CINXE.COM
Search results for: cellular defense
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: cellular defense</title> <meta name="description" content="Search results for: cellular defense"> <meta name="keywords" content="cellular defense"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="cellular defense" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="cellular defense"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1215</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: cellular defense</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1215</span> A Framework for Embedding Industry 4.0 in the UAE Defence Manufacturing Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khalifa%20Al%20Baloushi">Khalifa Al Baloushi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongwei%20Zhang"> Hongwei Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Terrence%20Perera"> Terrence Perera</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last few decades, the government of the UAE has been taking actions to consolidate defense manufacturing entities with the view to build a coherent and modern defense manufacturing base. Whilst these actions have significantly improved the overall capabilities of defense manufacturing; further opportunities exist to radically transform the sector. A comprehensive literature review and data collected from a survey identified three potential areas of improvements, (a) integration of Industry 4.0 technologies and other smart technologies, (b) stronger engagement of small and Medium-sized defense manufacturing companies and (c) Enhancing the national defense policies by embedding best practices from other nations. This research paper presents the design and development of a conceptual framework for the UAE defense industrial ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=industry%204.0" title="industry 4.0">industry 4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20manufacturing" title=" defense manufacturing"> defense manufacturing</a>, <a href="https://publications.waset.org/abstracts/search?q=eco-systems" title=" eco-systems"> eco-systems</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a> </p> <a href="https://publications.waset.org/abstracts/145808/a-framework-for-embedding-industry-40-in-the-uae-defence-manufacturing-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">207</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1214</span> Intramuscular Heat Shock Protein 72 and Heme Oxygenase-1 mRNA are Reduced in Patients with Type 2 Diabetes Evidence That Insulin Resistance is Associated with a Disturbed Antioxidant Defense Mechanism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ghibeche%20Abderrahmane">Ghibeche Abderrahmane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To examine whether genes associated with cellular defense against oxidative stress are associated with insulin sensitivity, patients with type 2 diabetes (n=7) and age-matched (n=5) and young (n=9) control subjects underwent a euglycemic-hyperinsulinemic clamp for 120 min. Muscle samples were obtained before and after the clamp and analyzed for heat shock protein (HSP)72 and heme oxygenase (HO)-1 mRNA, intramuscular triglyceride content, and the maximal activities of β-hyroxyacyl-CoA dehydrogenase (β-HAD) and citrate synthase (CS). Basal expression of both HSP72 and HO-1 mRNA were lower (P < 0.05) by 33 and 55%, respectively, when comparing diabetic patients with age-matched and young control subjects, with no differences between the latter groups. Both basal HSP72 (r = 0.75, P < 0.001) and HO-1 (r = 0.50,P < 0.05) mRNA expression correlated with the glucose infusion rate during the clamp. Significant correlations were also observed between HSP72 mRNA and both β-HAD (r = 0.61, P < 0.01) and CS (r = 0.65, P < 0.01). HSP72 mRNA was induced (P < 0.05) by the clamp in all groups. Although HO-1 mRNA was unaffected by the clamp in both the young and age-matched control subjects, it was increased (P < 0.05) ∼70-fold in the diabetic patients after the clamp. These data demonstrate that genes involved in providing cellular protection against oxidative stress are defective in patients with type 2 diabetes and correlate with insulin-stimulated glucose disposal and markers of muscle oxidative capacity. The data provide new evidence that the pathogenesis of type 2 diabetes involves perturbations to the antioxidant defense mechanism within skeletal muscle. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=euglycemic-hyperinsulinemic" title="euglycemic-hyperinsulinemic">euglycemic-hyperinsulinemic</a>, <a href="https://publications.waset.org/abstracts/search?q=HSP72" title=" HSP72"> HSP72</a>, <a href="https://publications.waset.org/abstracts/search?q=mRNA" title=" mRNA"> mRNA</a>, <a href="https://publications.waset.org/abstracts/search?q=diabete" title=" diabete"> diabete</a> </p> <a href="https://publications.waset.org/abstracts/25876/intramuscular-heat-shock-protein-72-and-heme-oxygenase-1-mrna-are-reduced-in-patients-with-type-2-diabetes-evidence-that-insulin-resistance-is-associated-with-a-disturbed-antioxidant-defense-mechanism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1213</span> Classification Based on Deep Neural Cellular Automata Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yasser%20F.%20Hassan">Yasser F. Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep learning structure is a branch of machine learning science and greet achievement in research and applications. Cellular neural networks are regarded as array of nonlinear analog processors called cells connected in a way allowing parallel computations. The paper discusses how to use deep learning structure for representing neural cellular automata model. The proposed learning technique in cellular automata model will be examined from structure of deep learning. A deep automata neural cellular system modifies each neuron based on the behavior of the individual and its decision as a result of multi-level deep structure learning. The paper will present the architecture of the model and the results of simulation of approach are given. Results from the implementation enrich deep neural cellular automata system and shed a light on concept formulation of the model and the learning in it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title="cellular automata">cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20cellular%20automata" title=" neural cellular automata"> neural cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a> </p> <a href="https://publications.waset.org/abstracts/104722/classification-based-on-deep-neural-cellular-automata-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104722.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1212</span> Cellular Automata Using Fractional Integral Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yasser%20F.%20Hassan">Yasser F. Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a proposed model of cellular automata is studied by means of fractional integral function. A cellular automaton is a decentralized computing model providing an excellent platform for performing complex computation with the help of only local information. The paper discusses how using fractional integral function for representing cellular automata memory or state. The architecture of computing and learning model will be given and the results of calibrating of approach are also given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fractional%20integral" title="fractional integral">fractional integral</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title=" cellular automata"> cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=memory" title=" memory"> memory</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a> </p> <a href="https://publications.waset.org/abstracts/55312/cellular-automata-using-fractional-integral-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55312.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">413</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1211</span> Therapeutical Role of Copper Oxide Nanoparticles (CuO NPs) for Breast Cancer Therapy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dipranjan%20Laha">Dipranjan Laha</a>, <a href="https://publications.waset.org/abstracts/search?q=Parimal%20Karmakar"> Parimal Karmakar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Metal oxide nanoparticles are well known to generate oxidative stress and deregulate normal cellular activities. Among these, transition metals copper oxide nanoparticles (CuO NPs) are more compelling than others and able to modulate different cellular responses. In this work, we have synthesized and characterized CuO NPs by various biophysical methods. These CuO NPs (~30 nm) induce autophagy in human breast cancer cell line, MCF7 in a time and dose-dependent manner. Cellular autophagy was tested by MDC staining, induction of green fluorescent protein light chain 3 (GFP-LC3B) foci by confocal microscopy, transfection of pBABE-puro mCherry-EGFP-LC3B plasmid and western blotting of autophagy marker proteins LC3B, beclin1, and ATG5. Further, inhibition of autophagy by 3-Methyladenine (3-MA) decreased LD50 doses of CuO NPs. Such cell death was associated with the induction of apoptosis as revealed by FACS analysis, cleavage of PARP, dephosphorylation of Bad and increased cleavage product of caspase3. siRNA-mediated inhibition of autophagy-related gene beclin1 also demonstrated similar results. Finally, induction of apoptosis by 3-MA in CuO NPs treated cells were observed by TEM. This study indicates that CuO NPs are a potent inducer of autophagy which may be a cellular defense against the CuO NPs mediated toxicity and inhibition of autophagy switches the cellular response into apoptosis. A combination of CuO NPs with the autophagy inhibitor is essential to induce apoptosis in breast cancer cells. Acknowledgments: The authors would like to acknowledge for financial support for this research work to the Department of Biotechnology (No. BT/PR14661/NNT/28/494/2010), Government of India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nanoparticle" title="nanoparticle">nanoparticle</a>, <a href="https://publications.waset.org/abstracts/search?q=autophagy" title=" autophagy"> autophagy</a>, <a href="https://publications.waset.org/abstracts/search?q=apoptosis" title=" apoptosis"> apoptosis</a>, <a href="https://publications.waset.org/abstracts/search?q=siRNA-mediated%20inhibition" title=" siRNA-mediated inhibition"> siRNA-mediated inhibition</a> </p> <a href="https://publications.waset.org/abstracts/18208/therapeutical-role-of-copper-oxide-nanoparticles-cuo-nps-for-breast-cancer-therapy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18208.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1210</span> Literature Review: Adversarial Machine Learning Defense in Malware Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leidy%20M.%20Aldana">Leidy M. Aldana</a>, <a href="https://publications.waset.org/abstracts/search?q=Jorge%20E.%20Camargo"> Jorge E. Camargo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malware" title="Malware">Malware</a>, <a href="https://publications.waset.org/abstracts/search?q=adversarial" title=" adversarial"> adversarial</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=defense" title=" defense"> defense</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a> </p> <a href="https://publications.waset.org/abstracts/177946/literature-review-adversarial-machine-learning-defense-in-malware-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177946.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1209</span> Application of Strength Criteria for Cellular Pressure Vessels</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Antanas%20%C5%BDiliukas">Antanas Žiliukas</a>, <a href="https://publications.waset.org/abstracts/search?q=Mindaugas%20Kukis"> Mindaugas Kukis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The work deals with cellular pressure vessels subjected to internal pressure. Their cellular insert can be used for placing liquids or gases, which is necessary to carry out technological processes, and the vessel itself has a good bearing capacity. Numerical calculations of the three core structures, which measure the influence of the inner cylinder thickness on maximum bearing capacity are presented. The calculations are compared using strength criteria and they show the different strength safety level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pressure" title="pressure">pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=strength%20criterion" title=" strength criterion"> strength criterion</a>, <a href="https://publications.waset.org/abstracts/search?q=sandwich%20plate" title=" sandwich plate"> sandwich plate</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20vessel" title=" cellular vessel"> cellular vessel</a> </p> <a href="https://publications.waset.org/abstracts/6763/application-of-strength-criteria-for-cellular-pressure-vessels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6763.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1208</span> Performance Based Logistics and Applications in Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ferhat%20Yilmaz">Ferhat Yilmaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Defense sector is one of the most important areas where logistics is used extensively. Nations give importance to their defense spending in order to survive in their geography. Parallel to the rising crises around the world, governments increase their defense spending; however, resources are limited while the needs are infinite. Therefore, countries try to develop a more effective use of their defense budget. In order to make logistics more effective and efficient, performance- based logistical system was developed. This article tries to explain the Performance-based Logistical System, its employment process, employment areas, and how it will be used along with other main systems in the Turkey. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=performance" title="performance">performance</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20based%20logistics%20applications" title=" performance based logistics applications"> performance based logistics applications</a>, <a href="https://publications.waset.org/abstracts/search?q=logistical%20system" title=" logistical system"> logistical system</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/31834/performance-based-logistics-and-applications-in-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1207</span> An Adaptive Cooperative Scheme for Reliability of Transmission Using STBC and CDD in Wireless Communications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hyun-Jun%20Shin">Hyun-Jun Shin</a>, <a href="https://publications.waset.org/abstracts/search?q=Jae-Jeong%20Kim"> Jae-Jeong Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyoung-Kyu%20Song"> Hyoung-Kyu Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In broadcasting and cellular system, a cooperative scheme is proposed for the improvement of performance of bit error rate. Up to date, the coverage of broadcasting system coexists with the coverage of cellular system. Therefore each user in a cellular coverage is frequently involved in a broadcasting coverage. The proposed cooperative scheme is derived from the shared areas. The users receive signals from both broadcasting base station and cellular base station. The proposed scheme selects a cellular base station of a worse channel to achieve better performance of bit error rate in cooperation. The performance of the proposed scheme is evaluated in fading channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cooperative%20communication" title="cooperative communication">cooperative communication</a>, <a href="https://publications.waset.org/abstracts/search?q=diversity" title=" diversity"> diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=STBC" title=" STBC"> STBC</a>, <a href="https://publications.waset.org/abstracts/search?q=CDD" title=" CDD"> CDD</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20condition" title=" channel condition"> channel condition</a>, <a href="https://publications.waset.org/abstracts/search?q=broadcasting%20system" title=" broadcasting system"> broadcasting system</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20system" title=" cellular system"> cellular system</a> </p> <a href="https://publications.waset.org/abstracts/3519/an-adaptive-cooperative-scheme-for-reliability-of-transmission-using-stbc-and-cdd-in-wireless-communications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">509</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1206</span> Self-denigration in Doctoral Defense Sessions: Scale Development and Validation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Jalilifar">Alireza Jalilifar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nadia%20Mayahi"> Nadia Mayahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The dissertation defense as a complicated conflict-prone context entails the adoption of elegant interactional strategies, one of which is self-denigration. This study aimed to develop and validate a self-denigration model that fits the context of doctoral defense sessions in applied linguistics. Two focus group discussions provided the basis for developing this conceptual model, which assumed 10 functions for self-denigration, namely good manners, modesty, affability, altruism, assertiveness, diffidence, coercive self-deprecation, evasion, diplomacy, and flamboyance. These functions were used to design a 40-item questionnaire on the attitudes of applied linguists concerning self-denigration in defense sessions. The confirmatory factor analysis of the questionnaire indicated the predictive ability of the measurement model. The findings of this study suggest that self-denigration in doctoral defense sessions is the social representation of the participants’ values, ideas and practices adopted as a negotiation strategy and a conflict management policy for the purpose of establishing harmony and maintaining resilience. This study has implications for doctoral students and academics and illuminates further research on self-denigration in other contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20discourse" title="academic discourse">academic discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=politeness" title=" politeness"> politeness</a>, <a href="https://publications.waset.org/abstracts/search?q=self-denigration" title=" self-denigration"> self-denigration</a>, <a href="https://publications.waset.org/abstracts/search?q=grounded%20theory" title=" grounded theory"> grounded theory</a>, <a href="https://publications.waset.org/abstracts/search?q=dissertation%20defense" title=" dissertation defense"> dissertation defense</a> </p> <a href="https://publications.waset.org/abstracts/143887/self-denigration-in-doctoral-defense-sessions-scale-development-and-validation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143887.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1205</span> Improved Performance Using Adaptive Pre-Coding in the Cellular Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yong-Jun%20Kim">Yong-Jun Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jae-Hyun%20Ro"> Jae-Hyun Ro</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang-Bin%20Ha"> Chang-Bin Ha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyoung-Kyu%20Song"> Hyoung-Kyu Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes the cooperative transmission scheme with pre-coding because the cellular communication requires high reliability. The cooperative transmission scheme uses pre-coding method with limited feedback information among small cells. Particularly, the proposed scheme has adaptive mode according to the position of mobile station. Thus, demand of recent wireless communication is resolved by this scheme. From the simulation results, the proposed scheme has better performance compared to the conventional scheme in the cellular network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CDD" title="CDD">CDD</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20network" title=" cellular network"> cellular network</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-coding" title=" pre-coding"> pre-coding</a>, <a href="https://publications.waset.org/abstracts/search?q=SPC" title=" SPC"> SPC</a> </p> <a href="https://publications.waset.org/abstracts/42216/improved-performance-using-adaptive-pre-coding-in-the-cellular-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">569</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1204</span> Defense Mechanism Maturity and the Severity of Mood Disorder Symptoms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maja%20Pand%C5%BEa">Maja Pandža</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjin%20Lovri%C4%87"> Sanjin Lovrić</a>, <a href="https://publications.waset.org/abstracts/search?q=Iva%20%C4%8Colak"> Iva Čolak</a>, <a href="https://publications.waset.org/abstracts/search?q=Josipa%20Mandari%C4%87"> Josipa Mandarić</a>, <a href="https://publications.waset.org/abstracts/search?q=Miro%20Klari%C4%87"> Miro Klarić</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the role of symptoms related to mood disorders salience on different types of defense mechanisms (mature, neurotic, immature) predominance. Total of 177 both clinical and non-clinical participants in Mostar, Bosnia & Herzegovina, completed a battery of questionnaires associated with defense mechanisms and self-reported depression and anxiety symptoms. The sample was additionally divided into four groups, given the level of symptoms experienced: 1. minimal, 2. mild, 3. moderate, 4. severe depression/anxiety. Participants with minimal anxiety and depression symptoms use mature defense mechanisms more often than other three groups. Immature mechanisms are most commonly used by the group with severe depression/anxiety levels in comparison with other groups. These differences are discussed on the dynamic level of analysis to have a better understanding of the relationship between defense mechanisms' maturity and degree of mood disorders' symptom severity. Also, results given could serve as an implication for the psychotherapeutic treatment plans. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anxiety%2Fdepression%20symptoms" title="anxiety/depression symptoms">anxiety/depression symptoms</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%2Fnon-clinical%20sample" title=" clinical/non-clinical sample"> clinical/non-clinical sample</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanism%20maturity" title=" defense mechanism maturity"> defense mechanism maturity</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20approach" title=" dynamic approach"> dynamic approach</a> </p> <a href="https://publications.waset.org/abstracts/34314/defense-mechanism-maturity-and-the-severity-of-mood-disorder-symptoms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34314.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1203</span> A Macroeconomic Analysis of Defense Industry: Comparisons, Trends and Improvements in Brazil and in the World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Fajardo">J. Fajardo</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Guerra"> J. Guerra</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Gonzales"> E. Gonzales</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will outline a study of Brazil's industrial base of defense (IDB), through a bibliographic research method, combined with an analysis of macroeconomic data from several available public data platforms. This paper begins with a brief study about Brazilian national industry, including analyzes of productivity, income, outcome and jobs. Next, the research presents a study on the defense industry in Brazil, presenting the main national companies that operate in the aeronautical, army and naval branches. After knowing the main points of the Brazilian defense industry, data on the productivity of the defense industry of the main countries and competing companies of the Brazilian industry were analyzed, in order to summarize big cases in Brazil with a comparative analysis. Concerned the methodology, were used bibliographic research and the exploration of historical data series, in order to analyze information, to get trends and to make comparisons along the time. The research is finished with the main trends for the development of the Brazilian defense industry, comparing the current situation with the point of view of several countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=economics%20of%20defence" title="economics of defence">economics of defence</a>, <a href="https://publications.waset.org/abstracts/search?q=industry" title=" industry"> industry</a>, <a href="https://publications.waset.org/abstracts/search?q=trends" title=" trends"> trends</a>, <a href="https://publications.waset.org/abstracts/search?q=market" title=" market"> market</a> </p> <a href="https://publications.waset.org/abstracts/99239/a-macroeconomic-analysis-of-defense-industry-comparisons-trends-and-improvements-in-brazil-and-in-the-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1202</span> Implementation of Gender Policy in the Georgian National Defence: Key Issues and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vephkhvia%20Grigalashvili">Vephkhvia Grigalashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The defense of Georgia is every citizen’s duty. The present article reviews the principles and standards of gender policy in the Georgian national defense sector. In addition, it looks at mechanisms for ensuring gender equality, going through the relevant Georgian legislation. Furthermore, this work aims to conduct a comparative analysis of defense models of Georgia, Finland, and the Baltic States in order to identify core institutional challenges. The study produced the following findings:(a) The national defense planning is based on the Total Defense approach, which implies a wide involvement of the country`s population in state defense. (b) This political act does not specify gender equality aspects of the Total Defense strategy; (c) According to the Constitution of Georgia, irrespective of gender factors, every citizen of Georgia is legally obliged to participate in state security activities. However, the state has an authority (power of choice) to decide which gender group (male or/and female citizen) must fulfill above mentioned their constitutional commitment. For instance, completion of compulsory military and reserve military services is a male citizen’s duty, whereas professional military service is equally accessible to both genders. The study concludes that effective implementation of the Total Defense concept largely depends on how Georgia uses its capabilities and human resources. Based on the statistical fact that more than 50% of the country’s population are women, Georgia has to elaborate on relevant institutional mechanisms for implementation of gender equality in the national defense organization. In this regard, it would be advisable: (i) to give the legal opportunity to women to serve in compulsory military service, and (ii) to develop labor reserve service as a part of the anti-crisis management system of Georgia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gender%20in%20defense%20organisation" title="gender in defense organisation">gender in defense organisation</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20mechanisms" title=" gender mechanisms"> gender mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20in%20defense%20policy" title=" gender in defense policy"> gender in defense policy</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20policy" title=" gender policy"> gender policy</a> </p> <a href="https://publications.waset.org/abstracts/111949/implementation-of-gender-policy-in-the-georgian-national-defence-key-issues-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111949.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1201</span> Improved Particle Swarm Optimization with Cellular Automata and Fuzzy Cellular Automata</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramin%20Javadzadeh">Ramin Javadzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The particle swarm optimization are Meta heuristic optimization method, which are used for clustering and pattern recognition applications are abundantly. These algorithms in multimodal optimization problems are more efficient than genetic algorithms. A major drawback in these algorithms is their slow convergence to global optimum and their weak stability can be considered in various running of these algorithms. In this paper, improved Particle swarm optimization is introduced for the first time to overcome its problems. The fuzzy cellular automata is used for improving the algorithm efficiently. The credibility of the proposed approach is evaluated by simulations, and it is shown that the proposed approach achieves better results can be achieved compared to the Particle swarm optimization algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title="cellular automata">cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20learning%20automata" title=" cellular learning automata"> cellular learning automata</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20search" title=" local search"> local search</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20swarm%20optimization" title=" particle swarm optimization"> particle swarm optimization</a> </p> <a href="https://publications.waset.org/abstracts/24739/improved-particle-swarm-optimization-with-cellular-automata-and-fuzzy-cellular-automata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24739.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">607</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1200</span> The Limits to Self-Defense Claims in Case of Domestic Violence Homicides</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria%20Elisabete%20Costa%20Ferreira">Maria Elisabete Costa Ferreira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title="domestic violence">domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=homicide" title=" homicide"> homicide</a>, <a href="https://publications.waset.org/abstracts/search?q=self-defense" title=" self-defense"> self-defense</a>, <a href="https://publications.waset.org/abstracts/search?q=imminent%20threat" title=" imminent threat"> imminent threat</a>, <a href="https://publications.waset.org/abstracts/search?q=necessity%20of%20lethal%20force" title=" necessity of lethal force"> necessity of lethal force</a> </p> <a href="https://publications.waset.org/abstracts/171695/the-limits-to-self-defense-claims-in-case-of-domestic-violence-homicides" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171695.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1199</span> Predicting the Relationship Between Childhood Trauma on the Formation of Defense Mechanisms with the Mediating Role of Object Relations in Traders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmadreza%20Jabalameli">Ahmadreza Jabalameli</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Ebrahimpour%20Borujeni"> Mohammad Ebrahimpour Borujeni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to psychodynamic theories, the major personality structure of individuals is formed in the first years of life. Trauma is an inseparable and undeniable part of everyone's life and they inevitably struggle with many traumas that can have a very significant impact on their lives. The present study deals with the relationship between childhood trauma on the formation of defense mechanisms and the role of object relations. The present descriptive study is a correlation with structural equation modeling (SEM). Sample selection is available and consists of 200 knowledgeable traders in Jabalameli Information Technology Company. The results indicate that the experience of childhood trauma with a demographic moderating effect, through the mediating role of object relations can lead to vulnerability to ego reality functionality and immature and psychically disturbed defense mechanisms. In this regard, there is a significant negative relationship between childhood trauma and object relations with mature defense mechanisms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=childhood%20trauma" title="childhood trauma">childhood trauma</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanisms" title=" defense mechanisms"> defense mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20relations" title=" object relations"> object relations</a>, <a href="https://publications.waset.org/abstracts/search?q=trade" title=" trade"> trade</a> </p> <a href="https://publications.waset.org/abstracts/148276/predicting-the-relationship-between-childhood-trauma-on-the-formation-of-defense-mechanisms-with-the-mediating-role-of-object-relations-in-traders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148276.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1198</span> Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Felipe">F. Felipe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20defense" title="air defense">air defense</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-support" title=" decision-support"> decision-support</a> </p> <a href="https://publications.waset.org/abstracts/125149/enhancing-the-effectiveness-of-air-defense-systems-through-simulation-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1197</span> Performance Evaluation of Vertical Handover on Silom Line BTS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Silumpa%20Suboonsan">Silumpa Suboonsan</a>, <a href="https://publications.waset.org/abstracts/search?q=Suwat%20Pattaramalai"> Suwat Pattaramalai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the performance of internet usage by using Vertical Handover (VHO) between cellular network and wireless local area network (WLAN) on Silom line Bangkok Mass Transit System (BTS) is evaluated. In the evaluation model, there is the WLAN on every BTS station and there are cellular base stations along the BTS path. The maximum data rates for cellular network are 7.2, 14.4, 42, and 100Mbps and for WLAN are 54, 150, and 300Mbps. The simulation are based on users using internet, watching VDOs and browsing web pages, on the BTS train from first station to the last station (full time usage) and on the BTS train for traveling some number of stations (random time). The results shows that VHO system has throughput a lot more than using only cellular network when the data rate of WLAN is more than one of cellular network. Lastly, the number of watching HD VDO and Full HD VDO is higher on VHO system on both regular time and rush hour of BTS travelling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vertical%20handover" title="vertical handover">vertical handover</a>, <a href="https://publications.waset.org/abstracts/search?q=WLAN" title=" WLAN"> WLAN</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular" title=" cellular"> cellular</a>, <a href="https://publications.waset.org/abstracts/search?q=silom%20line%20BTS" title=" silom line BTS"> silom line BTS</a> </p> <a href="https://publications.waset.org/abstracts/17241/performance-evaluation-of-vertical-handover-on-silom-line-bts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1196</span> The Role of Defense Mechanisms in Treatment Adherence in Type 2 Diabetes Mellitus: An Exploratory Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20Marchini">F. Marchini</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Caputo"> A. Caputo</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Balonan"> J. Balonan</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Fedele"> F. Fedele</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Napoli"> A. Napoli</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Langher"> V. Langher</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aim: The present study aims to explore the specific role of defense mechanisms in persons with type 2 diabetes mellitus in treatment adherence. Materials and methods: A correlational study design was employed. Thirty-two persons with type 2 diabetes mellitus were enrolled and assessed with Defense Mechanism Inventory, Beck Depression Inventory-II, Toronto Alexithymia Scale and Self-Care Inventory-Revised. Bivariate correlation and two-step regression analyses were performed. Results: Treatment adherence negatively correlates with hetero-directed hostility (r= -.537; p < .01), whereas it is positively associated with principalization (r= .407; p < .05). These two defense mechanisms overall explain an incremental variance of 26.9% in treatment adherence (ΔF=4.189, df1=2, df2 =21, p < .05), over and above the control variables for depression and alexithymia. However, only higher hetero-directed hostility is found to be a solid predictor of a decreased treatment adherence (β=-.497, p < .05). Conclusions: Despite providing preliminary results, this pilot study highlights the original contribution of defense mechanisms in adherence to type 2 diabetes regimens. Specifically, hetero-directed hostility may relate to an unconscious process, according to which disease-related painful feelings are displaced onto care relationships with negative impacts on adherence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alexithymia" title="alexithymia">alexithymia</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%20mechanisms" title=" defense mechanisms"> defense mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=treatment%20adherence" title=" treatment adherence"> treatment adherence</a>, <a href="https://publications.waset.org/abstracts/search?q=type%202%20diabetes%20mellitus" title=" type 2 diabetes mellitus"> type 2 diabetes mellitus</a> </p> <a href="https://publications.waset.org/abstracts/93212/the-role-of-defense-mechanisms-in-treatment-adherence-in-type-2-diabetes-mellitus-an-exploratory-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1195</span> A Graph SEIR Cellular Automata Based Model to Study the Spreading of a Transmittable Disease</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natasha%20Sharma">Natasha Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Kulbhushan%20Agnihotri"> Kulbhushan Agnihotri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cellular Automata are discrete dynamical systems which are based on local character and spatial disparateness of the spreading process. These factors are generally neglected by traditional models based on differential equations for epidemic spread. The aim of this work is to introduce an SEIR model based on cellular automata on graphs to imitate epidemic spreading. Distinctively, it is an SEIR-type model where the population is divided into susceptible, exposed, infected and recovered individuals. The results obtained from simulations are in accordance with the spreading behavior of a real time epidemics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title="cellular automata">cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemic%20spread" title=" epidemic spread"> epidemic spread</a>, <a href="https://publications.waset.org/abstracts/search?q=graph" title=" graph"> graph</a>, <a href="https://publications.waset.org/abstracts/search?q=susceptible" title=" susceptible"> susceptible</a> </p> <a href="https://publications.waset.org/abstracts/33909/a-graph-seir-cellular-automata-based-model-to-study-the-spreading-of-a-transmittable-disease" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33909.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">459</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1194</span> Analysis of Beams with Web Opening Subject to Vertical Loads</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Chantarawitoon">P. Chantarawitoon</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Askarinejad"> H. Askarinejad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The steel beams with web opening including the cellular and castellated I-beams are fabricated from a solid web I-beam through a double cutting method to a specific shape and size along the beam. The two halves of the beams are then welded together, increasing the overall depth of the web section. In this paper, the deflection of the cellular and castellated beams subject to uniform vertical loads are investigated using Finite Element Autodesk simulation package. The structural response of the beams with web opening are compared with regular solid beams. Additionally, parametric studies are carried out to study the influence of the geometric properties of a cellular beam to its structural responses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=beams%20with%20web%20opening" title="beams with web opening">beams with web opening</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20and%20castellated%20beams" title=" cellular and castellated beams"> cellular and castellated beams</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20analysis" title=" finite element analysis"> finite element analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20deflection" title=" vertical deflection"> vertical deflection</a> </p> <a href="https://publications.waset.org/abstracts/73216/analysis-of-beams-with-web-opening-subject-to-vertical-loads" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">241</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1193</span> Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayesh%20M.%20Patel">Jayesh M. Patel</a>, <a href="https://publications.waset.org/abstracts/search?q=Bharat%20P.%20Modi"> Bharat P. Modi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular" title="cellular">cellular</a>, <a href="https://publications.waset.org/abstracts/search?q=Wi-Fi" title=" Wi-Fi"> Wi-Fi</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20phone" title=" smart phone "> smart phone </a> </p> <a href="https://publications.waset.org/abstracts/18238/analysis-of-user-data-usage-trends-on-cellular-and-wi-fi-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1192</span> 2D Hexagonal Cellular Automata: The Complexity of Forms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vural%20Erdogan">Vural Erdogan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We created two-dimensional hexagonal cellular automata to obtain complexity by using simple rules same as Conway’s game of life. Considering the game of life rules, Wolfram's works about life-like structures and John von Neumann's self-replication, self-maintenance, self-reproduction problems, we developed 2-states and 3-states hexagonal growing algorithms that reach large populations through random initial states. Unlike the game of life, we used six neighbourhoods cellular automata instead of eight or four neighbourhoods. First simulations explained that whether we are able to obtain sort of oscillators, blinkers, and gliders. Inspired by Wolfram's 1D cellular automata complexity and life-like structures, we simulated 2D synchronous, discrete, deterministic cellular automata to reach life-like forms with 2-states cells. The life-like formations and the oscillators have been explained how they contribute to initiating self-maintenance together with self-reproduction and self-replication. After comparing simulation results, we decided to develop the algorithm for another step. Appending a new state to the same algorithm, which we used for reaching life-like structures, led us to experiment new branching and fractal forms. All these studies tried to demonstrate that complex life forms might come from uncomplicated rules. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hexagonal%20cellular%20automata" title="hexagonal cellular automata">hexagonal cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=self-replication" title=" self-replication"> self-replication</a>, <a href="https://publications.waset.org/abstracts/search?q=self-reproduction" title=" self-reproduction"> self-reproduction</a>, <a href="https://publications.waset.org/abstracts/search?q=self-%20maintenance" title=" self- maintenance"> self- maintenance</a> </p> <a href="https://publications.waset.org/abstracts/99380/2d-hexagonal-cellular-automata-the-complexity-of-forms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99380.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1191</span> Criteria for Good Governance in Georgian Defense Sector:Standards and Principles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vephkhvia%20Grigalashvili">Vephkhvia Grigalashvili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-corruption%20policy%20within%20Georgian%20defense%20governance" title="anti-corruption policy within Georgian defense governance">anti-corruption policy within Georgian defense governance</a>, <a href="https://publications.waset.org/abstracts/search?q=conflict%20of%20interests%20within%20Georgian%20defense%20governance" title=" conflict of interests within Georgian defense governance"> conflict of interests within Georgian defense governance</a>, <a href="https://publications.waset.org/abstracts/search?q=good%20governance%20in%20Georgian%20defense%20sector" title=" good governance in Georgian defense sector"> good governance in Georgian defense sector</a>, <a href="https://publications.waset.org/abstracts/search?q=principles%20of%20integrity%20in%20Georgian%20defense%20management" title=" principles of integrity in Georgian defense management"> principles of integrity in Georgian defense management</a> </p> <a href="https://publications.waset.org/abstracts/94977/criteria-for-good-governance-in-georgian-defense-sectorstandards-and-principles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94977.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1190</span> Rough Neural Networks in Adapting Cellular Automata Rule for Reducing Image Noise</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yasser%20F.%20Hassan">Yasser F. Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The reduction or removal of noise in a color image is an essential part of image processing, whether the final information is used for human perception or for an automatic inspection and analysis. This paper describes the modeling system based on the rough neural network model to adaptive cellular automata for various image processing tasks and noise remover. In this paper, we consider the problem of object processing in colored image using rough neural networks to help deriving the rules which will be used in cellular automata for noise image. The proposed method is compared with some classical and recent methods. The results demonstrate that the new model is capable of being trained to perform many different tasks, and that the quality of these results is comparable or better than established specialized algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rough%20sets" title="rough sets">rough sets</a>, <a href="https://publications.waset.org/abstracts/search?q=rough%20neural%20networks" title=" rough neural networks"> rough neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title=" cellular automata"> cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a> </p> <a href="https://publications.waset.org/abstracts/1516/rough-neural-networks-in-adapting-cellular-automata-rule-for-reducing-image-noise" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1516.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1189</span> Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azita%20Ramezani">Azita Ramezani</a>, <a href="https://publications.waset.org/abstracts/search?q=Atousa%20Ramezani"> Atousa Ramezani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fusion%20models" title="fusion models">fusion models</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threat%20defense" title=" cyber threat defense"> cyber threat defense</a>, <a href="https://publications.waset.org/abstracts/search?q=windows%20malware" title=" windows malware"> windows malware</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forests" title=" random forests"> random forests</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machines%20%28SVM%29" title=" support vector machines (SVM)"> support vector machines (SVM)</a>, <a href="https://publications.waset.org/abstracts/search?q=accuracy" title=" accuracy"> accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=f1-score" title=" f1-score"> f1-score</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20code%20detection" title=" malicious code detection"> malicious code detection</a> </p> <a href="https://publications.waset.org/abstracts/179650/fusion-models-for-cyber-threat-defense-integrating-clustering-random-forests-and-support-vector-machines-to-against-windows-malware" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1188</span> Drying Modeling of Banana Using Cellular Automata</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Fathi">M. Fathi</a>, <a href="https://publications.waset.org/abstracts/search?q=Z.%20Farhaninejad"> Z. Farhaninejad</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Shahedi"> M. Shahedi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Sadeghi"> M. Sadeghi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Drying is one of the oldest preservation methods for food and agriculture products. Appropriate control of operation can be obtained by modeling. Limitation of continues models for complex boundary condition and non-regular geometries leading to appearance of discrete novel methods such as cellular automata, which provides a platform for obtaining fast predictions by rule-based mathematics. In this research a one D dimensional CA was used for simulating thin layer drying of banana. Banana slices were dried with a convectional air dryer and experimental data were recorded for validating of final model. The model was programmed by MATLAB, run for 70000 iterations and von-Neumann neighborhood. The validation results showed a good accordance between experimental and predicted data (R=0.99). Cellular automata are capable to reproduce the expected pattern of drying and have a powerful potential for solving physical problems with reasonable accuracy and low calculating resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=banana" title="banana">banana</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title=" cellular automata"> cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=drying" title=" drying"> drying</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a> </p> <a href="https://publications.waset.org/abstracts/34912/drying-modeling-of-banana-using-cellular-automata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34912.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">438</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1187</span> Cellular Energy Metabolism Decreases with Age in the Trophocytes and Oenocytes of Honeybees (Apis Mellifera)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chin-Yuan%20Hsu">Chin-Yuan Hsu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Lung%20Chuang"> Yu-Lung Chuang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expression, concentration, and activity of mitochondrial energy-utilized molecules and cellular energy-regulated molecules decreased with age in the trophocytes and oenocytes of honeybees (Apis mellifera), but those of cellular energy-metabolized molecules is unknown. In this study, the expression, concentration, and activity of cellular energy-metabolized molecules were assayed in the trophocytes and fat cells of young and old worker bees by using the techniques of cell and biochemistry. The results showed that (i) the •-hydroxylacyl-coenzyme A dehydrogenase (HOAD) activity/citrate synthase (CS) activity ratio, non-esterified fatty acids concentrations, the expression of eukaryotic initiation factor 4E, and the expression of phosphorylated eIF4E binding protein 1 decreased with age; (ii) fat and glycogen accumulation increased with age; and (iii) the pyruvate dehydrogenase (PDH) activity/citrate synthase (CS) activity ratio was not correlated with age. These finding indicated that •-oxidation (HOAD/CS) and protein synthsis decreased with age. Glycolysis (PDH/CS) was unchanged with age. The most likely reason is that sugars are the vital food of worker bees. Taken together these data reveal that young workers have higher cellular energy metabolism than old workers and that aging results in a decline in the cellular energy metabolism in worker honeybees. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aging" title="aging">aging</a>, <a href="https://publications.waset.org/abstracts/search?q=energy" title=" energy"> energy</a>, <a href="https://publications.waset.org/abstracts/search?q=honeybee" title=" honeybee"> honeybee</a>, <a href="https://publications.waset.org/abstracts/search?q=metabolism" title=" metabolism "> metabolism </a> </p> <a href="https://publications.waset.org/abstracts/23207/cellular-energy-metabolism-decreases-with-age-in-the-trophocytes-and-oenocytes-of-honeybees-apis-mellifera" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23207.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1186</span> Disclosure in the Defence of Sexual Assault</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tony%20Zipp">Tony Zipp</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will identify developments in the law in British Columbia, Canada, to disclosure to be provided to the defense in cases of sexual misconduct and sexual assault. Disclosure is the keystone to providing a full and robust defense to such charges. The investigation of sexual misconduct and sexual assault involving children usually involves multiple government agencies. This includes child welfare agencies, police and other social service participants. This paper will examine situations in which Courts have ordered disclosure of material from non-police agencies in criminal cases of charges of sexual assault when that material is ‘obviously relevant’ to the charges to enable the defense to present full answer and defense to the charges. The methodology of the oral presentation/paper will be a case analysis of decisions of the Supreme Court of British Columbia, the British Columbia Court of Appeal and the Supreme Court of Canada in the area of disclosure to the defense in criminal trials, including those for sexual assault and sexual misconduct. The emphasis will be on the decisions that expand the disclosure available. The robust defense of these charges is significant to the rule of law as it engenders public confidence in the Judicial system by remembering to protect the innocent while prosecuting these allegations. As such, disclosure is fundamental to human rights and human security. Human rights and human security cannot exclusively be confined to alleged victims but must also protect the rights of those charged to a fair Judicial process. This oral presentation/paper will illustrate that fulsome disclosure enhances the rule of law and law enforcement rather than hinders the prosecution of charges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence" title="defence">defence</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20assault" title=" sexual assault"> sexual assault</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20misconduct" title=" sexual misconduct"> sexual misconduct</a> </p> <a href="https://publications.waset.org/abstracts/189376/disclosure-in-the-defence-of-sexual-assault" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189376.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">24</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=40">40</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=41">41</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cellular%20defense&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>