Search results for: contrast%20sensitivity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1428

Search results for: contrast%20sensitivity

258 Assessment of Physical Activity Patterns in Patients with Cardiopulmonary Diseases

Authors: Ledi Neçaj

Abstract:

Objectives: The target of this paper is (1) to explain objectively physical activity model throughout three chronic cardiopulmonary conditions, and (2) to study the connection among physical activity dimensions with disease severity, self-reported physical and emotional functioning, and exercise performance. Material and Methods: This is a cross-sectional study of patients in their domestic environment. Patients with cardiopulmonary diseases were: chronic obstructive pulmonary disease (COPD), (n-63), coronary heart failure (n=60), and patients with implantable cardioverter defibrillator (n=60). Main results measures: Seven ambulatory physical activity dimensions (total steps, percentage time active, percentage time ambulating at low, medium, and hard intensity, maximum cadence for 30 non-stop minutes, and peak performance) have been measured with an accelerometer. Results: Subjects with COPD had the lowest amount of ambulatory physical activity compared with topics with coronary heart failure and cardiac dysrhythmias (all 7 interest dimensions, P<.05); total step counts have been: 5319 as opposed to 7464 as opposed to 9570, respectively. Six-minute walk distance becomes correlated (r=.44-.65, P<.01) with all physical activity dimensions inside the COPD pattern, the most powerful correlations being with total steps and peak performance. In topics with cardiac impairment, maximal oxygen intake had the most effective small to slight correlations with five of the physical activity dimensions (r=.22-.40, P<.05). In contrast, correlations among 6-minute walk test distance and physical activity have been higher (r=.48-.61, P<.01) albeit in a smaller pattern of most effective patients with coronary heart failure. For all three samples, self-reported physical and mental health functioning, age, frame mass index, airflow obstruction, and ejection fraction had both exceptionally small and no significant correlations with physical activity. Conclusions: Findings from this study present a profitable benchmark of physical activity patterns in individuals with cardiopulmonary diseases for comparison with future studies. All seven dimensions of ambulatory physical activity have disfavor between subjects with COPD, heart failure, and cardiac dysrhythmias. Depending on the research or clinical goal, the use of one dimension, such as total steps, may be sufficient. Although physical activity had high correlations with performance on a six-minute walk test relative to other variables, accelerometers-based physical activity monitoring provides unique, important information about real-world behavior in patients with cardiopulmonary not already captured with existing measures.

Keywords: ambulatory physical activity, walking, monitoring, COPD, heart failure, implantable defibrillator, exercise performance

Procedia PDF Downloads 63
257 How to Talk about It without Talking about It: Cognitive Processing Therapy Offers Trauma Symptom Relief without Violating Cultural Norms

Authors: Anne Giles

Abstract:

Humans naturally wish they could forget traumatic experiences. To help prevent future harm, however, the human brain has evolved to retain data about experiences of threat, alarm, or violation. When given compassionate support and assistance with thinking helpfully and realistically about traumatic events, most people can adjust to experiencing hardships, albeit with residual sad, unfortunate memories. Persistent, recurrent, intrusive memories, difficulty sleeping, emotion dysregulation, and avoidance of reminders, however, may be symptoms of Post-traumatic Stress Disorder (PTSD). Brain scans show that PTSD affects brain functioning. We currently have no physical means of restoring the system of brain structures and functions involved with PTSD. Medications may ease some symptoms but not others. However, forms of "talk therapy" with cognitive components have been found by researchers to reduce, even resolve, a broad spectrum of trauma symptoms. Many cultures have taboos against talking about hardships. Individuals may present themselves to mental health care professionals with severe, disabling trauma symptoms but, because of cultural norms, be unable to speak about them. In China, for example, relationship expectations may include the belief, "Bad things happening in the family should stay in the family (jiāchǒu bùkě wàiyán 家丑不可外扬)." The concept of "family (jiā 家)" may include partnerships, close and extended families, communities, companies, and the nation itself. In contrast to many trauma therapies, Cognitive Processing Therapy (CPT) for Post-traumatic Stress Disorder asks its participants to focus not on "what" happened but on "why" they think the trauma(s) occurred. The question "why" activates and exercises cognitive functioning. Brain scans of individuals with PTSD reveal executive functioning portions of the brain inadequately active, with emotion centers overly active. CPT conceptualizes PTSD as a network of cognitive distortions that keep an individual "stuck" in this under-functioning and over-functioning dynamic. Through asking participants forms of the question "why," plus offering a protocol for examining answers and relinquishing unhelpful beliefs, CPT assists individuals in consciously reactivating the cognitive, executive functions of their brains, thus restoring normal functioning and reducing distressing trauma symptoms. The culturally sensitive components of CPT that allow people to "talk about it without talking about it" may offer the possibility for worldwide relief from symptoms of trauma.

Keywords: cognitive processing therapy (CPT), cultural norms, post-traumatic stress disorder (PTSD), trauma recovery

Procedia PDF Downloads 179
256 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 42
255 Effect of Hypoxia on AOX2 Expression in Chlamydomonas reinhardtii

Authors: Maria Ostroukhova, Zhanneta Zalutskaya, Elena Ermilova

Abstract:

The alternative oxidase (AOX) mediates cyanide-resistant respiration, which bypasses proton-pumping complexes III and IV of the cytochrome pathway to directly transfer electrons from reduced ubiquinone to molecular oxygen. In Chlamydomonas reinhardtii, AOX is a monomeric protein that is encoded by two genes of discrete subfamilies, AOX1 and AOX2. Although AOX has been proposed to play essential roles in stress tolerance of organisms, the role of subfamily AOX2 is largely unknown. In C. reinhardtii, AOX2 was initially identified as one of constitutively low expressed genes. Like other photosynthetic organisms C. reinhardtii cells frequently experience periods of hypoxia. To examine AOX2 transcriptional regulation and role of AOX2 in hypoxia adaptation, real-time PCR analysis and artificial microRNA method were employed. Two experimental approaches have been used to induce the anoxic conditions: dark-anaerobic and light-anaerobic conditions. C. reinhardtii cells exposed to the oxygen deprivation have shown increased AOX2 mRNA levels. By contrast, AOX1 was not an anoxia-responsive gene. In C. reinhardtii, a subset of genes is regulated by transcription factor CRR1 in anaerobic conditions. Notable, the AOX2 promoter region contains the potential motif for CRR1 binding. Therefore, the role of CRR1 in the control of AOX2 transcription was tested. The CRR1-underexpressing strains, that were generated and characterized in this work, exhibited low levels of AOX2 transcripts under anoxic conditions. However, the transformants still slightly induced AOX2 gene expression in the darkness. These confirmed our suggestions that darkness is a regulatory stimulus for AOX genes in C. reinhardtii. Thus, other factors must contribute to AOX2 promoter activity under dark-anoxic conditions. Moreover, knock-down of CRR1 caused a complete reduction of AOX2 expression under light-anoxic conditions. These results indicate that (1) CRR1 is required for AOX2 expression during hypoxia, and (2) AOX2 gene is regulated by CRR1 together with yet-unknown regulatory factor(s). In addition, the AOX2-underexpressing strains were generated. The analysis of amiRNA-AOX2 strains suggested a role of this alternative oxidase in hypoxia adaptation of the alga. In conclusion, the results reported here show that C. reinhardtii AOX2 gene is stress inducible. CRR1 transcriptional factor is involved in the regulation of the AOX2 gene expression in the absence of oxygen. Moreover, AOX2 but not AOX1 functions under oxygen deprivation. This work was supported by Russian Science Foundation (research grant № 16-14-10004).

Keywords: alternative oxidase 2, artificial microRNA approach, chlamydomonas reinhardtii, hypoxia

Procedia PDF Downloads 215
254 Evaluation of Medicinal Plants, Catunaregam spinosa, Houttuynia cordata, and Rhapis excelsa from Malaysia for Antibacterial, Antifungal and Antiviral Properties

Authors: Yik Sin Chan, Bee Ling Chuah, Wei Quan Chan, Ri Jin Cheng, Yan Hang Oon, Kong Soo Khoo, Nam Weng Sit

Abstract:

Traditionally, medicinal plants have been used to treat different kinds of ailments including infectious diseases. They serve as a good source of lead compounds for the development of new and safer anti-infective agents. This study aimed to investigate the antimicrobial potential of the leaves of three medicinal plants, namely Catunaregam spinosa (Rubiaceae; Mountain pomegranate), Houttuynia cordata (Saururaceae; "fishy-smell herb") and Rhapis excelsa (Arecaceae; “broadleaf lady palm”). The leaves extracts were obtained by sequential extraction using hexane, chloroform, ethyl acetate, ethanol, methanol and water. The antibacterial and antifungal activities were assessed using a colorimetric broth microdilution method against a panel of human pathogenic bacteria (Gram-positive: Bacillus cereus and Staphylococcus aureus; Gram-negative: Escherichia coli, Klebsiella pneumoniae and Pseudomonas aeruginosa) and fungi (yeasts: Candida albicans, Candida parapsilosis and Cryptococcus neoformans; Moulds: Aspergillus fumigatus and Trichophyton mentagrophytes) respectively; while antiviral activity was evaluated against the Chikungunya virus on monkey kidney epithelial (Vero) cells by neutral red uptake assay. All the plant extracts showed bacteriostatic activity, however, only 72% of the extracts (13/18) were found to have bactericidal activity. The lowest minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) were given by the hexane extract of C. spinosa against S. aureus with the values of 0.16 and 0.31 mg/mL respectively. All the extracts also possessed fungistatic activity. Only the hexane, chloroform and ethyl acetate extracts of H. cordata exerted inhibitory activity against A. fumigatus, giving the lowest fungal susceptibility index of 16.7%. In contrast, only 61% of the extracts (11/18) showed fungicidal activity. The ethanol extract of R. excelsa exhibited the strongest fungicidal activity against C. albicans, C. parapsilosis and T. mentagrophytes with minimum fungicidal concentration (MFC) values of 0.04–0.08 mg/mL, in addition to its methanol extract against T. mentagrophytes (MFC=0.02 mg/mL). For anti-Chikungunya virus activity, only chloroform and ethyl acetate extracts of R. excelsa showed significant antiviral activity with 50% effective concentrations (EC50) of 29.9 and 78.1 g/mL respectively. Extracts of R. excelsa warrant further investigations into their active principles responsible for antifungal and antiviral properties.

Keywords: bactericidal, Chikungunya virus, extraction, fungicidal

Procedia PDF Downloads 377
253 Investigating Early Markers of Alzheimer’s Disease Using a Combination of Cognitive Tests and MRI to Probe Changes in Hippocampal Anatomy and Functionality

Authors: Netasha Shaikh, Bryony Wood, Demitra Tsivos, Michael Knight, Risto Kauppinen, Elizabeth Coulthard

Abstract:

Background: Effective treatment of dementia will require early diagnosis, before significant brain damage has accumulated. Memory loss is an early symptom of Alzheimer’s disease (AD). The hippocampus, a brain area critical for memory, degenerates early in the course of AD. The hippocampus comprises several subfields. In contrast to healthy aging where CA3 and dentate gyrus are the hippocampal subfields with most prominent atrophy, in AD the CA1 and subiculum are thought to be affected early. Conventional clinical structural neuroimaging is not sufficiently sensitive to identify preferential atrophy in individual subfields. Here, we will explore the sensitivity of new magnetic resonance imaging (MRI) sequences designed to interrogate medial temporal regions as an early marker of Alzheimer’s. As it is likely a combination of tests may predict early Alzheimer’s disease (AD) better than any single test, we look at the potential efficacy of such imaging alone and in combination with standard and novel cognitive tasks of hippocampal dependent memory. Methods: 20 patients with mild cognitive impairment (MCI), 20 with mild-moderate AD and 20 age-matched healthy elderly controls (HC) are being recruited to undergo 3T MRI (with sequences designed to allow volumetric analysis of hippocampal subfields) and a battery of cognitive tasks (including Paired Associative Learning from CANTAB, Hopkins Verbal Learning Test and a novel hippocampal-dependent abstract word memory task). AD participants and healthy controls are being tested just once whereas patients with MCI will be tested twice a year apart. We will compare subfield size between groups and correlate subfield size with cognitive performance on our tasks. In the MCI group, we will explore the relationship between subfield volume, cognitive test performance and deterioration in clinical condition over a year. Results: Preliminary data (currently on 16 participants: 2 AD; 4 MCI; 9 HC) have revealed subfield size differences between subject groups. Patients with AD perform with less accuracy on tasks of hippocampal-dependent memory, and MCI patient performance and reaction times also differ from healthy controls. With further testing, we hope to delineate how subfield-specific atrophy corresponds with changes in cognitive function, and characterise how this progresses over the time course of the disease. Conclusion: Novel sequences on a MRI scanner such as those in route in clinical use can be used to delineate hippocampal subfields in patients with and without dementia. Preliminary data suggest that such subfield analysis, perhaps in combination with cognitive tasks, may be an early marker of AD.

Keywords: Alzheimer's disease, dementia, memory, cognition, hippocampus

Procedia PDF Downloads 551
252 Payload Bay Berthing of an Underwater Vehicle With Vertically Actuated Thrusters

Authors: Zachary Cooper-Baldock, Paulo E. Santos, Russell S. A. Brinkworth, Karl Sammut

Abstract:

In recent years, large unmanned underwater vehicles such as the Boeing Voyager and Anduril Ghost Shark have been developed. These vessels can be structured to contain onboard internal payload bays. These payload bays can serve a variety of purposes – including the launch and recovery (LAR) of smaller underwater vehicles. The LAR of smaller vessels is extremely important, as it enables transportation over greater distances, increased time on station, data transmission and operational safety. The larger vessel and its payload bay structure complicate the LAR of UUVs in contrast to static docks that are affixed to the seafloor, as they actively impact the local flow field. These flow field impacts require analysis to determine if UUV vessels can be safely launched and recovered inside the motherships. This research seeks to determine the hydrodynamic forces exerted on a vertically over-actuated, small, unmanned underwater vehicle (OUUV) during an internal LAR manoeuvre and compare this to an under-actuated vessel (UUUV). In this manoeuvre, the OUUV is navigated through the stern wake region of the larger vessel to a set point within the internal payload bay. The manoeuvre is simulated using ANSYS Fluent computational fluid dynamics models, covering the entire recovery of the OUUV and UUUV. The analysis of the OUUV is compared against the UUUV to determine the differences in the exerted forces. Of particular interest are the drag, pressure, turbulence and flow field effects exerted as the OUUV is driven inside the payload bay of the larger vessel. The hydrodynamic forces and flow field disturbances are used to determine the feasibility of making such an approach. From the simulations, it was determined that there was no significant detrimental physical forces, particularly with regard to turbulence. The flow field effects exerted by the OUUV are significant. The vertical thrusters exert significant wake structures, but their orientation ensures the wake effects are exerted below the UUV, minimising the impact. It was also seen that OUUV experiences higher drag forces compared to the UUUV, which will correlate to an increased energy expenditure. This investigation found no key indicators that recovery via a mothership payload bay was not feasible. The turbulence, drag and pressure phenomenon were of a similar magnitude to existing static and towed dock structures.

Keywords: underwater vehicles, submarine, autonomous underwater vehicles, AUV, computational fluid dynamics, flow fields, pressure, turbulence, drag

Procedia PDF Downloads 53
251 Health-Related Quality of Life of Caregivers of Institution-Reared Children in Metro Manila: Effects of Role Overload and Role Distress

Authors: Ian Christopher Rocha

Abstract:

This study aimed to determine the association of the quality of life (QOL) of the caregivers of children in need of special protection (CNSP) in child-caring institutions in Metro Manila with the levels of their role overload (RO) and role distress (RD). The CNSP in this study covered the orphaned, abandoned, abused, neglected, exploited, and mentally-challenged children. In this study, the domains of QOL included physical health (PH), psychological health, social health (SH), and living conditions (LC). It also intended to ascertain the association of their personal and work-related characteristics with their RO and RD levels. The respondents of this study were 130 CNSP caregivers in 17 residential child-rearing institutions in Metro Manila. A purposive non-probability sampling was used. Using a quantitative methodological approach, the survey method was utilized to gather data with the use of a self-administered structured questionnaire. Data were analyzed using both descriptive and inferential statistics. Results revealed that the level of RO, the level of RD, and the QOL of the CNSP caregivers were all moderate. Data also suggested that there were significant positive relationships between the RO level and the caregivers’ characteristics, such as age, the number of training, and years of service in the institution. At the same time, the findings revealed that there were significant positive relationships between the RD level and the caregivers’ characteristics, such as age and hours of care rendered to their care recipients. In addition, the findings suggested that all domains of their QOL obtained significant relationships with their RO level. For the correlations of their level of RO and their QOL domains, the PH and the LC obtained a moderate negative correlation with the RO level while the rest of the domains obtained weak negative correlations with RO level. For the correlations of their level of RD and the QOL domains, all domains, except SH, obtained strong negative correlations with the level of RD. The SH revealed to have a moderate negative correlation with RD level. In conclusion, caregivers who are older experience higher levels of RO and RD; caregivers who have more training and years of service experience the higher level of RO; and caregivers who have longer hours of rendered care experience the higher level of RD. In addition, the study affirmed that if the levels of RO and RD are high, the QOL is low, and vice versa. Therefore, the RO and RD levels are reliable predictors of the caregivers’ QOL. In relation, the caregiving situation in the Philippines revealed to be unique and distinct from other countries because the levels of RO and RD and the QOL of Filipino CNSP caregivers were all moderate in contrast with their foreign counterparts who experience high caregiving RO and RD leading to low QOL.

Keywords: quality of life, caregivers, children in need of special protection, physical health, psychological health, social health, living conditions, role overload, role distress

Procedia PDF Downloads 186
250 The Effect of Data Integration to the Smart City

Authors: Richard Byrne, Emma Mulliner

Abstract:

Smart cities are a vision for the future that is increasingly becoming a reality. While a key concept of the smart city is the ability to capture, communicate, and process data that has long been produced through day-to-day activities of the city, much of the assessment models in place neglect this fact to focus on ‘smartness’ concepts. Although it is true technology often provides the opportunity to capture and communicate data in more effective ways, there are also human processes involved that are just as important. The growing importance with regards to the use and ownership of data in society can be seen by all with companies such as Facebook and Google increasingly coming under the microscope, however, why is the same scrutiny not applied to cities? The research area is therefore of great importance to the future of our cities here and now, while the findings will be of just as great importance to our children in the future. This research aims to understand the influence data is having on organisations operating throughout the smart cities sector and employs a mixed-method research approach in order to best answer the following question: Would a data-based evaluation model for smart cities be more appropriate than a smart-based model in assessing the development of the smart city? A fully comprehensive literature review concluded that there was a requirement for a data-driven assessment model for smart cities. This was followed by a documentary analysis to understand the root source of data integration to the smart city. A content analysis of city data platforms enquired as to the alternative approaches employed by cities throughout the UK and draws on best practice from New York to compare and contrast. Grounded in theory, the research findings to this point formulated a qualitative analysis framework comprised of: the changing environment influenced by data, the value of data in the smart city, the data ecosystem of the smart city and organisational response to the data orientated environment. The framework was applied to analyse primary data collected through the form of interviews with both public and private organisations operating throughout the smart cities sector. The work to date represents the first stage of data collection that will be built upon by a quantitative research investigation into the feasibility of data network effects in the smart city. An analysis into the benefits of data interoperability supporting services to the smart city in the areas of health and transport will conclude the research to achieve the aim of inductively forming a framework that can be applied to future smart city policy. To conclude, the research recognises the influence of technological perspectives in the development of smart cities to date and highlights this as a challenge to introduce theory applied with a planning dimension. The primary researcher has utilised their experience working in the public sector throughout the investigation to reflect upon what is perceived as a gap in practice of where we are today, to where we need to be tomorrow.

Keywords: data, planning, policy development, smart cities

Procedia PDF Downloads 279
249 Corrosion Analysis of Brazed Copper-Based Conducts in Particle Accelerator Water Cooling Circuits

Authors: A. T. Perez Fontenla, S. Sgobba, A. Bartkowska, Y. Askar, M. Dalemir Celuch, A. Newborough, M. Karppinen, H. Haalien, S. Deleval, S. Larcher, C. Charvet, L. Bruno, R. Trant

Abstract:

The present study investigates the corrosion behavior of copper (Cu) based conducts predominantly brazed with Sil-Fos (self-fluxing copper-based filler with silver and phosphorus) within various cooling circuits of demineralized water across different particle accelerator components at CERN. The study covers a range of sample service time, from a few months to fifty years, and includes various accelerator components such as quadrupoles, dipoles, and bending magnets. The investigation comprises the established sample extraction procedure, examination methodology including non-destructive testing, evaluation of the corrosion phenomena, and identification of commonalities across the studied components as well as analysis of the environmental influence. The systematic analysis included computed microtomography (CT) of the joints that revealed distributed defects across all brazing interfaces. Some defects appeared to result from areas not wetted by the filler during the brazing operation, displaying round shapes, while others exhibited irregular contours and radial alignment, indicative of a network or interconnection. The subsequent dry cutting performed facilitated access to the conduct's inner surface and the brazed joints for further inspection through light and electron microscopy (SEM) and chemical analysis via Energy Dispersive X-ray spectroscopy (EDS). Brazing analysis away from affected areas identified the expected phases for a Sil-Fos alloy. In contrast, the affected locations displayed micrometric cavities propagating into the material, along with selective corrosion of the bulk Cu initiated at the conductor-braze interface. Corrosion product analysis highlighted the consistent presence of sulfur (up to 6 % in weight), whose origin and role in the corrosion initiation and extension is being further investigated. The importance of this study is paramount as it plays a crucial role in comprehending the underlying factors contributing to recently identified water leaks and evaluating the extent of the issue. Its primary objective is to provide essential insights for the repair of impacted brazed joints when accessibility permits. Moreover, the study seeks to contribute to the improvement of design and manufacturing practices for future components, ultimately enhancing the overall reliability and performance of magnet systems within CERN accelerator facilities.

Keywords: accelerator facilities, brazed copper conducts, demineralized water, magnets

Procedia PDF Downloads 20
248 The Usage of Negative Emotive Words in Twitter

Authors: Martina Katalin Szabó, István Üveges

Abstract:

In this paper, the usage of negative emotive words is examined on the basis of a large Hungarian twitter-database via NLP methods. The data is analysed from a gender point of view, as well as changes in language usage over time. The term negative emotive word refers to those words that, on their own, without context, have semantic content that can be associated with negative emotion, but in particular cases, they may function as intensifiers (e.g. rohadt jó ’damn good’) or a sentiment expression with positive polarity despite their negative prior polarity (e.g. brutális, ahogy ez a férfi rajzol ’it’s awesome (lit. brutal) how this guy draws’. Based on the findings of several authors, the same phenomenon can be found in other languages, so it is probably a language-independent feature. For the recent analysis, 67783 tweets were collected: 37818 tweets (19580 tweets written by females and 18238 tweets written by males) in 2016 and 48344 (18379 tweets written by females and 29965 tweets written by males) in 2021. The goal of the research was to make up two datasets comparable from the viewpoint of semantic changes, as well as from gender specificities. An exhaustive lexicon of Hungarian negative emotive intensifiers was also compiled (containing 214 words). After basic preprocessing steps, tweets were processed by ‘magyarlanc’, a toolkit is written in JAVA for the linguistic processing of Hungarian texts. Then, the frequency and collocation features of all these words in our corpus were automatically analyzed (via the analysis of parts-of-speech and sentiment values of the co-occurring words). Finally, the results of all four subcorpora were compared. Here some of the main outcomes of our analyses are provided: There are almost four times fewer cases in the male corpus compared to the female corpus when the negative emotive intensifier modified a negative polarity word in the tweet (e.g., damn bad). At the same time, male authors used these intensifiers more frequently, modifying a positive polarity or a neutral word (e.g., damn good and damn big). Results also pointed out that, in contrast to female authors, male authors used these words much more frequently as a positive polarity word as well (e.g., brutális, ahogy ez a férfi rajzol ’it’s awesome (lit. brutal) how this guy draws’). We also observed that male authors use significantly fewer types of emotive intensifiers than female authors, and the frequency proportion of the words is more balanced in the female corpus. As for changes in language usage over time, some notable differences in the frequency and collocation features of the words examined were identified: some of the words collocate with more positive words in the 2nd subcorpora than in the 1st, which points to the semantic change of these words over time.

Keywords: gender differences, negative emotive words, semantic changes over time, twitter

Procedia PDF Downloads 173
247 Hydrodynamic Analysis of Payload Bay Berthing of an Underwater Vehicle With Vertically Actuated Thrusters

Authors: Zachary Cooper-Baldock, Paulo E. Santos, Russell S. A. Brinkworth, Karl Sammut

Abstract:

- In recent years, large unmanned underwater vehicles such as the Boeing Voyager and Anduril Ghost Shark have been developed. These vessels can be structured to contain onboard internal payload bays. These payload bays can serve a variety of purposes – including the launch and recovery (LAR) of smaller underwater vehicles. The LAR of smaller vessels is extremely important, as it enables transportation over greater distances, increased time on station, data transmission and operational safety. The larger vessel and its payload bay structure complicate the LAR of UUVs in contrast to static docks that are affixed to the seafloor, as they actively impact the local flow field. These flow field impacts require analysis to determine if UUV vessels can be safely launched and recovered inside the motherships. This research seeks to determine the hydrodynamic forces exerted on a vertically over-actuated, small, unmanned underwater vehicle (OUUV) during an internal LAR manoeuvre and compare this to an under-actuated vessel (UUUV). In this manoeuvre, the OUUV is navigated through the stern wake region of the larger vessel to a set point within the internal payload bay. The manoeuvre is simulated using ANSYS Fluent computational fluid dynamics models, covering the entire recovery of the OUUV and UUUV. The analysis of the OUUV is compared against the UUUV to determine the differences in the exerted forces. Of particular interest are the drag, pressure, turbulence and flow field effects exerted as the OUUV is driven inside the payload bay of the larger vessel. The hydrodynamic forces and flow field disturbances are used to determine the feasibility of making such an approach. From the simulations, it was determined that there was no significant detrimental physical forces, particularly with regard to turbulence. The flow field effects exerted by the OUUV are significant. The vertical thrusters exert significant wake structures, but their orientation ensures the wake effects are exerted below the UUV, minimising the impact. It was also seen that OUUV experiences higher drag forces compared to the UUUV, which will correlate to an increased energy expenditure. This investigation found no key indicators that recovery via a mothership payload bay was not feasible. The turbulence, drag and pressure phenomenon were of a similar magnitude to existing static and towed dock structures.

Keywords: underwater vehicles, submarine, autonomous underwater vehicles, auv, computational fluid dynamics, flow fields, pressure, turbulence, drag

Procedia PDF Downloads 46
246 Family Income and Parental Behavior: Maternal Personality as a Moderator

Authors: Robert H. Bradley, Robert F. Corwyn

Abstract:

There is abundant research showing that socio-economic status is implicated in parenting. However, additional factors such as family context, parent personality, parenting history and child behavior also help determine how parents enact the role of caregiver. Each of these factors not only helps determine how a parent will act in a given situation, but each can serve to moderate the influence of the other factors. Personality has long been studied as a factor that influences parental behavior, but it has almost never been considered as a moderator of family contextual factors. For this study, relations between three maternal personality characteristics (agreeableness, extraversion, neuroticism) and four aspects of parenting (harshness, sensitivity, stimulation, learning materials) were examined when children were 6 months, 36 months, and 54 months old and again at 5th grade. Relations between these three aspects of personality and the overall home environment were also examined. A key concern was whether maternal personality characteristics moderated relations between household income and the four aspects of parenting and between household income and the overall home environment. The data for this study were taken from the NICHD Study of Early Child Care and Youth Development (NICHD SECCYD). The total sample consisted of 1364 families living in ten different sites in the United States. However, the samples analyzed included only those with complete data on all four parenting outcomes (i.e., sensitivity, harshness, stimulation, and provision of learning materials), income, maternal education and all three measures of personality (i.e., agreeableness, neuroticism, extraversion) at each age examined. Results from hierarchical regression analysis showed that mothers high in agreeableness were more likely to demonstrate sensitivity and stimulation as well as provide more learning materials to their children but were less likely to manifest harshness. Maternal agreeableness also consistently moderated the effects of low income on parental behavior. Mothers high in extraversion were more likely to provide stimulation and learning materials, with extraversion serving as a moderator of low income on both. By contrast, mothers high in neuroticism were less likely to demonstrate positive aspects of parenting and more likely to manifest negative aspects (e.g., harshness). Neuroticism also served to moderate the influence of low income on parenting, especially for stimulation and learning materials. The most consistent effects of parent personality were on the overall home environment, with significant main and interaction effects observed in 11 of the 12 models tested. These findings suggest that it may behoove professional who work with parents living in adverse circumstances to consider parental personality in helping to better target prevention or intervention efforts aimed at supporting parental efforts to act in ways that benefit children.

Keywords: home environment, household income, learning materials, personality, sensitivity, stimulation

Procedia PDF Downloads 186
245 Intelligent Indoor Localization Using WLAN Fingerprinting

Authors: Gideon C. Joseph

Abstract:

The ability to localize mobile devices is quite important, as some applications may require location information of these devices to operate or deliver better services to the users. Although there are several ways of acquiring location data of mobile devices, the WLAN fingerprinting approach has been considered in this work. This approach uses the Received Signal Strength Indicator (RSSI) measurement as a function of the position of the mobile device. RSSI is a quantitative technique of describing the radio frequency power carried by a signal. RSSI may be used to determine RF link quality and is very useful in dense traffic scenarios where interference is of major concern, for example, indoor environments. This research aims to design a system that can predict the location of a mobile device, when supplied with the mobile’s RSSIs. The developed system takes as input the RSSIs relating to the mobile device, and outputs parameters that describe the location of the device such as the longitude, latitude, floor, and building. The relationship between the Received Signal Strengths (RSSs) of mobile devices and their corresponding locations is meant to be modelled; hence, subsequent locations of mobile devices can be predicted using the developed model. It is obvious that describing mathematical relationships between the RSSIs measurements and localization parameters is one option to modelling the problem, but the complexity of such an approach is a serious turn-off. In contrast, we propose an intelligent system that can learn the mapping of such RSSIs measurements to the localization parameters to be predicted. The system is capable of upgrading its performance as more experiential knowledge is acquired. The most appealing consideration to using such a system for this task is that complicated mathematical analysis and theoretical frameworks are excluded or not needed; the intelligent system on its own learns the underlying relationship in the supplied data (RSSI levels) that corresponds to the localization parameters. These localization parameters to be predicted are of two different tasks: Longitude and latitude of mobile devices are real values (regression problem), while the floor and building of the mobile devices are of integer values or categorical (classification problem). This research work presents artificial neural network based intelligent systems to model the relationship between the RSSIs predictors and the mobile device localization parameters. The designed systems were trained and validated on the collected WLAN fingerprint database. The trained networks were then tested with another supplied database to obtain the performance of trained systems on achieved Mean Absolute Error (MAE) and error rates for the regression and classification tasks involved therein.

Keywords: indoor localization, WLAN fingerprinting, neural networks, classification, regression

Procedia PDF Downloads 313
244 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 309
243 Active Victim Participation in the Criminal Justice System: The Indian Scenario

Authors: Narayani Sepaha

Abstract:

In earlier days, the sufferer was burdened to prove the offence as well as to put the offender to punishment. The adversary system of legal procedure was characterized simply by two parties: the prosecution and the defence. With the onset of this system, firstly the judge started acting as a neutral arbitrator, and secondly, the state inadvertently started assuming the lead role and thereby relegated the victims to the position of oblivion. In this process, with the increasing role of police forces and the government, the victims got systematically excluded from the key stages of the case proceedings and were reduced to the stature of a prosecution witness. This paper tries to emphasise the increasing control over the various stages of the trial, by other stakeholders, leading to the marginalization of victims in the trial process. This monopolization has signalled the onset of an era of gross neglect of victims in the whole criminal justice system. This consciousness led some reformists to raise their concerns over the issue, during the early part of the 20th century. They started supporting the efforts which advocated giving prominence to the participation of victims in the trial process. This paved the way for the evolution of the science of victimology. Markedly the innovativeness to work out facts, seek opinions and statements of the victims and reassure that their voice is also heard has ensured the revival of their rightful roles in the justice delivery system. Many countries, like the US, have set an example by acknowledging the advantages of participation of victims in trials like in the proceedings of the Ariel Castro Kidnappings of Cleveland, Ohio and enacting laws for protecting their rights within the framework of the legal system to ensure speedy and righteous delivery of justice in some of the most complicated cases. An attempt has been made to flag that the accused have several rights in contrast to the near absence of separate laws for victims of crime, in India. It is sad to note that, even in the initial process of registering a crime the victims are subjected to the mercy of the officers in charge and thus begins the silent suffering of these victims, which continues throughout the process of their trial. The paper further contends, that the degree of victim participation in trials and its impact on the outcomes, can be debated and evaluated, but its potential to alter their position and make them regain their lost status cannot be ignored. Victim participation in trial proceedings will help the court in perceiving the facts of the case in a better manner and in arriving at a balanced view of the case. This will not only serve to protect the overall interest of the victims but will act to reinforce the faith in the criminal justice delivery system. It is pertinent to mention that there is an urgent need to review the accused centric prosecution system and introduce appropriate amendments so that the marginalization of victims comes to an end.

Keywords: victim participation, criminal justice, India, trial, marginalised

Procedia PDF Downloads 132
242 The Rise in Popularity of Online Islamic Fashion In Indonesia: An Economic, Political, and Socio-Anthropological Perspective

Authors: Cazadira Fediva Tamzil, Agung Sulthonaulia Utama

Abstract:

The rise in popularity of Indonesian Islamic fashion displayed and sold through social networking sites, especially Instagram, might seem at first glance like a commonplace and localized phenomenon. However, when analyzed critically, it actually reveals the relations between the global and local Indonesian economy, as well as a deep socio-anthropological dimension relating to religion, culture, class, work, identity. Conducted using a qualitative methodology, data collection technique of literature review, and observation of various social networking sites, this research finds four things that lead to the aforementioned conclusion. First, the rise of online Islamic fashion retailers was triggered by the shift in the structure of global and national Indonesian economy as well as the free access of information made possible by democratization in Indonesia and worldwide advances in terms of technology. All of those factors combined together gave birth to a large amount of middle-class Indonesians with high consumer culture and entrepreneurial flair. Second, online Islamic fashion retailers are the new cultural trendsetters in society. All these show how Indonesians are becoming increasingly pious, no longer only adhere to Western conception of luxury and that many are increasingly exploiting Islam commercial and status-acquiring purposes. Third, the online Islamic fashion retailers actually reveal a shift in the conception of ‘work’ – social media has made work no longer only confined to the toiling activities inside factories, but instead something that can be done from any location only through posting online words or pictures that can increase a fashion product’s capital value. Without realizing it, many celebrities and online retailers who promote Islamic fashion through social media on a daily basis are now also ‘semi-free immaterial labors’ – a slight reconceptualization to Tiziana Terranova’s concept of ‘free labor’ and Maurizio Lazzarato’s ‘immaterial labor’, which basically refer to people who create economic value and thus help out capitals from producing immaterial things with only little compensation in return. Fourth, this research also shows that the diversity of Islamic fashion styles being sold on Instagram reflects the polarized identity of Islam in Indonesia. In stark contrast with the theory which states that globalization always leads to the strengthening and unification of identity, this research shows how polarized the Islamic identity in Indonesia really is – even in the face of globalization.

Keywords: global economy, Indonesian online Islamic fashion, political relations, socio-anthropology

Procedia PDF Downloads 320
241 Lipid-Coated Magnetic Nanoparticles for Frequency Triggered Drug Delivery

Authors: Yogita Patil-Sen

Abstract:

Superparamagnetic Iron Oxide Nanoparticles (SPIONs) have become increasingly important materials for separation of specific bio-molecules, drug delivery vehicle, contrast agent for MRI and magnetic hyperthermia for cancer therapy. Hyperthermia is emerging as an alternative cancer treatment to the conventional radio- and chemo-therapy, which have harmful side effects. When subjected to an alternating magnetic field, the magnetic energy of SPIONs is converted into thermal energy due to movement of particles. The ability of SPIONs to generate heat and potentially kill cancerous cells, which are more susceptible than the normal cells to temperatures higher than 41 °C forms the basis of hyerpthermia treatement. The amount of heat generated depends upon the magnetic properties of SPIONs which in turn is affected by their properties such as size and shape. One of the main problems associated with SPIONs is particle aggregation which limits their employability in in vivo drug delivery applications and hyperthermia cancer treatments. Coating the iron oxide core with thermally responsive lipid based nanostructures tend to overcome the issue of aggregation as well as improve biocompatibility and can enhance drug loading efficiency. Herein we report suitability of SPIONs and silica coated core-shell SPIONs, which are further, coated with various lipids for drug delivery and magnetic hyperthermia applications. The synthesis of nanoparticles is carried out using the established methods reported in the literature with some modifications. The nanoparticles are characterised using Infrared spectroscopy (IR), X-ray Diffraction (XRD), Scanning Electron Microscopy (SEM), Transmission Electron Microscopy (TEM) and Vibrating Sample Magnetometer (VSM). The heating ability of nanoparticles is tested under alternating magnetic field. The efficacy of the nanoparticles as drug carrier is also investigated. The loading of an anticancer drug, Doxorubicin at 18 °C is measured up to 48 hours using UV-visible spectrophotometer. The drug release profile is obtained under thermal incubation condition at 37 °C and compared with that under the influence of alternating magnetic field. The results suggest that the nanoparticles exhibit superparamagnetic behaviour, although coating reduces the magnetic properties of the particles. Both the uncoated and coated particles show good heating ability, again it is observed that coating decreases the heating behaviour of the particles. However, coated particles show higher drug loading efficiency than the uncoated particles and the drug release is much more controlled under the alternating magnetic field. Thus, the results demonstrate that lipid coated SPIONs exhibit potential as drug delivery vehicles for magnetic hyperthermia based cancer therapy.

Keywords: drug delivery, hyperthermia, lipids, superparamagnetic iron oxide nanoparticles (SPIONS)

Procedia PDF Downloads 207
240 A Visualization Classification Method for Identifying the Decayed Citrus Fruit Infected by Fungi Based on Hyperspectral Imaging

Authors: Jiangbo Li, Wenqian Huang

Abstract:

Early detection of fungal infection in citrus fruit is one of the major problems in the postharvest commercialization process. The automatic and nondestructive detection of infected fruits is still a challenge for the citrus industry. At present, the visual inspection of rotten citrus fruits is commonly performed by workers through the ultraviolet induction fluorescence technology or manual sorting in citrus packinghouses to remove fruit subject with fungal infection. However, the former entails a number of problems because exposing people to this kind of lighting is potentially hazardous to human health, and the latter is very inefficient. Orange is used as a research object. This study would focus on this problem and proposed an effective method based on Vis-NIR hyperspectral imaging in the wavelength range of 400-1000 nm with a spectroscopic resolution of 2.8 nm. In this work, three normalization approaches are applied prior to analysis to reduce the effect of sample curvature on spectral profiles, and it is found that mean normalization was the most effective pretreatment for decreasing spectral variability due to curvature. Then, principal component analysis (PCA) was applied to a dataset composing of average spectra from decayed and normal tissue to reduce the dimensionality of data and observe the ability of Vis-NIR hyper-spectra to discriminate data from two classes. In this case, it was observed that normal and decayed spectra were separable along the resultant first principal component (PC1) axis. Subsequently, five wavelengths (band) centered at 577, 702, 751, 808, and 923 nm were selected as the characteristic wavelengths by analyzing the loadings of PC1. A multispectral combination image was generated based on five selected characteristic wavelength images. Based on the obtained multispectral combination image, the intensity slicing pseudocolor image processing method is used to generate a 2-D visual classification image that would enhance the contrast between normal and decayed tissue. Finally, an image segmentation algorithm for detection of decayed fruit was developed based on the pseudocolor image coupled with a simple thresholding method. For the investigated 238 independent set samples including infected fruits infected by Penicillium digitatum and normal fruits, the total success rate is 100% and 97.5%, respectively, and, the proposed algorithm also used to identify the orange infected by penicillium italicum with a 100% identification accuracy, indicating that the proposed multispectral algorithm here is an effective method and it is potential to be applied in citrus industry.

Keywords: citrus fruit, early rotten, fungal infection, hyperspectral imaging

Procedia PDF Downloads 270
239 Oncolytic H-1 Parvovirus Entry in Cancer Cells through Clathrin-Mediated Endocytosis

Authors: T. Ferreira, A. Kulkarni, C. Bretscher, K. Richter, M. Ehrlich, A. Marchini

Abstract:

H-1 protoparvovirus (H-1PV) is a virus with inherent oncolytic and oncosuppressive activities while remaining non-pathogenic in humans. H-1PV was the first oncolytic parvovirus to undergo clinical testing. Results from trials in patients with glioblastoma or pancreatic carcinoma showed an excellent safety profile and first signs of efficacy. H-1PV infection is vastly dependent on cellular factors, from cell attachment and entry to viral replication and egress. Hence, we believe that the characterisation of the parvovirus life cycle would ultimately help further improve H-1PV clinical outcome. In the present study, we explored the entry pathway of H-1PV in cervical HeLa and glioma NCH125 cancer cell lines. Electron and confocal microscopy showed viral particles associated with clathrin-coated pits and vesicles, providing the first evidence that H-1PV cell entry occurs through clathrin-mediated endocytosis. Accordingly, we observed that by blocking clathrin-mediated endocytosis with hypertonic sucrose, chlorpromazine, or pitstop 2, H-1PV transduction was markedly decreased. Accordingly, siRNA-mediated knockdown of AP2M1, which retains a crucial role in clathrin-mediated endocytosis, verified the reliance of H-1PV on this route to enter HeLa and NCH125 cancer cells. By contrast, we found no evidence of viral entry through caveolae-mediated endocytosis. Indeed, pre-treatment of cells with nystatin or methyl-β-cyclodextrin, both inhibitors of caveolae-mediated endocytosis, did not affect viral transduction levels. Unexpectedly, siRNA-mediated knockdown of caveolin-1, the main driver of caveolae-mediated endocytosis, increased H-1PV transduction, suggesting caveolin-1 is a negative modulator of H-1PV infection. We also show that H-1PV entry is dependent on dynamin, a protein responsible for mediating the scission of vesicle neck and promoting further internalisation. Furthermore, since dynamin inhibition almost completely abolished H-1PV infection, makes it unlikely that H-1PV uses macropinocytosis as an alternative pathway to enter cells. After viral internalisation, H-1PV passes through early to late endosomes as observed by confocal microscopy. Inside these endocytic compartments, the acidic environment proved to be crucial for a productive infection. Inhibition of acidification of pH dramatically reduced H-1PV transduction. Besides, a fraction of H-1PV particles was observed inside LAMP1-positive lysosomes, most likely following a non-infectious route. To the author's best knowledge, this is the first study to characterise the cell entry pathways of H-1PV. Along these lines, this work will further contribute to understand H-1PV oncolytic properties as well as to improve its clinical potential in cancer virotherapy.

Keywords: clathrin-mediated endocytosis, H-1 parvovirus, oncolytic virus, virus entry

Procedia PDF Downloads 123
238 Neuroprotection against N-Methyl-D-Aspartate-Induced Optic Nerve and Retinal Degeneration Changes by Philanthotoxin-343 to Alleviate Visual Impairments Involve Reduced Nitrosative Stress

Authors: Izuddin Fahmy Abu, Mohamad Haiqal Nizar Mohamad, Muhammad Fattah Fazel, Renu Agarwal, Igor Iezhitsa, Nor Salmah Bakar, Henrik Franzyk, Ian Mellor

Abstract:

Glaucoma is the global leading cause of irreversible blindness. Currently, the available treatment strategy only involves lowering intraocular pressure (IOP); however, the condition often progresses despite lowered or normal IOP in some patients. N-methyl-D-aspartate receptor (NMDAR) excitotoxicity often occurs in neurodegeneration-related glaucoma; thus it is a relevant target to develop a therapy based on neuroprotection approach. This study investigated the effects of Philanthotoxin-343 (PhTX-343), an NMDAR antagonist, on the neuroprotection of NMDA-induced glaucoma to alleviate visual impairments. Male Sprague-Dawley rats were equally divided: Groups 1 (control) and 2 (glaucoma) were intravitreally injected with phosphate buffer saline (PBS) and NMDA (160nM), respectively, while group 3 was pre-treated with PhTX-343 (160nM) 24 hours prior to NMDA injection. Seven days post-treatments, rats were subjected to visual behavior assessments and subsequently euthanized to harvest their retina and optic nerve tissues for histological analysis and determination of nitrosative stress level using 3-nitrotyrosine ELISA. Visual behavior assessments via open field, object, and color recognition tests demonstrated poor visual performance in glaucoma rats indicated by high exploratory behavior. PhTX-343 pre-treatment appeared to preserve visual abilities as all test results were significantly improved (p < 0.05). H&E staining of the retina showed a marked reduction of ganglion cell layer thickness in the glaucoma group; in contrast, PhTX-343 significantly increased the number by 1.28-folds (p < 0.05). PhTX-343 also increased the number of cell nuclei/100μm2 within inner retina by 1.82-folds compared to the glaucoma group (p < 0.05). Toluidine blue staining of optic nerve tissues showed that PhTX-343 reduced the degeneration changes compared to the glaucoma group which exhibited vacuolation overall sections. PhTX-343 also decreased retinal 3- nitrotyrosine concentration by 1.74-folds compared to the glaucoma group (p < 0.05). All results in PhTX-343 group were comparable to control (p > 0.05). We conclude that PhTX-343 protects against NMDA-induced changes and visual impairments in the rat model by reducing nitrosative stress levels.

Keywords: excitotoxicity, glaucoma, nitrosative stress , NMDA receptor , N-methyl-D-aspartate , philanthotoxin, visual behaviour

Procedia PDF Downloads 104
237 Economic Decision Making under Cognitive Load: The Role of Numeracy and Financial Literacy

Authors: Vânia Costa, Nuno De Sá Teixeira, Ana C. Santos, Eduardo Santos

Abstract:

Financial literacy and numeracy have been regarded as paramount for rational household decision making in the increasing complexity of financial markets. However, financial decisions are often made under sub-optimal circumstances, including cognitive overload. The present study aims to clarify how financial literacy and numeracy, taken as relevant expert knowledge for financial decision-making, modulate possible effects of cognitive load. Participants were required to perform a choice between a sure loss or a gambling pertaining a financial investment, either with or without a competing memory task. Two experiments were conducted varying only the content of the competing task. In the first, the financial choice task was made while maintaining on working memory a list of five random letters. In the second, cognitive load was based upon the retention of six random digits. In both experiments, one of the items in the list had to be recalled given its serial position. Outcomes of the first experiment revealed no significant main effect or interactions involving cognitive load manipulation and numeracy and financial literacy skills, strongly suggesting that retaining a list of random letters did not interfere with the cognitive abilities required for financial decision making. Conversely, and in the second experiment, a significant interaction between the competing mnesic task and level of financial literacy (but not numeracy) was found for the frequency of choice of a gambling option. Overall, and in the control condition, both participants with high financial literacy and high numeracy were more prone to choose the gambling option. However, and when under cognitive load, participants with high financial literacy were as likely as their illiterate counterparts to choose the gambling option. This outcome is interpreted as evidence that financial literacy prevents intuitive risk-aversion reasoning only under highly favourable conditions, as is the case when no other task is competing for cognitive resources. In contrast, participants with higher levels of numeracy were consistently more prone to choose the gambling option in both experimental conditions. These results are discussed in the light of the opposition between classical dual-process theories and fuzzy-trace theories for intuitive decision making, suggesting that while some instances of expertise (as numeracy) are prone to support easily accessible gist representations, other expert skills (as financial literacy) depend upon deliberative processes. It is furthermore suggested that this dissociation between types of expert knowledge might depend on the degree to which they are generalizable across disparate settings. Finally, applied implications of the present study are discussed with a focus on how it informs financial regulators and the importance and limits of promoting financial literacy and general numeracy.

Keywords: decision making, cognitive load, financial literacy, numeracy

Procedia PDF Downloads 149
236 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 113
235 Myanmar Consonants Recognition System Based on Lip Movements Using Active Contour Model

Authors: T. Thein, S. Kalyar Myo

Abstract:

Human uses visual information for understanding the speech contents in noisy conditions or in situations where the audio signal is not available. The primary advantage of visual information is that it is not affected by the acoustic noise and cross talk among speakers. Using visual information from the lip movements can improve the accuracy and robustness of automatic speech recognition. However, a major challenge with most automatic lip reading system is to find a robust and efficient method for extracting the linguistically relevant speech information from a lip image sequence. This is a difficult task due to variation caused by different speakers, illumination, camera setting and the inherent low luminance and chrominance contrast between lip and non-lip region. Several researchers have been developing methods to overcome these problems; the one is lip reading. Moreover, it is well known that visual information about speech through lip reading is very useful for human speech recognition system. Lip reading is the technique of a comprehensive understanding of underlying speech by processing on the movement of lips. Therefore, lip reading system is one of the different supportive technologies for hearing impaired or elderly people, and it is an active research area. The need for lip reading system is ever increasing for every language. This research aims to develop a visual teaching method system for the hearing impaired persons in Myanmar, how to pronounce words precisely by identifying the features of lip movement. The proposed research will work a lip reading system for Myanmar Consonants, one syllable consonants (င (Nga)၊ ည (Nya)၊ မ (Ma)၊ လ (La)၊ ၀ (Wa)၊ သ (Tha)၊ ဟ (Ha)၊ အ (Ah) ) and two syllable consonants ( က(Ka Gyi)၊ ခ (Kha Gway)၊ ဂ (Ga Nge)၊ ဃ (Ga Gyi)၊ စ (Sa Lone)၊ ဆ (Sa Lain)၊ ဇ (Za Gwe) ၊ ဒ (Da Dway)၊ ဏ (Na Gyi)၊ န (Na Nge)၊ ပ (Pa Saug)၊ ဘ (Ba Gone)၊ ရ (Ya Gaug)၊ ဠ (La Gyi) ). In the proposed system, there are three subsystems, the first one is the lip localization system, which localizes the lips in the digital inputs. The next one is the feature extraction system, which extracts features of lip movement suitable for visual speech recognition. And the final one is the classification system. In the proposed research, Two Dimensional Discrete Cosine Transform (2D-DCT) and Linear Discriminant Analysis (LDA) with Active Contour Model (ACM) will be used for lip movement features extraction. Support Vector Machine (SVM) classifier is used for finding class parameter and class number in training set and testing set. Then, experiments will be carried out for the recognition accuracy of Myanmar consonants using the only visual information on lip movements which are useful for visual speech of Myanmar languages. The result will show the effectiveness of the lip movement recognition for Myanmar Consonants. This system will help the hearing impaired persons to use as the language learning application. This system can also be useful for normal hearing persons in noisy environments or conditions where they can find out what was said by other people without hearing voice.

Keywords: feature extraction, lip reading, lip localization, Active Contour Model (ACM), Linear Discriminant Analysis (LDA), Support Vector Machine (SVM), Two Dimensional Discrete Cosine Transform (2D-DCT)

Procedia PDF Downloads 262
234 Detailed Quantum Circuit Design and Evaluation of Grover's Algorithm for the Bounded Degree Traveling Salesman Problem Using the Q# Language

Authors: Wenjun Hou, Marek Perkowski

Abstract:

The Traveling Salesman problem is famous in computing and graph theory. In short, it asks for the Hamiltonian cycle of the least total weight in a given graph with N nodes. All variations on this problem, such as those with K-bounded-degree nodes, are classified as NP-complete in classical computing. Although several papers propose theoretical high-level designs of quantum algorithms for the Traveling Salesman Problem, no quantum circuit implementation of these algorithms has been created up to our best knowledge. In contrast to previous papers, the goal of this paper is not to optimize some abstract complexity measures based on the number of oracle iterations, but to be able to evaluate the real circuit and time costs of the quantum computer. Using the emerging quantum programming language Q# developed by Microsoft, which runs quantum circuits in a quantum computer simulation, an implementation of the bounded-degree problem and its respective quantum circuit were created. To apply Grover’s algorithm to this problem, a quantum oracle was designed, evaluating the cost of a particular set of edges in the graph as well as its validity as a Hamiltonian cycle. Repeating the Grover algorithm with an oracle that finds successively lower cost each time allows to transform the decision problem to an optimization problem, finding the minimum cost of Hamiltonian cycles. N log₂ K qubits are put into an equiprobablistic superposition by applying the Hadamard gate on each qubit. Within these N log₂ K qubits, the method uses an encoding in which every node is mapped to a set of its encoded edges. The oracle consists of several blocks of circuits: a custom-written edge weight adder, node index calculator, uniqueness checker, and comparator, which were all created using only quantum Toffoli gates, including its special forms, which are Feynman and Pauli X. The oracle begins by using the edge encodings specified by the qubits to calculate each node that this path visits and adding up the edge weights along the way. Next, the oracle uses the calculated nodes from the previous step and check that all the nodes are unique. Finally, the oracle checks that the calculated cost is less than the previously-calculated cost. By performing the oracle an optimal number of times, a correct answer can be generated with very high probability. The oracle of the Grover Algorithm is modified using the recalculated minimum cost value, and this procedure is repeated until the cost cannot be further reduced. This algorithm and circuit design have been verified, using several datasets, to generate correct outputs.

Keywords: quantum computing, quantum circuit optimization, quantum algorithms, hybrid quantum algorithms, quantum programming, Grover’s algorithm, traveling salesman problem, bounded-degree TSP, minimal cost, Q# language

Procedia PDF Downloads 146
233 Planning a European Policy for Increasing Graduate Population: The Conditions That Count

Authors: Alice Civera, Mattia Cattaneo, Michele Meoli, Stefano Paleari

Abstract:

Despite the fact that more equal access to higher education has been an objective public policy for several decades, little is known about the effectiveness of alternative means for achieving such goal. Indeed, nowadays, high level of graduate population can be observed both in countries with the high and low level of fees, or high and low level of public expenditure in higher education. This paper surveys the extant literature providing some background on the economic concepts of the higher education market, and reviews key determinants of demand and supply. A theoretical model of aggregate demand and supply of higher education is derived, with the aim to facilitate the understanding of the challenges in today’s higher education systems, as well as the opportunities for development. The model is validated on some exemplary case studies describing the different relationship between the level of public investment and levels of graduate population and helps to derive general implications. In addition, using a two-stage least squares model, we build a macroeconomic model of supply and demand for European higher education. The model allows interpreting policies shifting either the supply or the demand for higher education, and allows taking into consideration contextual conditions with the aim of comparing divergent policies under a common framework. Results show that the same policy objective (i.e., increasing graduate population) can be obtained by shifting either the demand function (i.e., by strengthening student aid) or the supply function (i.e., by directly supporting higher education institutions). Under this theoretical perspective, the level of tuition fees is irrelevant, and empirically we can observe high levels of graduate population in both countries with high (i.e., the UK) or low (i.e., Germany) levels of tuition fees. In practice, this model provides a conceptual framework to help better understanding what are the external conditions that need to be considered, when planning a policy for increasing graduate population. Extrapolating a policy from results in different countries, under this perspective, is a poor solution when contingent factors are not addressed. The second implication of this conceptual framework is that policies addressing the supply or the demand function needs to address different contingencies. In other words, a government aiming at increasing graduate population needs to implement complementary policies, designing them according to the side of the market that is interested. For example, a ‘supply-driven’ intervention, through the direct financial support of higher education institutions, needs to address the issue of institutions’ moral hazard, by creating incentives to supply higher education services in efficient conditions. By contrast, a ‘demand-driven’ policy, providing student aids, need to tackle the students’ moral hazard, by creating an incentive to responsible behavior.

Keywords: graduates, higher education, higher education policies, tuition fees

Procedia PDF Downloads 133
232 Bi-Directional Impulse Turbine for Thermo-Acoustic Generator

Authors: A. I. Dovgjallo, A. B. Tsapkova, A. A. Shimanov

Abstract:

The paper is devoted to one of engine types with external heating – a thermoacoustic engine. In thermoacoustic engine heat energy is converted to an acoustic energy. Further, acoustic energy of oscillating gas flow must be converted to mechanical energy and this energy in turn must be converted to electric energy. The most widely used way of transforming acoustic energy to electric one is application of linear generator or usual generator with crank mechanism. In both cases, the piston is used. Main disadvantages of piston use are friction losses, lubrication problems and working fluid pollution which cause decrease of engine power and ecological efficiency. Using of a bidirectional impulse turbine as an energy converter is suggested. The distinctive feature of this kind of turbine is that the shock wave of oscillating gas flow passing through the turbine is reflected and passes through the turbine again in the opposite direction. The direction of turbine rotation does not change in the process. Different types of bidirectional impulse turbines for thermoacoustic engines are analyzed. The Wells turbine is the simplest and least efficient of them. A radial impulse turbine has more complicated design and is more efficient than the Wells turbine. The most appropriate type of impulse turbine was chosen. This type is an axial impulse turbine, which has a simpler design than that of a radial turbine and similar efficiency. The peculiarities of the method of an impulse turbine calculating are discussed. They include changes in gas pressure and velocity as functions of time during the generation of gas oscillating flow shock waves in a thermoacoustic system. In thermoacoustic system pressure constantly changes by a certain law due to acoustic waves generation. Peak values of pressure are amplitude which determines acoustic power. Gas, flowing in thermoacoustic system, periodically changes its direction and its mean velocity is equal to zero but its peak values can be used for bi-directional turbine rotation. In contrast with feed turbine, described turbine operates on un-steady oscillating flows with direction changes which significantly influence the algorithm of its calculation. Calculated power output is 150 W with frequency 12000 r/min and pressure amplitude 1,7 kPa. Then, 3-d modeling and numerical research of impulse turbine was carried out. As a result of numerical modeling, main parameters of the working fluid in turbine were received. On the base of theoretical and numerical data model of impulse turbine was made on 3D printer. Experimental unit was designed for numerical modeling results verification. Acoustic speaker was used as acoustic wave generator. Analysis if the acquired data shows that use of the bi-directional impulse turbine is advisable. By its characteristics as a converter, it is comparable with linear electric generators. But its lifetime cycle will be higher and engine itself will be smaller due to turbine rotation motion.

Keywords: acoustic power, bi-directional pulse turbine, linear alternator, thermoacoustic generator

Procedia PDF Downloads 347
231 Motivation of Doctors and its Impact on the Quality of Working Life

Authors: E. V. Fakhrutdinova, K. R. Maksimova, P. B. Chursin

Abstract:

At the present stage of the society progress the health care is an integral part of both the economic system and social, while in the second case the medicine is a major component of a number of basic and necessary social programs. Since the foundation of the health system are highly qualified health professionals, it is logical proposition that increase of doctor`s professionalism improves the effectiveness of the system as a whole. Professionalism of the doctor is a collection of many components, essential role played by such personal-psychological factors as honesty, willingness and desire to help people, and motivation. A number of researchers consider motivation as an expression of basic human needs that have passed through the “filter” which is a worldview and values learned in the process of socialization by the individual, to commit certain actions designed to achieve the expected result. From this point of view a number of researchers propose the following classification of highly skilled employee’s needs: 1. the need for confirmation the competence (setting goals that meet the professionalism and receipt of positive emotions in their decision), 2. The need for independence (the ability to make their own choices in contentious situations arising in the process carry out specialist functions), 3. The need for ownership (in the case of health care workers, to the profession and accordingly, high in the eyes of the public status of the doctor). Nevertheless, it is important to understand that in a market economy a significant motivator for physicians (both legal and natural persons) is to maximize its own profits. In the case of health professionals duality motivational structure creates an additional contrast, as in the public mind the image of the ideal physician; usually a altruistically minded person thinking is not primarily about their own benefit, and to assist others. In this context, the question of the real motivation of health workers deserves special attention. The survey conducted by the American researcher Harrison Terni for the magazine "Med Tech" in 2010 revealed the opinion of more than 200 medical students starting courses, and the primary motivation in a profession choice is "desire to help people", only 15% said that they want become a doctor, "to earn a lot". From the point of view of most of the classical theories of motivation this trend can be called positive, as intangible incentives are more effective. However, it is likely that over time the opinion of the respondents may change in the direction of mercantile motives. Thus, it is logical to assume that well-designed system of motivation of doctor`s labor should be based on motivational foundations laid during training in higher education.

Keywords: motivation, quality of working life, health system, personal-psychological factors, motivational structure

Procedia PDF Downloads 331
230 Association between TNF-α and Its Receptor TNFRSF1B Polymorphism with Pulmonary Tuberculosis in Tomsk, Russia Federation

Authors: K. A. Gladkova, N. P. Babushkina, E. Y. Bragina

Abstract:

Purpose: Tuberculosis (TB), caused by Mycobacterium tuberculosis, is one of the major public health problems worldwide. It is clear that the immune response to M. tuberculosis infection is a relationship between inflammatory and anti-inflammatory responses in which Tumour Necrosis Factor-α (TNF-α) plays key roles as a pro-inflammatory cytokine. TNF-α involved in various cell immune responses via binding to its two types of membrane-bound receptors, TNFRSF1A and TNFRSF1B. Importantly, some variants of the TNFRSF1B gene have been considered as possible markers of host susceptibility to TB. However, the possible impact of such TNF-α and its receptor genes polymorphism on TB cases in Tomsk is missing. Thus, the purpose of our study was to investigate polymorphism of TNF-α (rs1800629) and its receptor TNFRSF1B (rs652625 and rs525891) genes in population of Tomsk and to evaluate their possible association with the development of pulmonary TB. Materials and Methods: The population distribution features of genes polymorphisms were investigated and made case-control study based on group of people from Tomsk. Human blood was collected during routine patients examination at Tomsk Regional TB Dispensary. Altogether, 234 TB-positive patients (80 women, 154 men, average age is 28 years old) and 205 health-controls (153 women, 52 men, average age is 47 years old) were investigated. DNA was extracted from blood plasma by phenol-chloroform method. Genotyping was carried out by a single-nucleotide-specific real-time PCR assay. Results: First, interpopulational comparison was carried out between healthy individuals from Tomsk and available data from the 1000 Genomes project. It was found that polymorphism rs1800629 region demonstrated that Tomsk population was significantly different from Japanese (P = 0.0007), but it was similar with the following Europeans subpopulations: Italians (P = 0.052), Finns (P = 0.124) and British (P = 0.910). Polymorphism rs525891 clear demonstrated that group from Tomsk was significantly different from population of South Africa (P = 0.019). However, rs652625 demonstrated significant differences from Asian population: Chinese (P = 0.03) and Japanese (P = 0.004). Next, we have compared healthy individuals versus patients with TB. It was detected that no association between rs1800629, rs652625 polymorphisms, and positive TB cases. Importantly, AT genotype of polymorphism rs525891 was significantly associated with resistance to TB (odds ratio (OR) = 0.61; 95% confidence interval (CI): 0.41-0.9; P < 0.05). Conclusion: To the best of our knowledge, the polymorphism of TNFRSF1B (rs525891) was associated with TB, while genotype AT is protective [OR = 0.61] in Tomsk population. In contrast, no significant correlation was detected between polymorphism TNF-α (rs1800629) and TNFRSF1B (rs652625) genes and alveolar TB cases among population of Tomsk. In conclusion, our data expands the molecular particularities associated with TB. The study was supported by the grant of the Russia for Basic Research #15-04-05852.

Keywords: polymorphism, tuberculosis, TNF-α, TNFRSF1B gene

Procedia PDF Downloads 156
229 The Effects of Grape Waste Bioactive Compounds on the Immune Response and Oxidative Stress in Pig Kidney

Authors: Mihai Palade, Gina Cecilia Pistol, Mariana Stancu, Veronica Chedea, Ionelia Taranu

Abstract:

Nutrition is an important determinant of general health status, with especially focus on prevention and/or attenuation of the inflammatory-associated pathologies. People with chronic kidney disease can experience chronic inflammation that can lead to cardiovascular disease and even an increased rate of death. There are important links between chronic kidney diseases, inflammation and nutritional strategies that may prevent or protect against undesirable inflammation and oxidative stress. The grape by-products either seeds or pomace are rich in polyphenols which may be beneficial in prevention of inflammatory, antioxidant and antimicrobial processes. As a model for studying the impact of grape seeds on renal inflammation and oxidative stress, we used in this study weaned piglets. After a feeding trial of 30 days with a control diet and an experimental diet containing 5% grape seed (GS), kidney samples were collected. In renal tissues were determined the expression and activity of important markers of immune respose and oxidative stress: pro-inflammatory cytokines (TNF-alpha, IL-1 beta, IL-6, IL-8, IFN-gamma), anti-inflammatory cytokines (IL-4, IL-10), anti-oxidant enzymes (catalase CAT, superoxide dismutase SOD, glutathione peroxidise GPx) and important mediators belonging to nuclear receptors (NF-kB1, Nrf-2 and PPAR-gamma). Gene expression was evaluated by qPCR, whereas protein concentration was determined using proteomic techniques (ELISA). The activity of anti-oxidant enzymes was determined using specific kits. Our results showed that GS enriched in polyphenols does not have effect on TNF-alpha, IL-6 and IL-1 beta gene expression and protein concentration in kidney. By contrast, the gene expression and protein level of IL-8 and IFN-gamma were decreased in GS kidney. Anti-inflammatory cytokines IL-4 and IL-10 gene levels were increased in kidneys collected from GS piglets in comparison with controls, with no modification of protein levels between the two groups. The activities of anti-oxidant enzymes CAT and GPx were increased in kidney by GS, whereas SOD activity was unmodified in comparison with control samples. Also, the GS diet was associated with no modulation of mRNAs for nuclear receptors NF-kB1, Nrf-2 and PPAR-gamma gene expressions in kidneys. In conclusion, our results demonstrated that GS enriched in bioactive compounds such polyphenols could modulate inflammation and oxidative stress markers in kidney tissues. Further studies are necessary to elucidate the mechanism of action of GS compounds in case kidney inflammation associated with oxidative stress, and signalling molecules involved in these mechanisms.

Keywords: animal model, kidney inflammation, oxidative stress, grape seed

Procedia PDF Downloads 272