Search results for: protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1087

Search results for: protocol

637 Functional Analysis of Thyroid Peroxidase (TPO) Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 322
636 Functional Analysis of Thyroid Peroxidase Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 306
635 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 225
634 A Learning Automata Based Clustering Approach for Underwater ‎Sensor Networks to Reduce Energy Consumption

Authors: Motahareh Fadaei

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: clustering, energy consumption‎, learning automata, underwater sensor networks

Procedia PDF Downloads 290
633 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.

Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 155
632 Performance Analysis of Routing Protocols for WLAN Based Wireless Sensor Networks (WSNs)

Authors: Noman Shabbir, Roheel Nawaz, Muhammad N. Iqbal, Junaid Zafar

Abstract:

This paper focuses on the performance evaluation of routing protocols in WLAN based Wireless Sensor Networks (WSNs). A comparative analysis of routing protocols such as Ad-hoc On-demand Distance Vector Routing System (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR) is been made against different network parameters like network load, end to end delay and throughput in small, medium and large-scale sensor network scenarios to identify the best performing protocol. Simulation results indicate that OLSR gives minimum network load in all three scenarios while AODV gives the best throughput in small scale network but in medium and large scale networks, DSR is better. In terms of delay, OLSR is more efficient in small and medium scale network while AODV is slightly better in large networks.

Keywords: WLAN, WSN, AODV, DSR, OLSR

Procedia PDF Downloads 405
631 The Achievements and Challenges of Physics Teachers When Implementing Problem-Based Learning: An Exploratory Study Applied to Rural High Schools

Authors: Osman Ali, Jeanne Kriek

Abstract:

Introduction: The current instructional approach entrenched in memorizing does not assist conceptual understanding in science. Instructional approaches that encourage research, investigation, and experimentation, which depict how scientists work, should be encouraged. One such teaching strategy is problem-based learning (PBL). PBL has many advantages; enhanced self-directed learning and improved problem-solving and critical thinking skills. However, despite many advantages, PBL has challenges. Research confirmed is time-consuming and difficult to formulate ill-structured questions. Professional development interventions are needed for in-service educators to adopt the PBL strategy. The purposively selected educators had to implement PBL in their classrooms after the intervention to develop their practice and then reflect on the implementation. They had to indicate their achievements and challenges. This study differs from previous studies as the rural educators were subjected to implementing PBL in their classrooms and reflected on their experiences, beliefs, and attitudes regarding PBL. Theoretical Framework: The study reinforced Vygotskian sociocultural theory. According to Vygotsky, the development of a child's cognitive is sustained by the interaction between the child and more able peers in his immediate environment. The theory suggests that social interactions in small groups create an opportunity for learners to form concepts and skills on their own better than working individually. PBL emphasized learning in small groups. Research Methodology: An exploratory case study was employed. The reason is that the study was not necessarily for specific conclusive evidence. Non-probability purposive sampling was adopted to choose eight schools from 89 rural public schools. In each school, two educators were approached, teaching physical sciences in grades 10 and 11 (N = 16). The research instruments were questionnaires, interviews, and lesson observation protocol. Two open-ended questionnaires were developed before and after intervention and analyzed thematically. Three themes were identified. The semi-structured interviews and responses were coded and transcribed into three themes. Subsequently, the Reform Teaching Observation Protocol (RTOP) was adopted for lesson observation and was analyzed using five constructs. Results: Evidence from analyzing the questionnaires before and after the intervention shows that participants knew better what was required to develop an ill-structured problem during the implementation. Furthermore, indications from the interviews are that participants had positive views about the PBL strategy. They stated that they only act as facilitators, and learners’ problem-solving and critical thinking skills are enhanced. They suggested a change in curriculum to adopt the PBL strategy. However, most participants may not continue to apply the PBL strategy stating that it is time-consuming and difficult to complete the Annual Teaching Plan (ATP). They complained about materials and equipment and learners' readiness to work. Evidence from RTOP shows that after the intervention, participants learn to encourage exploration and use learners' questions and comments to determine the direction and focus of classroom discussions.

Keywords: problem-solving, self-directed, critical thinking, intervention

Procedia PDF Downloads 82
630 Novel Approach to Privacy - Preserving Secure Multiparty Computation of Complex Solid Geometric Shape

Authors: Rizwan Rizwan

Abstract:

Secure Multiparty Computation is an emerging area of research within the cryptographic community, enabling secure collaboration among multiple parties while safeguarding their sensitive data. Secure Multiparty Computation has been extensively studied in the context of plane geometry, its application to complex solid geometry shapes remains relatively unexplored. This research paper aims to bridge this gap by proposing a solution for the secure multiparty computation of intersecting tetrahedra. We present an approach to calculate the volume of intersecting tetrahedra securely while preserving the privacy of the input data provided by each participating party. The proposed solution leverages accepted simulation paradigms to prove the privacy of the computation. We thoroughly analyze the computational and communication complexities of our approach, demonstrating that they closely align with the minimum theoretical complexity for the problems at hand. This optimal nature of our solution ensures efficient and secure collaborative geometric computations.

Keywords: cryptography, secure multiparty computation, solid geometry, protocol, simulation paradigm

Procedia PDF Downloads 25
629 Social Construction of Gender: Comparison of Gender Stereotypes among Bureaucrats and Non- Bureaucrats

Authors: Arshad Ali

Abstract:

This study aims to highlight the comparative patterns of social construction of gender among bureaucrats and non-bureaucrats. For the purpose of this study purposive sample of 8 respondents, including both male and female bureaucrats and non-bureaucrats, was collected from Gujranwala and Lahore. The measures for collecting data included an indigenous demographic information sheet and interview protocol related to gender roles, social construction of gender and managerial performance. The collected data was analyzed through the Nvivo version 11 and analysis reveals that there are diverse perceptions regarding male and female stereotyping among bureaucrats and non-bureaucrats, as different kinds of social environments lead to the modification of stereotypes. The research contributes to gender studies, specifically in the context of Pakistani society. There are very few studies available, and empirical data about Gender construction is scanty, so the study provides an impetus for future research. It is suggested that future research explore the phenomenon at a larger scale, including more respondents and another dimension, by keeping in view the socio-economic factors and policies of the government regarding the elimination of gender discrimination in Pakistan.

Keywords: social construction, gender, bureaucrats, gender perception

Procedia PDF Downloads 46
628 Automated End of Sprint Detection for Force-Velocity-Power Analysis with GPS/GNSS Systems

Authors: Patrick Cormier, Cesar Meylan, Matt Jensen, Dana Agar-Newman, Chloe Werle, Ming-Chang Tsai, Marc Klimstra

Abstract:

Sprint-derived horizontal force-velocity-power (FVP) profiles can be developed with adequate validity and reliability with satellite (GPS/GNSS) systems. However, FVP metrics are sensitive to small nuances in data processing procedures such that minor differences in defining the onset and end of the sprint could result in different FVP metric outcomes. Furthermore, in team-sports, there is a requirement for rapid analysis and feedback of results from multiple athletes, therefore developing standardized and automated methods to improve the speed, efficiency and reliability of this process are warranted. Thus, the purpose of this study was to compare different methods of sprint end detection on the development of FVP profiles from 10Hz GPS/GNSS data through goodness-of-fit and intertrial reliability statistics. Seventeen national team female soccer players participated in the FVP protocol which consisted of 2x40m maximal sprints performed towards the end of a soccer specific warm-up in a training session (1020 hPa, wind = 0, temperature = 30°C) on an open grass field. Each player wore a 10Hz Catapult system unit (Vector S7, Catapult Innovations) inserted in a vest in a pouch between the scapulae. All data were analyzed following common procedures. Variables computed and assessed were the model parameters, estimated maximal sprint speed (MSS) and the acceleration constant τ, in addition to horizontal relative force (F₀), velocity at zero (V₀), and relative mechanical power (Pmax). The onset of the sprints was standardized with an acceleration threshold of 0.1 m/s². The sprint end detection methods were: 1. Time when peak velocity (MSS) was achieved (zero acceleration), 2. Time after peak velocity drops by -0.4 m/s, 3. Time after peak velocity drops by -0.6 m/s, and 4. When the integrated distance from the GPS/GNSS signal achieves 40-m. Goodness-of-fit of each sprint end detection method was determined using the residual sum of squares (RSS) to demonstrate the error of the FVP modeling with the sprint data from the GPS/GNSS system. Inter-trial reliability (from 2 trials) was assessed utilizing intraclass correlation coefficients (ICC). For goodness-of-fit results, the end detection technique that used the time when peak velocity was achieved (zero acceleration) had the lowest RSS values, followed by -0.4 and -0.6 velocity decay, and 40-m end had the highest RSS values. For intertrial reliability, the end of sprint detection techniques that were defined as the time at (method 1) or shortly after (method 2 and 3) when MSS was achieved had very large to near perfect ICC and the time at the 40 m integrated distance (method 4) had large to very large ICCs. Peak velocity was reached at 29.52 ± 4.02-m. Therefore, sport scientists should implement end of sprint detection either when peak velocity is determined or shortly after to improve goodness of fit to achieve reliable between trial FVP profile metrics. Although, more robust processing and modeling procedures should be developed in future research to improve sprint model fitting. This protocol was seamlessly integrated into the usual training which shows promise for sprint monitoring in the field with this technology.

Keywords: automated, biomechanics, team-sports, sprint

Procedia PDF Downloads 92
627 The Effect of Ethylene Glycol on Cryopreserved Bovine Oocytes

Authors: Sri Wahjuningsih, Nur Ihsan, Hadiah

Abstract:

In the embryo transfer program, to address the limited production of embryos in vivo, in vitro embryo production has become an alternative approach that is relatively inexpensive. One potential source of embryos that can be developed is to use immature oocytes then conducted in vitro maturation and in vitro fertilization. However, obstacles encountered were oocyte viability mammals have very limited that it cannot be stored for a long time, so we need oocyte cryopreservation. The research was conducted to know the optimal concentration use of ethylene glycol as a cryoprotectant on oocytes freezing.Material use in this research was immature oocytes; taken from abbatoir which was aspirated from follicle with diameter 2-6 mm. Concentration ethylen glycol used were 0,5 M, I M, 1,5 M and 2M. The freezing method used was conventional method combined with a five-step protocol washing oocytes from cryoprotectant after thawing. The result showed that concentration ethylen glycol have the significant effect (P<0.05) on oocytes quality after thawing and in vitro maturation. It was concluded that concentration 1,5 M was the best concentration for freezing oocytes using conventional method.

Keywords: bovine, conventional freezing, ethylen glycol, oocytes

Procedia PDF Downloads 329
626 Governance of Clean Energy in Rural Northwest Pakistan

Authors: Inayatullah Jan, Sidra Pervez

Abstract:

Effective institutional arrangements at local and national levels are quintessential for promotion of renewable energy in a country. This study attempts to examine the institutional arrangements for development of domestic renewable energy in rural northwest Pakistan. The study describes that very limited number of public and private organizations were working on clean development in the area. Surprisingly, no institutional arrangements exclusively meant for domestic clean energy promotion were observed in the area. The study concludes that the objectives of Kyoto Protocol in Pakistan can be achieved only if the government and non-governmental organizations work together to launch cost-effective renewable energy interventions, particularly in rural areas. The need is to have a coordinated, consistent, and focused cooperation of all stakeholders involved in promotion of domestic renewable energy at all levels. This will not only improve the socioeconomic and environmental conditions in the local context, but will play a key role in achieving the United Nations Millennium Development Goals(MDGs).

Keywords: governance, clean energy, greenhouse gases, CDM, Northwest Pakistan

Procedia PDF Downloads 361
625 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 93
624 Splenic Artery Aneurysms: A Rare, Insidious Cause of Abdominal Pain

Authors: Christopher Oyediran, Nicola Ubayasiri, Christopher Gough

Abstract:

Splenic artery aneurysms are often clinically occult, occasionally identified incidentally with imaging. The pathogenesis of aneurysms is complex, but certain factors are thought to contribute to their development. Given the potential fatal complications of rupture, a high index of suspicion is required to make an early diagnosis. We present a case of a 36-year-old female with a history of endometriosis and multiple sclerosis who presented to the Emergency Department with sudden onset epigastric pain and collapse. On arrival, she was pale and clammy with profound tachycardia and hypotension. An ultrasound done in the resuscitation department revealed abdominal free fluid. She was resuscitated with blood and transferred for emergent laparotomy. Laparotomy revealed massive haemoperitoneum from the spleen. She underwent emergency splenectomy and inspection of the spleen revealed a splenic artery aneurysm. She received our massive transfusion protocol followed by a short stay on ITU, making a good post-operative recovery and was discharged home a week later.

Keywords: aneurysm, human chorionic gonadotrophin (hCG), resuscitation, laparotomy

Procedia PDF Downloads 405
623 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 264
622 Direct Organogenesis of Begonia Rex cv. DS-EYWA, An Unique Rare Cultivar, via Thin Cell Layering (TCL) Technique

Authors: Mahboubeh Davoudi Pahnekolayi

Abstract:

Begonia rex cv. DS-EYWA is a rare, unique cultivar of begonia rex with curly colorful leaves. Optimization of an in vitro efficient regeneration protocol by focusing on transverse Thin Cell Layer (tTCL) petiole explants for high-scale production of such a beautiful cultivar was considered as our main purpose in this experiment. Thus, various concentrations of Plant Growth Regulators (PGRs) including 6-Benzylaminopurine (BAP), Thidiazuron (TDY), and –Naphthaleneacetic Acid (NAA), were selected in a Completely Randomized Design (CRD) to establish and optimize the direct organogenesis efficiency of this cultivar. Cultivation of 1 mm tTCL petiole explants in noted treatments showed that 1.5 mgl-1 BAP + 0.5 mgl-1 NAA can induce the highest number of direct regenerated shoots and lower concentration of BAP (0.5 mgl-1) can be suggested for shoot elongation before rooting stage. Elongated shoots were successfully rooted in MS free basal medium and acclimatized in 1:1 peat moss: perlite sterilized pot mixture.

Keywords: begonia rare cultivar, direct organogenesis, explant type, regeneration, thin cell layering (TCL)

Procedia PDF Downloads 41
621 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks

Authors: Anusha M., V. Srikanth

Abstract:

Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.

Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios

Procedia PDF Downloads 527
620 Controlled Synthesis of CdSe Quantum Dots via Microwave-Enhanced Process: A Green Approach for Mass Production

Authors: Delele Worku Ayele, Bing-Joe Hwang

Abstract:

A method that does not employ hot injection techniques has been developed for the size-tunable synthesis of high-quality CdSe quantum dots (QDs) with a zinc blende structure. In this environmentally benign synthetic route, which uses relatively less toxic precursors, solvents, and capping ligands, CdSe QDs that absorb visible light are obtained. The size of the as-prepared CdSe QDs and, thus, their optical properties can be manipulated by changing the microwave reaction conditions. The QDs are characterized by XRD, TEM, UV-vis, FTIR, time-resolved fluorescence spectroscopy, and fluorescence spectrophotometry. In this approach, the reaction is conducted in open air and at a much lower temperature than in hot injection techniques. The use of microwaves in this process allows for a highly reproducible and effective synthesis protocol that is fully adaptable for mass production and can be easily employed to synthesize a variety of semiconductor QDs with the desired properties. The possible application of the as-prepared CdSe QDs has been also assessed using deposition on TiO2 films.

Keywords: average life time, CdSe QDs, microwave (MW), mass production oleic acid, Na2SeSO3

Procedia PDF Downloads 278
619 The Impact of an Improved Strategic Partnership Programme on Organisational Performance and Growth of Firms in the Internet Protocol Television and Hybrid Fibre-Coaxial Broadband Industry

Authors: Collen T. Masilo, Brane Semolic, Pieter Steyn

Abstract:

The Internet Protocol Television (IPTV) and Hybrid Fibre-Coaxial (HFC) Broadband industrial sector landscape are rapidly changing and organisations within the industry need to stay competitive by exploring new business models so that they can be able to offer new services and products to customers. The business challenge in this industrial sector is meeting or exceeding high customer expectations across multiple content delivery modes. The increasing challenges in the IPTV and HFC broadband industrial sector encourage service providers to form strategic partnerships with key suppliers, marketing partners, advertisers, and technology partners. The need to form enterprise collaborative networks poses a challenge for any organisation in this sector, in selecting the right strategic partners who will ensure that the organisation’s services and products are marketed in new markets. Partners who will ensure that customers are efficiently supported by meeting and exceeding their expectations. Lastly, selecting cooperation partners who will represent the organisation in a positive manner, and contribute to improving the performance of the organisation. Companies in the IPTV and HFC broadband industrial sector tend to form informal partnerships with suppliers, vendors, system integrators and technology partners. Generally, partnerships are formed without thorough analysis of the real reason a company is forming collaborations, without proper evaluations of prospective partners using specific selection criteria, and with ineffective performance monitoring of partners to ensure that a firm gains real long term benefits from its partners and gains competitive advantage. Similar tendencies are illustrated in the research case study and are based on Skyline Communications, a global leader in end-to-end, multi-vendor network management and operational support systems (OSS) solutions. The organisation’s flagship product is the DataMiner network management platform used by many operators across multiple industries and can be referred to as a smart system that intelligently manages complex technology ecosystems for its customers in the IPTV and HFC broadband industry. The approach of the research is to develop the most efficient business model that can be deployed to improve a strategic partnership programme in order to significantly improve the performance and growth of organisations participating in a collaborative network in the IPTV and HFC broadband industrial sector. This involves proposing and implementing a new strategic partnership model and its main features within the industry which should bring about significant benefits for all involved companies to achieve value add and an optimal growth strategy. The proposed business model has been developed based on the research of existing relationships, value chains and business requirements in this industrial sector and validated in 'Skyline Communications'. The outputs of the business model have been demonstrated and evaluated in the research business case study the IPTV and HFC broadband service provider 'Skyline Communications'.

Keywords: growth, partnership, selection criteria, value chain

Procedia PDF Downloads 97
618 Coaxial Helix Antenna for Microwave Coagulation Therapy in Liver Tissue Simulations

Authors: M. Chaichanyut, S. Tungjitkusolmun

Abstract:

This paper is concerned with microwave (MW) ablation for a liver cancer tissue by using helix antenna. The antenna structure supports the propagation of microwave energy at 2.45 GHz. A 1½ turn spiral catheter-based microwave antenna applicator has been developed. We utilize the three-dimensional finite element method (3D FEM) simulation to analyze where the tissue heat flux, lesion pattern and volume destruction during MW ablation. The configurations of helix antenna where Helix air-core antenna and Helix Dielectric-core antenna. The 3D FEMs solutions were based on Maxwell and bio-heat equations. The simulation protocol was power control (10 W, 300s). Our simulation result, both helix antennas have heat flux occurred around the helix antenna and that can be induced the temperature distribution similar (teardrop). The region where the temperature exceeds 50°C the microwave ablation was successful (i.e. complete destruction). The Helix air-core antenna and Helix Dielectric-core antenna, ablation zone or axial ratios (Widest/length) were respectively 0.82 and 0.85; the complete destructions were respectively 4.18 cm³ and 5.64 cm³.

Keywords: liver cancer, Helix antenna, finite element, microwave ablation

Procedia PDF Downloads 287
617 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 226
616 A Scalable Model of Fair Socioeconomic Relations Based on Blockchain and Machine Learning Algorithms-1: On Hyperinteraction and Intuition

Authors: Merey M. Sarsengeldin, Alexandr S. Kolokhmatov, Galiya Seidaliyeva, Alexandr Ozerov, Sanim T. Imatayeva

Abstract:

This series of interdisciplinary studies is an attempt to investigate and develop a scalable model of fair socioeconomic relations on the base of blockchain using positive psychology techniques and Machine Learning algorithms for data analytics. In this particular study, we use hyperinteraction approach and intuition to investigate their influence on 'wisdom of crowds' via created mobile application which was created for the purpose of this research. Along with the public blockchain and private Decentralized Autonomous Organization (DAO) which were elaborated by us on the base of Ethereum blockchain, a model of fair financial relations of members of DAO was developed. We developed a smart contract, so-called, Fair Price Protocol and use it for implementation of model. The data obtained from mobile application was analyzed by ML algorithms. A model was tested on football matches.

Keywords: blockchain, Naïve Bayes algorithm, hyperinteraction, intuition, wisdom of crowd, decentralized autonomous organization

Procedia PDF Downloads 143
615 Preparation of Superparamagnetic Functionalized Magnetite Nanoparticles for Magnetically Separable Catalysis

Authors: Priya Arora, Jaspreet K. Rajput

Abstract:

Superparamagnetism has accelerated the research and use of more economical and ecological magnetically separable catalysts due to their more efficient isolation by response to an applied magnetic field. Magnetite nanomaterials coated by SiO2 shell have received a great deal of focus in the last decades as it provides high stability and also easy further surface functionalization depending upon the application. In this protocol, Fe3O4 magnetic nanoparticles have been synthesized by co-precipitation combined with sonication method. Further, Fe3O4 superparamagnetic nanoparticles have been functionalized by various moieties to serve as efficient catalysts for multicomponent reactions. The functionalized nanoparticles were characterized by techniques like Fourier transform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM), scanning electron microscopy (SEM), vibrating sample magnetometer (VSM), thermogravimetric analysis (TGA), Brunauer-Emmett-Teller (BET) surface area analysis. The as prepared nanocatalysts can be reused for several times without any significant loss in its activity. The utilization of magnetic nanoparticles as catalysts for this reaction is one approach i.e. green, inexpensive, facile and widely applicable.

Keywords: functionalized, magnetite, multicomponent reactions, superparamagnetic

Procedia PDF Downloads 316
614 Model and Neural Control of the Depth of Anesthesia during Surgery

Authors: Javier Fernandez, Mayte Medina, Rafael Fernandez de Canete, Nuria Alcain, Juan Carlos Ramos-Diaz

Abstract:

At present, the experimentation of anesthetic drugs on patients requires a regulation protocol, and the response of each patient to several doses of entry drug must be well known. Therefore, the development of pharmacological dose control systems is a promising field of research in anesthesiology. In this paper, it has been developed a non-linear compartmental the pharmacokinetic-pharmacodynamical model which describes the anesthesia depth effect in a sufficiently reliable way over a set of patients with the depth effect quantified by the Bi-Spectral Index. Afterwards, an Artificial Neural Network (ANN) predictive controller has been designed based on the depth of anesthesia model so as to keep the patient in the optimum condition while he undergoes surgical treatment. For the purpose of quantifying the efficiency of the neural predictive controller, a classical proportional-integral-derivative controller has also been developed to compare both strategies. Results show the superior performance of predictive neural controller during BiSpectral Index reference tracking.

Keywords: anesthesia, bi-spectral index, neural network control, pharmacokinetic-pharmacodynamical model

Procedia PDF Downloads 305
613 Rapid Microwave-Enhanced Process for Synthesis of CdSe Quantum Dots for Large Scale Production and Manipulation of Optical Properties

Authors: Delele Worku Ayele, Bing-Joe Hwang

Abstract:

A method that does not employ hot injection techniques has been developed for the size-tunable synthesis of high-quality CdSe quantum dots (QDs) with a zinc blende structure. In this environmentally benign synthetic route, which uses relatively less toxic precursors, solvents, and capping ligands, CdSe QDs that absorb visible light are obtained. The size of the as-prepared CdSe QDs and, thus, their optical properties can be manipulated by changing the microwave reaction conditions. The QDs are characterized by XRD, TEM, UV-vis, FTIR, time-resolved fluorescence spectroscopy, and fluorescence spectrophotometry. In this approach, the reaction is conducted in open air and at a much lower temperature than in hot injection techniques. The use of microwaves in this process allows for a highly reproducible and effective synthesis protocol that is fully adaptable for mass production and can be easily employed to synthesize a variety of semiconductor QDs with the desired properties. The possible application of the as-prepared CdSe QDs has been also assessed using deposition on TiO2 films.

Keywords: CdSe QDs, Na2SeSO3, microwave (MW), oleic acid, mass production, average life time

Procedia PDF Downloads 678
612 Invasion of Scaevola sericea (Goodeniaceae) in Cuba: Invasive Dynamic and Density-Dependent Relationship with the Native Species Tournefortia gnaphalodes (Boraginaceae)

Authors: Jorge Ferro-Diaz, Lazaro Marquez-Llauger, Jose Alberto Camejo-Lamas, Lazaro Marquez-Govea

Abstract:

The invasion of Scaevola sericea Vahl (Goodeniaceae) in Cuba is a recent process, this exotic invasive species was reported for the first time, in the national territory, by 2008. S. sericea is native to the coasts around the Indian Ocean and western Pacific, common on sandy beaches; it has expanded rapidly around the planet by either natural or anthropic causes, mainly due to its use in hotel gardening. Cuba is highly vulnerable to the colonization of these species, mainly due to tropical hurricanes which have increased in the last decades; it also affects other native species such as Tournefortia gnaphalodes (L.) R. Br. (Boraginaceae) that show invasive manifestations because of the unbalanced state of demographic processes of littoral vegetation, which has been studied by authors during the last 10 years. The fast development of Cuban tourism has encouraged the use of exotic species in gardening that invade large sectors of sandy coasts. Taking into account the importance of assessing the impacts dimensions and adopting effective control measures, a monitoring program for the invasion of S. sericea in Cuba was undertaken. The program has been implemented since 2013 and the main objective was to identify invasive patterns and interactions with other native species of coastal vegetation. This experience also aimed to validate the design and propose a standardized monitoring protocol to be applied throughout the country. In the Cuban territory, 12 sites were chosen, where there were established 24 permanent plots of 100 m2; measurements were taken twice a year taking into consideration variables such as abundance, plant height, soil cover, flora and companion vegetation, density and frequency; other physical variables of the beaches were also measured. Similarly, for associated individuals of T. gnaphalodes, the same variables were measured. The results of these first four years allowed us to document patterns of S. sericea invasion, highlighting the use of adventitious roots to enhance their colonization, and to characterize demographic indicators, ecosystem affections, and interactions with native plants. A density-dependent relationship with T. gnaphalodes was documented, finding a controlling effect on S. sericea, so that a manipulation experiment was applied to evaluate possible management actions to be incorporated in the Plans of the protected areas involved. With these results, it was concluded, for the evaluated sites, that S. sericea has had an invasion dynamics ruled by effects of coastal dynamics, more intense in beaches with affectations to the native vegetation, and more controlled in beaches with more preserved vegetation. It was found that when S. sericea is established, the mechanism that most reinforces its invasion is the use of adventitious roots, used to expand the patches and colonize beach sectors. It was also found that when the density of T. gnaphalodes increases, it detains the expansion of S. sericea and reduces its colonization possibilities, behaving as a natural controller of its biological invasion. The results include a proposal of a new Monitoring Protocol for Scaevola sericea in Cuba, with the possibility of extending its implementation to other countries in the region.

Keywords: biological invasion, exotic invasive species, plant interactions, Scaevola sericea

Procedia PDF Downloads 195
611 Antimicrobial Activity of Olive Mill Wastewater Fractions

Authors: Chahinez Ait Si Said, Ouassila Touafek, Mohamed Reda Zahi, Smain Sabour, ‎Mohamed El Hattab ‎

Abstract:

Oil mill wastewater (OMW) is a major effluent of the olive industry resulting from olive ‎oil extraction which is a great source for the development of new drugs. The present ‎study aimed to evaluate the antimicrobial activity of seven different fractions separated ‎from OMW extract. The sample was recovered from an oil mill in the Blida region ‎‎(Algeria). A crude ethyl acetate extract was prepared from OMW according to a well-‎established protocol; the yield of the extract obtained was 4%. From the extract, ‎different fractions were prepared by fractionating the total extract with an open column ‎chromatography. The obtained fractions were submitted to antimicrobial activity ‎screening in a comparative purpose. All the fractions obtained show great antimicrobial ‎potential. ‎Phytochemical study of the different fractions was assessed by evaluating the total ‎phenolic compounds for all fractions studied as the main compounds found in OMW ‎were phenols like hydroxytyrosol, tyrosol, phenolic acids like caffeic, quinic and ferulic ‎acids which show great therapeutic activities. ‎

Keywords: olive mill wastewater, fractionation, total phenolic compound, antimicrobial activity

Procedia PDF Downloads 62
610 Pluripotent Stem Cells as Therapeutic Tools for Limbal Stem Cell Deficiencies and Drug Testing

Authors: Aberdam Edith, Sangari Linda, Petit Isabelle, Aberdam Daniel

Abstract:

Background and Rationale: Transparent avascularised cornea is essential for normal vision and depends on limbal stem cells (LSC) that reside between the cornea and the conjunctiva. Ocular burns or injuries may destroy the limbus, causing limbal stem cell deficiency (LSCD). The cornea becomes vascularised by invaded conjunctival cells, the stroma is scarring, resulting in corneal opacity and loss of vision. Grafted autologous limbus or cultivated autologous LCS can restore the vision, unless the two eyes are affected. Alternative cellular sources have been tested in the last decades, including oral mucosa or hair follicle epithelial cells. However, only partial success has been achieved by the use of these cells since they were not able to uniformly commit into corneal epithelial cells. Human pluripotent stem cells (iPSC) display both unlimited growth capacity and ability to differentiate into any cell type. Our goal was to design a standardized and reproducible protocol to produce transplantable autologous LSC from patients through cell reprogramming technology. Methodology: First, keratinocyte primary culture was established from a small number of plucked hair follicles of healthy donors. The resulting epithelial cells were reprogrammed into induced pluripotent stem cells (iPSCs) and further differentiate into corneal epithelial cells (CEC), according to a robust protocol that recapitulates the main step of corneal embryonic development. qRT-PCR analysis and immunofluorescent staining during the course of differentiation confirm the expression of stage specific markers of corneal embryonic lineage. First appear ectodermal progenitor-specific cytokeratins K8/K18, followed at day 7 by limbal-specific PAX6, TP63 and cytokeratins K5/K14. At day 15, K3/K12+-corneal cells are present. To amplify the iPSC-derived LSC (named COiPSC), intact small epithelial colonies were detached and cultivated in limbal cell-specific medium. In that culture conditions, the COiPSC can be frozen and thaw at any passage, while retaining their corneal characteristics for at least eight passages. To evaluate the potential of COiPSC as an alternative ocular toxicity model, COiPSC were treated at passage P0 to P4 with increasing amounts of SDS and Benzalkonium. Cell proliferation and apoptosis of treated cells was compared to LSC and the SV40-immortalized human corneal epithelial cell line (HCE) routinely used by cosmetological industrials. Of note, HCE are more resistant to toxicity than LSC. At P0, COiPSC were systematically more resistant to chemical toxicity than LSC and even to HCE. Remarkably, this behavior changed with passage since COiPSC at P2 became identical to LSC and thus closer to physiology than HCE. Comparative transcriptome analysis confirmed that COiPSC from P2 are similar to a mixture of LSC and CEC. Finally, by organotypic reconstitution assay, we demonstrated the ability of COiPSC to produce a 3D corneal epithelium on a stromal equivalent made of keratocytes. Conclusion: COiPSC could become valuable for two main applications: (1) an alternative robust tool to perform, in a reproducible and physiological manner, toxicity assays for cosmetic products and pharmacological tests of drugs. (2). COiPSC could become an alternative autologous source for cornea transplantation for LSCD.

Keywords: Limbal stem cell deficiency, iPSC, cornea, limbal stem cells

Procedia PDF Downloads 382
609 Artificial Intelligence Based Method in Identifying Tumour Infiltrating Lymphocytes of Triple Negative Breast Cancer

Authors: Nurkhairul Bariyah Baharun, Afzan Adam, Reena Rahayu Md Zin

Abstract:

Tumor microenvironment (TME) in breast cancer is mainly composed of cancer cells, immune cells, and stromal cells. The interaction between cancer cells and their microenvironment plays an important role in tumor development, progression, and treatment response. The TME in breast cancer includes tumor-infiltrating lymphocytes (TILs) that are implicated in killing tumor cells. TILs can be found in tumor stroma (sTILs) and within the tumor (iTILs). TILs in triple negative breast cancer (TNBC) have been demonstrated to have prognostic and potentially predictive value. The international Immune-Oncology Biomarker Working Group (TIL-WG) had developed a guideline focus on the assessment of sTILs using hematoxylin and eosin (H&E)-stained slides. According to the guideline, the pathologists use “eye balling” method on the H&E stained- slide for sTILs assessment. This method has low precision, poor interobserver reproducibility, and is time-consuming for a comprehensive evaluation, besides only counted sTILs in their assessment. The TIL-WG has therefore recommended that any algorithm for computational assessment of TILs utilizing the guidelines provided to overcome the limitations of manual assessment, thus providing highly accurate and reliable TILs detection and classification for reproducible and quantitative measurement. This study is carried out to develop a TNBC digital whole slide image (WSI) dataset from H&E-stained slides and IHC (CD4+ and CD8+) stained slides. TNBC cases were retrieved from the database of the Department of Pathology, Hospital Canselor Tuanku Muhriz (HCTM). TNBC cases diagnosed between the year 2010 and 2021 with no history of other cancer and available block tissue were included in the study (n=58). Tissue blocks were sectioned approximately 4 µm for H&E and IHC stain. The H&E staining was performed according to a well-established protocol. Indirect IHC stain was also performed on the tissue sections using protocol from Diagnostic BioSystems PolyVue™ Plus Kit, USA. The slides were stained with rabbit monoclonal, CD8 antibody (SP16) and Rabbit monoclonal, CD4 antibody (EP204). The selected and quality-checked slides were then scanned using a high-resolution whole slide scanner (Pannoramic DESK II DW- slide scanner) to digitalize the tissue image with a pixel resolution of 20x magnification. A manual TILs (sTILs and iTILs) assessment was then carried out by the appointed pathologist (2 pathologists) for manual TILs scoring from the digital WSIs following the guideline developed by TIL-WG 2014, and the result displayed as the percentage of sTILs and iTILs per mm² stromal and tumour area on the tissue. Following this, we aimed to develop an automated digital image scoring framework that incorporates key elements of manual guidelines (including both sTILs and iTILs) using manually annotated data for robust and objective quantification of TILs in TNBC. From the study, we have developed a digital dataset of TNBC H&E and IHC (CD4+ and CD8+) stained slides. We hope that an automated based scoring method can provide quantitative and interpretable TILs scoring, which correlates with the manual pathologist-derived sTILs and iTILs scoring and thus has potential prognostic implications.

Keywords: automated quantification, digital pathology, triple negative breast cancer, tumour infiltrating lymphocytes

Procedia PDF Downloads 81
608 Effect of Early Therapeutic Intervention for the Children With Autism Spectrum Disorders: A Quasi Experimental Design

Authors: Sultana Razia

Abstract:

The purpose of this study was to investigate the effect of early therapeutic intervention for the children with autism spectrum disorder. Participants were 63 children with autism spectrum disorder from Autism Corner in a selected rehabilitation center of Bangladesh. The hypothesis of the study was that participants would demonstrate significant improvement in social skills, speech and sensory skills following a 3-month intensive therapeutic protocol. This study included children who are at age of 18-month to 36-month and who were taking occupational therapy and speech and language therapy from the autism center. They were primarily screened using M-CHAT; however, children with other physical disability or medical conditions excluded. 3-months interventions of 6 sessions per week are a minimum of 45-minutes long per session, one to one interaction followed by parent-led structured home-based therapy was provided. The results indicated that early intensive therapeutic intervention improve understanding, social skills and sensory skills. It can be concluded that therapeutic early intervention a positive effect on Autism Spectrum Disorder.

Keywords: M-CHAT, ASD, sensory cheeklist, OT

Procedia PDF Downloads 22