Search results for: routing protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 811

Search results for: routing protocols

571 Assessing Two Protocols for Positive Reinforcement Training in Captive Olive Baboons (Papio anubis)

Authors: H. Cano, P. Ferrer, N. Garcia, M. Popovic, J. Zapata

Abstract:

Positive Reinforcement Training is a well-known methodology which has been reported frequently to be used in captive non-human primates. As a matter of fact, it is an invaluable tool for different purposes related with animal welfare, such as primate husbandry and environmental enrichment. It is also essential to perform some cognitive experiments. The main propose of this pilot study was to establish an efficient protocol to train captive olive baboons (Papio anubis). This protocol seems to be vital in the context of a larger research program in which it will be necessary to train a complete population of around 40 baboons. Baboons were studied at the Veterinary Research Farm of the University of Murcia. Temporally isolated animals were trained to perform three basic tasks. Firstly, they were required to take food prices directly from the researchers’ hands. Then a clicker sound or bridge stimulus was added each time the animal acceded to the reinforcement. Finally, they were trained to touch a target, consisted of a whip with a red ball in its end, with their hands or their nose. When the subject completed correctly this task, it was also exposed to the bridge stimulus and awarded with a food price, such as a portion of banana, orange, apple, peach or a raisin. Two protocols were tested during this experiment. In both of them, there were 6 series of 2min training periods each day. However, in the first protocol, the series consisted in 3 trials, whereas in the second one, in each series there were 5 trials. A reliable performance was obtained with only 6 days of training in the case of the 5-trials protocol. However, with the 3-trials one, 26 days of training were needed. As a result, the 5-trials protocol seems to be more effective than the 3-trials one, in order to teach these three basic tasks to olive baboons. In consequence, it will be used to train the rest of the colony.

Keywords: captive primates, olive baboon, positive reinforcement training, Papio anubis, training

Procedia PDF Downloads 92
570 Comparison of Two Transcranial Magnetic Stimulation Protocols on Spasticity in Multiple Sclerosis - Pilot Study of a Randomized and Blind Cross-over Clinical Trial

Authors: Amanda Cristina da Silva Reis, Bruno Paulino Venâncio, Cristina Theada Ferreira, Andrea Fialho do Prado, Lucimara Guedes dos Santos, Aline de Souza Gravatá, Larissa Lima Gonçalves, Isabella Aparecida Ferreira Moretto, João Carlos Ferrari Corrêa, Fernanda Ishida Corrêa

Abstract:

Objective: To compare two protocols of Transcranial Magnetic Stimulation (TMS) on quadriceps muscle spasticity in individuals diagnosed with Multiple Sclerosis (MS). Method: Clinical, crossover study, in which six adult individuals diagnosed with MS and spasticity in the lower limbs were randomized to receive one session of high-frequency (≥5Hz) and low-frequency (≤ 1Hz) TMS on motor cortex (M1) hotspot for quadriceps muscle, with a one-week interval between the sessions. To assess the spasticity was applied the Ashworth scale and were analyzed the latency time (ms) of the motor evoked potential (MEP) and the central motor conduction time (CMCT) of the bilateral quadriceps muscle. Assessments were performed before and after each intervention. The difference between groups was analyzed using the Friedman test, with a significance level of 0.05 adopted. Results: All statistical analyzes were performed using the SPSS Statistic version 26 programs, with a significance level established for the analyzes at p<0.05. Shapiro Wilk normality test. Parametric data were represented as mean and standard deviation for non-parametric variables, median and interquartile range, and frequency and percentage for categorical variables. There was no clinical change in quadriceps spasticity assessed using the Ashworth scale for the 1 Hz (p=0.813) and 5 Hz (p= 0.232) protocols for both limbs. Motor Evoked Potential latency time: in the 5hz protocol, there was no significant change for the contralateral side from pre to post-treatment (p>0.05), and for the ipsilateral side, there was a decrease in latency time of 0.07 seconds (p<0.05 ); for the 1Hz protocol there was an increase of 0.04 seconds in the latency time (p<0.05) for the contralateral side to the stimulus, and for the ipsilateral side there was a decrease in the latency time of 0.04 seconds (p=<0.05), with a significant difference between the contralateral (p=0.007) and ipsilateral (p=0.014) groups. Central motor conduction time in the 1Hz protocol, there was no change for the contralateral side (p>0.05) and for the ipsilateral side (p>0.05). In the 5Hz protocol for the contralateral side, there was a small decrease in latency time (p<0.05) and for the ipsilateral side, there was a decrease of 0.6 seconds in the latency time (p<0.05) with a significant difference between groups (p=0.019). Conclusion: A high or low-frequency session does not change spasticity, but it is observed that when the low-frequency protocol was performed, there was an increase in latency time on the stimulated side, and a decrease in latency time on the non-stimulated side, considering then that inhibiting the motor cortex increases cortical excitability on the opposite side.

Keywords: multiple sclerosis, spasticity, motor evoked potential, transcranial magnetic stimulation

Procedia PDF Downloads 54
569 Attitudes and Knowledge of Dental Patients Towards Infection Control Measures in Kuwait University Dental Center

Authors: Fatima Taqi, Abrar Alanzi

Abstract:

Objectives: The objective of this study is to determine and assess the level of knowledge and attitudes of dental patients attending Kuwait University Dental Clinics (KUDC) regarding the infection control protocols practiced in the clinic. The results would highlight the importance of conducting awareness campaigns in the community to promote good oral healthcare in Kuwait. Materials and Methods: A cross-sectional descriptive survey was carried out among dental patients attending KUDC. A structured questionnaire, in both Arabic and English languages, was used for data collection about the socio-demographic characteristics, knowledge about the dental cross-infection, and attitudes and self-reported practices regarding infection transmission and control in dentistry. Results: A response rate of 80% (202/250) was reported. 47% of respondents had poor knowledge about dental infection transmission, and only 19.8% had satisfactory knowledge. Female participants obtained a higher satisfactory score (14.3%) compared to males (5.5%). Patients with a university degree or higher education had a better level of knowledge compared to patients with a lower educational level (p < 0.05). The majority of participants agreed that the dentist should wear gloves (95.5%), masks (89.6%), safety glasses (70.3%), and gowns (84.7%). Many patients believed that the protection measures are mainly to stop the infection transmission from patient to patient via the dentist. Half of the participants would ask if the instruments are sterilized and might accept treatment from non-vaccinated dentists. Conclusions: Many dental patients attending KUDC have obtained poor knowledge scores regarding infection transmission in the dental clinic. The educational level was significantly associated with their level of knowledge. An overall positive attitude was reported regarding the infection control protocols practiced in the dental clinic. Raising awareness among dental patients about dental infection transmission and protective measures is of utmost importance.

Keywords: dental infection, knowledge, dental patients, infection control

Procedia PDF Downloads 104
568 Design, Shielding and Infrastructure of an X-Ray Diagnostic Imaging Area

Authors: D. Diaz, C. Guevara, P. Rey

Abstract:

This paper contains information about designing, shielding and protocols building in order to avoid ionizing radiation in X-Rays imaging areas as generated by X-Ray, mammography equipment, computed tomography equipment and digital subtraction angiography equipment, according to global standards. Furthermore, tools and elements about infrastructure to improve protection over patients, physicians and staff involved in a diagnostic imaging area are presented. In addition, technical parameters about each machine and the architecture designs and maps are described.

Keywords: imaging area, X-ray, shielding, dose

Procedia PDF Downloads 409
567 Reliability of Movement Assessment Battery for Children-2 Age Band 3 Using Multiple Testers

Authors: Jernice S. Y. Tan

Abstract:

Introduction: Reliability within and between testers is vital to ensure the accuracy of any motor assessment instrument. However, reliability checks of the Movement Assessment Battery for Children-2 (MABC-2) age band 3 using multiple testers assigned to different MABC-2 tasks for the same group of participants are uncommon. Multiple testers were not stated as a choice in the MABC-2 manual. Therefore, the purpose of this study was to determine the inter- and intra-tester reliability for using multiple testers to administer the test protocols of MABC-2 age band 3. Methods: Thirty volunteered adolescents (n = 30; 15 males, 15 females; age range: 13 – 16 years) performed the eight tasks in a randomised sequence at three different test stations for the MABC-2 task components (Manual Dexterity, Aiming and Catching, Balance). Ethics approval and parental consent were obtained. The participants were videotaped while performing the test protocols of MABC-2 age band 3. Five testers were involved in the data collection process. They were Sports Science graduating students doing their final year project and were supervised by experienced motor assessor. Inter- and intra-tester reliability checks using intra-class coefficient (ICC) were carried out using the videotaped data. Results: The inter-tester reliability between the five testers for the eight tasks ranged from rᵢcc = 0.705 to rᵢcc = 0.995. This suggests that the average agreement between them was considered good to excellent. With the exception of one tester who had rᵢcc = 0.687 for one of the eight tasks (i.e. zip-zap hopping), the intra-tester reliability within each tester ranged from rᵢcc = 0.728 to rᵢcc = 1.000, and this also suggested good to excellent consistency within testers. Discussion: The use of multiple testers with good intra-tester reliability for different test stations is feasible. This method allows several participants to be assessed concurrently at different test stations and saves overall data collection time. Therefore, it is recommended that the administering of MABC-2 with multiple testers should be extended to other age bands ensuring the feasibility of such method for other age bands.

Keywords: adolescents, MABC, motor assessment, motor skills, reliability

Procedia PDF Downloads 295
566 Sensor Network Routing Optimization by Simulating Eurygaster Life in Wheat Farms

Authors: Fariborz Ahmadi, Hamid Salehi, Khosrow Karimi

Abstract:

A sensor network is set of sensor nodes that cooperate together to perform a predefined tasks. The important problem in this network is power consumption. So, in this paper one algorithm based on the eurygaster life is introduced to minimize power consumption by the nodes of these networks. In this method the search space of problem is divided into several partitions and each partition is investigated separately. The evaluation results show that our approach is more efficient in comparison to other evolutionary algorithm like genetic algorithm.

Keywords: evolutionary computation, genetic algorithm, particle swarm optimization, sensor network optimization

Procedia PDF Downloads 392
565 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 386
564 Building Atmospheric Moisture Diagnostics: Environmental Monitoring and Data Collection

Authors: Paula Lopez-Arce, Hector Altamirano, Dimitrios Rovas, James Berry, Bryan Hindle, Steven Hodgson

Abstract:

Efficient mould remediation and accurate moisture diagnostics leading to condensation and mould growth in dwellings are largely untapped. Number of factors are contributing to the rising trend of excessive moisture in homes mainly linked with modern living, increased levels of occupation and rising fuel costs, as well as making homes more energy efficient. Environmental monitoring by means of data collection though loggers sensors and survey forms has been performed in a range of buildings from different UK regions. Air and surface temperature and relative humidity values of residential areas affected by condensation and/or mould issues were recorded. Additional measurements were taken through different trials changing type, location, and position of loggers. In some instances, IR thermal images and ventilation rates have also been acquired. Results have been interpreted together with environmental key parameters by processing and connecting data from loggers and survey questionnaires, both in buildings with and without moisture issues. Monitoring exercises carried out during Winter and Spring time show the importance of developing and following accurate protocols for guidance to obtain consistent, repeatable and comparable results and to improve the performance of environmental monitoring. A model and a protocol are being developed to build a diagnostic tool with the goal of performing a simple but precise residential atmospheric moisture diagnostics to distinguish the cause entailing condensation and mould generation, i.e., ventilation, insulation or heating systems issue. This research shows the relevance of monitoring and processing environmental data to assign moisture risk levels and determine the origin of condensation or mould when dealing with a building atmospheric moisture excess.

Keywords: environmental monitoring, atmospheric moisture, protocols, mould

Procedia PDF Downloads 113
563 Analysis of Decentralized on Demand Cross Layer in Cognitive Radio Ad Hoc Network

Authors: A. Sri Janani, K. Immanuel Arokia James

Abstract:

Cognitive radio ad hoc networks different unlicensed users may acquire different available channel sets. This non-uniform spectrum availability imposes special design challenges for broadcasting in CR ad hoc networks. Cognitive radio automatically detects available channels in wireless spectrum. This is a form of dynamic spectrum management. Cross-layer optimization is proposed, using this can allow far away secondary users can also involve into channel work. So it can increase the throughput and it will overcome the collision and time delay.

Keywords: cognitive radio, cross layer optimization, CR mesh network, heterogeneous spectrum, mesh topology, random routing optimization technique

Procedia PDF Downloads 331
562 Quest for an Efficient Green Multifunctional Agent for the Synthesis of Metal Nanoparticles with Highly Specified Structural Properties

Authors: Niharul Alam

Abstract:

The development of energy efficient, economic and eco-friendly synthetic protocols for metal nanoparticles (NPs) with tailor-made structural properties and biocompatibility is a highly cherished goal for researchers working in the field of nanoscience and nanotechnology. In this context, green chemistry is highly relevant and the 12 principles of Green Chemistry can be explored to develop such synthetic protocols which are practically implementable. One of the most promising green chemical synthetic methods which can serve the purpose is biogenic synthetic protocol, which utilizes non-toxic multifunctional reactants derived from natural, biological sources ranging from unicellular organisms to higher plants that are often characterized as “medicinal plants”. Over the past few years, a plethora of medicinal plants have been explored as the source of this kind of multifunctional green chemical agents. In this presentation, we focus on the syntheses of stable monometallic Au and Ag NPs and also bimetallic Au/Ag alloy NPs with highly efficient catalytic property using aqueous extract of leaves of Indian Curry leaf plat (Murraya koenigii Spreng.; Fam. Rutaceae) as green multifunctional agents which is extensively used in Indian traditional medicine and cuisine. We have also studied the interaction between the synthesized metal NPs and surface-adsorbed fluorescent moieties, quercetin and quercetin glycoside which are its chemical constituents. This helped us to understand the surface property of the metal NPs synthesized by this plant based biogenic route and to predict a plausible mechanistic pathway which may help in fine-tuning green chemical methods for the controlled synthesis of various metal NPs in future. We observed that simple experimental parameters e.g. pH and temperature of the reaction medium, concentration of multifunctional agent and precursor metal ions play important role in the biogenic synthesis of Au NPs with finely tuned structures.

Keywords: green multifunctional agent, metal nanoparticles, biogenic synthesis

Procedia PDF Downloads 400
561 Safety Study of Intravenously Administered Human Cord Blood Stem Cells in the Treatment of Symptoms Related to Chronic Inflammation

Authors: Brian M. Mehling, Louis Quartararo, Marine Manvelyan, Paul Wang, Dong-Cheng Wu

Abstract:

Numerous investigations suggest that Mesenchymal Stem Cells (MSCs) in general represent a valuable tool for therapy of symptoms related to chronic inflammatory diseases. Blue Horizon Stem Cell Therapy Program is a leading provider of adult and children’s stem cell therapies. Uniquely we have safely and efficiently treated more than 600 patients with documenting each procedure. The purpose of our study is primarily to monitor the immune response in order to validate the safety of intravenous infusion of human umbilical cord blood derived MSCs (UC-MSCs), and secondly, to evaluate effects on biomarkers associated with chronic inflammation. Nine patients were treated for conditions associated with chronic inflammation and for the purpose of anti-aging. They have been given one intravenous infusion of UC-MSCs. Our study of blood test markers of 9 patients with chronic inflammation before and within three months after MSCs treatment demonstrates that there is no significant changes and MSCs treatment was safe for the patients. Analysis of different indicators of chronic inflammation and aging included in initial, 24-hours, two weeks and three months protocols showed that stem cell treatment was safe for the patients; there were no adverse reactions. Moreover data from follow up protocols demonstrates significant improvement in energy level, hair, nails growth and skin conditions. Intravenously administered UC-MSCs were safe and effective in the improvement of symptoms related to chronic inflammation. Further close monitoring and inclusion of more patients are necessary to fully characterize the advantages of UC-MSCs application in treatment of symptoms related to chronic inflammation.

Keywords: chronic inflammatory diseases, intravenous infusion, stem cell therapy, umbilical cord blood derived mesenchymal stem cells (UC-MSCs)

Procedia PDF Downloads 400
560 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 67
559 A Two Phase VNS Algorithm for the Combined Production Routing Problem

Authors: Nejah Ben Mabrouk, Bassem Jarboui, Habib Chabchoub

Abstract:

Production and distribution planning is the most important part in supply chain management. In this paper, a NP-hard production-distribution problem for one product over a multi-period horizon is investigated. The aim is to minimize the sum of costs of three items: production setups, inventories and distribution, while determining, for each period, the amount produced, the inventory levels and the delivery trips. To solve this difficult problem, we propose a bi-phase approach based on a Variable Neighbourhood Search (VNS). This heuristic is tested on 90 randomly generated instances from the literature, with 20 periods and 50, 100, 200 customers. Computational results show that our approach outperforms existing solution procedures available in the literature

Keywords: logistic, production, distribution, variable neighbourhood search

Procedia PDF Downloads 303
558 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 57
557 Benefit Of Waste Collection Route Optimisation

Authors: Bojana Tot, Goran BošKović, Goran Vujić

Abstract:

Route optimisation is a process of planning one or multiple routes, with the purpose of minimizing overall costs, while achieving the highest possible performance under a set of given constraints. It combines routing or route planning, which is the process of creating the most cost-effective route by minimizing the distance or travelled time necessary to reach a set of planned stops, and route scheduling, which is the process of assigning an arrival and service time for each stop, with drivers being given shifts that adhere to their working hours. The objective of this paper is to provide benefits on the implementation of waste collection route optimisation and thus achieve economic efficiency for public utility companies, better service for citizens and positive environment and health.

Keywords: waste management, environment, collection route optimisation, GIS

Procedia PDF Downloads 124
556 Decision Support System for Solving Multi-Objective Routing Problem

Authors: Ismail El Gayar, Ossama Ismail, Yousri El Gamal

Abstract:

This paper presented a technique to solve one of the transportation problems that faces us in real life which is the Bus Scheduling Problem. Most of the countries using buses in schools, companies and traveling offices as an example to transfer multiple passengers from many places to specific place and vice versa. This transferring process can cost time and money, so we build a decision support system that can solve this problem. In this paper, a genetic algorithm with the shortest path technique is used to generate a competitive solution to other well-known techniques. It also presents a comparison between our solution and other solutions for this problem.

Keywords: bus scheduling problem, decision support system, genetic algorithm, shortest path

Procedia PDF Downloads 370
555 Cybernetic Model-Based Optimization of a Fed-Batch Process for High Cell Density Cultivation of E. Coli In Shake Flasks

Authors: Snehal D. Ganjave, Hardik Dodia, Avinash V. Sunder, Swati Madhu, Pramod P. Wangikar

Abstract:

Batch cultivation of recombinant bacteria in shake flasks results in low cell density due to nutrient depletion. Previous protocols on high cell density cultivation in shake flasks have relied mainly on controlled release mechanisms and extended cultivation protocols. In the present work, we report an optimized fed-batch process for high cell density cultivation of recombinant E. coli BL21(DE3) for protein production. A cybernetic model-based, multi-objective optimization strategy was implemented to obtain the optimum operating variables to achieve maximum biomass and minimized substrate feed rate. A syringe pump was used to feed a mixture of glycerol and yeast extract into the shake flask. Preliminary experiments were conducted with online monitoring of dissolved oxygen (DO) and offline measurements of biomass and glycerol to estimate the model parameters. Multi-objective optimization was performed to obtain the pareto front surface. The selected optimized recipe was tested for a range of proteins that show different extent soluble expression in E. coli. These included eYFP and LkADH, which are largely expressed in soluble fractions, CbFDH and GcanADH , which are partially soluble, and human PDGF, which forms inclusion bodies. The biomass concentrations achieved in 24 h were in the range 19.9-21.5 g/L, while the model predicted value was 19.44 g/L. The process was successfully reproduced in a standard laboratory shake flask without online monitoring of DO and pH. The optimized fed-batch process showed significant improvement in both the biomass and protein production of the tested recombinant proteins compared to batch cultivation. The proposed process will have significant implications in the routine cultivation of E. coli for various applications.

Keywords: cybernetic model, E. coli, high cell density cultivation, multi-objective optimization

Procedia PDF Downloads 203
554 Phorbol 12-Myristate 13-Acetate (PMA)-Differentiated THP-1 Monocytes as a Validated Microglial-Like Model in Vitro

Authors: Amelia J. McFarland, Andrew K. Davey, Shailendra Anoopkumar-Dukie

Abstract:

Microglia are the resident macrophage population of the central nervous system (CNS), contributing to both innate and adaptive immune response, and brain homeostasis. Activation of microglia occurs in response to a multitude of pathogenic stimuli in their microenvironment; this induces morphological and functional changes, resulting in a state of acute neuroinflammation which facilitates injury resolution. Adequate microglial function is essential for the health of the neuroparenchyma, with microglial dysfunction implicated in numerous CNS pathologies. Given the critical role that these macrophage-derived cells play in CNS homeostasis, there is a high demand for microglial models suitable for use in neuroscience research. The isolation of primary human microglia, however, is both difficult and costly, with microglial activation an unwanted but inevitable result of the extraction process. Consequently, there is a need for the development of alternative experimental models which exhibit morphological, biochemical and functional characteristics of human microglia without the difficulties associated with primary cell lines. In this study, our aim was to evaluate whether THP-1 human peripheral blood monocytes would display microglial-like qualities following an induced differentiation, and, therefore, be suitable for use as surrogate microglia. To achieve this aim, THP-1 human peripheral blood monocytes from acute monocytic leukaemia were differentiated with a range of phorbol 12-myristate 13-acetate (PMA) concentrations (50-200 nM) using two different protocols: a 5-day continuous PMA exposure or a 3-day continuous PMA exposure followed by a 5-day rest in normal media. In each protocol and at each PMA concentration, microglial-like cell morphology was assessed through crystal violet staining and the presence of CD-14 microglial / macrophage cell surface marker. Lipopolysaccharide (LPS) from Escherichia coli (055: B5) was then added at a range of concentrations from 0-10 mcg/mL to activate the PMA-differentiated THP-1 cells. Functional microglial-like behavior was evaluated by quantifying the release of prostaglandin (PG)-E2 and pro-inflammatory cytokines interleukin (IL)-1β and tumour necrosis factor (TNF)-α using mediator-specific ELISAs. Furthermore, production of global reactive oxygen species (ROS) and nitric oxide (NO) were determined fluorometrically using dichlorodihydrofluorescein diacetate (DCFH-DA) and diaminofluorescein diacetate (DAF-2-DA) respectively. Following PMA-treatment, it was observed both differentiation protocols resulted in cells displaying distinct microglial morphology from 10 nM PMA. Activation of differentiated cells using LPS significantly augmented IL-1β, TNF-α and PGE2 release at all LPS concentrations under both differentiation protocols. Similarly, a significant increase in DCFH-DA and DAF-2-DA fluorescence was observed, indicative of increases in ROS and NO production. For all endpoints, the 5-day continuous PMA treatment protocol yielded significantly higher mediator levels than the 3-day treatment and 5-day rest protocol. Our data, therefore, suggests that the differentiation of THP-1 human monocyte cells with PMA yields a homogenous microglial-like population which, following stimulation with LPS, undergo activation to release a range of pro-inflammatory mediators associated with microglial activation. Thus, the use of PMA-differentiated THP-1 cells represents a suitable microglial model for in vitro research.

Keywords: differentiation, lipopolysaccharide, microglia, monocyte, neuroscience, THP-1

Procedia PDF Downloads 352
553 Expression of PGC-1 Alpha Isoforms in Response to Eccentric and Concentric Resistance Training in Healthy Subjects

Authors: Pejman Taghibeikzadehbadr

Abstract:

Background and Aim: PGC-1 alpha is a transcription factor that was first detected in brown adipose tissue. Since its discovery, PGC-1 alpha has been known to facilitate beneficial adaptations such as mitochondrial biogenesis and increased angiogenesis in skeletal muscle following aerobic exercise. Therefore, the purpose of this study was to investigate the expression of PGC-1 alpha isoforms in response to eccentric and concentric resistance training in healthy subjects. Materials and Methods: Ten healthy men were randomly divided into two groups (5 patients in eccentric group - 5 in eccentric group). Isokinetic contraction protocols included eccentric and concentric knee extension with maximum power and angular velocity of 60 degrees per second. The torques assigned to each subject were considered to match the workload in both protocols, with a rotational speed of 60 degrees per second. Contractions consisted of a maximum of 12 sets of 10 repetitions for the right leg, a rest time of 30 seconds between each set. At the beginning and end of the study, biopsy of the lateral broad muscle tissue was performed. Biopsies were performed in both distal and proximal directions of the lateral flank. To evaluate the expression of PGC1α-1 and PGC1α-4 genes, tissue analysis was performed in each group using Real-Time PCR technique. Data were analyzed using dependent t-test and covariance test. SPSS21 software and Exell 2013 software were used for data analysis. Results: The results showed that intra-group changes of PGC1α-1 after one session of activity were not significant in eccentric (p = 0.168) and concentric (p = 0.959) groups. Also, inter-group changes showed no difference between the two groups (p = 0.681). Also, intra-group changes of PGC1α-4 after one session of activity were significant in an eccentric group (p = 0.012) and concentric group (p = 0.02). Also, inter-group changes showed no difference between the two groups (p = 0.362). Conclusion: It seems that the lack of significant changes in the desired variables due to the lack of exercise pressure is sufficient to stimulate the increase of PGC1α-1 and PGC1α-4. And with regard to reviewing the answer, it seems that the compatibility debate has different results that need to be addressed.

Keywords: eccentric contraction, concentric contraction, PGC1α-1 و PGC1α-4, human subject

Procedia PDF Downloads 40
552 Design and Manufacture of Removable Nosecone Tips with Integrated Pitot Tubes for High Power Sounding Rocketry

Authors: Bjorn Kierulf, Arun Chundru

Abstract:

Over the past decade, collegiate rocketry teams have emerged across the country with various goals: space, liquid-fueled flight, etc. A critical piece of the development of knowledge within a club is the use of so-called "sounding rockets," whose goal is to take in-flight measurements that inform future rocket design. Common measurements include acceleration from inertial measurement units (IMU's), and altitude from barometers. With a properly tuned filter, these measurements can be used to find velocity, but are susceptible to noise, offset, and filter settings. Instead, velocity can be measured more directly and more instantaneously using a pitot tube, which operates by measuring the stagnation pressure. At supersonic speeds, an additional thermodynamic property is necessary to constrain the upstream state. One possibility is the stagnation temperature, measured by a thermocouple in the pitot tube. The routing of the pitot tube from the nosecone tip down to a pressure transducer is complicated by the nosecone's structure. Commercial-off-the-shelf (COTS) nosecones come with a removable metal tip (without a pitot tube). This provides the opportunity to make custom tips with integrated measurement systems without making the nosecone from scratch. The main design constraint is how the nosecone tip is held down onto the nosecone, using the tension in a threaded rod anchored to a bulkhead below. Because the threaded rod connects into a threaded hole in the center of the nosecone tip, the pitot tube follows a winding path, and the pressure fitting is off-center. Two designs will be presented in the paper, one with a curved pitot tube and a coaxial design that eliminates the need for the winding path by routing pressure through a structural tube. Additionally, three manufacturing methods will be presented for these designs: bound powder filament metal 3D printing, stereo-lithography (SLA) 3D printing, and traditional machining. These will employ three different materials, copper, steel, and proprietary resin. These manufacturing methods and materials are relatively low cost, thus accessible to student researchers. These designs and materials cover multiple use cases, based on how fast the sounding rocket is expected to travel and how important heating effects are - to measure and to avoid melting. This paper will include drawings showing key features and an overview of the design changes necessitated by the manufacture. It will also include a look at the successful use of these nosecone tips and the data they have gathered to date.

Keywords: additive manufacturing, machining, pitot tube, sounding rocketry

Procedia PDF Downloads 133
551 Interactive, Topic-Oriented Search Support by a Centroid-Based Text Categorisation

Authors: Mario Kubek, Herwig Unger

Abstract:

Centroid terms are single words that semantically and topically characterise text documents and so may serve as their very compact representation in automatic text processing. In the present paper, centroids are used to measure the relevance of text documents with respect to a given search query. Thus, a new graphbased paradigm for searching texts in large corpora is proposed and evaluated against keyword-based methods. The first, promising experimental results demonstrate the usefulness of the centroid-based search procedure. It is shown that especially the routing of search queries in interactive and decentralised search systems can be greatly improved by applying this approach. A detailed discussion on further fields of its application completes this contribution.

Keywords: search algorithm, centroid, query, keyword, co-occurrence, categorisation

Procedia PDF Downloads 250
550 Study on the Effect of Pre-Operative Patient Education on Post-Operative Outcomes

Authors: Chaudhary Itisha, Shankar Manu

Abstract:

Patient satisfaction represents a crucial aspect in the evaluation of health care services. Preoperative teaching provides the patient with pertinent information concerning the surgical process and the intended surgical procedure as well as anticipated patient behavior (anxiety, fear), expected sensation, and the probable outcomes. Although patient education is part of Accreditation protocols, it is not uniform at most places. The aim of this study was to try to assess the benefit of preoperative patient education on selected post-operative outcome parameters; mainly, post-operative pain scores, requirement of additional analgesia, return to activity of daily living and overall patient satisfaction, and try to standardize few education protocols. Dependent variables were measured before and after the treatment on a study population of 302 volunteers. Educational intervention was provided by the Investigator in the preoperative period to the study group through personal counseling. An information booklet contained detailed information was also provided. Statistical Analysis was done using Chi square test, Mann Whitney u test and Fischer Exact Test on a total of 302 subjects. P value <0.05 was considered as level of statistical significance and p<0.01 was considered as highly significant. This study suggested that patients who are given a structured, individualized and elaborate preoperative education and counseling have a better ability to cope up with postoperative pain in the immediate post-operative period. However, there was not much difference when the patients have had almost complete recovery. There was no difference in the requirement of additional analgesia among the two groups. There is a positive effect of preoperative counseling on expected return to the activities of daily living and normal work schedule. However, no effect was observed on the activities in the immediate post-operative period. There is no difference in the overall satisfaction score among the two groups of patients. Thus this study concludes that there is a positive benefit as suggested by the results for pre-operative patient education. Although the difference in various parameters studied might not be significant over a long term basis, they definitely point towards the benefits of preoperative patient education. 

Keywords: patient education, post-operative pain, postoperative outcomes, patient satisfaction

Procedia PDF Downloads 293
549 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 36
548 Investigation of Optical Requirements for Power System Assets Monitoring with Unmanned Aerial Vehicles

Authors: Ioana Pisica, Dimitrios Gkritzapis

Abstract:

The significance of UAS in scientific applications has been amply demonstrated in recent years. The combinations of portability and quasi-static positioning by means of flying in close loop path make them versatile and efficient in the inspection of power systems infrastructure. In this paper, we critically assess several platforms and sensor capabilities to identify their pros and cons in relation to the power systems assets to be monitored. In this respect, it is paramount the flights to be conducted by using UAS which bear certain suitable features, such as responsive and easy control, video capturing in real time, autonomous routing of pre-planned flight programming with differentiating payloads. The outcome of this research is a set of optimal requirements for power system assets monitoring with UAS.

Keywords: platforms, power system, sensors, UAVs

Procedia PDF Downloads 255
547 Fuzzy Rules Based Improved BEENISH Protocol for Wireless Sensor Networks

Authors: Rishabh Sharma

Abstract:

The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.

Keywords: wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system

Procedia PDF Downloads 73
546 Coherent Optical Tomography Imaging of Epidermal Hyperplasia in Vivo in a Mouse Model of Oxazolone Induced Atopic Dermatitis

Authors: Eric Lacoste

Abstract:

Laboratory animals are currently widely used as a model of human pathologies in dermatology such as atopic dermatitis (AD). These models provide a better understanding of the pathophysiology of this complex and multifactorial disease, the discovery of potential new therapeutic targets and the testing of the efficacy of new therapeutics. However, confirmation of the correct development of AD is mainly based on histology from skin biopsies requiring invasive surgery or euthanasia of the animals, plus slicing and staining protocols. However, there are currently accessible imaging technologies such as Optical Coherence Tomography (OCT), which allows non-invasive visualization of the main histological structures of the skin (like stratum corneum, epidermis, and dermis) and assessment of the dynamics of the pathology or efficacy of new treatments. Briefly, female immunocompetent hairless mice (SKH1 strain) were sensitized and challenged topically on back and ears for about 4 weeks. Back skin and ears thickness were measured using calliper at 3 occasions per week in complement to a macroscopic evaluation of atopic dermatitis lesions on back: erythema, scaling and excoriations scoring. In addition, OCT was performed on the back and ears of animals. OCT allows a virtual in-depth section (tomography) of the imaged organ to be made using a laser, a camera and image processing software allowing fast, non-contact and non-denaturing acquisitions of the explored tissues. To perform the imaging sessions, the animals were anesthetized with isoflurane, placed on a support under the OCT for a total examination time of 5 to 10 minutes. The results show a good correlation of the OCT technique with classical HES histology for skin lesions structures such as hyperkeratosis, epidermal hyperplasia, and dermis thickness. This OCT imaging technique can, therefore, be used in live animals at different times for longitudinal evaluation by repeated measurements of lesions in the same animals, in addition to the classical histological evaluation. Furthermore, this original imaging technique speeds up research protocols, reduces the number of animals and refines the use of the laboratory animal.

Keywords: atopic dermatitis, mouse model, oxzolone model, histology, imaging

Procedia PDF Downloads 103
545 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 418
544 Treating Complex Pain and Addictions with Bioelectrode Therapy: An Acupuncture Point Stimulus Method for Relieving Human Suffering

Authors: Les Moncrieff

Abstract:

In a world awash with potent opioids flaming an international crisis, the need to explore safe alternatives has never been more urgent. Bio-electrode Therapy is a novel adjunctive treatment method for relieving acute opioid withdrawal symptoms and many types of complex acute and chronic pain (often the underlying cause of opioid dependence). By combining the science of developmental bioelectricity with Traditional Chinese Medicine’s theory of meridians, rapid relief from pain is routinely being achieved in the clinical setting. Human body functions are dependent on electrical factors, and acupuncture points on the body are known to have higher electrical conductivity than surrounding skin tissue. When tiny gold- and silver-plated electrodes are secured to the skin at specific acupuncture points using established Chinese Medicine principles and protocols, an enhanced microcurrent and electrical field are created between the electrodes, influencing the entire meridian and connecting meridians. No external power source or electrical devices are required. Endogenous DC electric fields are an essential fundamental component for development, regeneration, and wound healing. Disruptions in the normal ion-charge in the meridians and circulation of blood will manifest as pain and development of disease. With the application of these simple electrodes (gold acting as cathode and silver as anode) according to protocols, the resulting microcurrent is directed along the selected meridians to target injured or diseased organs and tissues. When injured or diseased cells have been stimulated by the microcurrent and electrical fields, the permeability of the cell membrane is affected, resulting in an immediate relief of pain, a rapid balancing of positive and negative ions (sodium, potassium, etc.) in the cells, the restoration of intracellular fluid levels, replenishment of electrolyte levels, pH balance, removal of toxins, and a re-establishment of homeostasis.

Keywords: bioelectricity, electrodes, electrical fields, acupuncture meridians, complex pain, opioid withdrawal management

Procedia PDF Downloads 35
543 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks

Authors: Ebrahim Alrashed

Abstract:

Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.

Keywords: energy-aware routing, reliability, sink-hole attack, WSN

Procedia PDF Downloads 364
542 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 41