Abstract:The study proposes and discusses a model for knowledge production and truth discovery under the rubric of hosting versus control. The proposed model shows that there are two types of knowledge production methods. The first method is to control the phenomenon by studying it by knowing the initial root of the phenomenon or what the study calls a bottom-up method. The second method is the method of knowing the maximum extent of the phenomenon or its final path, which is what the study calls the method from top to bottom. The first method is the dominant method, while the second method is the suggested method. The study highlighted several applications of the proposed method in the fields of exact sciences, social sciences, history, arts, identity and the like. The final result of the study is that the different ways of producing knowledge lead to the same truth, but the difference is in the mode of the phenomenon or the special law that governs the phenomenon
Abstract:This paper presents a novel encryption method for the secure transmission of medical images in the Internet of Medical Things (IoMT) systems. The method combines Feedforward Neural Network (FFNN) architectures for a random key generation with a substitution function using the Sbox of the AES algorithm to ensure high-level security. The FFNNs are trained to generate strong and unpredictable encryption keys, enhancing overall security. The substitution function, based on the AES Sbox, further strengthens security by substituting pixel values with encrypted equivalents. Evaluation results demonstrate the method\'s effectiveness in achieving robust encryption while preserving essential image characteristics. Tests including histogram analysis, entropy evaluation, correlation assessment, and Peak Signal-to-Noise Ratio (PSNR) analysis confirm the quality and integrity of the encrypted images. Additionally, the proposed method exhibits low encryption and decryption times, contributing to its efficiency in IoMT systems. This encryption method addresses privacy concerns, ensures data integrity, and is suitable for securely transmitting medical images in IoMT systems.
Abstract:The transient electromagnetic (TEM) method is an effective tool for investigating the subsurface resistivity structure. An important requirement for accurate investigation of the shallow depth is a transmitter current with the steep and linear falling-edge. We present a scheme for fast turning off the bipolar pulse current of TEM transmitter. The scheme exploits the passive voltage-clamp circuit and the divided transmitter loop. The moment the current is switched off, the transmitter loop is divided into two equal parts by controllable switches. Synchronously, the inverse constant high voltage is added to each loop parts by the voltage-clamp circuit composed of the transient voltage suppressors. When the current falls to zero, the loop parts are again connected to one for the next transmitting. We analyze the effect of proposed scheme by using the equations of fall time and linearity. Simulation and experimental results show that the transmitter current of this scheme has a short fall time and a highly linear falling-edge, which is especially useful for mine or shallow TEM surveys.
Abstract:Maturity-onset diabetes of the young (MODY) is a monogenic disease, mainly characterized by β-cell destruction, impaired insulin biosynthesis, hyperglycemia, and dominant autosomal mode of inheritance. It is mainly caused by gene mutations. GCK gene is an essential gene for insulin biosynthesis. Any deregulation or mutation of this gene might result in MODY. Thus, nucleotide heterogeneity in this gene may be useful in identifying the probability of MODY occurrence. Purpose of current study is to determine the impact of single nucleotide polymorphisms (SNPs) in human GCK gene on various properties of encoded protein such as extinction coefficient, aliphatic index, instability index, isoelectric point, half-life, trans-membrane topology, sub-cellular localization 3D configuration and ontology. For this reason, we first retrieved the coding sequence of normal GCK gene transcript ENST00000671824.1 GCK-210 and its forty-nine selected missense, frame-shift & stop gained mutations by using the ENSEMBL database. We incorporated these SNPs into the normal GCK gene coding sequence and constructed mutated coding region. Coding sequences of normal and forty-nine mutated GCK gene coding regions were transcribed into an amino-acid sequence using the Translate tool-Expasy. Then change in the function of protein caused by SNPs was determined by changes in subcellular localization, Ontology, 3D configuration and physical properties using CELLO2GO, PHYRE2 and ProParam-Expasy tools, respectively. Pathogenicity analysis was also performed by using SIFT and PolyPhen tools. It was found that out of the forty-nine SNPs evaluated in the current study, eight variations documented in cases 3 (rs193922259), 11 (rs1554335752), 15 (rs193922295), 16 (rs1064796410), 19 (rs1470521850), 24 (rs104894006), 28 (rs144723656), and 32 (rs1562715426) considerably changed the physicochemical properties, 3D configuration and sub-cellular localization of mutated proteins. Among thirty three SNPs, thirty were deleterious according to SIFT analysis. According to PolyPhen tool sixteen were probably damaging, thirteen were possibly damaging and one was benign. These genetic variations can potentially be used as biomarkers in human to assess the likelihood of having MODY.
Abstract:Increasing consumption of energy in Traction Power Supply Systems (TPSS) will result in continuing escalation of electricity costs. Since the supply voltage source rectifiers are high frequency harmonic generators which often lead to high frequency resonances that affect the energy quality leading to unbalanced systems and low voltage fluctuations, etc. However, major savings could be made by using an appropriate filter. In order to suppress such harmonics, an LCL-type filter well-suited is therefore used. This paper describes the LCL-type filter strategy in the TPSS and deals with the control system and its PI and PR control units. In order to check the system performance, simulation using Matlab program is used. The results obtained of both L and LCL-type filters were compared. The special features of the LCL-type filter in terms of energy quality improvement and harmonic suppression are discussed.
Abstract:With an outbreak of covid19 and the lockdown measures imposed, the electricity sector was majorly shaken almost everywhere in the world. The electricity demand dropped more abruptly across Europe and India with these confinement measures and later on recovered with time as these measures were softened by the government. In this context, in this work, it is investigated that how the lockdown and unlock measures impacted energy consumption of state Haryana, India during the COVID-19 crisis. Further in this paper the recovery of electricity demands of various circles of the state is estimated by applying statistical test. For this dataset from state regional electricity boards were considered and implementation was done in python. As per the implementation results it can be seen that the lockdown impacted the electricity demands abruptly in almost all the circles, but the demands gradually increased with unlock measures. Although unlock has a positive impact on energy consumption and as per statistical test it is observed that urban sectors/industrial sectors of the state recovered quickly their energy consumption as compared to the agriculture sectors to the level before the lockdown. This implies that these regions needed special aid and policy to recover their economy from the damage suffered from the COVID-19 crisis. Also the same study can be proactively applied continuously by power systems for gauging energy needs and thereafter monitor energy generation as per the needs so as to avoid energy been waste.
Abstract:The emergence of the fifth generation (5G) telecommunication systems in Nigeria is a step towards new possibilities. 5G signal propagation loss prediction models with high accuracy and low complexity should be proposed to optimally deploy these 5G systems. In this study, various propagation models (Free Space, Stanford University Interim (SUI), Ericsson (ECC-999) and Okumura-Hata Extended (ECC-33)) are analyzed and compared with the measurements. The study site is the University of Port Harcourt Teaching Hospital, Choba located at latitude and longitude of 4.8998° N, and 6.9292° E respectively. The experimental exercise was conducted to measure the receiver signal strength of a 3.5GHz cellular network with the use of the Network Cell Info app installed on a Tecno Phone. The researchers proposed a path loss model using gradient-boosted linear regression (GBLR). According to the result, the GBLR model performed optimally with an R-square value of 0.9. The idea presented in this paper showed that the heuristic path model performs better than the empirical models in diverse environments.
Abstract:In this paper, we analyze the e-commerce data collected using Google Analytics from an IT components company and a tourism agency website located in the same county in Romania. Our aim is to analyze the COVID-19 lingering effects and seasonal effects. The data set was collected from January 2019, long before COVID-19, until mid-February 2023. To perform analyses, we grouped the metrics into categories that reflect site performance, access to the website, and users’ behavior for the IT company, and access to the website, users’ behavior, and marketing campaigns for the tourism agency. Additionally, the aim is to test five hypotheses we formulate on the immediate and persistent influence of COVID-19 on the activity of small businesses.
Abstract:Abstract \nIntroduction, \nThis current study examines the factors that contribute towards behavior change among motorcyclist and its implications in encouraging the use of crush helmets in Accra the capital city of Ghana. \nMethods \nIn this study the result primarily is based on collected data from using questionnaire randomly administered to motorcyclists in two specific municipalities in the greater Accra Region who ride motorcycles either for private or for commercial use.\nResults\nThe theory of Planned behavior was used and the results indicate that of the four variables in the framework only perceived behavioral control was seen to contribute towards changing risky behaviors of motorcyclists as it was found to have a significant positive relationship with intention to change and change with helmet wearing. Again, the moderating role of social marketing campaigns was found to have a rather negative influence indicating the lack of or inadequate use it. \nConclusions\nThe argument therefore is that social marketing campaigns should be intensified so as to educate motorcyclists on the need to use helmets to serve as protection even where when there is an accident. This will prevent head injuries in the event of road crush.
Abstract:This study applies quantitative linguistics to explore how language distance plays an essential role in third language acquisition in terms of a morphosyntactic module. Data were drawn from 360 essays written in Japanese by low, middle and high levels of learners from 12 first-language (L1) backgrounds who acquire English as a second language (L2)-interlanguage and Japanese as a third language (L3). The findings indicate that (a) mean dependency distance is an efficient indicator for syntactic complexity of writing proficiency. In both elementary and intermediate groups, learners of highly agglutinative languages are likely to show higher dependency distance than learners from isolated-language and fusion-language backgrounds. (b) The frequency and dependency distance are distributed in Power Law Function. Fitting Right truncated Good to the dependency distances indicates that the values of the parameter p ascend as the degree of agglutination of learners’ mother tongue increases. (c) The syntactic complexity in multi-background Japanese learners’ essays highlights that no matter how diverse the learners’ native and target languages are, the syntax is always constrained by universal law, namely, minimizing dependency distance. This is in accordance with existing findings in second language acquisition of inflectional languages.