129 research outputs found

    The role of PHF5A in cancer: A review and update

    Full text link
    PHF5A is a member of the zinc-finger proteins. To advance knowledge on their role in carcinogenesis, data from experimental studies, animal models and clinical studies in different tumorigenesis have been reviewed. Furthermore, PHF5A as an oncogenic function, is frequently expressed in tumor cells and a potential prognostic marker for different cancers. PHF5A is implicated in the regulation of cancer cell proliferation, invasion, migration and metastasis. Knockdown of PHF5A prevented the invasion and metastasis of tumor cells. Here, the role of PHF5A in different cancers and their possible mechanism in relation to recent literature is reviewed and discussed. However, there is an open promising perspective to their therapeutic management for different cancer types.Comment: 18 pages, 1 figure, 2 table

    Roadmap toward Smart Grids in Hydro and Thermal Power System : A Case study of the Ghanaian Power System

    Get PDF
    The evolution of Smart Grid flings fresh applications and opportunities to enhance the efficiency of power distribution networks. Network operators have the opportunity to make use of different sources of power. Communication between the network operators and the consumersis constantly permitted to allow optimization and balancing of energy usage. This paper seeks to evaluate the state of the Ghanaian Electric Distribution Network with respect to Smart Grid. We evaluate the performance of the traditional distribution network since its partial incorporation with the Smart Grid elements. The operations of the Supervisory Control and Data Acquisition, the Automated Meter Infrastructure and Circuit Breakers are specifically addressed. Road map to optimizing the distribution network in Ghana is presented. It is concluded that optimizing these key elements will transform the role of the distribution system and ensure a safe and reliable power network.©2020 IJAREEIE.fi=vertaisarvioimaton|en=nonPeerReviewed

    Proposed algorithm for smart grid DDoS detection based on deep learning

    Get PDF
    The Smart Grid’s objective is to increase the electric grid’s dependability, security, and efficiency through extensive digital information and control technology deployment. As a result, it is necessary to apply real-time analysis and state estimation-based techniques to ensure efficient controls are implemented correctly. These systems are vulnerable to cyber-attacks, posing significant risks to the Smart Grid’s overall availability due to their reliance on communication technology. Therefore, effective intrusion detection algorithms are required to mitigate such attacks. In dealing with these uncertainties, we propose a hybrid deep learning algorithm that focuses on Distributed Denial of Service attacks on the communication infrastructure of the Smart Grid. The proposed algorithm is hybridized by the Convolutional Neural Network and the Gated Recurrent Unit algorithms. Simulations are done using a benchmark cyber security dataset of the Canadian Institute of Cybersecurity Intrusion Detection System. According to the simulation results, the proposed algorithm outperforms the current intrusion detection algorithms, with an overall accuracy rate of 99.7%.© 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).fi=vertaisarvioitu|en=peerReviewed

    Cyber Security in Power Systems Using Meta-Heuristic and Deep Learning Algorithms

    Get PDF
    Supervisory Control and Data Acquisition system linked to Intelligent Electronic Devices over a communication network keeps an eye on smart grids’ performance and safety. The lack of algorithms protecting the power system communication protocols makes them vulnerable to cyberattacks, which can result in a hacker introducing false data into the operational network. This can result in delayed attack detection, which might harm the infrastructure, cause financial loss, or even result in fatalities. Similarly, attackers may be able to feed the system with fake information to hoax the operator and the algorithm into making bad decisions at crucial moments. This paper attempts to identify and classify such cyber-attacks by using numerous deep learning algorithms and optimizing the data features with a metaheuristic algorithm. We proposed a Restricted Boltzmann Machine-based nature-inspired artificial root foraging optimization algorithm. Using a publicly available dataset produced in Mississippi State University’s Oak Ridge National Laboratory, simulations are run on the Jupiter Notebook. Traditional supervised machine learning algorithms like Artificial Neural Networks, Convolutional Neural Networks, and Support Vector Machines are measured with the proposed algorithm to demonstrate the effectiveness of the algorithms. Simulations show that the proposed algorithm produced superior results, with an accuracy of 97.8% for binary classification, 95.6% for three-class classification, and 94.3% for multi-class classification. Thereby outperforming its counterpart algorithms in terms of accuracy, precision, recall, and f1 score.©2023 Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/fi=vertaisarvioitu|en=peerReviewed

    On the performance metrics for cyber-physical attack detection in smart grid

    Get PDF
    Supervisory Control and Data Acquisition (SCADA) systems play an important role in Smart Grid. Though the rapid evolution provides numerous advantages it is one of the most desired targets for malicious attackers. So far security measures deployed for SCADA systems detect cyber-attacks, however, the performance metrics are not up to the mark. In this paper, we have deployed an intrusion detection system to detect cyber-physical attacks in the SCADA system concatenating the Convolutional Neural Network and Gated Recurrent Unit as a collective approach. Extensive experiments are conducted using a benchmark dataset to validate the performance of the proposed intrusion detection model in a smart metering environment. Parameters such as accuracy, precision, and false-positive rate are compared with existing deep learning models. The proposed concatenated approach attains 98.84% detection accuracy which is much better than existing techniques.©The Author(s) 2022 This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.fi=vertaisarvioitu|en=peerReviewed

    Evaluation of Optimization Algorithms for Customers Load Schedule

    Get PDF
    This paper introduces a novel concept for customer load scheduling in the Smart Grid (SG). The concept is based on the forthcoming internet of things (IoT). Approximate optimization algorithms are deduced for optimum customer load scheduling, maximization of electric power suppliers performance, and fairness in scheduling customers load. Using these approximate optimization algorithms as constraints, some loads are given priority. Other loads are scheduled in order to control the maximum demand load and electricity bills. To evaluate the effectiveness of the algorithms, we utilize the Mixed Integer Linear Programming (MILP). Simulations are carried out and the impact on reducing the peak-to-average power ratio (PAPR), the electricity bills, and ensuring fairness in customers load schedules are investigated. Simulation results establish that our algorithms significantly cut down on electricity bills, maximizes utility performance, and deliver fairness in customers load schedules.©2021 International Association of Engineers (IAENG).fi=vertaisarvioitu|en=peerReviewed

    Radical Cyclization of Trichloroacetamides: Synthesis of Lactams

    Get PDF
    Trichloroacetamides can act as radical precursors to synthesize nitrogen-containing heterocycles in a variety of processes, mainly involving atom transfer radical cyclizations (ATRC), mediated by Cu(I) or Ru(II) catalysts, and the hydride reductive method, employing either Bu3SnH or (Me3Si)3SiH, or recently NaBH3CN. Additionally, amine-mediated single-electron transfer cyclizations, as well as radical processes promoted by Ni, Fe, Mn, Ti, and Ag, have been developed

    Cytotoxic Assessment of 3,3-Dichloro-β-Lactams Prepared through Microwave-Assisted Benzylic C-H Activation from Benzyl-Tethered Trichloroacetamides Catalyzed by RuCl2(PPh3)3

    Full text link
    Natural and synthetic ß -lactam derivatives constitute an interesting class of compounds due to their diverse biological activity. Mostly used as antibiotics, they were also found to have antitubercular, anticancer and antidiabetic activities, among others. In this investigation, six new 3,3-dichloro-ß -lactams prepared in a previous work were evaluated for their hemolytic and cytotoxic properties. The results showed that the proposed compounds have non-hemolytic properties and exhibited an interesting cytotoxic activity toward squamous cell carcinoma (A431 cell line), which was highly dependent on the structure and concentration of these -lactams. Among the molecules tested, 2b was the most cytotoxic, with the lowest IC50 values (30-47 µg/mL) and a promising selectivity against the tumor cells compared with non-tumoral cells

    Synthesis of Normorphans through an Efficient Intramolecular Carbamoylation of Ketones

    Get PDF
    An unexpected C-C bond cleavage was observed in trichloroacetamide-tethered ketones under amine treatment and exploited to develop a new synthesis of normophans from 4-amidocyclohexanones. The reaction involves an unprecedented intramolecular haloform-type reaction of trichloroacetamides promoted by enamines (generated in situ from ketones) as counter-reagents. The methodology was applied to the synthesis of compounds embodying the 6-azabicyclo[3.2.1]octane framework
    corecore