83 research outputs found

    The JK System to Detect Plagiarism

    Get PDF
    In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is used to bring each suspected program back to its initial specification stage. This operation enables us to extract the structure of the program which is an important factor in detecting plagiarism. This can be achieved through the extraction of the Static Execution Tree (SET) for each program. The SET is then transformed into Terminating Binary Sequence (TBS). The TBSs generated from the tested programs are compared in order to get similar branches. Reengineering technique is then applied on these similar branches in order to compute its entropy (information content). The entropy is computed to prove or disprove the existence of similarities between programs. The JK system has been tested on different Java programs with different modifications, and proved successful in detecting almost all cases including those of partially plagiarised programs.Facultad de Informátic

    Prevention Religion Offenses (Delic) In Policy Formulation For National Criminal Justice Reform

    Get PDF
    Religious offenses as crime on the public focuses on the protection of peace religious people is not a religion as the object of protection. However, as the editorial seems that the formulation of the Criminal Code (KUHP) requires the protection of religion. This means that religion is seen as a legal interest or an object that must be protected. Thus there is disharmony between the status and description of the offense with text or formulas offense. In the prevention efforts of religion especially have relationship with criminal law policy formulation in the future in the prevention religious offense in the RUU KUHP 2008 is formulated as a crime against religion and relating to religion or to the religious life. Keywords: Offences Religion, Policy Formulation, Prevention, National Criminal Justice Reform.

    Correlating liposomal adjuvant characteristics to in-vivo cell-mediated immunity using a novel Mycobacterium tuberculosis fusion protein : a multivariate analysis study

    Get PDF
    OBJECTIVE: In this study, we have used a chemometrics-based method to correlate key liposomal adjuvant attributes with in-vivo immune responses based on multivariate analysis. METHODS: The liposomal adjuvant composed of the cationic lipid dimethyldioctadecylammonium bromide (DDA) and trehalose 6,6-dibehenate (TDB) was modified with 1,2-distearoyl-sn-glycero-3-phosphocholine at a range of mol% ratios, and the main liposomal characteristics (liposome size and zeta potential) was measured along with their immunological performance as an adjuvant for the novel, postexposure fusion tuberculosis vaccine, Ag85B-ESAT-6-Rv2660c (H56 vaccine). Partial least square regression analysis was applied to correlate and cluster liposomal adjuvants particle characteristics with in-vivo derived immunological performances (IgG, IgG1, IgG2b, spleen proliferation, IL-2, IL-5, IL-6, IL-10, IFN-γ). KEY FINDINGS: While a range of factors varied in the formulations, decreasing the 1,2-distearoyl-sn-glycero-3-phosphocholine content (and subsequent zeta potential) together built the strongest variables in the model. Enhanced DDA and TDB content (and subsequent zeta potential) stimulated a response skewed towards a cell mediated immunity, with the model identifying correlations with IFN-γ, IL-2 and IL-6. CONCLUSION: This study demonstrates the application of chemometrics-based correlations and clustering, which can inform liposomal adjuvant design

    The JK System to Detect Plagiarism

    Get PDF
    In this research a system, referred to as Jubair-Khaireddin (JK), has been developed to assess the degree of similarity between two programs even though they look superficially dissimilar. The JK system has the capability to detect deliberate attempts of plagiarism. Reverse engineering technique is used to bring each suspected program back to its initial specification stage. This operation enables us to extract the structure of the program which is an important factor in detecting plagiarism. This can be achieved through the extraction of the Static Execution Tree (SET) for each program. The SET is then transformed into Terminating Binary Sequence (TBS). The TBSs generated from the tested programs are compared in order to get similar branches. Reengineering technique is then applied on these similar branches in order to compute its entropy (information content). The entropy is computed to prove or disprove the existence of similarities between programs. The JK system has been tested on different Java programs with different modifications, and proved successful in detecting almost all cases including those of partially plagiarised programs.Facultad de Informátic

    Software Agent Simulation Design on the Efficiency of Food Delivery

    Get PDF
    Food delivery services have gained popularity since the emergence of online food delivery. Since the recent pandemic, the demand for service has increased tremendously. Due to several factors that affect how much time additional riders spend on the road; food delivery companies have no control over the location or timing of the delivery riders. There is a need to study and understand the food delivery riders' efficiency to estimate the service system's capacity. The study can ensure that the capacity is sufficient based on the number of orders, which usually depends on the number of potential customers within a territory and the time each rider takes to deliver the orders successfully. This study is an opportunity to focus on the efficiency of the riders since there is not much work at the operational level of the food delivery structure. This study takes up the opportunity to design a software agent simulation on the efficiency of riders' operations in food service due to the lack of simulation to predict this perspective, which could be extended to efficiency prediction. The results presented in this paper are based on the system design phase using the Tropos methodology. At movement in the simulation, the graph of the efficiency is calculated. Upon crossing the threshold, it is considered that the rider agents have achieved the efficiency rate required for decision-making. The simulation's primary operations depend on frontline remotely mobile workers like food delivery riders. It can benefit relevant organizations in decision-making during strategic capacity planning

    Verticalization of bacterial biofilms

    Full text link
    Biofilms are communities of bacteria adhered to surfaces. Recently, biofilms of rod-shaped bacteria were observed at single-cell resolution and shown to develop from a disordered, two-dimensional layer of founder cells into a three-dimensional structure with a vertically-aligned core. Here, we elucidate the physical mechanism underpinning this transition using a combination of agent-based and continuum modeling. We find that verticalization proceeds through a series of localized mechanical instabilities on the cellular scale. For short cells, these instabilities are primarily triggered by cell division, whereas long cells are more likely to be peeled off the surface by nearby vertical cells, creating an "inverse domino effect". The interplay between cell growth and cell verticalization gives rise to an exotic mechanical state in which the effective surface pressure becomes constant throughout the growing core of the biofilm surface layer. This dynamical isobaricity determines the expansion speed of a biofilm cluster and thereby governs how cells access the third dimension. In particular, theory predicts that a longer average cell length yields more rapidly expanding, flatter biofilms. We experimentally show that such changes in biofilm development occur by exploiting chemicals that modulate cell length.Comment: Main text 10 pages, 4 figures; Supplementary Information 35 pages, 15 figure

    Targeting Aquaporin-4 Subcellular Localization to Treat Central Nervous System Edema

    Get PDF
    Swelling of the brain or spinal cord (CNS edema) affects millions of people every year. All potential pharmacological interventions have failed in clinical trials, meaning that symptom management is the only treatment option. The water channel protein aquaporin-4 (AQP4) is expressed in astrocytes and mediates water flux across the blood-brain and blood-spinal cord barriers. Here we show that AQP4 cell-surface abundance increases in response to hypoxia-induced cell swelling in a calmodulin-dependent manner. Calmodulin directly binds the AQP4 carboxyl terminus, causing a specific conformational change and driving AQP4 cell-surface localization. Inhibition of calmodulin in a rat spinal cord injury model with the licensed drug trifluoperazine inhibited AQP4 localization to the blood-spinal cord barrier, ablated CNS edema, and led to accelerated functional recovery compared with untreated animals. We propose that targeting the mechanism of calmodulin-mediated cell-surface localization of AQP4 is a viable strategy for development of CNS edema therapies

    Assessing water permeability of aquaporins in a proteoliposome-based stopped-flow setup

    Get PDF
    Aquaporins (AQPs) are water channels embedded in the cell membrane that are critical in maintaining water homeostasis. We describe a protocol for determining the water permeation capacity of AQPs reconstituted into proteoliposomes. Using a stopped-flow setup, AQP embedded in proteoliposomes are exposed to an osmogenic gradient that triggers water flux. The consequent effects on proteoliposome size can be tracked using the fluorescence of an internalized fluorophore. This enables controlled characterization of water flux by AQPs. For complete details on the use and execution of this protocol, please refer to Kitchen et al. (2020). [Abstract copyright: © 2022 The Authors.
    corecore