Gastric cancer with mutations in the human epidermal growth factor receptor (HER2) can be regarded as one of the leading causes of cancer mortality in the world. Targeted tyrosine kinase inhibitors (TKIs) developed against HER2 yielded optimistic results in improving patients' survival rates and life quality. Nevertheless, drug resistance can influence the critical supportive documents of treatment plans and decrease the treatment effectiveness after about one year. Predicting the efficacy of HER2-TKI drugs or therapies for patients with HER2-mutated gastric cancer is a critical research field. In the present study, a personalized drug response prediction model based on molecular dynamics simulations and machine learning is presented to predict response to first-generation drugs approved by the Ministry of Health in patients with gastric cancer. In the molecular dynamics simulation, the patient's mutation status is considered. The patient's unique mutation status was modeled using molecular dynamics simulations to extract geometric features at the molecular level.Furthermore, additional clinical features are incorporated into the machine learning model to predict drug response. The complete features encompass demographic and clinical characteristics, geometrical properties of the drug-target binding site, and binding free energy (RBFE) of the drug-target complex from molecular dynamics simulations. Drug response prediction utilizes the XGBoost classifier, which achieved leading-edge performance for a 4-level drug response prediction task (PDRP) with 97.5% accuracy, 93% sensitivity, 96.5% specificity, and 94% F1 score. The present research has demonstrated that modeling the binding cavity geometry, in tandem with the binding free energy, can effectively predict drug response. Interestingly, the clinical information, while significant, did not significantly influence the model's performance. This exciting finding opens up new avenues for testing the proposed model on various types of cancers, potentially revolutionizing drug development strategies. DOI: https://doi.org/10.52783/pst.391
{"title":"Predicting Drug Resistance in Gastric Cancer with Mutation in the Human Epidermal Growth Factor Receptor 2 (HER2) And Machine Learning Technique","authors":"Elham Soltanian","doi":"10.52783/pst.391","DOIUrl":"https://doi.org/10.52783/pst.391","url":null,"abstract":"Gastric cancer with mutations in the human epidermal growth factor receptor (HER2) can be regarded as one of the leading causes of cancer mortality in the world. Targeted tyrosine kinase inhibitors (TKIs) developed against HER2 yielded optimistic results in improving patients' survival rates and life quality. Nevertheless, drug resistance can influence the critical supportive documents of treatment plans and decrease the treatment effectiveness after about one year. Predicting the efficacy of HER2-TKI drugs or therapies for patients with HER2-mutated gastric cancer is a critical research field. In the present study, a personalized drug response prediction model based on molecular dynamics simulations and machine learning is presented to predict response to first-generation drugs approved by the Ministry of Health in patients with gastric cancer. In the molecular dynamics simulation, the patient's mutation status is considered. The patient's unique mutation status was modeled using molecular dynamics simulations to extract geometric features at the molecular level.Furthermore, additional clinical features are incorporated into the machine learning model to predict drug response. The complete features encompass demographic and clinical characteristics, geometrical properties of the drug-target binding site, and binding free energy (RBFE) of the drug-target complex from molecular dynamics simulations. Drug response prediction utilizes the XGBoost classifier, which achieved leading-edge performance for a 4-level drug response prediction task (PDRP) with 97.5% accuracy, 93% sensitivity, 96.5% specificity, and 94% F1 score.\u0000The present research has demonstrated that modeling the binding cavity geometry, in tandem with the binding free energy, can effectively predict drug response. Interestingly, the clinical information, while significant, did not significantly influence the model's performance. This exciting finding opens up new avenues for testing the proposed model on various types of cancers, potentially revolutionizing drug development strategies.\u0000DOI: https://doi.org/10.52783/pst.391","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"4 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140971722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Botnets now make up a wide range of cyber-attacks, which are a network of infected computers connected to the Internet, with remote control. So far, a lot of research has been done in this field, the proposed methods are based on the signatures of discovered botnets, anomalies, traffic behavior, and addresses. Each method has both advantages and disadvantages. This research proposes a structure for performing identification operations, which is presented in this research based on the Markov chain and is based on behavioral analysis. A disadvantage of the past methods is the inability to receive network information at a very high speed. In this research, it has tried using a solution to receive traffic at a very high speed of about 40 Gbps and analyze it. To be able to perform the analysis with a lower overhead. The proposed method can investigate the behavior of botnets by examining the area of behavior better than the previous solutions, and as a result, during the solutions used by botnets to hide their behavior, it can counter and identify suspicious flows. The accuracy of the proposed method was found to be 96.170%. DOI: https://doi.org/10.52783/pst.390
{"title":"Botnet detection based on Markov chain and Fuzzy rough set","authors":"Aziz Ezzatneshan","doi":"10.52783/pst.390","DOIUrl":"https://doi.org/10.52783/pst.390","url":null,"abstract":"Botnets now make up a wide range of cyber-attacks, which are a network of infected computers connected to the Internet, with remote control. So far, a lot of research has been done in this field, the proposed methods are based on the signatures of discovered botnets, anomalies, traffic behavior, and addresses. Each method has both advantages and disadvantages. This research proposes a structure for performing identification operations, which is presented in this research based on the Markov chain and is based on behavioral analysis. A disadvantage of the past methods is the inability to receive network information at a very high speed. In this research, it has tried using a solution to receive traffic at a very high speed of about 40 Gbps and analyze it. To be able to perform the analysis with a lower overhead. The proposed method can investigate the behavior of botnets by examining the area of behavior better than the previous solutions, and as a result, during the solutions used by botnets to hide their behavior, it can counter and identify suspicious flows. The accuracy of the proposed method was found to be 96.170%.\u0000DOI: https://doi.org/10.52783/pst.390","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"68 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140972068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manjula G. Hegde, Dr. E. Kavitha, Professor and Head Research Supervisor
Wireless Sensor Network highly exposed to certain security attacks due to various uncertainties of the network which lead to node compromise. Hence considerable attention has been made by researcher during scheduling of the mobile sink to data collection of sensed information from the sensor nodes. Many secure data aggregation mechanism has been proposed to withstand the network against these kind of attack. Despite of many advantageous, those architectures will lead to several limitations such as large propagation delay and high energy consumption and spatial and temporal uncertainties. In order to mitigate those challenges, Light Weight Concurrent Scheduling of Mobile Sink routing protocol towards Minimization of Propagation Delay against Spatial and Temporal Uncertainties of Wireless Sensor Network is designed. It should be capable achieving energy efficiency and collision avoidance due to uncertainty in transmission and reception. Proposed model eliminates the packet collision and poor channel utilization challenges. Initially, node is partitioned and cluster head is selected based on the highest energy density of the node in the particular location. Employing Full duplex channel easily examines the spatial and temporal characteristic of the node through utilization cache information of routing table. It further helps to build the light weight scheme with behavioral strategies of the nodes for secure propagation of the sensed data to the mobile sink. Light weight scheme deployed in mobile sinks estimate the node trustworthiness and simultaneously collects the secure aggregated data packets of the sensor node through cluster head against dynamic time slots concurrently .Comparing with traditional secure routing architecture, simulation results demonstrates that proposed architecture can reduce the propagation delay against various uncertainties and maximizes the life time of the network on increasing the networking performances with respect to packet delivery ratio, throughput and propagation delay. Finally proposed model obtains the cooperative communication of sensor node information to the base station through mobile sink on heterogeneous wireless sensor network environment. DOI: https://doi.org/10.52783/pst.387
{"title":"Light Weight Concurrent Scheduling of Mobile Sink routing protocol towards Minimization of Propagation Delay against Spatial and Temporal Uncertainties of Cluster based Wireless Sensor Network","authors":"Manjula G. Hegde, Dr. E. Kavitha, Professor and Head Research Supervisor","doi":"10.52783/pst.387","DOIUrl":"https://doi.org/10.52783/pst.387","url":null,"abstract":" Wireless Sensor Network highly exposed to certain security attacks due to various uncertainties of the network which lead to node compromise. Hence considerable attention has been made by researcher during scheduling of the mobile sink to data collection of sensed information from the sensor nodes. Many secure data aggregation mechanism has been proposed to withstand the network against these kind of attack. Despite of many advantageous, those architectures will lead to several limitations such as large propagation delay and high energy consumption and spatial and temporal uncertainties. In order to mitigate those challenges, Light Weight Concurrent Scheduling of Mobile Sink routing protocol towards Minimization of Propagation Delay against Spatial and Temporal Uncertainties of Wireless Sensor Network is designed. It should be capable achieving energy efficiency and collision avoidance due to uncertainty in transmission and reception. Proposed model eliminates the packet collision and poor channel utilization challenges. Initially, node is partitioned and cluster head is selected based on the highest energy density of the node in the particular location. Employing Full duplex channel easily examines the spatial and temporal characteristic of the node through utilization cache information of routing table. It further helps to build the light weight scheme with behavioral strategies of the nodes for secure propagation of the sensed data to the mobile sink. Light weight scheme deployed in mobile sinks estimate the node trustworthiness and simultaneously collects the secure aggregated data packets of the sensor node through cluster head against dynamic time slots concurrently .Comparing with traditional secure routing architecture, simulation results demonstrates that proposed architecture can reduce the propagation delay against various uncertainties and maximizes the life time of the network on increasing the networking performances with respect to packet delivery ratio, throughput and propagation delay. Finally proposed model obtains the cooperative communication of sensor node information to the base station through mobile sink on heterogeneous wireless sensor network environment. \u0000DOI: https://doi.org/10.52783/pst.387","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":" 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141128190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel cooperative-based routing protocol designed for underwater Wireless Sensor Network Cloud Applications (uWSNCA). The protocol aims to minimize energy consumption by avoiding void nodes, which are areas without sensor coverage. The proposed approach consists of two main steps: first, avoiding void nodes using an adaptive hop-by-hop vector method, and second, applying a cooperative rule-based adaptive hop-by-hop vector method to create a hybrid algorithm that is more efficient than existing approaches, such as the watch-dog protocol. The research focuses on developing an energy-efficient distributed cooperative routing protocol for wireless sensor networks, specifically tailored for cooperation-based uWSNCA. This is achieved by preventing data packets from being forwarded through void nodes. The proposed routing protocol utilizes cooperation-based adaptive hop-by-hop vector-based forwarding concepts, where sensor nodes forward data packets in a multi-hop fashion within a virtual pipeline. In the developed algorithm for the underwater WSN cloud application, data packets are forwarded in a multi-hop manner using a virtual pipelining mechanism.Nodes outside the virtual pipeline do not forward data packets, thereby reducing flooding in the cooperative WSN. To prevent data packets from being forwarded towards void areas in the WSN, 2-hop information is used at each hop. This approach improves the performance of the wireless sensor network in terms of various performance criteria compared to existing routing protocols. The simulation tool NS2 is used to observe the simulation results of the energy packets being transferred from the source to the sink. The simulation results demonstrate the effectiveness of the proposed methodology. Overall, this paper contributes to the field of underwater WSNs by introducing a novel routing protocol that improves energy efficiency and performance for cloud applications.
{"title":"Design and Development of a Hybrid Cooperative- Based Routing Protocol avoiding the void nodes in WSNs using the Concepts of Minimum Energy Consumption with good Data Security features","authors":"Manjula G. Hegde, Dr.E.Kavitha","doi":"10.52783/pst.374","DOIUrl":"https://doi.org/10.52783/pst.374","url":null,"abstract":"This paper presents a novel cooperative-based routing protocol designed for underwater Wireless Sensor Network Cloud Applications (uWSNCA). The protocol aims to minimize energy consumption by avoiding void nodes, which are areas without sensor coverage. The proposed approach consists of two main steps: first, avoiding void nodes using an adaptive hop-by-hop vector method, and second, applying a cooperative rule-based adaptive hop-by-hop vector method to create a hybrid algorithm that is more efficient than existing approaches, such as the watch-dog protocol. The research focuses on developing an energy-efficient distributed cooperative routing protocol for wireless sensor networks, specifically tailored for cooperation-based uWSNCA. This is achieved by preventing data packets from being forwarded through void nodes. The proposed routing protocol utilizes cooperation-based adaptive hop-by-hop vector-based forwarding concepts, where sensor nodes forward data packets in a multi-hop fashion within a virtual pipeline. In the developed algorithm for the underwater WSN cloud application, data packets are forwarded in a multi-hop manner using a virtual pipelining mechanism.Nodes outside the virtual pipeline do not forward data packets, thereby reducing flooding in the cooperative WSN. To prevent data packets from being forwarded towards void areas in the WSN, 2-hop information is used at each hop. This approach improves the performance of the wireless sensor network in terms of various performance criteria compared to existing routing protocols. The simulation tool NS2 is used to observe the simulation results of the energy packets being transferred from the source to the sink. The simulation results demonstrate the effectiveness of the proposed methodology. Overall, this paper contributes to the field of underwater WSNs by introducing a novel routing protocol that improves energy efficiency and performance for cloud applications.","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":" 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141128789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nguyen Trong, Du, Nguyen Huu, Nguyen Cuong, Van Minh, Hoang Nguyen, Phong Dien
Wind energy is increasingly recognized as a worldwide sustainable and environmentally friendly power source. Nevertheless, an important barrier to further investment in wind energy is the large rate of failure that occurs to turbines. The gearbox, a crucial component, has a major effect on the performance of wind turbines. It consists of complex planetary and cylindrical gear systems, making it prone to failure and causing major defects in wind turbines. Therefore, there is an urgent need to minimize downtime and improve productivity in wind turbine gearbox operations. Recent decades have witnessed growing interest in fault diagnosis of gearboxes due to their widespread use and industry significance. The time synchronous averaging (TSA) method is widely used as a fundamental approach to detect faults in wind turbine gearboxes from mechanical vibration signals. Usually, applying this method requires a device to measure the vibration phase. Nevertheless, there are certain circumstances where installing a phase-measuring device might pose challenges. For instance, if the gearbox operates, it cannot be paused for installation. Additionally, if the gearboxes are enclosed, it becomes difficult to insert the device. The present paper presents an innovative technical approach to improve the time synchornous averaging method without requiring information about phase vibration. It also evaluates the effectiveness of the proposed method using feature values. An experimental test rig was set up to evaluate the algorithm's effectiveness, simulating different gear faults and load conditions.
{"title":"Detect Gear Fault in Wind Turbine Gearbox based on Time Synchornous Averaging Without Phase Signal.","authors":"Nguyen Trong, Du, Nguyen Huu, Nguyen Cuong, Van Minh, Hoang Nguyen, Phong Dien","doi":"10.52783/pst.352","DOIUrl":"https://doi.org/10.52783/pst.352","url":null,"abstract":"Wind energy is increasingly recognized as a worldwide sustainable and environmentally friendly power source. Nevertheless, an important barrier to further investment in wind energy is the large rate of failure that occurs to turbines. The gearbox, a crucial component, has a major effect on the performance of wind turbines. It consists of complex planetary and cylindrical gear systems, making it prone to failure and causing major defects in wind turbines. Therefore, there is an urgent need to minimize downtime and improve productivity in wind turbine gearbox operations. Recent decades have witnessed growing interest in fault diagnosis of gearboxes due to their widespread use and industry significance. The time synchronous averaging (TSA) method is widely used as a fundamental approach to detect faults in wind turbine gearboxes from mechanical vibration signals. Usually, applying this method requires a device to measure the vibration phase. Nevertheless, there are certain circumstances where installing a phase-measuring device might pose challenges. For instance, if the gearbox operates, it cannot be paused for installation. Additionally, if the gearboxes are enclosed, it becomes difficult to insert the device. The present paper presents an innovative technical approach to improve the time synchornous averaging method without requiring information about phase vibration. It also evaluates the effectiveness of the proposed method using feature values. An experimental test rig was set up to evaluate the algorithm's effectiveness, simulating different gear faults and load conditions.","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"40 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141014802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Malik, Sagheer Abbas, Altaf Hussain, Muhammad Saleem, Rahat Qudsi
Smart Car's era ushers in new challenges, some of which are in the field of information security such as wise cyber-attack prevention. Traditional IDS systems would lose everything in such a dynamic environment with their centralized architectures, and this approach could create single points of failure and privacy issues. Along with interconnectedness, cyber security becomes an inevitable problem as smart vehicles are incorporated into a daily life. Traditional security mechanisms usually lack scalability and privacy, which brings about the need to develop alter-nate or innovative methods. This research demonstrates a mixed security system that combines both federated learning and blockchain technologies to improve intrusion detection in smart vehicular networks. We evaluated the effectiveness of this framework using four machine learn-ing models as respectively; Support Vector Machine (SVM), Decision Tree, Neural Network, and Random Forest. Empirical results show that SVM had the highest accuracy of both 93.88% in training and 91.84% in validation, which is higher than Decision Tree, Neural Network, and Random Forest models. These findings evidently demonstrate that the federated learning and blockchain are a strong solution for the plausible security of smart vehicle networks; with SVM being employed mostly in complex security scenarios. DOI: https://doi.org/10.52783/pst.353
{"title":"Next-Generation Protection: Leveraging Federated Learning and Blockchain for Intrusion Detection in Smart Vehicle Network","authors":"J. Malik, Sagheer Abbas, Altaf Hussain, Muhammad Saleem, Rahat Qudsi","doi":"10.52783/pst.353","DOIUrl":"https://doi.org/10.52783/pst.353","url":null,"abstract":"Smart Car's era ushers in new challenges, some of which are in the field of information security such as wise cyber-attack prevention. Traditional IDS systems would lose everything in such a dynamic environment with their centralized architectures, and this approach could create single points of failure and privacy issues. Along with interconnectedness, cyber security becomes an inevitable problem as smart vehicles are incorporated into a daily life. Traditional security mechanisms usually lack scalability and privacy, which brings about the need to develop alter-nate or innovative methods. This research demonstrates a mixed security system that combines both federated learning and blockchain technologies to improve intrusion detection in smart vehicular networks. We evaluated the effectiveness of this framework using four machine learn-ing models as respectively; Support Vector Machine (SVM), Decision Tree, Neural Network, and Random Forest. Empirical results show that SVM had the highest accuracy of both 93.88% in training and 91.84% in validation, which is higher than Decision Tree, Neural Network, and Random Forest models. These findings evidently demonstrate that the federated learning and blockchain are a strong solution for the plausible security of smart vehicle networks; with SVM being employed mostly in complex security scenarios.\u0000DOI: https://doi.org/10.52783/pst.353","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"100 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141015772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abbasali Saffar, Mohammad Ehsanifar, Seyed Mohammad Mirhosseini, Mohammad Javad Taheri
Geopolymer mixtures offer an enhanced alternative to implement an eco-friendly solution in construction industry. These mixtures exhibit similar or better mechanical and structural properties in comprising of cement and can use recycling and by-product materials. Against this background, an eco-friendly advantageous were achieved from the engineers and researchers by using waste materials to replace cement and attention to reduce CO2 emission during its procedure. This study attempted to evaluate compressive and tensile strength, micro structure and post-fire characteristic of the geopolymer mixtures. For this aim, the geopolymer mixtures were exposed to elevated temperature between 200, 500 and 800 0C. Then, the post-fire and mechanical behaviour were investigated. The proposed research supported the slight decrease in the GPC's compressive stress by fibres, and the 1.25% PP fibres displayed the least performance, indicating nearly 13% decrease than the unreinforced mixtures. As exhibited by the post-fire behaviour of mixtures, the GPC's compressive strength increased first for all mixes but in the range of 400 - 800°C it decreased at a higher rate because of the geopolymer matrix-related dehydration. Besides, fiber melting under high temperatures and the thermal reaction procedure related to free water evaporation reduce the mechanical properties under temperatures ranging from 400°C to 800°C. DOI: https://doi.org/10.52783/pst.349
{"title":"Experimental Evaluation of Mechanical Properties, Micro Structure and Post-Fire Strength of Fiber Reinforced Geopolymer Concrete","authors":"Abbasali Saffar, Mohammad Ehsanifar, Seyed Mohammad Mirhosseini, Mohammad Javad Taheri ","doi":"10.52783/pst.349","DOIUrl":"https://doi.org/10.52783/pst.349","url":null,"abstract":"Geopolymer mixtures offer an enhanced alternative to implement an eco-friendly solution in construction industry. These mixtures exhibit similar or better mechanical and structural properties in comprising of cement and can use recycling and by-product materials. Against this background, an eco-friendly advantageous were achieved from the engineers and researchers by using waste materials to replace cement and attention to reduce CO2 emission during its procedure. This study attempted to evaluate compressive and tensile strength, micro structure and post-fire characteristic of the geopolymer mixtures. For this aim, the geopolymer mixtures were exposed to elevated temperature between 200, 500 and 800 0C. Then, the post-fire and mechanical behaviour were investigated. The proposed research supported the slight decrease in the GPC's compressive stress by fibres, and the 1.25% PP fibres displayed the least performance, indicating nearly 13% decrease than the unreinforced mixtures. As exhibited by the post-fire behaviour of mixtures, the GPC's compressive strength increased first for all mixes but in the range of 400 - 800°C it decreased at a higher rate because of the geopolymer matrix-related dehydration. Besides, fiber melting under high temperatures and the thermal reaction procedure related to free water evaporation reduce the mechanical properties under temperatures ranging from 400°C to 800°C.\u0000DOI: https://doi.org/10.52783/pst.349","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141022964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this scientific research is to study the effect of electromagnetic waves of the terahertz range on the frequency of molecular oxygen (129.0 GHz) on the processes of lipid peroxidation in experimental animals under chronic stress. Overtraining is a psychological and/or physiological condition that manifests itself as impairment in athletic performance. This condition may be based on prolonged competitive stress and stressful psychological factors that can lead to the activation of lipid peroxidation processes (LPO). Moreover, the activation of the processes of lipoperoxidation is the main pathogenetic link of many socially significant diseases, especially cardiovascular disease. These circumstances require the development of modern and relevant methods of prevention and treatment of post-stress disorders. In the last ten years, a new method has been used to assess the effect of stress on the pro-oxidant activity of blood plasma and the concentration of antioxidants by exposure to electromagnetic radiation. In this paper electromagnetic waves of terahertz range, at frequencies of active cellular metabolites, were used to correct the processes of lipoperoxidation (LPO) changes at chronic stress. The innovative device "Оrbit" was used to emit Terahertz (THz) radiation at frequencies of molecular oxygen 129,0 GHz in fractional mode. From the marked activation of lipid peroxidation processes and inhibition of antioxidant activity of blood, it is possible to observe a partial normalization, in the conditions of long-term immobilization or through cold water swimming of animals (rats), by using THz waves 5 days for 15 minutes; moreover, if the same procedure was applied for 30 minutes, a complete normalization of lipid peroxidation and antioxidant levels in the blood of stressed animals occurred. The study shows the high efficiency and expediency of using the device for terahertz therapy "Orbit" in the correction of altered processes of lipid peroxidation and it encourages future application for humans. DOI: https://doi.org/10.52783/pst.289
{"title":"The Effect of Electromagnetic Waves of the Terahertz Range on the Frequency of Molecular Oxygen (129.0 Ghz) On the Processes of Lipid Peroxidation in Experimental Animals Under Chronic Stress","authors":"Victoria Zaborova Et.al","doi":"10.52783/pst.289","DOIUrl":"https://doi.org/10.52783/pst.289","url":null,"abstract":"The aim of this scientific research is to study the effect of electromagnetic waves of the terahertz range on the frequency of molecular oxygen (129.0 GHz) on the processes of lipid peroxidation in experimental animals under chronic stress.\u0000Overtraining is a psychological and/or physiological condition that manifests itself as impairment in athletic performance. This condition may be based on prolonged competitive stress and stressful psychological factors that can lead to the activation of lipid peroxidation processes (LPO). Moreover, the activation of the processes of lipoperoxidation is the main pathogenetic link of many socially significant diseases, especially cardiovascular disease. These circumstances require the development of modern and relevant methods of prevention and treatment of post-stress disorders. In the last ten years, a new method has been used to assess the effect of stress on the pro-oxidant activity of blood plasma and the concentration of antioxidants by exposure to electromagnetic radiation. In this paper electromagnetic waves of terahertz range, at frequencies of active cellular metabolites, were used to correct the processes of lipoperoxidation (LPO) changes at chronic stress. The innovative device \"Оrbit\" was used to emit Terahertz (THz) radiation at frequencies of molecular oxygen 129,0 GHz in fractional mode. From the marked activation of lipid peroxidation processes and inhibition of antioxidant activity of blood, it is possible to observe a partial normalization, in the conditions of long-term immobilization or through cold water swimming of animals (rats), by using THz waves 5 days for 15 minutes; moreover, if the same procedure was applied for 30 minutes, a complete normalization of lipid peroxidation and antioxidant levels in the blood of stressed animals occurred. The study shows the high efficiency and expediency of using the device for terahertz therapy \"Orbit\" in the correction of altered processes of lipid peroxidation and it encourages future application for humans.\u0000DOI: https://doi.org/10.52783/pst.289\u0000 ","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":" 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140690962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saeed Mirnejati, Hosein Aslipour, Seyed Mehdi Alvani
Objective: This article uses the ultra-compound method to provide systematic framework of effective factors. Method: Meta-composition method is choosing 470 related articles and research in 2000-2024 from Web of Science citation index. This research is qualitative and interpretive paradigm aiming to discover the characteristics of development policy governance. Also, in terms of research time, it is cross-sectional. Results: The characteristics of this new approach to transition of governance can be seen in four categories; The role of the state, university, society and the market. Each of these four groups also has parts below. Conclusion: The issues of "power and policy developments, policy processes improvement" and "Information exchange,trust and diverse", the researchers have had more and more different research on issues of "qualitative and quantitative development" and "raising of the student's generation" and have not been studied in different dimensions. On this basis and regarding the importance of policy issues, implementation of policies, future research can pay more attention to the recent two dimensions. The findings of this study can be useful for applying new approaches to improve governance transformation in different policy fields. DOI: https://doi.org/10.52783/pst.290
目的本文采用超复合方法提供有效因素的系统框架:方法:采用元组合方法,从 Web of Science 引文索引中选取 2000-2024 年间的 470 篇相关文章和研究。本研究采用定性和解释范式,旨在发现发展政策治理的特点。同时,在研究时间上,本研究为横断面研究:从国家、大学、社会和市场的作用这四个方面可以看出这种新的治理转型方法的特点。这四类中的每一类也都有以下部分:在 "权力与政策发展、政策流程改进 "和 "信息交流、信任与多样化 "等问题上,研究人员对 "质与量的发展 "和 "学生一代的培养 "等问题的研究越来越多,但并没有从不同的维度进行研究。在此基础上,考虑到政策问题、政策实施的重要性,今后的研究可以更多地关注最近的两个维度。本研究的结论有助于在不同政策领域应用新方法来改善治理转型。DOI: https://doi.org/10.52783/pst.290
{"title":"Presenting a Systematic Framework of Factors Influencing the Policy of University Governance Transformation","authors":"Saeed Mirnejati, Hosein Aslipour, Seyed Mehdi Alvani","doi":"10.52783/pst.290","DOIUrl":"https://doi.org/10.52783/pst.290","url":null,"abstract":"Objective: This article uses the ultra-compound method to provide systematic framework of effective factors.\u0000Method: Meta-composition method is choosing 470 related articles and research in 2000-2024 from Web of Science citation index. This research is qualitative and interpretive paradigm aiming to discover the characteristics of development policy governance. Also, in terms of research time, it is cross-sectional.\u0000Results: The characteristics of this new approach to transition of governance can be seen in four categories; The role of the state, university, society and the market. Each of these four groups also has parts below.\u0000Conclusion: The issues of \"power and policy developments, policy processes improvement\" and \"Information exchange,trust and diverse\", the researchers have had more and more different research on issues of \"qualitative and quantitative development\" and \"raising of the student's generation\" and have not been studied in different dimensions. On this basis and regarding the importance of policy issues, implementation of policies, future research can pay more attention to the recent two dimensions. The findings of this study can be useful for applying new approaches to improve governance transformation in different policy fields.\u0000DOI: https://doi.org/10.52783/pst.290","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":" 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140690578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Elma Sibonghanoy Groenewald, María Teresa Espinosa-Jaramillo, Apeksha Garg, Kartik D Pipalia, Dr. Vijayakumar Umasekar, Dr. Coenrad Adolph, Groenewald
The pursuit of a circular economy has emerged as a viable solution to address the environmental and economic challenges posed by traditional linear production and consumption models. In this context, the integration of circular economy principles within supply chain management has garnered attention as a means to achieve zero waste and enhance sustainability. [1],[2] This paper explores the application of circular economy strategies in supply chain management, focusing on the transition towards zero waste. Through a comprehensive analysis of existing literature, case studies, and best practices, the paper examines key principles, challenges, and opportunities associated with adopting circular economy strategies in supply chains. It highlights the importance of design for circularity, resource optimization, collaboration, and integration across supply chain tiers. Furthermore, the paper discusses the role of stakeholders, policy frameworks, and technological advancements in facilitating the transition to a circular economy. By synthesizing insights from various sources, this paper provides a holistic understanding of the implications and benefits of integrating circular economy strategies in supply chain management. Ultimately, it underscores the importance of businesses embracing sustainability and innovation to create more resilient and efficient supply chains while minimizing environmental impact.
{"title":"Circular Economy Strategies in Supply Chain Management: Towards Zero Waste.","authors":"Dr. Elma Sibonghanoy Groenewald, María Teresa Espinosa-Jaramillo, Apeksha Garg, Kartik D Pipalia, Dr. Vijayakumar Umasekar, Dr. Coenrad Adolph, Groenewald","doi":"10.52783/pst.291","DOIUrl":"https://doi.org/10.52783/pst.291","url":null,"abstract":"The pursuit of a circular economy has emerged as a viable solution to address the environmental and economic challenges posed by traditional linear production and consumption models. In this context, the integration of circular economy principles within supply chain management has garnered attention as a means to achieve zero waste and enhance sustainability. [1],[2] This paper explores the application of circular economy strategies in supply chain management, focusing on the transition towards zero waste. Through a comprehensive analysis of existing literature, case studies, and best practices, the paper examines key principles, challenges, and opportunities associated with adopting circular economy strategies in supply chains. It highlights the importance of design for circularity, resource optimization, collaboration, and integration across supply chain tiers. Furthermore, the paper discusses the role of stakeholders, policy frameworks, and technological advancements in facilitating the transition to a circular economy. By synthesizing insights from various sources, this paper provides a holistic understanding of the implications and benefits of integrating circular economy strategies in supply chain management. Ultimately, it underscores the importance of businesses embracing sustainability and innovation to create more resilient and efficient supply chains while minimizing environmental impact.","PeriodicalId":20420,"journal":{"name":"Power system technology","volume":"78 S345","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}