Search results for: virus.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 96

Search results for: virus.

36 Feature Extraction Technique for Prediction the Antigenic Variants of the Influenza Virus

Authors: Majid Forghani, Michael Khachay

Abstract:

In genetics, the impact of neighboring amino acids on a target site is referred as the nearest-neighbor effect or simply neighbor effect. In this paper, a new method called wavelet particle decomposition representing the one-dimensional neighbor effect using wavelet packet decomposition is proposed. The main idea lies in known dependence of wavelet packet sub-bands on location and order of neighboring samples. The method decomposes the value of a signal sample into small values called particles that represent a part of the neighbor effect information. The results have shown that the information obtained from the particle decomposition can be used to create better model variables or features. As an example, the approach has been applied to improve the correlation of test and reference sequence distance with titer in the hemagglutination inhibition assay.

Keywords: Antigenic variants, neighbor effect, wavelet packet, wavelet particle decomposition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 783
35 Effect of Time Delay on the Transmission of Dengue Fever

Authors: K. Patanarapelert, I.M. Tang

Abstract:

The effect of a time delay on the transmission on dengue fever is studied. The time delay is due to the presence of an incubation period for the dengue virus to develop in the mosquito before the mosquito becomes infectious. The conditions for the existence of a Hopf bifurcation to limit cycle behavior are established. The conditions are different from the usual one and they are based on whether a particular third degree polynomial has positive real roots. A theorem for determining whether for a given set of parameter values, a critical delay time exist is given. It is found that for a set of realistic values of the parameters in the model, a Hopf bifurcation can not occur. For a set of unrealistic values of some of the parameters, it is shown that a Hopf bifurcation can occur. Numerical solutions using this last set show the trajectory of two of the variables making a transition from a spiraling orbit to a limit cycle orbit.

Keywords: Dengue fever transmission, time delay, Hopfbifurcation, limit cycle behavior

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1792
34 Hepatitis B Virus Infection among Egyptian Children Vaccinated during Infancy

Authors: Iman I. Salama, Samia M. Sami, Somaia I. Salama, Zeinab N. Said, Thanaa M. Rabah, Aida M. Abdel-Mohsin

Abstract:

This is a national community based project to evaluate effectiveness of HBV vaccination program in prevention of infection. HBV markers were tested in the sera of 3600 vaccinated children. Infected children were followed up for 1 year. Prevalence of HBV infection was 0.39 % (0.28% positive for anti-HBc, 0.03% positive for HBsAg and 0.08% positive for both). One year later, 50% of positive anti-HBc children turned negative with sustained positivity for positive HBsAg cases. HBV infection was significantly higher at age above 9 years (0.6%) compared to 0.2% at age 3-9 years and 0% at younger age (P<0.05). Logistic analysis revealed that predictors for HBV infection were history of blood transfusion, regular medical injection, and family history of either HBV infection or drug abuse (adjusted odds ratios 6.2, 5.6, 7.6 & 19.1 respectively). HBV vaccination program produced adequate protection. Adherence to infection control measures and safe blood transfusion are recommended.

Keywords: Children, Egypt, HBV Infection, HBV Vaccine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2722
33 Effect of the Seasonal Variation in the Extrinsic Incubation Period on the Long Term Behavior of the Dengue Hemorrhagic Fever Epidemic

Authors: Puntani Pongsumpun, I-Ming Tang

Abstract:

The incidences of dengue hemorrhagic disease (DHF) over the long term exhibit a seasonal behavior. It has been hypothesized that these behaviors are due to the seasonal climate changes which in turn induce a seasonal variation in the incubation period of the virus while it is developing the mosquito. The standard dynamic analysis is applied for analysis the Susceptible-Exposed- Infectious-Recovered (SEIR) model which includes an annual variation in the length of the extrinsic incubation period (EIP). The presence of both asymptomatic and symptomatic infections is allowed in the present model. We found that dynamic behavior of the endemic state changes as the influence of the seasonal variation of the EIP becomes stronger. As the influence is further increased, the trajectory exhibits sustained oscillations when it leaves the chaotic region.

Keywords: Chaotic behavior, dengue hemorrhagic fever, extrinsic incubation period, SEIR model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1763
32 A Novel Method for Non-Invasive Diagnosis of Hepatitis C Virus Using Electromagnetic Signal Detection: A Multicenter International Study

Authors: Gamal Shiha, Waleed Samir, Zahid Azam, Premashis Kar, Saeed Hamid, Shiv Sarin

Abstract:

A simple, rapid and non-invasive electromagnetic sensor (C-FAST device) was- patented; for diagnosis of HCV RNA. Aim: To test the validity of the device compared to standard HCV PCR. Subjects and Methods: The first phase was done as pilot in Egypt on 79 participants; the second phase was done in five centers: one center from Egypt, two centers from Pakistan and two centers from India (800, 92 and 113 subjects respectively). The third phase was done nationally as multicenter study on (1600) participants for ensuring its representativeness. Results: When compared to PCR technique, C-FAST device revealed sensitivity 95% to 100%, specificity 95.5% to 100%, PPV 89.5% to 100%, NPV 95% to 100% and positive likelihood ratios 21.8% to 38.5%. Conclusion: It is practical evidence that HCV nucleotides emit electromagnetic signals that can be used for its identification. As compared to PCR, C-FAST is an accurate, valid and non-invasive device.

Keywords: C-FAST- a valid and reliable device, Distant cellular interaction, Electromagnetic signal detection, Non-invasive diagnosis of HCV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18053
31 A Software of Intrusion Detection Mechanism for Virtual Platforms

Authors: Ying-Chuan Chen, Shuen-Tai Wang

Abstract:

Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.

Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1547
30 A Study of Liver Checkup in Patients with Hepatitis C in the Region of Batna

Authors: A. Zidani, M. Yahia K. Belhadi, S. Benbia

Abstract:

Hepatitis C is an infectious disease transmitted by blood and due to hepatitis C virus (HCV), which attacks the liver. The infection is characterized by liver inflammation (hepatitis) that is often asymptomatic but can progress to chronic hepatitis and later cirrhosis and liver cancer. Our problem tends to highlight on the one hand the prevalence of infectious disease in the population of the region of Batna and on other hand the biological characteristics of this disease by a screening and a specific diagnosis based on serological tests, liver checkup (measurement of haematological and biochemical parameters). The results showed: The serology of hepatitis C establishes the diagnosis of infection with hepatitis C. In this study and with the serological test, 24 cases of the disease of hepatitis C were found in 1000 suspected cases (7 cases with normal transaminases and 17 cases with elevated transaminases). The prevalence of this disease in this study population was 2.4%. The presence of hepatitis C disrupts liver function including the onset of cytolysis, cholestasis, jaundice, thrombocytopenia, and coagulation disorders.

Keywords: Disease hepatitis C, serology, liver checkup

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1654
29 HIV Treatment Planning on a case-by-CASE Basis

Authors: Marios M. Hadjiandreou, Raul Conejeros, Ian Wilson

Abstract:

This study presents a mathematical modeling approach to the planning of HIV therapies on an individual basis. The model replicates clinical data from typical-progressors to AIDS for all stages of the disease with good agreement. Clinical data from rapid-progressors and long-term non-progressors is also matched by estimation of immune system parameters only. The ability of the model to reproduce these phenomena validates the formulation, a fact which is exploited in the investigation of effective therapies. The therapy investigation suggests that, unlike continuous therapy, structured treatment interruptions (STIs) are able to control the increase in both the drug-sensitive and drug-resistant virus population and, hence, prevent the ultimate progression from HIV to AIDS. The optimization results further suggest that even patients characterised by the same progression type can respond very differently to the same treatment and that the latter should be designed on a case-by-case basis. Such a methodology is presented here.

Keywords: AIDS, chemotherapy, mathematical modeling, optimal control, progression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1685
28 Mining Association Rules from Unstructured Documents

Authors: Hany Mahgoub

Abstract:

This paper presents a system for discovering association rules from collections of unstructured documents called EART (Extract Association Rules from Text). The EART system treats texts only not images or figures. EART discovers association rules amongst keywords labeling the collection of textual documents. The main characteristic of EART is that the system integrates XML technology (to transform unstructured documents into structured documents) with Information Retrieval scheme (TF-IDF) and Data Mining technique for association rules extraction. EART depends on word feature to extract association rules. It consists of four phases: structure phase, index phase, text mining phase and visualization phase. Our work depends on the analysis of the keywords in the extracted association rules through the co-occurrence of the keywords in one sentence in the original text and the existing of the keywords in one sentence without co-occurrence. Experiments applied on a collection of scientific documents selected from MEDLINE that are related to the outbreak of H5N1 avian influenza virus.

Keywords: Association rules, information retrieval, knowledgediscovery in text, text mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2442
27 Phenotypes of B Cells Differ in EBV-positive Burkitt-s lymphoma Derived Cell Lines

Authors: Irina Spaka, Rita Birkenfelde, Svetlana Kozireva, Jevgenija Osmjana, Madara Upmane, ElenaKashuba, Irina Kholodnyuk Holodnuka

Abstract:

Epstein-Barr virus (EBV) is implicated in the pathogenesis of the endemic Burkitt-s lymphoma (BL). The EBVpositive BL-derived cell lines initially maintain the original tumor phenotype of EBV infection (latency I, LatI), but most of them drift toward a lymphoblast phenotype of EBV latency III (LatIII) during in vitro culturing. The aim of the present work was to characterize the B-cell subsets in EBV-positive BL cell lines and to verify whether a particular cell subset correlates with the type of EBV infection. The phenotype analysis of two EBV-negative and eleven EBV-positive (three of LatI and eight of LatIII) BL cell lines was performed by polychromatic flow cytomery, based on expression pattern of CD19, CD10, CD38, CD27, and CD5 markers. Two cell subsets, CD19+CD10+ and CD19+CD10-, were defined in LatIII BL cell lines. In both subsets, the CD27 and CD5 cell surface expression was detected in a proportion of the cells.

Keywords: B-cell subsets, Burkitt's lymphoma cell lines, EBV latency, phenotype profiles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1958
26 A Medical Resource Forecasting Model for Emergency Room Patients with Acute Hepatitis

Authors: R. J. Kuo, W. C. Cheng, W. C. Lien, T. J. Yang

Abstract:

Taiwan is a hyper endemic area for the Hepatitis B virus (HBV). The estimated total number of HBsAg carriers in the general population who are more than 20 years old is more than 3 million. Therefore, a case record review is conducted from January 2003 to June 2007 for all patients with a diagnosis of acute hepatitis who were admitted to the Emergency Department (ED) of a well-known teaching hospital. The cost for the use of medical resources is defined as the total medical fee. In this study, principal component analysis (PCA) is firstly employed to reduce the number of dimensions. Support vector regression (SVR) and artificial neural network (ANN) are then used to develop the forecasting model. A total of 117 patients meet the inclusion criteria. 61% patients involved in this study are hepatitis B related. The computational result shows that the proposed PCA-SVR model has superior performance than other compared algorithms. In conclusion, the Child-Pugh score and echogram can both be used to predict the cost of medical resources for patients with acute hepatitis in the ED.

Keywords: Acute hepatitis, Medical resource cost, Artificial neural network, Support vector regression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1917
25 Biosecurity Control Systems in Two Phases for Poultry Farms

Authors: M. Peña Aguilar Juan, E. Nava Galván Claudia, Pastrana Palma Alberto

Abstract:

In this work was developed and implemented a thermal fogging disinfection system to counteract pathogens from poultry feces in agribusiness farms, to reduce mortality rates and increase biosafety in them. The control system consists of two phases for the conditioning of the farm during the sanitary break. In the first phase, viral and bacterial inactivation was performed by treating the stool dry cleaning, along with the development of a specialized product that foster the generation of temperatures above 55 °C in less than 24 hr, for virus inactivation. In the second phase, a process for disinfection by fogging was implemented, along with the development of a specialized disinfectant that guarantee no risk for the operators’ health or birds. As a result of this process, it was possible to minimize the level of mortality of chickens on farms from 12% to 5.49%, representing a reduction of 6.51% in the death rate, through the formula applied to the treatment of poultry litter based on oxidising agents used as antiseptics, hydrogen peroxide solutions, glacial acetic acid and EDTA in order to act on bacteria, viruses, micro bacteria and spores.

Keywords: Innovation, triple-helix, innovation, poultry farms.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1453
24 Biplot Analysis for Evaluation of Tolerance in Some Bean (Phaseolus vulgaris L.) Genotypes to Bean Common Mosaic Virus (BCMV)

Authors: S. Ghasemi, M. M. Kamelmanesh, A. Namayandeh, R. Biabanikhankahdani

Abstract:

The common bean is the most important grain legume for direct human consumption in the world and BCMV is one of the world's most serious bean diseases that can reduce yield and quality of harvested product. To determine the best tolerance index to BCMV and recognize tolerant genotypes, 2 experiments were conducted in field conditions. Twenty five common bean genotypes were sown in 2 separate RCB design with 3 replications under contamination and non-contamination conditions. On the basis of the results of indices correlations GMP, MP and HARM were determined as the most suitable tolerance indices. The results of principle components analysis indicated 2 first components totally explained 98.52% of variations among data. The first and second components were named potential yield and stress susceptible respectively. Based on the results of BCMV tolerance indices assessment and biplot analysis WA8563-4, WA8563-2 and Cardinal were the genotypes that exhibited potential seed yield under contamination and noncontamination conditions.

Keywords: Phaseolus vulgaris, BCMV, principle components analysis, bi-plot analysis, tolerance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1358
23 Designing of Multi-Agent Rescue Robot: Development and Basic Experiments of Master-Slave Type Rescue Robots

Authors: J. Lin, T. C. Kuo, C. -Y. Gau, K. C. Liu, Y. J. Huang, J. D. Yu, Y. W. Lin

Abstract:

A multi-agent type robot for disaster response in calamity scene is proposed in this paper. The proposed grouped rescue robots can perform cooperative reconnaissance and surveillance to achieve a given rescue mission. The multi-agent rescue of dual set robot consists of one master set and three slave units. The research for this rescue robot system is going to detect at harmful environment where human is unreachable, such as the building is infected with virus or the factory has hazardous liquid in effluent. As a dual set robot, with Bluetooth and communication network, the master set can connect with slave units and send information back to computer by wireless and monitor. Therefore, rescuer can be informed the real-time information in a calamity area. Furthermore, each slave robot is able to obstacle avoidance by ultrasonic sensors, and encodes distance and location by compass. The master robot can integrate every devices information to increase the efficiency of prospected and research unknown area.

Keywords: Designing of multi-agent rescue robot, development and basic experiments of master-slave type rescue robots.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1553
22 Dimensional Modeling of HIV Data Using Open Source

Authors: Charles D. Otine, Samuel B. Kucel, Lena Trojer

Abstract:

Selecting the data modeling technique for an information system is determined by the objective of the resultant data model. Dimensional modeling is the preferred modeling technique for data destined for data warehouses and data mining, presenting data models that ease analysis and queries which are in contrast with entity relationship modeling. The establishment of data warehouses as components of information system landscapes in many organizations has subsequently led to the development of dimensional modeling. This has been significantly more developed and reported for the commercial database management systems as compared to the open sources thereby making it less affordable for those in resource constrained settings. This paper presents dimensional modeling of HIV patient information using open source modeling tools. It aims to take advantage of the fact that the most affected regions by the HIV virus are also heavily resource constrained (sub-Saharan Africa) whereas having large quantities of HIV data. Two HIV data source systems were studied to identify appropriate dimensions and facts these were then modeled using two open source dimensional modeling tools. Use of open source would reduce the software costs for dimensional modeling and in turn make data warehousing and data mining more feasible even for those in resource constrained settings but with data available.

Keywords: About Database, Data Mining, Data warehouse, Dimensional Modeling, Open Source.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1959
21 The Need for Including Hepatitis a Vaccine in Routine Childhood Immunization Programs in Europe as a Response to the Influx of Refugees from the Middle East and North Africa (MENA) Regions

Authors: S. Ramia, N. Melhem, K. Kreidieh

Abstract:

The world is facing an unprecedented displacement crisis. Recently, over 1.1 million asylum seekers have been granted protection status in the European Union (EU). The majority of these asylum seekers were from countries of the Middle East and North Africa (MENA) region.This influx carries with it a potential introduction of infectious diseases that have been eliminated in the EU, which poses a challenge for EU health authorities. Compared to MENA region countries where Hepatitis A Virus (HAV) endemicity is high to intermediate, member states of the EU show very low (Western Europe) to low (Eastern Europe) levels of HAV endemicity. Because of this situation, there is an ongoing public health concern in high-income countries, like members of the EU, that many adults remain susceptible to HAV outbreaks. The overwhelming majority of the EU members’ states do not include HAV vaccine in their immunization calendars. Hence, this paper urgently calls for the implementation of new policies regarding HAV in EU members’ states.

Keywords: European Union, Hepatitis A, MENA Region Refugees, Vaccine preventable diseases.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 867
20 Protocol and Method for Preventing Attacks from the Web

Authors: Ryuya Uda

Abstract:

Nowadays, computer worms, viruses and Trojan horse become popular, and they are collectively called malware. Those malware just spoiled computers by deleting or rewriting important files a decade ago. However, recent malware seems to be born to earn money. Some of malware work for collecting personal information so that malicious people can find secret information such as password for online banking, evidence for a scandal or contact address which relates with the target. Moreover, relation between money and malware becomes more complex. Many kinds of malware bear bots to get springboards. Meanwhile, for ordinary internet users, countermeasures against malware come up against a blank wall. Pattern matching becomes too much waste of computer resources, since matching tools have to deal with a lot of patterns derived from subspecies. Virus making tools can automatically bear subspecies of malware. Moreover, metamorphic and polymorphic malware are no longer special. Recently there appears malware checking sites that check contents in place of users' PC. However, there appears a new type of malicious sites that avoids check by malware checking sites. In this paper, existing protocols and methods related with the web are reconsidered in terms of protection from current attacks, and new protocol and method are indicated for the purpose of security of the web.

Keywords: Information Security, Malware, Network Security, World Wide Web

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2097
19 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: Network worms, malware infection propagating malicious code, virus, security, VPN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2811
18 Identification of Most Frequently Occurring Lexis in Winnings-announcing Unsolicited Bulke-mails

Authors: Jatinderkumar R. Saini, Apurva A. Desai

Abstract:

e-mail has become an important means of electronic communication but the viability of its usage is marred by Unsolicited Bulk e-mail (UBE) messages. UBE consists of many types like pornographic, virus infected and 'cry-for-help' messages as well as fake and fraudulent offers for jobs, winnings and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this challenge and combat this menace, we need to understand UBE. Towards this end, the current paper presents a content-based textual analysis of nearly 3000 winnings-announcing UBE. Technically, this is an application of Text Parsing and Tokenization for an un-structured textual document and we approach it using Bag Of Words (BOW) and Vector Space Document Model techniques. We have attempted to identify the most frequently occurring lexis in the winnings-announcing UBE documents. The analysis of such top 100 lexis is also presented. We exhibit the relationship between occurrence of a word from the identified lexisset in the given UBE and the probability that the given UBE will be the one announcing fake winnings. To the best of our knowledge and survey of related literature, this is the first formal attempt for identification of most frequently occurring lexis in winningsannouncing UBE by its textual analysis. Finally, this is a sincere attempt to bring about alertness against and mitigate the threat of such luring but fake UBE.

Keywords: Lexis, Unsolicited Bulk e-mail (UBE), Vector SpaceDocument Model, Winnings, Lottery

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540
17 Phage Capsid for Efficient Delivery of Cytotoxic Drugs

Authors: Simona Dostalova, Ana Maria Jimenez Jimenez, Marketa Vaculovicova, Vojtech Adam, Rene Kizek

Abstract:

Various nanomaterials can be used as a drug delivery vehicles in nanomedicine, called nanocarriers. They can either be organic or inorganic, synthetic or natural-based. Although synthetic nanocarriers are easier to produce, they can often be toxic for the organism and thus not suitable for use in treatment. From naturalbased nanocarriers, the most commonly used are protein cages or viral capsids. In this work, virus bacteriophage λ was used for delivery of different cytotoxic drugs (cisplatin, carboplatin, oxaliplatin and doxorubicin). Large quantities of phage λ were obtained from phage λ-producing strain of E. coli cultivated in medium with 0.2% maltose. After killing of E. coli with chloroform and its removal by centrifugation, the phage was concentrated by ultracentrifugation at 130 000×g and 4°C for 3 h. The encapsulation of the drugs was performed by infusion method and four different concentrations of the drugs were encapsulated (200; 100; 50; 25 μg·mL-1). Free drug molecules were removed by filtration. The encapsulation was verified using the absorbance for doxorubicin and atomic absorption spectrometry for platinum cytostatics. The amount of encapsulated drug linearly increased with the increasing concentration of applied drug with the determination coefficient R2=0.989 for doxorubicin; R2=0.967 for cisplatin; R2=0.989 for carboplatin and R2=0.996 for oxaliplatin. The overall encapsulation efficiency was calculated as 50% for doxorubicin; 8% for cisplatin; 6% for carboplatin and 10% for oxaliplatin.

Keywords: Bacteriophage λ, doxorubicin, platinum cytostatics, protein-based nanocarrier, viral capsid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1765
16 Identification of Most Frequently Occurring Lexis in Body-enhancement Medicinal Unsolicited Bulk e-mails

Authors: Jatinderkumar R. Saini, Apurva A. Desai

Abstract:

e-mail has become an important means of electronic communication but the viability of its usage is marred by Unsolicited Bulk e-mail (UBE) messages. UBE consists of many types like pornographic, virus infected and 'cry-for-help' messages as well as fake and fraudulent offers for jobs, winnings and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this challenge and combat this menace, we need to understand UBE. Towards this end, the current paper presents a content-based textual analysis of more than 2700 body enhancement medicinal UBE. Technically, this is an application of Text Parsing and Tokenization for an un-structured textual document and we approach it using Bag Of Words (BOW) and Vector Space Document Model techniques. We have attempted to identify the most frequently occurring lexis in the UBE documents that advertise various products for body enhancement. The analysis of such top 100 lexis is also presented. We exhibit the relationship between occurrence of a word from the identified lexis-set in the given UBE and the probability that the given UBE will be the one advertising for fake medicinal product. To the best of our knowledge and survey of related literature, this is the first formal attempt for identification of most frequently occurring lexis in such UBE by its textual analysis. Finally, this is a sincere attempt to bring about alertness against and mitigate the threat of such luring but fake UBE.

Keywords: Body Enhancement, Lexis, Medicinal, Unsolicited Bulk e-mail (UBE), Vector Space Document Model, Viagra

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3509
15 Benzpyrimoxan: An Insecticide for the Control of Rice Plant Hoppers

Authors: E. Satoh, R. Kasahara, T. Aoki, K. Fukatsu, D. Venkata Ramanarao, H. Harayama, T. Murata, A. Suwa

Abstract:

Rice plant hoppers (Hemiptera: Delphacidae) have been causing extensive economic damage in rice and are considered as serious threat in rice producing countries of Asia. They have developed resistance to major groups of chemical insecticide, and severe outbreaks occur commonly throughout Asia. To control these nuisance pests, Nihon Nohyaku Co., Ltd., recently discovered an insecticide, benzpyrimoxan (proposed ISO name), which is under development as NNI-1501 (development code). Benzpyrimoxan has a unique chemical structure which contains benzyloxy and cyclic acetal groups on pyrimidine moiety (5-(1,3-dioxan-2-yl)-4-[4- (trifluoromethyl)benzyloxy]pyrimidine). In order to clarify the biological properties of benzpyrimoxan, we conducted several experiments and found the following results. Benzpyrimoxan has high activity against nymphal stages of rice plant hoppers without any adulticidal activity. It provides excellent and long lasting control against rice plant hoppers, including populations that have developed resistance to several other chemical groups of insecticide. The study on its mode of action is undergoing. These features highlight the versatility of this insecticide as an effective and valuable tool from the viewpoints of insecticide resistance management and integrated pest management program. With the use of benzpyrimoxan, farmers shall be able to lead the best yield potential by keeping the population density of rice plant hoppers and associated virus diseases under control.

Keywords: Acetal, benzpyrimoxan, insecticide, NNI-1501, pyrimidine, rice plant hoppers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3586
14 Recent Outbreaks of Highly Pathogenic Avian Influenza Virus in Chickens and Ducks in Egypt: Pathological Study

Authors: A.A Abou-Rawash, H.S. Abd EL-Hamed. H A. Abd-Ellatieff, S. M. Elsamanoudy

Abstract:

Clinically, chickens showed progressively developed clinical signs represented by sever cyanosis of the comb and wattles with hemorrhage at the shanks, depression, and ruffling feathers with loss of appetite and high daily mortalities. The ducks showed severe neurological signs as torticollus, seizures and inability to stand with mild signs of diarrhea and depression. Grossly, chickens showed hemorrhages and congestion in most of the organs particularly lung, liver, spleen, trachea and kidney. The examined ducks showed multiple petechial hemorrhages, multifocal hemorrhagic necrosis in the pancreas, pulmonary edema, congestion and hemorrhage in meninges and congestion in the skeletal muscles. Histopathology revealed severe congestion and hemorrhages in most of the organs particularly lung, liver and kidney. Microscopic erosive tracheitis, sever pulmonary congestion and perivascular oedema and lymphogranulocytic pneumonia were constant. The liver showed hepatocyts necrosis and lympho-granulocytic infiltration. The kidney showed renal tubular necrosis and diffuse congestion. Multifocal, neuronal necrosis, hemorrhages, multifocal glial nodules, lympho- histiocytic perivascular cuffing, and occasional neuronophagia were observed in the cerebrum. Other organs showed moderate changes.

Keywords: Chicken, Ducks, H5N1 Avian Influenza, Pathology

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2536
13 Portfolio Management for Construction Company during Covid-19 Using AHP Technique

Authors: Sareh Rajabi, Salwa Bheiry

Abstract:

In general, Covid-19 created many financial and non-financial damages to the economy and community. Level and severity of covid-19 as pandemic case varies over the region and due to different types of the projects. Covid-19 virus emerged as one of the most imperative risk management factors word-wide recently. Therefore, as part of portfolio management assessment, it is essential to evaluate severity of such risk on the project and program in portfolio management level to avoid any risky portfolio. Covid-19 appeared very effectively in South America, part of Europe and Middle East. Such pandemic infection affected the whole universe, due to lock down, interruption in supply chain management, health and safety requirements, transportations and commercial impacts. Therefore, this research proposes Analytical Hierarchy Process (AHP) to analyze and assess such pandemic case like Covid-19 and its impacts on the construction projects. The AHP technique uses four sub-criteria: Health and safety, commercial risk, completion risk and contractual risk to evaluate the project and program. The result will provide the decision makers with information which project has higher or lower risk in case of Covid-19 and pandemic scenario. Therefore, the decision makers can have most feasible solution based on effective weighted criteria for project selection within their portfolio to match with the organization’s strategies.

Keywords: Portfolio management, risk management, COVID-19, analytical hierarchy process technique.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 833
12 Web–Based Tools and Databases for Micro-RNA Analysis: A Review

Authors: Sitansu Kumar Verma, Soni Yadav, Jitendra Singh, Shraddha, Ajay Kumar

Abstract:

MicroRNAs (miRNAs), a class of approximately 22 nucleotide long non coding RNAs which play critical role in different biological processes. The mature microRNA is usually 19–27 nucleotides long and is derived from a bigger precursor that folds into a flawed stem-loop structure. Mature micro RNAs are involved in many cellular processes that encompass development, proliferation, stress response, apoptosis, and fat metabolism by gene regulation. Resent finding reveals that certain viruses encode their own miRNA that processed by cellular RNAi machinery. In recent research indicate that cellular microRNA can target the genetic material of invading viruses. Cellular microRNA can be used in the virus life cycle; either to up regulate or down regulate viral gene expression Computational tools use in miRNA target prediction has been changing drastically in recent years. Many of the methods have been made available on the web and can be used by experimental researcher and scientist without expert knowledge of bioinformatics. With the development and ease of use of genomic technologies and computational tools in the field of microRNA biology has superior tremendously over the previous decade. This review attempts to give an overview over the genome wide approaches that have allow for the discovery of new miRNAs and development of new miRNA target prediction tools and databases.

Keywords: MicroRNAs, computational tools, gene regulation, databases, RNAi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3184
11 An Adaptive Memetic Algorithm With Dynamic Population Management for Designing HIV Multidrug Therapies

Authors: Hassan Zarei, Ali Vahidian Kamyad, Sohrab Effati

Abstract:

In this paper, a mathematical model of human immunodeficiency virus (HIV) is utilized and an optimization problem is proposed, with the final goal of implementing an optimal 900-day structured treatment interruption (STI) protocol. Two type of commonly used drugs in highly active antiretroviral therapy (HAART), reverse transcriptase inhibitors (RTI) and protease inhibitors (PI), are considered. In order to solving the proposed optimization problem an adaptive memetic algorithm with population management (AMAPM) is proposed. The AMAPM uses a distance measure to control the diversity of population in genotype space and thus preventing the stagnation and premature convergence. Moreover, the AMAPM uses diversity parameter in phenotype space to dynamically set the population size and the number of crossovers during the search process. Three crossover operators diversify the population, simultaneously. The progresses of crossover operators are utilized to set the number of each crossover per generation. In order to escaping the local optima and introducing the new search directions toward the global optima, two local searchers assist the evolutionary process. In contrast to traditional memetic algorithms, the activation of these local searchers is not random and depends on both the diversity parameters in genotype space and phenotype space. The capability of AMAPM in finding optimal solutions compared with three popular metaheurestics is introduced.

Keywords: HIV therapy design, memetic algorithms, adaptivealgorithms, nonlinear integer programming.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1628
10 A BIM-Based Approach to Assess COVID-19 Risk Management Regarding Indoor Air Ventilation and Pedestrian Dynamics

Authors: T. Delval, C. Sauvage, Q. Jullien, R. Viano, T. Diallo, B. Collignan, G. Picinbono

Abstract:

In the context of the international spread of COVID-19, the Centre Scientifique et Technique du Bâtiment (CSTB) has led a joint research with the French government authorities Hauts-de-Seine department, to analyse the risk in school spaces according to their configuration, ventilation system and spatial segmentation strategy. This paper describes the main results of this joint research. A multidisciplinary team involving experts in indoor air quality/ventilation, pedestrian movements and IT domains was established to develop a COVID risk analysis tool based on Building Information Model. The work started with specific analysis on two pilot schools in order to provide for the local administration specifications to minimize the spread of the virus. Different recommendations were published to optimize/validate the use of ventilation systems and the strategy of student occupancy and student flow segmentation within the building. This COVID expertise has been digitized in order to manage a quick risk analysis on the entire building that could be used by the public administration through an easy user interface implemented in a free BIM Management software. One of the most interesting results is to enable a dynamic comparison of different ventilation system scenarios and space occupation strategy inside the BIM model. This concurrent engineering approach provides users with the optimal solution according to both ventilation and pedestrian flow expertise.

Keywords: BIM, knowledge management, system expert, risk management, indoor ventilation, pedestrian movement, integrated design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 764
9 Chikungunya Protease Domain–High Throughput Virtual Screening

Authors: Surender Singh Jadav, Venkatesan Jayaprakash, Arijit Basu, Barij Nayan Sinha

Abstract:

Chikungunya virus (CHICKV) is an arboviruses belonging to family Tagoviridae and is transmitted to human through by mosquito (Aedes aegypti and Aedes albopictus) bite. A large outbreak of chikungunya has been reported in India between 2006 and 2007, along with several other countries from South-East Asia and for the first time in Europe. It was for the first time that the CHICKV outbreak has been reported with mortality from Reunion Island and increased mortality from Asian countries. CHICKV affects all age groups, and currently there are no specific drugs or vaccine to cure the disease. The need of antiviral agents for the treatment of CHICKV infection and the success of virtual screening against many therapeutically valuable targets led us to carry out the structure based drug design against Chikungunya nSP2 protease (PDB: 3TRK). Highthroughput virtual screening of publicly available databases, ZINC12 and BindingDB, has been carried out using the Openeye tools and Schrodinger LLC software packages. Openeye Filter program has been used to filter the database and the filtered outputs were docked using HTVS protocol implemented in GLIDE package of Schrodinger LLC. The top HITS were further used for enriching the similar molecules from the database through vROCS; a shape based screening protocol implemented in Openeye. The approach adopted has provided different scaffolds as HITS against CHICKV protease. Three scaffolds: Indole, Pyrazole and Sulphone derivatives were selected based on the docking score and synthetic feasibility. Derivatives of Pyrazole were synthesized and submitted for antiviral screening against CHICKV.

Keywords: Chikungunya, nsP2 protease, ADME filter, HTVS, Docking, Active site.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2496
8 Delineating Students’ Speaking Anxieties and Assessment Gaps in Online Speech Performances

Authors: Mary Jane B. Suarez

Abstract:

Speech anxiety is innumerable in any traditional communication classes especially for ESL students. The speech anxiety intensifies when communication skills assessments have taken its toll in an online mode of learning due to the perils of the COVID-19 virus. Teachers and students have experienced vast ambiguity on how to realize a still effective way to teach and learn various speaking skills amidst the pandemic. This mixed method study determined the factors that affected the public speaking skills of students in online performances, delineated the assessment gaps in assessing speaking skills in an online setup, and recommended ways to address students’ speech anxieties. Using convergent parallel design, quantitative data were gathered by examining the desired learning competencies of the English course including a review of the teacher’s class record to analyze how students’ performances reflected a significantly high level of anxiety in online speech delivery. Focus group discussion was also conducted for qualitative data describing students’ public speaking anxiety and assessment gaps. Results showed a significantly high level of students’ speech anxiety affected by time constraints, use of technology, lack of audience response, being conscious of making mistakes, and the use of English as a second language. The study presented recommendations to redesign curricular assessments of English teachers and to have a robust diagnosis of students’ speaking anxiety to better cater to the needs of learners in attempt to bridge any gaps in cultivating public speaking skills of students as educational institutions segue from the pandemic to the post-pandemic milieu.

Keywords: Blended learning, communication skills assessment, online speech delivery, public speaking anxiety, speech anxiety.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 178
7 The Psychological Effects of the COVID-19 Pandemic on Non-Healthcare Migrant Workers in a Construction Company in Saudi Arabia

Authors: Viviane Nascimento, Dania Mehmod

Abstract:

Introduction: The Coronavirus (COVID-19) disease was firstly reported in Asia at the end of 2019 and became a pandemic at the beginning of 2020. It resulted in a significant impact over the global economy and the health care systems around the world. The immediate measure adopted worldwide to contain the virus was mainly the lockdown and curfews. This certainly had an important impact on expats workers due to the financial insecurity, culture barrier and distance from the family. Saudi Arabia has one of the largest flows of foreign workers in the world and expats are the majority of the workforce. The aim of this essay was assessing the psychological impact of COVID-19 in non-health care expats living in Saudi Arabia. Methods: The study was conducted in a construction company in Riyadh with non-health care employees. The cross-sectional study protocol was approved by the company's executive management. Employees who verbally agreed to participate in the study were asked to anonymously answer a questionnaire validated for behavioral research (DASS-21). In addition, a second questionnaire was created to assess feelings and emotions. Results: More than a third of participants screened positive for one or more psychological symptoms (depression, anxiety and stress) on the DASS-21 scale. Moreover, it was observed an increase on negative feelings on the additional questionnaire. Conclusion: This study reveals an increase on negative feelings and psychological symptoms among non-health care migrant workers during the COVID-19 pandemic. In light of this, it is crucial to understand the emotional effects caused by the pandemic on migrant workers in order to create supportive and informative strategies minimizing the emotional impact on this vulnerable group.

Keywords: COVID-19 pandemic, Saudi Arabia, psychological effects, migrant workers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 512