Search results for: access to drugs
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4335

Search results for: access to drugs

4245 Binding Studies of Complexes of Anticancer Drugs with DNA and Enzymes Involved in DNA Replication Using Molecular Docking and Cell Culture Techniques

Authors: Fouzia Perveen, Rumana Qureshi

Abstract:

The presently studied twelve anticancer drugs are the cytotoxic agents which inhibit the replication of DNA and activity of enzymes involved in DNA replication namely topoisomerase-II, polymerase and helicase and have shown remarkable anticancer activity in clinical trials. In this study, we performed molecular docking studies of twelve antitumor drugs against DNA and DNA enzymes in the presence and absence of ascorbic acid (AA) and developed the quantitative structure-activity relationship (QSAR) model for anticancer activity screening. A number of electronic and steric descriptors were calculated using MOE software package. QSAR was established showing a correlation of binding strength with various physicochemical descriptors. Out of these twelve, eight cytotoxic drugs were tested on Non-Small Cell Lung Cancer cell lines (H-157 and H-1299) in the absence and presence of ascorbic acid and experimental IC50 values were calculated. From the docking studies, binding constants were calculated indicating the strength of drug-DNA and drug-enzyme complex formation and it was correlated to the IC50 values (both experimental and theoretical). These results can offer useful references for directing the molecular design of DNA enzyme inhibitor with improved anticancer activity.

Keywords: ascorbic acid, binding constant, cytotoxic agents, cell culture, DNA, DNA enzymes, molecular docking

Procedia PDF Downloads 397
4244 A Systematic Review on Orphan Drugs Pricing, and Prices Challenges

Authors: Seyran Naghdi

Abstract:

Background: Orphan drug development is limited by very high costs attributed to the research and development and small size market. How health policymakers address this challenge to consider both supply and demand sides need to be explored for directing the policies and plans in the right way. The price is an important signal for pharmaceutical companies’ profitability and the patients’ accessibility as well. Objective: This study aims to find out the orphan drugs' price-setting patterns and approaches in health systems through a systematic review of the available evidence. Methods: The Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) approach was used. MedLine, Embase, and Web of Sciences were searched via appropriate search strategies. Through Medical Subject Headings (MeSH), the appropriate terms for pricing were 'cost and cost analysis', and it was 'orphan drug production', and 'orphan drug', for orphan drugs. The critical appraisal was performed by the Joanna-Briggs tool. A Cochrane data extraction form was used to obtain the data about the studies' characteristics, results, and conclusions. Results: Totally, 1,197 records were found. It included 640 hits from Embase, 327 from Web of Sciences, and 230 MedLine. After removing the duplicates, 1,056 studies remained. Of them, 924 studies were removed in the primary screening phase. Of them, 26 studies were included for data extraction. The majority of the studies (>75%) are from developed countries, among them, approximately 80% of the studies are from European countries. Approximately 85% of evidence has been produced in the recent decade. Conclusions: There is a huge variation of price-setting among countries, and this is related to the specific pharmacological market structure and the thresholds that governments want to intervene in the process of pricing. On the other hand, there is some evidence on the availability of spaces to reduce the very high costs of orphan drugs development through an early agreement between pharmacological firms and governments. Further studies need to focus on how the governments could incentivize the companies to agree on providing the drugs at lower prices.

Keywords: orphan drugs, orphan drug production, pricing, costs, cost analysis

Procedia PDF Downloads 144
4243 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 435
4242 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 282
4241 Rose geranium Essential Oil as a Source of New and Safe Anti-Inflammatory Drugs

Authors: M. A. Ferhat, M. N. Boukhatem, F. Chemat

Abstract:

Since the available anti-inflammatory drugs exert an extensive variety of side effects, the search for new anti-inflammatory agents has been a priority of pharmaceutical industries. The aim of the present study was to assess the anti-inflammatory activities of the essential oil of rose geranium (RGEO). The chemical composition of the RGEO was investigated by gas chromatography. The major components were citronellol (29.13%), geraniol (12.62%), and citronellyl formate (8.06%). In the carrageenan induced paw edema, five different groups were established and RGEO was administered orally in three different doses. RGEO (100 mg/kg) was able to significantly reduce the paw edema with a comparable effect to that observed with diclofenac, the positive control. In addition, RGEO showed a potent anti-inflammatory activity by topical treatment in the method of croton oil-induced ear edema. When the dose was 5 or 10 ml of RGEO per ear, the inflammation was reduced by 73 and 88%, respectively. This is the first report to demonstrate a significant anti-inflammatory activity of Algerian RGEO. In addition, histological analysis confirmed that RGEO inhibited the inflammatory responses in the skin. Our results indicate that RGEO may have significant potential for the development of novel anti-inflammatory drugs with improved safety profile.

Keywords: anti-inflammatory effect, carrageenan, citronellol, histopathology, Rose geranium

Procedia PDF Downloads 311
4240 Development of Self Emulsifying Drug Delivery Systems (SEDDS) of Anticancer Agents Used in AYUSH System of Medicine for Improved Oral Bioavailability Followed by Their Pharmacological Evaluation Using Biotechnological Techniques

Authors: Meenu Mehta, Munish Garg

Abstract:

The use of oral anticancer drugs from AYUSH system of medicine is widely increased among the society due to their low cost, enhanced efficacy, increased patient preference, lack of inconveniences related to infusion and they provide an opportunity to develop chronic treatment regimens. However, oral delivery of these drugs usually laid down by the limited bioavailability of the drug, which is associated with a wide variation. As most of the cytotoxic agents have a narrow therapeutic window and are dosed at or near the maximum tolerated dose, a wide variability in the bioavailability can negatively affect treatment result. It is estimated that 40% of active substances are poorly soluble in water. The improvement of bio-availability of drugs with such properties presents one of the greatest challenges in drug formulations. There are several techniques reported in literature. Among all these Self Emulsifying Drug Delivery System (SEDDS) has gained more attention due to enhanced oral bio-availability enabling a reduction in dose. Thus, SEDDS anticancer drugs will have the increased bioavailability and efficacy. These dosage form will provide societal benefit in a cost-effective manner as compared to other oral dosage forms. Present study reflects on the formulation strategies as SEDDS for oral anticancer agents of AYUSH system for enhanced bioavailability with proven efficacy by cancer cell lines.

Keywords: anticancer agents, AYUSH system, bioavailability, SEDDS

Procedia PDF Downloads 276
4239 Drug-Drug Interaction Prediction in Diabetes Mellitus

Authors: Rashini Maduka, C. R. Wijesinghe, A. R. Weerasinghe

Abstract:

Drug-drug interactions (DDIs) can happen when two or more drugs are taken together. Today DDIs have become a serious health issue due to adverse drug effects. In vivo and in vitro methods for identifying DDIs are time-consuming and costly. Therefore, in-silico-based approaches are preferred in DDI identification. Most machine learning models for DDI prediction are used chemical and biological drug properties as features. However, some drug features are not available and costly to extract. Therefore, it is better to make automatic feature engineering. Furthermore, people who have diabetes already suffer from other diseases and take more than one medicine together. Then adverse drug effects may happen to diabetic patients and cause unpleasant reactions in the body. In this study, we present a model with a graph convolutional autoencoder and a graph decoder using a dataset from DrugBank version 5.1.3. The main objective of the model is to identify unknown interactions between antidiabetic drugs and the drugs taken by diabetic patients for other diseases. We considered automatic feature engineering and used Known DDIs only as the input for the model. Our model has achieved 0.86 in AUC and 0.86 in AP.

Keywords: drug-drug interaction prediction, graph embedding, graph convolutional networks, adverse drug effects

Procedia PDF Downloads 63
4238 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 514
4237 The Mental Health Policy in the State of EspíRito Santo, Brazil: Judicialization

Authors: Fabiola Xavier Leal, Lara Campanharo, Sueli Aparecida Rodrigues Lucas

Abstract:

The phenomenon of judicialization in health policy brings with it a great deal of problematization, but in general, it means that some issues that were previously solved by traditional political bodies are being decided by the Judiciary bodies. It is, therefore, a controversial topic that has generated many reflections both in the academic and political fields, considering that not only a dispute of public funds is at stake, but also the debate on access to social rights provided for in the Brazilian Federal Constitution of 1988 and in the various public policies, such as healthcare. With regard to the phenomenon in the Mental Health Policy focusing on people who use drugs, the disputes that permeate this scenario are evident: moral, cultural, sanitary, economic, psychological aspects. There are also the individual and collective dimensions of suffering. And in this process, we all question: What is the role of the Brazilian State in this matter? In this context, another question that needs to be answered is the amount spent on this procedure in the state of Espírito Santo (ES), Brazil (in the last 04 years, around R$121,978,591.44 were paid only for compulsory hospitalization of individuals) in the field in question, which is the financing of the services of the Psychosocial Care Network (RAPS). Therefore, this article aims to problematize the phenomenon of judicialization in Mental Health Policy through the compulsory hospitalization of people who use drugs in Espírito Santo (ES). We proposed a study that sought to understand how this has been occurring and making an impact on the provision of RAPS services in the Espírito Santo scenario. Therefore, the general objective of this study is to analyze the expenses with compulsory hospitalizations for drug use carried out by the State Health Department (SESA) between 2014 and 2019, in which we will seek to identify its destination and the impact of these actions on public health policy. For the purposes of this article, we will present the preliminary data of this study, such as the amount spent by the state and the receiving institutions. For data collection, the following data sources were used: documents available publicly on the Transparency Portal (payments made per year, institutions that received, subjects hospitalized, period and the amount of the daily rates paid); as well as the processes generated by SESA through its own system - ONBASE. For qualitative analysis, content analysis was used; and for quantitative analysis, descriptive statistics was used. Thus, we seek to problematize the issue of judicialization for compulsory hospitalizations, considering the current situation in which this resource has been widely requested to legitimize the war on drugs. This scenario highlights the moral-legal discourse, pointing out strategies through the control of bodies and through faith as an alternative.

Keywords: compulsory hospitalization, drugs, judicialization, mental health

Procedia PDF Downloads 141
4236 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 264
4235 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 337
4234 Modern Contraceptives versus Traditional Contraceptives and Abortion: An Ethnography of Fertiliy Control Practices in Burkina Faso

Authors: Seydou Drabo

Abstract:

This paper examines how traditional contraceptives and abortion practices challenges the use of modern contraceptives in Burkina Faso. It demonstrates how fears and ‘superstitions’ interact with knowledge about modern contraceptives methods to determine use in a context where other way of controlling fertility (traditional contraceptives, abortion) are available to women in the public, private and traditional health sectors. Furthermore, these issues come at the time when Burkina Faso is among countries with a high fertility rate which (6.0 in 2010) and a very low used of contraceptives as only 16% of married women of childbearing age were using a contraceptive method in 2010. The country also has a young population since 33 % of the population is between 10-24 years old and this number is expected to increase by 2050, generating fears that a growing population of youth will put excessive pressure on available resources, including access to education, health services, and employment. Despite over two decades of dedicated policy attention, 24% of women of reproductive age (15-49) was estimated to have an unmet need for contraception in 2010. This paper draws on ethnographic fieldwork conducted since march 2016 (The research is still in progress) in Burkina Faso. Data were collected from 25 women (users and non-users of modern contraceptives and /or traditional contraceptives, post abortion care patients), 4 street drugs vendors and 3 traditional healers through formal and informal interviews, as well as direct observation. The findings show that a variety of contraceptives methods and abortion drugs or methods, both traditional and modern circulate and are available to women. Traditional contraceptives called African contraceptives by some of our participants refer to several birth control method including plants decoction, magical ring, waist necklace, a ritual done with a mixture of lay coming from termite mound and menses. Abortion is a practice that is done in secret through the use of abortion drugs or through intra uterine manoeuvres. Modern contraceptives include Oral contraceptive, implants, injectable. Stereotypes about modern contraceptives, having regular menstrual cycles and adopt of natural birth control methods, bad experience with modern contraceptives methods, the side effect of modern contraceptives, irregularity of sexual activities and the availability of emergency contraceptives are among factors that limit their use among women. In addition, a negative perception is built around modern contraceptives seen as the drug of ‘white people’. In general, the information on these drugs circulates in women’s social network (first line of information on contraceptive). Some women prefer using what they call African contraceptives or inducing an abortion over modern contraceptives because of their side effect. Furthermore, the findings show that women practices and attitudes in controlling birth varies throughout different phases of their lives. Beyond global discourses and technical solution, the issue of Family planning is all about social practices.

Keywords: abortion, Burkina Faso, contraception, culture, women

Procedia PDF Downloads 166
4233 Graph Clustering Unveiled: ClusterSyn - A Machine Learning Framework for Predicting Anti-Cancer Drug Synergy Scores

Authors: Babak Bahri, Fatemeh Yassaee Meybodi, Changiz Eslahchi

Abstract:

In the pursuit of effective cancer therapies, the exploration of combinatorial drug regimens is crucial to leverage synergistic interactions between drugs, thereby improving treatment efficacy and overcoming drug resistance. However, identifying synergistic drug pairs poses challenges due to the vast combinatorial space and limitations of experimental approaches. This study introduces ClusterSyn, a machine learning (ML)-powered framework for classifying anti-cancer drug synergy scores. ClusterSyn employs a two-step approach involving drug clustering and synergy score prediction using a fully connected deep neural network. For each cell line in the training dataset, a drug graph is constructed, with nodes representing drugs and edge weights denoting synergy scores between drug pairs. Drugs are clustered using the Markov clustering (MCL) algorithm, and vectors representing the similarity of drug pairs to each cluster are input into the deep neural network for synergy score prediction (synergy or antagonism). Clustering results demonstrate effective grouping of drugs based on synergy scores, aligning similar synergy profiles. Subsequently, neural network predictions and synergy scores of the two drugs on others within their clusters are used to predict the synergy score of the considered drug pair. This approach facilitates comparative analysis with clustering and regression-based methods, revealing the superior performance of ClusterSyn over state-of-the-art methods like DeepSynergy and DeepDDS on diverse datasets such as Oniel and Almanac. The results highlight the remarkable potential of ClusterSyn as a versatile tool for predicting anti-cancer drug synergy scores.

Keywords: drug synergy, clustering, prediction, machine learning., deep learning

Procedia PDF Downloads 40
4232 Learners’ Violent Behaviour and Drug Abuse as Major Causes of Tobephobia in Schools

Authors: Prakash Singh

Abstract:

Many schools throughout the world are facing constant pressure to cope with the violence and drug abuse of learners who show little or no respect for acceptable and desirable social norms. These delinquent learners tend to harbour feelings of being beyond reproach because they strongly believe that it is well within their rights to engage in violent and destructive behaviour. Knives, guns, and other weapons appear to be more readily used by them on the school premises than before. It is known that learners smoke, drink alcohol, and use drugs during school hours, hence, their ability to concentrate, work, and learn, is affected. They become violent and display disruptive behaviour in their classrooms as well as on the school premises, and this atrocious behaviour makes it possible for drug dealers and gangsters to gain access onto the school premises. The primary purpose of this exploratory quantitative study was therefore to establish how tobephobia (TBP), caused by school violence and drug abuse, affects teaching and learning in schools. The findings of this study affirmed that poor discipline resulted in producing poor quality education. Most of the teachers in this study agreed that educating learners who consumed alcohol and other drugs on the school premises resulted in them suffering from TBP. These learners are frequently abusive and disrespectful, and resort to violence to seek attention. As a result, teachers feel extremely demotivated and suffer from high levels of anxiety and stress. The word TBP will surely be regarded as a blessing by many teachers throughout the world because finally, there is a word that will make people sit up and listen to their problems that cause real fear and anxiety in schools.

Keywords: aims and objectives of quality education, debilitating effects of tobephobia, fear of failure associated with education, learners' violent behaviour and drug abuse

Procedia PDF Downloads 251
4231 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 242
4230 Scientific Perspectives on Autism Over Time

Authors: Gian Marco Di Feo

Abstract:

Purpose: The study was conducted to examine changes in the beliefs and contents of articles on autism since the mid-twentieth century. Characteristics analyzed were the mentioning of pharmaceutical drugs, country, and institution of the first author, methodologies used, journal, and the year of publication. Methods: All articles (N=566) analyzed were published between January 1st, 1943 and December 31st, 2021. Inter rater reliability was assessed and there was a 94.4 percent agreement amongst raters. All articles were analyzed through both PubMed and PsycInfo. Results: A one way chi square indicated that there was a significant number of articles expressing mixed beliefs on the cause of autism. Scientific perspectives on the cause of autism have changed significantly over time. Particularly, the belief of empiricism (environmental factors) has decreased significantly, while both mixed beliefs and nativism have increased remarkably. Additionally, the mentioning of pharmaceutical drugs is involved with the beliefs on the cause of autism. Conclusion: Articles in the twenty first century are most likely to express both nativist and empiricist viewpoints on the cause of autism. Articles that express mixed beliefs are most likely to mention drugs in their study. The results impact scientific self-understanding on autism and beliefs in high-income countries, and advance scientific understanding globally.

Keywords: autism, beliefs, nativism, empiricism, nature, nurture

Procedia PDF Downloads 45
4229 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 394
4228 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 338
4227 Pharmacokinetic and Tissue Distribution of Etoposide Loaded Modified Glycol Chitosan Nanoparticles

Authors: Akhtar Aman, Abida Raza, Shumaila Bashir, Mehboob Alam

Abstract:

The development of efficient delivery systems remains a major concern in cancer chemotherapy as many efficacious anticancer drugs are hydrophobic and difficult to formulate. Nanomedicines based on drug-loaded amphiphilic glycol chitosan micelles offer potential advantages for the formulation of drugs such as etoposide that may improve the pharmacokinetics and reduce the formulation-related adverse effects observed with current formulations. Amphiphilic derivatives of glycol chitosan were synthesized by chemical grafting of palmitic acid N-hydroxysuccinimide and quaternization to glycol chitosan backbone. To this end, a 7.9 kDa glycol chitosan was modified by palmitoylation and quaternization, yielding a 13 kDa amphiphilic polymer. Micelles prepared from this amphiphilic polymer had a size of 162nm and were able to encapsulate up to 3 mg/ml etoposide. Pharmacokinetic results indicated that the GCPQ micelles transformed the biodistribution pattern and increased etoposide concentration in the brain significantly compared to free drugs after intravenous administration. AUC 0.5-24h showed statistically significant difference in ETP-GCPQ vs. Commercial preparation in liver (25 vs.70, p<0.001), spleen (27 vs.36, p<0.05), lungs (42 vs.136,p<0.001),kidneys(25 vs.70,p< 0.05),and brain(19 vs.9,p<0.001). ETP-GCPQ crossed the blood-brain barrier, and 4, 3.5, 2.6, 1.8, 1.7, 1.5, and 2.5 fold higher levels of etoposide were observed at 0.5, 1, 2, 4, 6, 12, and 24hrs; respectively suggesting these systems could deliver hydrophobic anticancer drugs such as etoposide to tumors but also increased their transport through the biological barriers, thus making it a good delivery system

Keywords: glycol chitosan, micelles, pharmacokinetics, tissue distribution

Procedia PDF Downloads 76
4226 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 82
4225 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 243
4224 The Probability of Smallholder Broiler Chicken Farmers' Participation in the Mainstream Market within Maseru District in Lesotho

Authors: L. E. Mphahama, A. Mushunje, A. Taruvinga

Abstract:

Although broiler production does not generate any large incomes among the smallholder community, it represents the main source of livelihood and part of nutritional requirement. As a result, market for broiler meat is growing faster than that of any other meat products and is projected to continue growing in the coming decades. However, the implication is that a multitude of factors manipulates transformation of smallholder broiler farmers participating in the mainstream markets. From 217 smallholder broiler farmers, socio-economic and institutional factors in broiler farming were incorporated into Binary model to estimate the probability of broiler farmers’ participation in the mainstream markets within the Maseru district in Lesotho. Of the thirteen (13) predictor variables fitted into the model, six (6) variables (household size, number of years in broiler business, stock size, access to transport, access to extension services and access to market information) had significant coefficients while seven (7) variables (level of education, marital status, price of broilers, poultry association, access to contract, access to credit and access to storage) did not have a significant impact. It is recommended that smallholder broiler farmers organize themselves into cooperatives which will act as a vehicle through which they can access contracts and formal markets. These cooperatives will also enable easy training and workshops for broiler rearing and marketing/markets through extension visits.

Keywords: broiler chicken, mainstream market, Maseru district, participation, smallholder farmers

Procedia PDF Downloads 118
4223 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 95
4222 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 160
4221 Sequential Release of Dual Drugs Using Thermo-Sensitive Hydrogel for Tumor Vascular Inhibition and to Enhance the Efficacy of Chemotherapy

Authors: Haile F. Darge, Hsieh C. Tsai

Abstract:

The tumor microenvironment affects the therapeutic outcomes of cancer disease. In a malignant tumor, overexpression of vascular endothelial growth factor (VEGF) provokes the production of pathologic vascular networks. This results in a hostile tumor environment that hinders anti-cancer drug activities and profoundly fuels tumor progression. In this study, we develop a strategy of sequential sustain release of the anti-angiogenic drug: Bevacizumab(BVZ), and anti-cancer drug: Doxorubicin(DOX) which had a synergistic effect on cancer treatment. Poly (D, L-Lactide)- Poly (ethylene glycol) –Poly (D, L-Lactide) (PDLLA-PEG-PDLLA) thermo-sensitive hydrogel was used as a vehicle for local delivery of drugs in a single platform. The in vitro release profiles of the drugs were investigated and confirmed a relatively rapid release of BVZ (73.56 ± 1.39%) followed by Dox (61.21 ± 0.62%) for a prolonged period. The cytotoxicity test revealed that the copolymer exhibited negligible cytotoxicity up to 2.5 mg ml-1 concentration on HaCaT and HeLa cells. The in vivo study on Hela xenograft nude mice verified that hydrogel co-loaded with BVZ and DOX displayed the highest tumor suppression efficacy for up to 36 days with pronounce anti-angiogenic effect of BVZ and with no noticeable damage on vital organs. Therefore, localized co-delivery of anti-angiogenic drug and anti-cancer drugs by the hydrogel system may be a promising approach for enhanced chemotherapeutic efficacy in cancer treatment.

Keywords: anti-angiogenesis, chemotherapy, controlled release, thermo-sensitive hydrogel

Procedia PDF Downloads 101
4220 Target and Biomarker Identification Platform to Design New Drugs against Aging and Age-Related Diseases

Authors: Peter Fedichev

Abstract:

We studied fundamental aspects of aging to develop a mathematical model of gene regulatory network. We show that aging manifests itself as an inherent instability of gene network leading to exponential accumulation of regulatory errors with age. To validate our approach we studied age-dependent omic data such as transcriptomes, metabolomes etc. of different model organisms and humans. We build a computational platform based on our model to identify the targets and biomarkers of aging to design new drugs against aging and age-related diseases. As biomarkers of aging, we choose the rate of aging and the biological age since they completely determine the state of the organism. Since rate of aging rapidly changes in response to an external stress, this kind of biomarker can be useful as a tool for quantitative efficacy assessment of drugs, their combinations, dose optimization, chronic toxicity estimate, personalized therapies selection, clinical endpoints achievement (within clinical research), and death risk assessments. According to our model, we propose a method for targets identification for further interventions against aging and age-related diseases. Being a biotech company, we offer a complete pipeline to develop an anti-aging drug-candidate.

Keywords: aging, longevity, biomarkers, senescence

Procedia PDF Downloads 248
4219 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 272
4218 Effects of the Treatment by Polypill Combinations vs Identical Monopill Therapies in Patients with Cardiovascular Comorbid Diseases

Authors: Denys Sebov, Viktoriia Korotaieva, Kateryna Markina

Abstract:

The clinical advantage of the multipill combination drugs administration (polypill-strategy) over single-component drugs (monopill-strategy) has been established in patients with comorbid arterial hypertension, heart failure, chronic coronary syndrome, diabetes. It was found that polypill-strategy provides better treatment adherence in 33.4% of the patients. It was proven a significant decrease in systolic and diastolic blood pressure, as well as a decrease in dispersion index due to the stability of the blood pressure profile in patients with the polypill-strategy treatment.

Keywords: polypill, artetial hypertension, cardiovascular disease, compliance

Procedia PDF Downloads 10
4217 Preparation of Flurbiprofen Derivative for Enhanced Brain Penetration

Authors: Jungkyun Im

Abstract:

Nonsteroidal anti-inflammatory drugs (NSAIDs) are effective for relieving pain and reducing inflammation. They are nonselective inhibitors of two isoforms of COX, cyclooxygenase-1 (COX-1) and cyclooxygenase-2 (COX-2), and thereby inhibiting the production of hormone-like lipid compounds such as, prostaglandins and thromboxanes which cause inflammation, pain, fever, platelet aggregation, etc. In addition, recently there are many research articles reporting the neuroprotective effect of NSAIDs in neurodegenerative diseases, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD). However, the clinical use of NSAIDs in these diseases is limited by low brain distribution. Therefore, in order to assist the in-depth investigation on the pharmaceutical mechanism of flurbiprofen in neuroprotection and to make flurbiprofen a more potent drug to prevent or alleviate neurodegenerative diseases, delivery of flurbiprofen to brain should be effective and sufficient amount of flurbiprofen must penetrate the BBB thus gaining access into the patient’s brain. We have recently developed several types of guanidine-rich molecular carriers with high molecular weights and good water solubility that readily cross the blood-brain barrier (BBB) and display efficient distributions in the mouse brain. The G8 (having eight guanidine groups) molecular carrier based on D-sorbitol was found to be very effective in delivering anticancer drugs to a mouse brain. In the present study, employing the same molecular carrier, we prepared the flurbiprofen conjugate and studied its BBB permeation by mouse tissue distribution study. Flurbiprofen was attached to a molecular carrier with a fluorescein probe and multiple terminal guanidiniums. The conjugate was found to internalize into live cells and readily cross the BBB to enter the mouse brain. Our novel synthetic flurbiprofen conjugate will hopefully delivery NSAIDs into brain, and is therefore applicable to the neurodegenerative diseases treatment or prevention.

Keywords: flurbiprofen, drug delivery, molecular carrier, organic synthesis

Procedia PDF Downloads 208
4216 Prescribing Pattern of Drugs in Patients with ARDS: An Observational Study

Authors: Rahul Magazine, Shobitha Rao

Abstract:

The aim of this study was to study the prescribing pattern of drugs in patients with ARDS (Acute Respiratory Distress Syndrome) managed at a tertiary care hospital. This observational study was conducted at Kasturba Hospital, Karnataka, India. Data of patients admitted from January 2010 to December 2012 was collected. A total of 150 patients of ARDS were included. Data included patients’ age, gender, clinical disorders precipitating ARDS, and prescribing pattern of drugs. The mean age of the study population was 42.92±13.91 years. 48% of patients were less than 40 years of age. Infection was the cause of ARDS in 81.3% of subjects. Antibiotics were prescribed in all the subjects and beta-lactams were prescribed in 97.3%. 41.3% were prescribed corticosteroids, 39.3% diuretics and 89.3% intravenous fluids. Infection was the commonest etiology for ARDS, and beta-lactams were the commonest antibiotics prescribed. Corticosteroids and diuretics were prescribed in a significant number of patients. Most of the patients received intravenous fluids.

Keywords: acute respiratory syndrome, beta lactams, corticosteroids, Acute Respiratory Distress Syndrome (ARDS)

Procedia PDF Downloads 343