118 research outputs found

    CSS-Tutor: An Intelligent Tutoring System for CSS and HTML

    Get PDF
    In this paper we show how a student can learn the basics of the system databases using (W3school CSS) which was built as intelligent tutoring educational system by using the authoring tool called (ITSB). The learning material contains CSS and HTML. We divided the material in a group of lessons for novice learner which combines relational system and lessons in the process of learning. The student can learn using example of CSS, and types of CSS color. Furthermore, the intelligent tutoring system supports not only lessons; but exercises of different difficult levels for each lesson. When a student finish successfully the first difficulty level in a lesson, the student is allowed to move to the next difficulty level of the exercises of the lesson

    Bradford Multi-Modal Gait Database: Gateway to Using Static Measurements to Create a Dynamic Gait Signature

    Get PDF
    YesAims: To create a gait database with optimum accuracy of joint rotational data and an accu-rate representation of 3D volume, and explore the potential of using the database in studying the relationship between static and dynamic features of a human’s gait. Study Design: The study collected gait samples from 38 subjects, in which they were asked to walk, run, walk to run transition, and walk with a bag. The motion capture, video, and 3d measurement data extracted was used to analyse and build a correlation between features. Place and Duration of Study: The study was conducted in the University of Bradford. With the ethical approval from the University, 38 subjects’ motion and body volumes were recorded at the motion capture studio from May 2011- February 2013. Methodology: To date, the database includes 38 subjects (5 females, 33 males) conducting walk cycles with speed and load as covariants. A correlation analysis was conducted to ex-plore the potential of using the database to study the relationship between static and dynamic features. The volumes and surface area of body segments were used as static features. Phased-weighted magnitudes extracted through a Fourier transform of the rotation temporal data of the joints from the motion capture were used as dynamic features. The Pearson correlation coefficient is used to evaluate the relationship between the two sets of data. Results: A new database was created with 38 subjects conducting four forms of gait (walk, run, walk to run, and walking with a hand bag). Each subject recording included a total of 8 samples of each form of gait, and a 3D point cloud (representing the 3D volume of the subject). Using a Pvalue (P<.05) as a criterion for statistical significance, 386 pairs of features displayed a strong relationship. Conclusion: A novel database available to the scientific community has been created. The database can be used as an ideal benchmark to apply gait recognition techniques, and based on the correlation analysis, can offer a detailed perspective of the dynamics of gait and its relationship to volume. Further research in the relationship between static and dynamic features can contribute to the field of biomechanical analysis, use of biometrics in forensic applications, and 3D virtual walk simulation

    Forensics Writer Identification using Text Mining and Machine Learning

    Get PDF
    Constant technological growth has resulted in the danger and seriousness of cyber-attacks, which has recently unmistakably developed in various institutions that have complex Information Technology (IT) infrastructure. For instance, for the last three (3) years, the most horrendous instances of cybercrimes were perceived globally with enormous information breaks, fake news spreading, cyberbullying, crypto-jacking, and cloud computing services. To this end, various agencies improvised techniques to curb this vice and bring perpetrators, both real and perceived, to book in relation to such serious cybersecurity issues. Consequently, Forensic Writer Identification was introduced as one of the most effective remedies to the concerned issue through a stylometry application. Indeed, the Forensic Writer Identification is a complex forensic science technology that utilizes Artificial Intelligence (AI) technology to safeguard, recognize proof, extraction, and documentation of the computer or digital explicit proof that can be utilized by the official courtroom, especially, the investigative officers in case of a criminal issue or just for data analytics. This research\u27s fundamental objective was to scrutinize Forensic Writer Identification technology aspects in twitter authorship analytics of various users globally and apply it to reduce the time to find criminals by providing the Police with the most accurate methodology. As well as compare the accuracy of different techniques. The report shall analytically follow a logical literature review that observes the vital text analysis techniques. Additionally, the research applied agile text mining methodology to extract and analyze various Twitter users\u27 texts. In essence, digital exploration for appropriate academics and scholarly artifacts was affected in various online and offline databases to expedite this research. Forensic Writer Identification for text extraction, analytics have recently appreciated reestablished attention, with extremely encouraging outcomes. In fact, this research presents an overall foundation and reason for text and author identification techniques. Scope of current techniques and applications are given, additionally tending to the issue of execution assessment. Results on various strategies are summed up, and a more inside and out illustration of two consolidated methodologies are introduced. By encompassing textural, algorithms, and allographic, emerging technologies are beginning to show valuable execution levels. Nevertheless, user acknowledgment would play a vital role with regards to the future of technology. To this end, the goal of coming up with a project proposal was to come up with an analytical system that would automate the process of authorship identification methodology in various Web 2.0 Technologies aspects globally, hence addressing the contemporary cybercrime issues

    Strategic HRM effectiveness in the case of Four Seasons Hotel -

    Get PDF
    Project. M.H.R.M. American University of Beirut. Suliman S. Olayan School of Business, 2015. Pj:1839First Reader : Dr. Bettina Bastian, Assistant Professor, Suliman S. Olayan School of Business ; Second Reader : Dr. Fida Afiouni, Assistant Professor, Suliman S. Olayan School of Business.Includes bibliographical references (leaves 39-42)As strategic human resources management (SHRM) begins to flourish in the Middle East North Africa (MENA) region, Four Seasons Hotel in Beirut serves as an example of a pioneer company that has delved into SHRM implementation and began to reap the successes of being strategic in their HR practices. As we take a look at Lebanon, as part of the MENA region, we find several challenges that pose the hospitality industry in particular. This case includes a large theoretical section discussing SHRM globally and in the MENA as well as background on Lebanon, to give readers insight on the contextual challenges that surround Four Seasons-Beirut. Afterwards, the case dissects five overarching issues in HR that are posed to Four Seasons-Beirut, and describes for each the challenge as well as the initiative taken by Four Seasons to overcome those difficulties

    Methyl 2-(5-fluoro-1H-indol-3-yl)-2-oxoacetate

    Get PDF
    The indolyl portion of the title mol­ecule, C11H8FNO3, is flat, the five- and six-membered rings making a dihedral angle of 0.815 (6)°. Inter­molecular N—H⋯O hydrogen bonds link adjacent mol­ecules into a linear chain. Slipped π–π stacking inter­actions between two neighboring indole groups further consolidate the mol­ecules into a three-dimensional supra­molecular architecture [centroid–centroid distances = 3.555 (10) and 3.569 (10) Å]

    An outline on the global insights of implementation and challenges in primary healthcare telemedicine

    Get PDF
    Background: The utilization of telephone consultation (TC) has seen a significant increase of up to 86% since the start of the COVID-19 pandemic. In order to bridge the existing knowledge gap by examining the usage and efficacy of telephone or virtual consultations in a clinical setting during the COVID-19 lockdown, the objective of the current review is to gain a comprehensive understanding of the advantages and limitations of TC in the light of physicians and familial perspectives to enlighten future healthcare planning and decision-making. Methods: The data utilized in this research spanning the period of COVID-19 and other studies related to TC that occurred before the onset of the pandemic were gathered from a variety of reputable sources, such as Pubmed, Pubmed Central, Google Scholar, Research Gate, and Science Direct with the pre-established eligibility criteria and relevant keywords. Results: Studies revealed that the incorporation of teleconsultation has demonstrated numerous benefits for patients, including effective handling of data, fair accessibility, and adherence to standardized care protocols. Nonetheless, the implementation of TC also presents obstacles such as insufficiently trained staff, technical hurdles like connectivity issues and unreliable internet connections, and the possibility of erroneous diagnoses. Conclusions: During the COVID-19 phase, TC has proven effective with fewer limitations that can be minimized by training the healthcare staff and overcoming technical issues

    Required minimal protein domain of flower for synaptobrevin2 endocytosis in cytotoxic T cells

    Get PDF
    Flower, a highly conserved protein, crucial for endocytosis and cellular ftness, has been implicated in cytotoxic T lymphocyte (CTL) killing efciency through its role in cytotoxic granule (CG) endocytosis at the immune synapse (IS). This study explores the molecular cues that govern Flower-mediated CG endocytosis by analyzing uptake of Synaptobrevin2, a protein specifc to CG in mouse CTL. Using immunogold electron microscopy and total internal fuorescence microscopy, we found that Flower translocates in a stimulus-dependent manner from small vesicles to the IS, thereby ensuring specifcity in CG membrane protein recycling. Using confocal live-cell imaging, we assessed the ability of a range of naturally occurring mouse, human and Drosophila isoforms to rescue defective endocytosis in Flower KO CTLs. This analysis demonstrated that the N-terminal portion of the protein, encompassing amino acids 1–106 in mice, is the minimal domain necessary for Synaptobrevin2 endocytosis. Additionally, we identifed two pivotal sites through site-specifc mutation: a putative AP2- binding site, and a tyrosine at position 104 in mouse Flower. These fndings provide insights into Flower's specifc functional domain essential for CG endocytosis, which is a key process in mediating T cell serial killing required for the efective fght against cancer

    Activation-induced thrombospondin-4 works with thrombospondin-1 to build cytotoxic supramolecular attack particles

    Get PDF
    Cytotoxic attack particles released by CTLs and NK cells include diverse phospholipid membrane and glycoprotein encapsulated entities that contribute to target cell killing. Supramolecular attack particles (SMAPs) are one type of particle characterized by a cytotoxic core enriched in granzymes and perforin surrounded by a proteinaceous shell including thrombospondin (TSP)-1. TSP-4 was also detected in bulk analysis of SMAPs released by CTLs; however, it has not been investigated whether TSP-4 contributes to distinct SMAP types or the same SMAP type as TSP-1 and, if in the same type of SMAP, whether TSP-4 and TSP-1 cooperate or compete. Here, we observed that TSP-4 expression increased upon CD8+ T cell activation while, surprisingly, TSP-1 was down-regulated. Correlative Light and Electron Microscopy and Stimulated Emission Depletion microscopy localized TSP-4 and TSP-1 in SMAP-containing multicore granules. Superresolution dSTORM revealed that TSP-4 and TSP-1 are usually enriched in the same SMAPs while particles with single-positive shells are rare. Retention Using Selective Hooks assays showed that TSP-4 localizes to the lytic granules faster than TSP-1 and promotes its accumulation therein. TSP-4 contributed to direct CTL-mediated killing, as previously shown for TSP-1. TSP-4 and TSP-1 were both required for latent SMAP-mediated cell killing, in which released SMAPs kill targets after removal of the CTLs. Of note, we found that chronic lymphocytic leukemia (CLL) cell culture supernatants suppressed expression of TSP-4 in CTL and latent SMAP-mediated killing. These results identify TSP-4 as a functionally important component of SMAPs and suggest that SMAPs may be targeted for immune suppression by CLL

    One-step nanoscale expansion microscopy reveals individual protein shapes

    Get PDF
    The attainable resolution of fluorescence microscopy has reached the subnanometer range, but this technique still fails to image the morphology of single proteins or small molecular complexes. Here, we expand the specimens at least tenfold, label them with conventional fluorophores and image them with conventional light microscopes, acquiring videos in which we analyze fluorescence fluctuations. One-step nanoscale expansion (ONE) microscopy enables the visualization of the shapes of individual membrane and soluble proteins, achieving around 1-nm resolution. We show that conformational changes are readily observable, such as those undergone by the ~17-kDa protein calmodulin upon Ca2+ binding. ONE is also applied to clinical samples, analyzing the morphology of protein aggregates in cerebrospinal fluid from persons with Parkinson disease, potentially aiding disease diagnosis. This technology bridges the gap between high-resolution structural biology techniques and light microscopy, providing new avenues for discoveries in biology and medicine
    corecore