Search results for: James Zhang
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1303

Search results for: James Zhang

1243 Efficacy of In-Situ Surgical vs. Needle Revision on Late Failed Trabeculectomy Blebs

Authors: Xie Xiaobin, Zhang Yan, Shi Yipeng, Sun Wenying, Chen Shuang, Cai Zhipeng, Zhang Hong, Zhang Lixia, Xie Like

Abstract:

Objective: The objective of this research is to compare the efficacy of the late in-situ surgical revision augmented with continuous infusion and needle revision on failed trabeculectomy blebs. Methods From December 2018 to December 2021, a prospective randomized controlled trial was performed on 44 glaucoma patients with failed bleb ≥ 6months with medically uncontrolled in Eye Hospital, China Academy of Chinese Medical Sciences. They were randomly divided into two groups. 22 eyes of 22 patients underwent the late in-situ surgical revision with continuous anterior chamber infusion in the study group, and 22 of 22 patients were treated with needle revision in the control group. Main outcome measures include preoperative and postoperative intraocular pressure (IOP), the number of anti-glaucoma medicines, the operation success rate, and the postoperative complications. Results The postoperative IOP values decreased significantly from the baseline in both groups (both P<0.05). IOP was significantly lower in the study group than in the control group at one week, 1, and 3 months postoperatively (all P<0.05). IOP reductions in the study group were substantially more prominent than in the control group at all postoperative time points (all P<0.05). The complete success rate in the study group was significantly higher than in the control group (71.4% vs. 33.3%, P<0.05), while the complete failure rate was significantly lower in the study group (0% vs. 28.5%, P<0.05). According to Cox’s proportional hazards regression analysis, high IOP at baseline was independently associated with increased risks of complete failure (adjusted hazard ratio=1.141, 95% confidence interval=1.021-1.276, P<0.05). There was no significant difference in the incidence of postoperative complications between the two groups (P>0.05). Conclusion: Both in-situ surgical and needle revision have acceptable success rates and safety for the late failed trabeculectomy blebs, while the former is likely to have a higher level of efficacy over the latter. Needle revision may be insufficient for eyes with low target IOP.

Keywords: glaucoma, trabeculectomy blebs, in-situ surgical revision, needle revision

Procedia PDF Downloads 67
1242 Artificial Neurons Based on Memristors for Spiking Neural Networks

Authors: Yan Yu, Wang Yu, Chen Xintong, Liu Yi, Zhang Yanzhong, Wang Yanji, Chen Xingyu, Zhang Miaocheng, Tong Yi

Abstract:

Neuromorphic computing based on spiking neural networks (SNNs) has emerged as a promising avenue for building the next generation of intelligent computing systems. Owing to its high-density integration, low power, and outstanding nonlinearity, memristors have attracted emerging attention on achieving SNNs. However, fabricating a low-power and robust memristor-based spiking neuron without extra electrical components is still a challenge for brain-inspired systems. In this work, we demonstrate a TiO₂-based threshold switching (TS) memristor to emulate a leaky integrate-and-fire (LIF) neuron without auxiliary circuits, used to realize single layer fully connected (FC) SNNs. Moreover, our TiO₂-based resistive switching (RS) memristors realize spiking-time-dependent-plasticity (STDP), originating from the Ag diffusion-based filamentary mechanism. This work demonstrates that TiO2-based memristors may provide an efficient method to construct hardware neuromorphic computing systems.

Keywords: leaky integrate-and-fire, memristor, spiking neural networks, spiking-time-dependent-plasticity

Procedia PDF Downloads 97
1241 Comparison of Interactive Performance of Clicking Tasks Using Cursor Control Devices under Different Feedback Modes

Authors: Jinshou Shi, Xiaozhou Zhou, Yingwei Zhou, Tuoyang Zhou, Ning Li, Chi Zhang, Zhanshuo Zhang, Ziang Chen

Abstract:

In order to select the optimal interaction method for common computer click tasks, the click experiment test adopts the ISO 9241-9 task paradigm, using four common operations: mouse, trackball, touch, and eye control under visual feedback, auditory feedback, and no feedback. Through data analysis of various parameters of movement time, throughput, and accuracy, it is found that the movement time of touch-control is the shortest, the operation accuracy and throughput are higher than others, and the overall operation performance is the best. In addition, the motion time of the click operation with auditory feedback is significantly lower than the other two feedback methods in each operation mode experiment. In terms of the size of the click target, it is found that when the target is too small (less than 14px), the click performance of all aspects is reduced, so it is proposed that the design of the interface button should not be less than 28px. In this article, we discussed in detail the advantages and disadvantages of the operation and feedback methods, and the results of the discussion of the click operation can be applied to the design of the buttons in the interactive interface.

Keywords: cursor control performance, feedback, human computer interaction, throughput

Procedia PDF Downloads 169
1240 Self-Attention Mechanism for Target Hiding Based on Satellite Images

Authors: Hao Yuan, Yongjian Shen, Xiangjun He, Yuheng Li, Zhouzhou Zhang, Pengyu Zhang, Minkang Cai

Abstract:

Remote sensing data can provide support for decision-making in disaster assessment or disaster relief. The traditional processing methods of sensitive targets in remote sensing mapping are mainly based on manual retrieval and image editing tools, which are inefficient. Methods based on deep learning for sensitive target hiding are faster and more flexible. But these methods have disadvantages in training time and cost of calculation. This paper proposed a target hiding model Self Attention (SA) Deepfill, which used self-attention modules to replace part of gated convolution layers in image inpainting. By this operation, the calculation amount of the model becomes smaller, and the performance is improved. And this paper adds free-form masks to the model’s training to enhance the model’s universal. The experiment on an open remote sensing dataset proved the efficiency of our method. Moreover, through experimental comparison, the proposed method can train for a longer time without over-fitting. Finally, compared with the existing methods, the proposed model has lower computational weight and better performance.

Keywords: remote sensing mapping, image inpainting, self-attention mechanism, target hiding

Procedia PDF Downloads 92
1239 An MrPPG Method for Face Anti-Spoofing

Authors: Lan Zhang, Cailing Zhang

Abstract:

In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.

Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG

Procedia PDF Downloads 145
1238 Thermodynamic Performance Tests for 3D Printed Steel Slag Powder Concrete Walls

Authors: Li Guoyou, Zhang Tao, Ji Wenzhan, Huo Liang, Lin Xiqiang, Zhang Nan

Abstract:

The three dimensional (3D) printing technology has undergone rapid development in the last few years and it is possible to print engineering structures. 3D printing buildings use wastes from constructions, industries and mine tailings as “ink”, and mix it with property improved materials, such as cement, fiber etc. This paper presents a study of the Thermodynamic performance of 3D printed walls using cement and steel slag powder. Analyses the thermal simulation regarding 3D printed walls and solid brick wall by the way of the hot-box methods and the infrared technology, and the results were contrasted with theoretical calculation. The results show that the excellent thermodynamic performance of 3D printed concrete wall made it suitable as the partial materials for self-thermal insulation walls in residential buildings. The thermodynamic performance of 3D printed concrete walls depended on the density of materials, distribution of holes, and the filling materials. Decreasing the density of materials, increasing the number of holes or replacing the filling materials with foamed concrete could improve its thermodynamic performance significantly. The average of heat transfer coefficient and thermal inertia index of 3D printed steel slag powder concrete wall all better than the traditional solid brick wall with a thickness of 240mm.

Keywords: concrete, 3D printed walls, thermodynamic performance, steel slag powder

Procedia PDF Downloads 159
1237 Distributed Optical Fiber Vibration Sensing Using Phase Generated Carrier Demodulation Algorithm

Authors: Zhihua Yu, Qi Zhang, Mingyu Zhang, Haolong Dai

Abstract:

Distributed fiber-optic vibration sensors are gaining extensive attention, for the advantages of high sensitivity, accurate location, light weight, large-scale monitoring, good concealment, and etc. In this paper, a novel optical fiber distributed vibration sensing system is proposed, which is based on self-interference of Rayleigh backscattering with phase generated carrier (PGC) demodulation algorithm. Pulsed lights are sent into the sensing fiber and the Rayleigh backscattering light from a certain position along the sensing fiber would interfere through an unbalanced Michelson Interferometry (MI) to generate the interference light. An improved PGC demodulation algorithm is carried out to recover the phase information of the interference signal, which carries the sensing information. Three vibration events were applied simultaneously to different positions over 2000m sensing fiber and demodulated correctly. Experiments show that the spatial resolution of is 10 m, and the noise level of the Φ-OTDR system is about 10-3 rad/√Hz, and the signal to noise ratio (SNR) is about 30.34dB. This vibration measurement scheme can be applied at surface, seabed or downhole for vibration measurements or distributed acoustic sensing (DAS).

Keywords: fiber optics sensors, Michelson interferometry, MI, phase-sensitive optical time domain reflectometry, Φ-OTDR, phase generated carrier, PGC

Procedia PDF Downloads 161
1236 Association Between Hip Internal and External Rotation Range of Motion and Low Back Pain in Table Tennis Players

Authors: Kaili Wang, Botao Zhang, Enming Zhang

Abstract:

Background: Low back pain (LBP) is a common problem affecting athletes' training and competition. Although the association between a limited hip range of motion and prevalence of low back pain has been studied extensively, it has not been studied in table tennis. Aim: The main purposes of this study in table tennis players were (1) to investigate if there is a difference in hip internal rotation (HIR) and external rotation (HER) range of motion (ROM) between players with LBP and players without LBP and (2) to analyze the association between HIR and HER ROM and LBP. Methods: Forty-six table tennis players from the Chinese table tennis team were evaluated for passive maximum HIR and HER ROM. LBP was retrospectively recorded for the last 12 months before the date of ROM assessment by a physical therapist. The data were analyzed the difference in HIR and HER ROM between players with LBP and players without LBP by Mann-Whitney U test, and the association between the difference in HIR and HER ROM and LBP was analyzed via a binary logistic regression. Results: The 54% of players had developed LBP during the retrospective study period. Significant difference between LBP group and the asymptomatic group for HIR ROM (z=4.007, p<0.001) was observed. Difference between LBP group and asymptomatic group for HER ROM (z=1.117, p=0.264) was not significant. Players who had HIR ROM deficit had an increased risk of LBP compared with players without HIR ROM deficit (OR=5.344, 95%CI: 1.006-28.395, P=0.049). Conclusion: HIR ROM of a table tennis player with LBP was less than a table tennis player without LBP. Compared with player whose HIR ROM was normal, player who had HIR ROM deficit appeared to have a higher risk for LBP.

Keywords: assessment, injury prevention, low back pain, table tennis players

Procedia PDF Downloads 87
1235 Biological Control of Blue Mold Disease of Grapes by Pichia anomala Supplemented by Chitosan and Its Possible Control Mechanism

Authors: Esa Abiso Godana, Qiya Yang, Kaili Wang, Zhang Hongyin, Xiaoyun Zhang, Lina Zhao

Abstract:

Blue mold decay caused by Penicillium expansum is among the recent identified diseases of grapes (Vitis vinifera). The increasing concern about use of chemical substance and pesticide in postharvest fruit push the trends of research toward biocontrol strategies which are more sustainable and ecofriendly. In this study, we determined the biocontrol efficacy of Pichia anomala alone and supplemented with 1% chitosan in the grapefruit against blue mold disease caused by P. expansum. The result showed that 1% chitosan better enhances the biocontrol efficacy P. anomala. Chitosan (1% w/v) also improved the number of population of P. anomala in grape wounds, surface and on nutrient yeast dextrose broth (NYDB). P. anomala supplemented with 1% w/v chitosan significantly reduced the disease incidence, lesion diameter and natural decay of grapefruits without affecting the fruit quality as compared to the control. The scanned electron microscope (SEM) concisely illustrates how the high number of yeast cells on the wounds reduced the growth of P. expansum. P. anomala alone or P. anomala supplemented with 1% w/v chitosan are presented as a potential biocontrol alternative against the postharvest blue mold of grapefruit.

Keywords: biocontrol, Pichia anomala, chitosan, Penicillium expansum, grape

Procedia PDF Downloads 85
1234 Collective Behavior of Mice Passing through a Middle-Exit or Corner-Exit under Panic

Authors: Teng Zhang, Xuelin Zhang, Shouxiang Lu, Changhai Li

Abstract:

The existence of animal groups and collective migration are common in nature, and collective behavior is attracting more and more attention of researchers. Previous results have shown that architectural design had an important effect on the process of crowd evacuation. In this paper, collective behavior of mice passing through a middle-exit or corner-exit under panic was investigated. Selfish behavior and herd behavior were easily observed in our video, which caused the congregation with high density near the exit. Triangle structure of congregation formed near the middle-exit while arch structure formed near the corner-exit. It is noteworthy that the exit located at the middle of the wall was more effective for evacuation than at the corner. Meanwhile, the escape sequence of mouse passing through the exit was investigated, and the result showed that the priority depends largely on its location in the congregation. With the level of stimulus increasing, these phenomena still exist. The frequency distributions of time intervals and the burst sizes were also analyzed in this study to explore the secret of collective behavior of mice. These results could provide evidence for the hypothesis or prediction about human behavior in crowd evacuation. However, it is not clear whether the simulated results from different species can correspond to reality or not. Broader comparison among different species about this topic will be eager to be conducted to deepen our understanding of collective behavior in nature.

Keywords: collective behavior, mice, evacuation, exit location

Procedia PDF Downloads 278
1233 Attitudes Towards the Supernatural in Benjamin Britten’s The Turn of the Screw

Authors: Yaou Zhang

Abstract:

Background: Relatively little scholarly attention has been paid to the production of Benjamin Britten’s chamber opera The Turn of the Screw. As one of Britten’s most remarkable operas. The story of the libretto was from Henry James’s novella of the same name. The novella was created in 1898 and one of the primary questions addressed to people in the story is “how real the ghosts are,” which leads the story to a huge ambiguity in readers’ minds. Aims: This research focuses on the experience of seeing the opera on stage over several decades. This study of opera productions over time not only provides insight into how stage performances can alter audience members' perceptions of the opera in the present but also reveals a landscape of shifting aesthetics and receptions. Methods: To examine the hypotheses in interpretation and reception, the qualitative analysis is used to examine the figures of ghosts in different productions across the time from 1954 to 2021 in the UK: by accessing recordings, newspapers, and reviews for the productions that are sourced from online and physical archives. For instance, the field research is conducted on the topic by arranging interviews with the creative team and visiting Opera North in Leeds and Britten-Pears Foundation. The collected data reveals the “hidden identity” in creative teams’ interpretations, social preferences, and rediscover that have previously remained unseen. Results: This research presents an angle of Britten’s Screw by using the third position; it shows how the attention moved from the stage of “do the ghosts really exist” to “traumatised children.” Discussion: Critics and audiences have debated whether the governess hallucinates the ghosts in the opera for decades. While, in recent years, directors of new productions have given themselves the opportunity to go deeper into Britten's musical structure and offer the opera more space to be interpreted, rather than debating if "ghosts actually exist" or "the psychological problems of the governess." One can consider and reflect that the questionable actions of the children are because they are suffering from trauma, whether the trauma comes from the ghosts, the hallucinating governess, or some prior experiences: various interpretations cause one result that children are the recipients of trauma. Arguably, the role of the supernatural is neither simply one of the elements of a ghost story nor simply one of the parts of the ambiguity between the supernatural and the hallucination of the governess; rather, the ghosts and the hallucinating governess can exist at the same time - the combination of the supernatural’s and the governess’s behaviours on stage generates a sharper and more serious angle that draws our attention to the traumatized children.

Keywords: benjamin britten, chamber opera, production, reception, staging, the turn of the screw

Procedia PDF Downloads 77
1232 Finite Element Analysis of Piezolaminated Structures with Both Geometric and Electroelastic Material Nonlinearities

Authors: Shun-Qi Zhang, Shu-Yang Zhang, Min Chen, , Jing Bai

Abstract:

Piezoelectric laminated smart structures can be subjected to the strong driving electric field, which may result in large displacements and rotations. In one hand, piezoelectric materials usually behave very significant material nonlinear effects under strong electric fields. On the other hand, thin-walled structures undergoing large displacements and rotations exist nonnegligible geometric nonlinearity. In order to give a precise prediction of piezo laminated smart structures under the large electric field, this paper develops a finite element (FE) model accounting for material nonlinearity (piezoelectric part) and geometric nonlinearity based on the first order shear deformation (FSOD) hypothesis. The proposed FE model is first validated by both experimental and numerical examples from the literature. Afterwards, it is applied to simulate for plate and shell structures with multiple piezoelectric patches under the strong applied electric field. From the simulation results, it shows that large discrepancies occur between linear and nonlinear predictions for piezoelectric laminated structures driving at the strong electric field. Therefore, both material and geometric nonlinearities should be taken into account for piezoelectric structures under strong electric.

Keywords: piezoelectric smart structures, finite element analysis, geometric nonlinearity, electroelastic material nonlinearities

Procedia PDF Downloads 289
1231 A Convergent Interacting Particle Method for Computing Kpp Front Speeds in Random Flows

Authors: Tan Zhang, Zhongjian Wang, Jack Xin, Zhiwen Zhang

Abstract:

We aim to efficiently compute the spreading speeds of reaction-diffusion-advection (RDA) fronts in divergence-free random flows under the Kolmogorov-Petrovsky-Piskunov (KPP) nonlinearity. We study a stochastic interacting particle method (IPM) for the reduced principal eigenvalue (Lyapunov exponent) problem of an associated linear advection-diffusion operator with spatially random coefficients. The Fourier representation of the random advection field and the Feynman-Kac (FK) formula of the principal eigenvalue (Lyapunov exponent) form the foundation of our method implemented as a genetic evolution algorithm. The particles undergo advection-diffusion and mutation/selection through a fitness function originated in the FK semigroup. We analyze the convergence of the algorithm based on operator splitting and present numerical results on representative flows such as 2D cellular flow and 3D Arnold-Beltrami-Childress (ABC) flow under random perturbations. The 2D examples serve as a consistency check with semi-Lagrangian computation. The 3D results demonstrate that IPM, being mesh-free and self-adaptive, is simple to implement and efficient for computing front spreading speeds in the advection-dominated regime for high-dimensional random flows on unbounded domains where no truncation is needed.

Keywords: KPP front speeds, random flows, Feynman-Kac semigroups, interacting particle method, convergence analysis

Procedia PDF Downloads 16
1230 Some Results on the Generalized Higher Rank Numerical Ranges

Authors: Mohsen Zahraei

Abstract:

‎In this paper, ‎the notion of ‎rank-k numerical range of rectangular complex matrix polynomials‎ ‎are introduced. ‎Some algebraic and geometrical properties are investigated. ‎Moreover, ‎for ε>0 the notion of Birkhoff-James approximate orthogonality sets for ε-higher ‎rank numerical ranges of rectangular matrix polynomials is also introduced and studied. ‎The proposed definitions yield a natural generalization of the standard higher rank numerical ranges.

Keywords: ‎‎Rank-k numerical range‎, ‎isometry‎, ‎numerical range‎, ‎rectangular matrix polynomials

Procedia PDF Downloads 424
1229 Automata-Based String Analysis for Detecting Malware in Android Programs

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We design and implement a precise model of string operations using finite state machine transformers and state transformers to approximate the values string variables can take throughout the execution of the program.We use our model to analyze Android program string variables. Our experimental results show that our string analysis is very efficient at detecting the contextual effect of string operations on the string variables. Our model proved to be very useful when it came to verifying statements about the string variables of the program.

Keywords: abstract interpretation, android, static analysis, string analysis

Procedia PDF Downloads 154
1228 Effect of Experience on Evacuation of Mice in Emergency Conditions

Authors: Teng Zhang, Shenshi Huang, Gang Xu, Xuelin Zhang, Shouxiang Lu

Abstract:

With the acceleration of urbanization and the increasing of the population in the city, the evacuation of pedestrians suffering from disaster environments such as fire in a room or other limited space becomes a vital issue in modern society. Mice have been used in experimental crowd evacuation in recent years for its good similarities to human in physical structure and stress reaction. In this study, the effect of experience or memory on the collective behavior of mice was explored. To help mice familiarize themselves with the design of the space and the stimulus caused by smoke, we trained them repeatedly for 2 days so that they can escape from the emergency conditions as soon as possible. The escape pattern, trajectories, walking speed, turning angle and mean individual escape time of mice in each training trail were analyzed. We found that mice can build memory quickly after the first trial on the first day. On the second day, the evacuation of mice was maintained in a stable and efficient state. Meanwhile, the group with size of 30 (G30) had a shorter mean individual escape time compared with G12. Furthermore, we tested the experience of evacuation skill of mice after several days. The results showed that the mice can hold the experience or memory over 3 weeks. We proposed the importance of experience of evacuation skill and the research of training methods in experimental evacuation of mice. The results can deepen our understanding of collective behavior of mice and conduce to the establishment of animal models in the study of pedestrian crowd dynamics in emergency conditions.

Keywords: experience, evacuation, mice, group size, behavior

Procedia PDF Downloads 240
1227 Asymmetric Synthesis of β- and γ-Borylated Amines via Rh-Catalyzed Hydroboration of Allylamine Derivatives

Authors: Rukshani Wickrama-Arachchi, Tanner Metz, James M. Takacs

Abstract:

Amines bearing γ-stereocenters are important structural motifs found in many biologically active compounds. Regioselective Rh-catalyzed asymmetric hydroboration of acyclic allylamines is used to synthesize amines bearing chiral β- and γ-boronic esters yields up to 70% with 98:2 enantioselectivity. The major enantiomeric outcome can be independent of starting alkene geometry, revealing that cis/trans-isomerization of alkene can occur before hydroboration. Stereospecific transformations of the newly generated C-B bond illustrates the utility of these chiral synthons.

Keywords: allylamines, borylated amines, chiral amines, hydroboration, rhodium-catalysis

Procedia PDF Downloads 155
1226 Regulating Nanocarrier and Mononuclear Phagocyte System Interactions through Esomeprazole-Based Preconditioning Strategy

Authors: Zakia Belhadj, Bing He, Hua Zhang, Xueqing Wang, Wenbing Dai, Qiang Zhang

Abstract:

Mononuclear phagocyte system (MPS) forms an abominable obstacle hampering the tumor delivery efficiency of nanoparticles. Passively targeted nanocarriers have received clinical approval over the past 20 years. However, none of the actively targeted nanocarriers have entered clinical trials. Thus it is important to endue effective targeting ability to actively targeted approaches by overcoming biological barriers to nanoparticle drug delivery. Here, it presents that an Esomeprazole-based preconditioning strategy for regulating nanocarrier-MPS interaction to substantially prolong circulation time and enhance tumor targeting of nanoparticles. In vitro, the clinically approved proton pump inhibitor Esomeprazole “ESO” was demonstrated to reduce interactions between macrophages and subsequently injected targeted vesicles by interfering with their lysosomal trafficking. Of note, in vivo studies demonstrated that ESO pretreatment greatly decreased the liver and spleen uptake of c(RGDm7)-modified vesicles, highly enhanced their tumor accumulation, thereby provided superior therapeutic efficacy of c(RGDm7)-modified vesicles co-loaded with Doxorubicin (DOX) and Gefitinib (GE). This MPS-preconditioning strategy using ESO provides deeper insights into regulating nanoparticles interaction with the phagocytic system and enhancing their cancer cells' accessibility for anticancer therapy.

Keywords: esomeprazole (ESO), mononuclear phagocyte system (MPS), preconditioning strategy, targeted lipid vesicles

Procedia PDF Downloads 150
1225 Novel EGFR Ectodomain Mutations and Resistance to Anti-EGFR and Radiation Therapy in H&N Cancer

Authors: Markus Bredel, Sindhu Nair, Hoa Q. Trummell, Rajani Rajbhandari, Christopher D. Willey, Lewis Z. Shi, Zhuo Zhang, William J. Placzek, James A. Bonner

Abstract:

Purpose: EGFR-targeted monoclonal antibodies (mAbs) provide clinical benefit in some patients with H&N squamous cell carcinoma (HNSCC), but others progress with minimal response. Missense mutations in the EGFR ectodomain (ECD) can be acquired under mAb therapy by mimicking the effect of large deletions on receptor untethering and activation. Little is known about the contribution of EGFR ECD mutations to EGFR activation and anti-EGFR response in HNSCC. Methods: We selected patient-derived HNSCC cells (UM-SCC-1) for resistance to mAb Cetuximab (CTX) by repeated, stepwise exposure to mimic what may occur clinically and identified two concurrent EGFR ECD mutations (UM-SCC-1R). We examined the competence of the mutants to bind EGF ligand or CTX. We assessed the potential impact of the mutations through visual analysis of space-filling models of the native sidechains in the original structures vs. their respective side-chain mutations. We performed CRISPR in combination with site-directed mutagenesis to test for the effect of the mutants on ligand-independent EGFR activation and sorting. We determined the effects on receptor internalization, endocytosis, downstream signaling, and radiation sensitivity. Results: UM-SCC-1R cells carried two non-synonymous missense mutations (G33S and N56K) mapping to domain I in or near the EGF binding pocket of the EGFR ECD. Structural modeling predicted that these mutants restrict the adoption of a tethered, inactive EGFR conformation while not permitting association of EGFR with the EGF ligand or CTX. Binding studies confirmed that the mutant, untethered receptor displayed a reduced affinity for both EGF and CTX but demonstrated sustained activation and presence at the cell surface with diminished internalization and sorting for endosomal degradation. Single and double-mutant models demonstrated that the G33S mutant is dominant over the N56K mutant in its effect on EGFR activation and EGF binding. CTX-resistant UM-SCC-1R cells demonstrated cross-resistance to mAb Panitumuab but, paradoxically, remained sensitive to the reversible receptor tyrosine kinase inhibitor Erlotinib. Conclusions: HNSCC cells can select for EGFR ECD mutations under EGFR mAb exposure that converge to trap the receptor in an open, constitutively activated state. These mutants impede the receptor’s competence to bind mAbs and EGF ligand and alter its endosomal trafficking, possibly explaining certain cases of clinical mAb and radiation resistance.

Keywords: head and neck cancer, EGFR mutation, resistance, cetuximab

Procedia PDF Downloads 58
1224 Analysis of Decentralized on Demand Cross Layer in Cognitive Radio Ad Hoc Network

Authors: A. Sri Janani, K. Immanuel Arokia James

Abstract:

Cognitive radio ad hoc networks different unlicensed users may acquire different available channel sets. This non-uniform spectrum availability imposes special design challenges for broadcasting in CR ad hoc networks. Cognitive radio automatically detects available channels in wireless spectrum. This is a form of dynamic spectrum management. Cross-layer optimization is proposed, using this can allow far away secondary users can also involve into channel work. So it can increase the throughput and it will overcome the collision and time delay.

Keywords: cognitive radio, cross layer optimization, CR mesh network, heterogeneous spectrum, mesh topology, random routing optimization technique

Procedia PDF Downloads 334
1223 An Analysis of Business Intelligence Requirements in South African Corporates

Authors: Adheesh Budree, Olaf Jacob, Louis CH Fourie, James Njenga, Gabriel D Hoffman

Abstract:

Business Intelligence (BI) is implemented by organisations for many reasons and chief among these is improved data support, decision support and savings. The main purpose of this study is to determine BI requirements and availability within South African organisations. The study addresses the following areas as identified as part of a literature review; assessing BI practices in businesses over a range of industries, sectors and managerial functions, determining the functionality of BI (technologies, architecture and methods). It was found that the overall satisfaction with BI in larger organisations is low due to lack of ability to meet user requirements.

Keywords: business intelligence, business value, data management, South Africa

Procedia PDF Downloads 547
1222 A Machine Learning-Assisted Crime and Threat Intelligence Hunter

Authors: Mohammad Shameel, Peter K. K. Loh, James H. Ng

Abstract:

Cybercrime is a new category of crime which poses a different challenge for crime investigators and incident responders. Attackers can mask their identities using a suite of tools and with the help of the deep web, which makes them difficult to track down. Scouring the deep web manually takes time and is inefficient. There is a growing need for a tool to scour the deep web to obtain useful evidence or intel automatically. In this paper, we will explain the background and motivation behind the research, present a survey of existing research on related tools, describe the design of our own crime/threat intelligence hunting tool prototype, demonstrate its capability with some test cases and lastly, conclude with proposals for future enhancements.

Keywords: cybercrime, deep web, threat intelligence, web crawler

Procedia PDF Downloads 143
1221 Visualisation in Health Communication: Taking Weibo Interaction in COVD19 as the Example

Authors: Zicheng Zhang, Linli Zhang

Abstract:

As China's biggest social media platform, Weibo has taken on essential health communication responsibilities during the pandemic. This research takes 105 posters in 15 health-related official Weibo accounts as the analysis objects to explore COVID19 health information communication and visualisation. First, the interaction between the audiences and Weibo, including forwarding, comments, and likes, is statistically analysed. The comments about the information design are extracted manually, and then the sentiment analysis is carried out to verdict audiences' views about the poster's design. The forwarding and comments are quantified as the attention index for a reference to the degree of likes. In addition, this study also designed an evaluation scale based on the standards of Health Literacy Resource by the Centers for Medicare& Medicaid Services (US). Then designers scored all selected posters one by one. Finally, combining the data of the two parts, concluded that: 1. To a certain extent, people think that the posters do not deliver substantive and practical information; 2. Non-knowledge posters(i.e., cartoon posters) gained more Forwarding and Likes, such as Go, Wuhan poster; 3. The analysis of COVID posters is still mainly picture-oriented, mainly about encouraging people to overcome difficulties; 4. Posters for pandemic prevention usually contain more text and fewer illustrations and do not clearly show cultural differences. In conclusion, health communication usually involves a lot of professional knowledge, so visualising that knowledge in an accessible way for the general public is challenging. The relevant posters still have the problems of lack of effective communication, superficial design, and insufficient content accessibility.

Keywords: weibo, visualisation, covid posters, poster design

Procedia PDF Downloads 95
1220 Dry Friction Fluctuations in Plain Journal Bearings

Authors: James Moran, Anusarn Permsuwan

Abstract:

This paper compares oscillations in the dry friction coefficient in different journal bearings. Measurements are made of the average and standard deviation in the coefficient of friction as a function of sliding velocity. The standard deviation of the friction coefficient changed dramatically with sliding velocity. The magnitude and frequency of the oscillations were a function of the velocity. A numerical model was developed for the frictional oscillations. There was good agreement between the model and results. Five different materials were used as the sliding surfaces in the experiments, Aluminum, Bronze, Mild Steel, Stainless Steel, and Nylon.

Keywords: Coulomb friction, dynamic friction, non-lubricated bearings, frictional oscillations

Procedia PDF Downloads 333
1219 A New Car-Following Model with Consideration of the Brake Light

Authors: Zhiyuan Tang, Ju Zhang, Wenyuan Wu

Abstract:

In this research, a car-following model with consideration of the status of the brake light is proposed. The numerical results show that the stability of the traffic flow is improved. The ability of the brake light to reduce car accident is also showed.

Keywords: brake light, car-following model, traffic flow, regional planning, transportation

Procedia PDF Downloads 548
1218 Investigation of Shear Thickening Fluid Isolator with Vibration Isolation Performance

Authors: M. C. Yu, Z. L. Niu, L. G. Zhang, W. W. Cui, Y. L. Zhang

Abstract:

According to the theory of the vibration isolation for linear systems, linear damping can reduce the transmissibility at the resonant frequency, but inescapably increase the transmissibility of the isolation frequency region. To resolve this problem, nonlinear vibration isolation technology has recently received increasing attentions. Shear thickening fluid (STF) is a special colloidal material. When STF is subject to high shear rate, it rheological property changes from a flowable behavior into a rigid behavior, i.e., it presents shear thickening effect. STF isolator is a vibration isolator using STF as working material. Because of shear thickening effect, STF isolator is a variable-damped isolator. It exhibits small damping under high vibration frequency and strong damping at resonance frequency due to shearing rate increasing. So its special inherent character is very favorable for vibration isolation, especially for restraining resonance. In this paper, firstly, STF was prepared by dispersing nano-particles of silica into polyethylene glycol 200 fluid, followed by rheological properties test. After that, an STF isolator was designed. The vibration isolation system supported by STF isolator was modeled, and the numerical simulation was conducted to study the vibration isolation properties of STF. And finally, the effect factors on vibrations isolation performance was also researched quantitatively. The research suggests that owing to its variable damping, STF vibration isolator can effetely restrain resonance without bringing unfavorable effect at high frequency, which meets the need of ideal damping properties and resolves the problem of traditional isolators.

Keywords: shear thickening fluid, variable-damped isolator, vibration isolation, restrain resonance

Procedia PDF Downloads 146
1217 Improving Taint Analysis of Android Applications Using Finite State Machines

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We present a taint analysis that can automatically detect when string operations result in a string that is free of taints, where all the tainted patterns have been removed. This is an improvement on the conservative behavior of previous taint analyzers, where a string operation on a tainted string always leads to a tainted string unless the operation is manually marked as a sanitizer. The taint analysis is built on top of a string analysis that uses finite state automata to approximate the sets of values that string variables can take during the execution of a program. The proposed approach has been implemented as an extension of FlowDroid and experimental results show that the resulting taint analyzer is much more precise than the original FlowDroid.

Keywords: android, static analysis, string analysis, taint analysis

Procedia PDF Downloads 149
1216 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems

Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh

Abstract:

It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.

Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property

Procedia PDF Downloads 169
1215 The Metabolite Profiling of Fulvestrant-3 Boronic Acid under Biological Oxidation

Authors: Changde Zhang, Qiang Zhang, Shilong Zheng, Jiawang Liu, Shanchun Guo, Qiu Zhong, Guangdi Wang

Abstract:

Fulvestrant was approved by FDA to treat breast cancer as a selective estrogen receptor downregulator (SERD) with intramuscular injection administration. ZB716, a fulvestarnt-3 boronic acid, is an SERD with comparable anticancer effect to fulvestrant, but could produce good pharmacokinetic properties under oral administration with mice or rat models. To understand why ZB716 produced much better oral bioavailability, it was proposed that the boronic acid blocked the phase II direct biotransformation with the hydroxyl group on the 3 position of the aromatic ring on fulvestrant. In this study, ZB716 or fulvestrant was incubated with human liver microsome and oxidation cofactor NADPH in vitro. Their metabolites after oxidation were profiled with the Q-Exactive, a high-resolution mass spectrometer. The result showed that ZB716 blocked the forming of hydroxyl groups on its benzene ring except for the oxidation of C-B bond forming fulvestrant in its metabolites, and the concentration of fulvestrant with one more hydroxyl group found in the metabolites from incubation with fulvestrant was about 34 fold high as that formed from incubation with ZB716. Compared to fulvestrant, ZB716 is expected to be much difficult to be further bio-transformed into more hydrophilic compounds, to be difficult excreted out of blood system, and to have longer residence time in blood, which can lead to higher oral bioavailability. This study provided evidence to explain the high bioavailability of ZB716 after oral administration from the perspective of its difficulty of oxidation, a phase I biotransformation, on positions on its aromatic ring.

Keywords: biotransformation, fulvestrant, metabolite profiling, ZB716

Procedia PDF Downloads 229
1214 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 126