Search results for: page segmentations.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 99

Search results for: page segmentations.

39 Evaluating the Effectiveness of Memory Overcommit Techniques on KVM-based Hosting Platform

Authors: Chin-Hung Li

Abstract:

Determining how many virtual machines a Linux host could run can be a challenge. One of tough missions is to find the balance among performance, density and usability. Now KVM hypervisor has become the most popular open source full virtualization solution. It supports several ways of running guests with more memory than host really has. Due to large differences between minimum and maximum guest memory requirements, this paper presents initial results on same-page merging, ballooning and live migration techniques that aims at optimum memory usage on KVM-based cloud platform. Given the design of initial experiments, the results data is worth reference for system administrators. The results from these experiments concluded that each method offers different reliability tradeoff.

Keywords: Kernel-based Virtual Machine, Overcommit, Virtualization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3078
38 Principles of Editing and Story Telling in Relation to Editorial Graphic Design

Authors: Melike Taşcıoğlu

Abstract:

This paper aims to combine film-editing principles with basic design principles to explore what graphic designers do in terms of storytelling. The sequential aspect of film is designed and examined through the art of editing. Examining the rules, principles and formulas of film editing can be a used as a method by graphic designers to further practice the art of storytelling. There are many publications and extensive research on design basics; however, time, pace, dramatic structure and choreography are not very well defined in the area of graphic design. In this era of creative storytelling and interdisciplinary collaboration, not only film editors, but also graphic designers and students of art and design should understand the theory and practice of editing to be able to create a strong mise-en-scène and not only a mise-en-page.

Keywords: Design principles, editing principles, editorial design, film editing, graphic design, storytelling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2549
37 The Influence of Some Polyphenols on Human Erythrocytes Glutathione S-Transferase Activity

Authors: Mustafa Erat

Abstract:

Glutathione S-transferase was purified from human erythrocytes and effects of some polyphenols were investigated on the enzyme activity. The purification procedure was performed on Glutathione-Agarose affinity chromatography after preparation of erythrocytes hemolysate with a yield of 81%. The purified enzyme showed a single band on the SDS-PAGE. The effects of some poliphenolic compounds such as catechin, dopa, dopamine, progallol and catechol were examined on the in vitro GST activity. Catechin was determined to be inhibitor for the enzyme, but others were not effective on the enzyme as inhibitors or activators. IC50 value -the concentration of inhibitor which reduces enzyme activity by 50%- was estimated to be 10 mM. Ki constants were also calculated as 6.38 ± 0,70 mM with GSH substrate, and 3.86 ± 0,78 mM with CDNB substrate using the equations of graphs for the inhibitor, and its inhibition type was determined as non-competitive.

Keywords: Drug resistance, Glutathione S-transferase, Inhibition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2142
36 A Web Text Mining Flexible Architecture

Authors: M. Castellano, G. Mastronardi, A. Aprile, G. Tarricone

Abstract:

Text Mining is an important step of Knowledge Discovery process. It is used to extract hidden information from notstructured o semi-structured data. This aspect is fundamental because much of the Web information is semi-structured due to the nested structure of HTML code, much of the Web information is linked, much of the Web information is redundant. Web Text Mining helps whole knowledge mining process to mining, extraction and integration of useful data, information and knowledge from Web page contents. In this paper, we present a Web Text Mining process able to discover knowledge in a distributed and heterogeneous multiorganization environment. The Web Text Mining process is based on flexible architecture and is implemented by four steps able to examine web content and to extract useful hidden information through mining techniques. Our Web Text Mining prototype starts from the recovery of Web job offers in which, through a Text Mining process, useful information for fast classification of the same are drawn out, these information are, essentially, job offer place and skills.

Keywords: Web text mining, flexible architecture, knowledgediscovery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2615
35 Criminal Exhibit the Feminine Violent Victim within Thai Newspaper

Authors: Supaporn Wimonchailerk

Abstract:

This research aims to critical analyze the feminine violent within Thai daily newspaper. This study was qualitative base; content analysis from two popular newspapers (Thairath and Dailynews) two qualitative newspapers (Thaipost and Mathichon). Purposive sampling was used to select eleven specialize news reporters to do in-depth interview. The result found that, popular newspapers, Thairath and dailynews have presented feminine violent news in their paper more than Thaipost and Mathichon the qualitative newspaper. Beside, majority of sample present the feminine violent within news under the code of ethic, The National Press Council of Thailand. Interesting, the age of feminine violent victim was the information that has been focused most. The popular newspaper have illustrated crime scene photo on their first-page while qualitative newspaper used only headline to present the same news.

Keywords: Ethic, Feminine, Journalism, Newspaper, Violent Victim.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1588
34 Performance Evaluation of an Online Text-Based Strategy Game

Authors: Nazleeni S. Haron, Mohd K. Zaime , Izzatdin A. Aziz, Mohd H. Hasan

Abstract:

Text-based game is supposed to be a low resource consumption application that delivers good performances when compared to graphical-intensive type of games. But, nowadays, some of the online text-based games are not offering performances that are acceptable to the users. Therefore, an online text-based game called Star_Quest has been developed in order to analyze its behavior under different performance measurements. Performance metrics such as throughput, scalability, response time and page loading time are captured to yield the performance of the game. The techniques in performing the load testing are also disclosed to exhibit the viability of our work. The comparative assessment between the results obtained and the accepted level of performances are conducted as to determine the performance level of the game. The study reveals that the developed game managed to meet all the performance objectives set forth.

Keywords: Online text-based games, performance evaluation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1561
33 Concurrency in Web Access Patterns Mining

Authors: Jing Lu, Malcolm Keech, Weiru Chen

Abstract:

Web usage mining is an interesting application of data mining which provides insight into customer behaviour on the Internet. An important technique to discover user access and navigation trails is based on sequential patterns mining. One of the key challenges for web access patterns mining is tackling the problem of mining richly structured patterns. This paper proposes a novel model called Web Access Patterns Graph (WAP-Graph) to represent all of the access patterns from web mining graphically. WAP-Graph also motivates the search for new structural relation patterns, i.e. Concurrent Access Patterns (CAP), to identify and predict more complex web page requests. Corresponding CAP mining and modelling methods are proposed and shown to be effective in the search for and representation of concurrency between access patterns on the web. From experiments conducted on large-scale synthetic sequence data as well as real web access data, it is demonstrated that CAP mining provides a powerful method for structural knowledge discovery, which can be visualised through the CAP-Graph model.

Keywords: concurrent access patterns (CAP), CAP mining and modelling, CAP-Graph, web access patterns (WAP), WAP-Graph, Web usage mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677
32 Isolation and Characterization of Collagen from Chicken Feet

Authors: P. Hashim, M. S. Mohd Ridzwan, J. Bakar

Abstract:

Collagen was isolated from chicken feet by using papain and pepsin enzymes in acetic acid solution at 4°C for 24h with a yield of 18.16% and 22.94% by dry weight, respectively. Chemical composition and characteristics of chicken feet collagen such as amino acid composition, SDS-PAGE patterns, FTIR spectra and thermal properties were evaluated. The chicken feet collagen is rich in the amino acids glycine, glutamic acid, proline and hydroxyproline. Electrophoresis pattern demonstrated two distinct α-chains (α1 and α2) and β chain, indicating that type I collagen is a major component of chicken feet collagen. The thermal stability of collagen isolated by papain and pepsin revealed stable denaturation temperatures of 48.40 and 53.35°C, respectively. The FTIR spectra of both collagens were similar with amide regions in A, B, I, II and III. The study demonstrated that chicken feet collagen using papain isolation method is possible as commercial alternative ingredient. 

Keywords: Chicken feet, collagen, papain, pepsin.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8255
31 Vetiver Oil Production from Root Culture of Vetiveria zizanioides

Authors: Rizkita R. Esyanti, Iriawati, Olga Mardisadora

Abstract:

Vetiver oil is secondary metabolite that accumulates in Vetiveria zizanioides roots.  The aim of this study was to obtain best type of root culture which produce high amount of vetiver oil, and was similar to metabolites produce from its mother plant.  Protein analysis was also conducted to detect protein, related to putative enzymes, which have a role in terpenoids synthesis in the root culture. The results showed that root culture derived from crown explant produced the best root growth.   The root culture produced primary and lateral roots, ca. 40 branches.  The vetiver oil produced from root culture was analyzed by using GC-MS., and the highest content of terpenoids from roots of crown explant attained 19.024%.  The result of SDS PAGE showed proteins which were ±61 kD and ± 68 kD, each might be related to putative monoterpene synthase and sesquiterpenes complex, respectively. 

Keywords: Protein, Root culture, Terpenoids, Vetiver oil.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3743
30 Improving the Performance of Proxy Server by Using Data Mining Technique

Authors: P. Jomsri

Abstract:

Currently, web usage make a huge data from a lot of user attention. In general, proxy server is a system to support web usage from user and can manage system by using hit rates. This research tries to improve hit rates in proxy system by applying data mining technique. The data set are collected from proxy servers in the university and are investigated relationship based on several features. The model is used to predict the future access websites. Association rule technique is applied to get the relation among Date, Time, Main Group web, Sub Group web, and Domain name for created model. The results showed that this technique can predict web content for the next day, moreover the future accesses of websites increased from 38.15% to 85.57 %. This model can predict web page access which tends to increase the efficient of proxy servers as a result. In additional, the performance of internet access will be improved and help to reduce traffic in networks.

Keywords: Association rule, proxy server, data mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3014
29 Personalization of Web Search Using Web Page Clustering Technique

Authors: Amol Bapuso Rajmane, Pradeep M. Patil, Prakash J. Kulkarni

Abstract:

The Information Retrieval community is facing the problem of effective representation of Web search results. When we organize web search results into clusters it becomes easy to the users to quickly browse through search results. The traditional search engines organize search results into clusters for ambiguous queries, representing each cluster for each meaning of the query. The clusters are obtained according to the topical similarity of the retrieved search results, but it is possible for results to be totally dissimilar and still correspond to the same meaning of the query. People search is also one of the most common tasks on the Web nowadays, but when a particular person’s name is queried the search engines return web pages which are related to different persons who have the same queried name. By placing the burden on the user of disambiguating and collecting pages relevant to a particular person, in this paper, we have developed an approach that clusters web pages based on the association of the web pages to the different people and clusters that are based on generic entity search.

Keywords: Entity resolution, information retrieval, graph based disambiguation, web people search, clustering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448
28 Place Recommendation Using Location-Based Services and Real-time Social Network Data

Authors: Kanda Runapongsa Saikaew, Patcharaporn Jiranuwattanawong, Patinya Taearak

Abstract:

Currently, there is excessively growing information about places on Facebook, which is the largest social network but such information is not explicitly organized and ranked. Therefore users cannot exploit such data to recommend places conveniently and quickly. This paper proposes a Facebook application and an Android application that recommend places based on the number of check-ins of those places, the distance of those places from the current location, the number of people who like Facebook page of those places, and the number of talking about of those places. Related Facebook data is gathered via Facebook API requests. The experimental results of the developed applications show that the applications can recommend places and rank interesting places from the most to the least. We have found that the average satisfied score of the proposed Facebook application is 4.8 out of 5. The users’ satisfaction can increase by adding the app features that support personalization in terms of interests and preferences.

Keywords: Mobile computing, location-based services, recommendation system, social network analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1733
27 Inhibitory Effects of Ambrosia trifida L. on the Development of Root Hairs and Protein Patterns of Radicles

Authors: Ji-Hyon Kil, Kew-Cheol Shim, Kyoung-Ae Park, Kyoungho Kim

Abstract:

Ambrosia trifida L. is designated as invasive alien species by the Act on the Conservation and Use of Biodiversity by the Ministry of Environment, Korea. The purpose of present paper was to investigate the inhibitory effects of aqueous extracts of A.trifida on the development of root hairs of Triticum aestivum L., and Allium tuberosum Rottler ex Spreng and the electrophoretic protein patterns of their radicles. The development of root hairs was inhibited by increasing of aqueous extract concentrations. Through SDS-PAGE, the electrophoretic protein bands of extracted proteins from their radicles were appeared in controls, but protein bands of specific molecular weight disappeared or weakened in treatments. In conclusion, inhibitory effects of A. trifida made two receptor species changed morphologically, and at the molecular level in early growth stage.

Keywords: Ambrosia trifida L., invasive alien species, inhibitory effect, root hair, electrophoretic protein, radicle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2184
26 Unified, Low-Cost Analysis Framework for the Cycling Situation in Cities

Authors: Joerg Schweizer, Jason N. Meggs, Nazanin R. Dehkordi, Frederico Rupi, Anton Pashkevich

Abstract:

We propose a low-cost uniform analysis framework allowing comparison of the strengths and weaknesses of the bicycling experience within and between cities. A primary component is an expedient, one-page mobility survey from which mode share is calculated. The bicycle mode share of many cities remains unknown, creating a serious barrier for both scientists and policy makers aiming to understand and increase rates of bicycling. Because of its low cost and expedience, this framework could be replicated widely, uniformly filling the data gap. The framework has been applied to 13 Central European cities with success. Data is collected on multiple modes with specific questions regarding both behavior and quality of travel experience. Individual preferences are also collected, examining the conditions under which respondents would change behavior to adopt more sustainable modes (bicycling or public transportation). A broad analysis opportunity results, intended to inform policy choices.

Keywords: bicycling, modal splits, transport policy, surveys.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1362
25 A Book Cover as an Expression of Conceptualization and a Tool of Social Identity Construction: The Interpretation Based on the Example of G. Ritzer's book McDonaldization of Society

Authors: Jiří Pavelka

Abstract:

The study is based on the assumption that media products are appropriate subjects for the exploration of social and cultural identities as a keystone of value orientations of their authors, producers and target audiences. The research object of the study is the title page of the book cover of a professional publication that serves as a medium of marketing, scientific and intercultural communication, which is the result of semiotic and intercultural transfer. The study aims to answer the question whether the book cover is an expression of conceptualization and tool for social identity construction. It attempts to determine what value orientations and what concepts of social and cultural identities are hidden in the narrative structures of the book cover of the Czech translation of the book by G. Ritzer The McDonaldization of Society (1993), issued after the fall of the iron curtain in 1996 in the Czech Republic.

Keywords: Social and cultural identity, book cover, marketing communication, semiotic and intercultural transfer, narrative structure, the McDonaldisation of Society.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1849
24 Semantic Spatial Objects Data Structure for Spatial Access Method

Authors: Kalum Priyanath Udagepola, Zuo Decheng, Wu Zhibo, Yang Xiaozong

Abstract:

Modern spatial database management systems require a unique Spatial Access Method (SAM) in order solve complex spatial quires efficiently. In this case the spatial data structure takes a prominent place in the SAM. Inadequate data structure leads forming poor algorithmic choices and forging deficient understandings of algorithm behavior on the spatial database. A key step in developing a better semantic spatial object data structure is to quantify the performance effects of semantic and outlier detections that are not reflected in the previous tree structures (R-Tree and its variants). This paper explores a novel SSRO-Tree on SAM to the Topo-Semantic approach. The paper shows how to identify and handle the semantic spatial objects with outlier objects during page overflow/underflow, using gain/loss metrics. We introduce a new SSRO-Tree algorithm which facilitates the achievement of better performance in practice over algorithms that are superior in the R*-Tree and RO-Tree by considering selection queries.

Keywords: Outlier, semantic spatial object, spatial objects, SSRO-Tree, topo-semantic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1649
23 Skew Detection Technique for Binary Document Images based on Hough Transform

Authors: Manjunath Aradhya V N, Hemantha Kumar G, Shivakumara P

Abstract:

Document image processing has become an increasingly important technology in the automation of office documentation tasks. During document scanning, skew is inevitably introduced into the incoming document image. Since the algorithm for layout analysis and character recognition are generally very sensitive to the page skew. Hence, skew detection and correction in document images are the critical steps before layout analysis. In this paper, a novel skew detection method is presented for binary document images. The method considered the some selected characters of the text which may be subjected to thinning and Hough transform to estimate skew angle accurately. Several experiments have been conducted on various types of documents such as documents containing English Documents, Journals, Text-Book, Different Languages and Document with different fonts, Documents with different resolutions, to reveal the robustness of the proposed method. The experimental results revealed that the proposed method is accurate compared to the results of well-known existing methods.

Keywords: Optical Character Recognition, Skew angle, Thinning, Hough transform, Document processing

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2054
22 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: Social Network Sites, Online Social Network, Privacy, Trust, Security and Authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3738
21 Characterization and Evaluation of the Activity of Dipeptidyl Peptidase IV from the Black-Bellied Hornet Vespa basalis

Authors: Feng Chia Hsieh, Sheng Kuo Hsieh, Tzyy Rong Jinn

Abstract:

Characterization and evaluation of the activity of Vespa basalis DPP-IV, which expressed in Spodoptera frugiperda 21 cells. The expression of rDPP-IV was confirmed by SDS–PAGE, Western blot analyses, LC-MS/MS and measurement of its peptidase specificity. One-step purification by Ni-NTA affinity chromatography and the total amount of rDPP-IV recovered was approximately 6.4mg per liter from infected culture medium; an equivalent amount would be produced by 1x109 infected Sf21 insect cells. Through the affinity purification led to highly stable rDPP-IV enzyme was recovered and with significant peptidase activity. The rDPP-IV exhibited classical Michaelis–Menten kinetics, with kcat/Km in the range of 10-500 mM-1×S-1 for the five synthetic substrates and optimum substrate is Ala-Pro-pNA. As expected in inhibition assay, the enzymatic activity of rDPP-IV was significantly reduced by 80 or 60% in the presence of sitagliptin (a DPP-IV inhibitor) or PMSF (a serine protease inhibitor), but was not apparently affected by iodoacetamide (a cysteine protease inhibitor).

Keywords: Dipeptidyl-Peptidase IV, Phenylmethylsulfonyl fluoride; Serine protease, Sitagliptin, Vespa basalis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1532
20 Extracellular Protein Secreted by Bacillus subtilis ATCC21332 in the Presence of Streptomycin Sulfate

Authors: Hanina M. N., Hairul Shahril M., Ismatul Nurul Asyikin I., Abdul Jalil A. K., Salina M. R., Maryam M. R., Rosfarizan M.

Abstract:

The extracellular proteins secreted by bacteria may be increased in stressful surroundings, such as in the presence of antibiotics. It appears that many antibiotics, when used at low concentrations, have in common the ability to activate or repress gene transcription, which is distinct from their inhibitory effect. There have been comparatively few studies on the potential of antibiotics as a specific chemical signal that can trigger a variety of biological functions. Therefore, this study was carried out to determine the effect of Streptomycin Sulfate in regulating extracellular proteins secreted by Bacillus subtilis ATCC21332. Results of Microdilution assay showed that the Minimum Inhibition Concentration (MIC) of Streptomycin Sulfate on B. subtilis ATCC21332 was 2.5 mg/ml. The bacteria cells were then exposed to Streptomycin Sulfate at concentration of 0.01 MIC before being further incubated for 48h to 72 h. The extracellular proteins secreted were then isolated and analyzed by sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS-PAGE). Proteins profile revealed that three additional bands with approximate sizes of 30 kDa, 22 kDa and 23 kDa were appeared for the treated bacteria with Streptomycin Sulfate. Thus, B. subtilis ATCC21332 in stressful condition with the presence of Streptomycin Sulfate at low concentration could induce the extracellular proteins secretion.

Keywords: Bacillus subtilis ATCC21332, Streptomycin Sulfate, extracellular proteins.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3123
19 Animation of Objects on the Website by Application of CSS3 Language

Authors: Vladimir Simovic, Matija Varga, Robert Svetlacic

Abstract:

Scientific work analytically explores and demonstrates techniques that can animate objects and geometric characters using CSS3 language by applying proper formatting and positioning of elements. This paper presents examples of optimum application of the CSS3 descriptive language when generating general web animations (e.g., billiards and movement of geometric characters, etc.). The paper presents analytically, the optimal development and animation design with the frames within which the animated objects are. The originally developed content is based on the upgrading of existing CSS3 descriptive language animations with more complex syntax and project-oriented work. The purpose of the developed animations is to provide an overview of the interactive features of CSS3 descriptive language design for computer games and the animation of important analytical data based on the web view. It has been analytically demonstrated that CSS3 as a descriptive language allows inserting of various multimedia elements into websites for public and internal sites.

Keywords: Animation recording, web page graphics, HTML5 forms, Cascading Style Sheets 3 - CSS3, man-computer interaction, KML animation presenting format, GML, Google Earth Professional.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 755
18 The Construction of a Probiotic Lactic Acid Bacterium Expressing Acid-Resistant Phytase Enzyme

Authors: R. Majidzadeh Heravi, M. Sankian, H. Kermanshahi, M. R. Nassiri, A. Heravi Moussavi, S. A. Lari, A. R. Varasteh

Abstract:

The use of probiotics engineered to express specific enzymes has been the subject of considerable attention in poultry industry because of increased nutrient availability and reduced cost of enzyme supplementation. Phytase enzyme is commonly added to poultry feed to improve digestibility and availability of phosphorus from plant sources. To construct a probiotic with potential of phytate degradation, phytase gene (appA) from E. coli was cloned and transformed into two probiotic bacteria Lactobacillus salivarius and Lactococcus lactis. L. salivarous showed plasmid instability, unable to express the gene. The expression of appA gene in L. lactis was analyzed by detecting specific RNA and zymography assay. Phytase enzyme was isolated from cellular extracts of recombinant L. lactis, showing a 46 kDa band upon the SDS-PAGE analysis. Zymogram also confirmed the phytase activity of the 46 kDa band corresponding to the enzyme. An enzyme activity of 4.9U/ml was obtained in cell extracts of L. lactis. The growth of native and recombinant L. lactis was similar in the presence of two concentrations of ox bile.

Keywords: Lactobacillus salivarus, Lactococcus lactis, recombinant, phytase, poultry.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 973
17 A Survey on Early Screen Exposure during Infancy and Autism

Authors: I. Mahmood

Abstract:

This survey was conducted to explore the hypothesis that excessive screen exposure combined with a subsequent decrease in parent-child interaction during infancy might be associated with autism. The main questions being asked are: Were children with autism exposed to long hours of screen time during the first 2 years of life? And what was the reason(s) for exposure at such an early age? Other variables were also addressed in this survey. An Arabic questionnaire was administered online (June 2019) via a Facebook page, relatively well-known in Arab countries. 1725 parents of children diagnosed with autism participated in this survey. Results show that 80.9% of children surveyed who were diagnosed with autism had been exposed to screens for long periods of time during the first 2 years of life. It can be inferred from the results of this survey that over-exposure to screens disrupt the parent-child interaction which is shown to be associated with ASD. The results of this survey highlight the harmful effects of screen exposure during infancy and the importance of parent-child interaction during the critical period of brain development. This paper attempts to further explore the connection between parent-child interaction and ASD, as well as serve as a call for further research and investigation of the relation between screens and parent-child interactions during infancy and Autism.

Keywords: Attachment disorder, autism, screen exposure, virtual autism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 760
16 Web Page Watermarking: XML files using Synonyms and Acronyms

Authors: Nighat Mir, Sayed Afaq Hussain

Abstract:

Advent enhancements in the field of computing have increased massive use of web based electronic documents. Current Copyright protection laws are inadequate to prove the ownership for electronic documents and do not provide strong features against copying and manipulating information from the web. This has opened many channels for securing information and significant evolutions have been made in the area of information security. Digital Watermarking has developed into a very dynamic area of research and has addressed challenging issues for digital content. Watermarking can be visible (logos or signatures) and invisible (encoding and decoding). Many visible watermarking techniques have been studied for text documents but there are very few for web based text. XML files are used to trade information on the internet and contain important information. In this paper, two invisible watermarking techniques using Synonyms and Acronyms are proposed for XML files to prove the intellectual ownership and to achieve the security. Analysis is made for different attacks and amount of capacity to be embedded in the XML file is also noticed. A comparative analysis for capacity is also made for both methods. The system has been implemented using C# language and all tests are made practically to get the results.

Keywords: Watermarking, Extensible Markup Language (XML), Synonyms, Acronyms, Copyright protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2229
15 Displaying of GnRH Peptides on Bacteriophage T7 and Its Immunogenicity in Mice Model

Authors: Hai Xu, Yiwei Wang, Xi Bao, Bihua Deng, Pengcheng Li, Yu Lu

Abstract:

T7 phage could be used as a perfect vector for peptides expression and haptens presentation. T7-3GnRH recombinant phage was constructed by inserting three copies of Gonadotrophin Releasing Hormone (GnRH) gene into the multiple cloning site of T7 Select 415-1b phage genome. The positive T7-3GnRH phage was selected by using polymerase chain reaction amplification, and the p10B-3GnRH fusion protein was verified by SDS-PAGE and Western-blotting assay. T7-3GnRH vaccine was made and immunized with 1010 pfu in 0.2 ml per dose in mice. Blood samples were collected at an interval in weeks, and anti-GnRH antibody and testosterone concentrations were detected by ELISA and radioimmunoassay, respectively. The results show that T7-3GnRH phage particles confer a high immunogenicity to the GnRH-derived epitope. Moreover, the T7-3GnRH vaccine induced higher level of anti-GnRH antibody than ImproVac®. However, the testosterone concentrations in both immunized groups were at a similar level, and the testis developments were significantly inhibited compared to controls. These findings demonstrated that the anti-GnRH antibody could neutralize the endogenous GnRH to down regulate testosterone level and limit testis development, highlighting the potential value of T7-3GnRH in the immunocastration vaccine research.

Keywords: Gonadotrophin releasing hormone, GnRH, immunocastration, T7 phage, phage vaccine.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1046
14 Maya Semantic Technique: A Mathematical Technique Used to Determine Partial Semantics for Declarative Sentences

Authors: Marcia T. Mitchell

Abstract:

This research uses computational linguistics, an area of study that employs a computer to process natural language, and aims at discerning the patterns that exist in declarative sentences used in technical texts. The approach is mathematical, and the focus is on instructional texts found on web pages. The technique developed by the author and named the MAYA Semantic Technique is used here and organized into four stages. In the first stage, the parts of speech in each sentence are identified. In the second stage, the subject of the sentence is determined. In the third stage, MAYA performs a frequency analysis on the remaining words to determine the verb and its object. In the fourth stage, MAYA does statistical analysis to determine the content of the web page. The advantage of the MAYA Semantic Technique lies in its use of mathematical principles to represent grammatical operations which assist processing and accuracy if performed on unambiguous text. The MAYA Semantic Technique is part of a proposed architecture for an entire web-based intelligent tutoring system. On a sample set of sentences, partial semantics derived using the MAYA Semantic Technique were approximately 80% accurate. The system currently processes technical text in one domain, namely Cµ programming. In this domain all the keywords and programming concepts are known and understood.

Keywords: Natural language understanding, computational linguistics, knowledge representation, linguistic theories.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1624
13 Implementation of an Improved Secure System Detection for E-passport by using EPC RFID Tags

Authors: A. Baith Mohamed, Ayman Abdel-Hamid, Kareem Youssri Mohamed

Abstract:

Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.

Keywords: RFID "Radio Frequency Identification", EPC"Electronic Product Code", ICAO "International Civil Aviation Organization", IFF "Identify Friend or Foe"

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2563
12 Protein Production by Bacillus Subtilis Atcc 21332 in the Presence of Cymbopogon Essential Oils

Authors: Hanina M. N., Hairul Shahril M., Mohd Fazrullah Innsan M. F., Ismatul Nurul Asyikin I., Abdul Jalil A. K, Salina M. R., Ahmad I.B.

Abstract:

Proteins levels produced by bacteria may be increased in stressful surroundings, such as in the presence of antibiotics. It appears that many antimicrobial agents or antibiotics, when used at low concentrations, have in common the ability to activate or repress gene transcription, which is distinct from their inhibitory effect. There have been comparatively few studies on the potential of antibiotics or natural compounds in nature as a specific chemical signal that can trigger a variety of biological functions. Therefore, this study was focusing on the effect of essential oils from Cymbopogon flexuosus and C. nardus in regulating proteins production by Bacillus subtilis ATCC 21332. The Minimum Inhibition Concentrations (MICs) of both essential oils on B. subtilis were determined by using microdilution assay, resulting 0.2% and 1.56% for each C. flexuosus and C. nardus subsequently. The bacteria were further exposed to each essential oils at concentration of 0.01XMIC for 2 days. The proteins were then isolated and analyzed by sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS-PAGE). Protein profile showed that a band with approximate size of 250 kD was appeared for the treated bacteria with essential oils. Thus, Bacillus subtilis ATCC 21332 in stressful condition with the presence of essential oils at low concentration could induce the protein production.

Keywords: Bacillus subtilis ATCC 21332, Cymbopogon essential oils, protein

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2109
11 Biological Effects of a Carbohydrate-Binding Protein from an Annelid, Perinereis nuntia Against Human and Phytopathogenic Microorganisms

Authors: Sarkar M. A. Kawsar, Sarkar M. A. Mamun, Md S. Rahman, Hidetaro Yasumitsu, Yasuhiro Ozeki

Abstract:

Lectins have a good scope in current clinical microbiology research. In the present study evaluated the antimicrobial activities of a D-galactose binding lectin (PnL) was purified from the annelid, Perinereis nuntia (polychaeta) by affinity chromatography. The molecular mass of the lectin was determined to be 32 kDa as a single polypeptide by SDS-PAGE under both reducing and non-reducing conditions. The hemagglutinating activity of the PnL showed against trypsinized and glutaraldehyde-fixed human erythrocytes was specifically inhibited by D-Gal, GalNAc, Galβ1-4Glc and Galα1-6Glc. PnL was evaluated for in vitro antibacterial screening studies against 11 gram-positive and gram-negative microorganisms. From the screening results, it was revealed that PnL exhibited significant antibacterial activity against gram-positive bacteria. Bacillus megaterium showed the highest growth inhibition by the lectin (250 μg/disc). However, PnL did not inhibit the growth of gram-negative bacteria such as Vibrio cholerae and Pseudomonas sp. PnL was also examined for in vitro antifungal activity against six fungal phytopathogens. PnL (100 μg/mL) inhibited the mycelial growth of Alternaria alternata (24.4%). These results indicate that future findings of lectin applications obtained from annelids may be of importance to life sciences.

Keywords: Perinereis nuntia, Lectin, Inhibition zone, Mycelial growth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1934
10 Extraction of Data from Web Pages: A Vision Based Approach

Authors: P. S. Hiremath, Siddu P. Algur

Abstract:

With the explosive growth of information sources available on the World Wide Web, it has become increasingly difficult to identify the relevant pieces of information, since web pages are often cluttered with irrelevant content like advertisements, navigation-panels, copyright notices etc., surrounding the main content of the web page. Hence, tools for the mining of data regions, data records and data items need to be developed in order to provide value-added services. Currently available automatic techniques to mine data regions from web pages are still unsatisfactory because of their poor performance and tag-dependence. In this paper a novel method to extract data items from the web pages automatically is proposed. It comprises of two steps: (1) Identification and Extraction of the data regions based on visual clues information. (2) Identification of data records and extraction of data items from a data region. For step1, a novel and more effective method is proposed based on visual clues, which finds the data regions formed by all types of tags using visual clues. For step2 a more effective method namely, Extraction of Data Items from web Pages (EDIP), is adopted to mine data items. The EDIP technique is a list-based approach in which the list is a linear data structure. The proposed technique is able to mine the non-contiguous data records and can correctly identify data regions, irrespective of the type of tag in which it is bound. Our experimental results show that the proposed technique performs better than the existing techniques.

Keywords: Web data records, web data regions, web mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1860