56 research outputs found

    Rohelisema tarkvaratehnoloogia poole tarkvaraanalĂŒĂŒsi abil

    Get PDF
    Mobiilirakendused, mis ei tĂŒhjenda akut, saavad tavaliselt head kasutajahinnangud. Mobiilirakenduste energiatĂ”husaks muutmiseks on avaldatud mitmeid refaktoreerimis- suuniseid ja tööriistu, mis aitavad rakenduse koodi optimeerida. Neid suuniseid ei saa aga seoses energiatĂ”hususega ĂŒldistada, sest kĂ”igi kontekstide kohta ei ole piisavalt energiaga seotud andmeid. Olemasolevad energiatĂ”hususe parandamise tööriistad/profiilid on enamasti prototĂŒĂŒbid, mis kohalduvad ainult vĂ€ikese alamhulga energiaga seotud probleemide suhtes. Lisaks kĂ€sitlevad olemasolevad suunised ja tööriistad energiaprobleeme peamiselt a posteriori ehk tagantjĂ€rele, kui need on juba lĂ€htekoodi sees. Android rakenduse koodi saab pĂ”hijoontes jagada kaheks osaks: kohandatud kood ja korduvkasutatav kood. Kohandatud kood on igal rakendusel ainulaadne. Korduvkasutatav kood hĂ”lmab kolmandate poolte teeke, mis on rakendustesse lisatud arendusprotessi kiirendamiseks. Alustuseks hindame mitmete lĂ€htekoodi halbade lĂ”hnade refaktoreerimiste energiatarbimist Androidi rakendustes. SeejĂ€rel teeme empiirilise uuringu Androidi rakendustes kasutatavate kolmandate osapoolte vĂ”rguteekide energiamĂ”ju kohta. Pakume ĂŒldisi kontekstilisi suuniseid, mida vĂ”iks rakenduste arendamisel kasutada. Lisaks teeme sĂŒstemaatilise kirjanduse ĂŒlevaate, et teha kindlaks ja uurida nĂŒĂŒdisaegseid tugitööriistu, mis on rohelise Androidi arendamiseks saadaval. Selle uuringu ja varem lĂ€bi viidud katsete pĂ”hjal toome esile riistvarapĂ”histe energiamÔÔtmiste jÀÀdvustamise ja taasesitamise probleemid. Arendame tugitööriista ARENA, mis vĂ”ib aidata koguda energiaandmeid ja analĂŒĂŒsida Androidi rakenduste energiatarbimist. Viimasena töötame vĂ€lja tugitööriista REHAB, et soovitada arendajatele energiatĂ”husaid kolmanda osapoole vĂ”rguteekeMobile apps that do not drain the battery usually get good user ratings. To make mobile apps energy efficient many refactoring guidelines and tools are published that help optimize the app code. However, these guidelines cannot be generalized w.r.t energy efficiency, as there is not enough energy-related data for every context. Existing energy enhancement tools/profilers are mostly prototypes applicable to only a small subset of energy-related problems. In addition, the existing guidelines and tools mostly address the energy issues a posteriori, i.e., once they have already been introduced into the code. Android app code can be roughly divided into two parts: the custom code and the reusable code. Custom code is unique to each app. Reusable code includes third-party libraries that are included in apps to speed up the development process. We start by evaluating the energy consumption of various code smell refactorings in native Android apps. Then we conduct an empirical study on the energy impact of third-party network libraries used in Android apps. We provide generalized contextual guidelines that could be used during app development Further, we conduct a systematic literature review to identify and study the current state of the art support tools available to aid green Android development. Based on this study and the experiments we conducted before, we highlight the problems in capturing and reproducing hardware-based energy measurements. We develop the support tool ‘ARENA’ that could help gather energy data and analyze the energy consumption of Android apps. Last, we develop the support tool ‘REHAB’ to recommend energy efficient third-party network libraries to developers.https://www.ester.ee/record=b547174

    Scalable diversification for data exploration platforms

    Get PDF

    Flavonoids and Other Polyphenols Act as Epigenetic Modifiers in Breast Cancer.

    Get PDF
    Breast cancer is a common cancer that occurs due to different epigenetic alterations and genetic mutations. Various epidemiological studies have demonstrated an inverse correlation between breast cancer incidence and flavonoid intake. The anti-cancer action of flavonoids, a class of polyphenolic compounds that are present in plants, as secondary metabolites has been a major topic of research for many years. Our review analysis demonstrates that flavonoids exhibit anti-cancer activity against breast cancer occurring in different ethnic populations. Breast cancer subtype and menopausal status are the key factors in inducing the flavonoid\u27s anti-cancer action in breast cancer. The dose is another key factor, with research showing that approximately 10 mg/day of isoflavones is required to inhibit breast cancer occurrence. In addition, flavonoids also influence the epigenetic machinery in breast cancer, with research demonstrating that epigallocatechin, genistein, and resveratrol all inhibited DNA methyltransferase and altered chromatin modification in breast cancer. These flavonoids can induce the expression of different tumor suppressor genes that may contribute to decreasing breast cancer progression and metastasis. Additional studies are required to confirm the contribution of epigenetic modifications by flavonoids to breast cancer prevention

    Shorter Notices

    Get PDF
    Download the fil

    Identification of Missense Mutation (I12T) in the BSND Gene and Bioinformatics Analysis

    Get PDF
    Nonsyndromic hearing loss is a paradigm of genetic heterogeneity with 85 loci and 39 nuclear disease genes reported so far. Mutations of BSND have been shown to cause Bartter syndrome type IV, characterized by significant renal abnormalities and deafness and nonsyndromic nearing loss. We studied a Pakistani consanguineous family. Clinical examinations of affected individuals did not reveal the presence of any associated signs, which are hallmarks of the Bartter syndrome type IV. Linkage analysis identified an area of 18.36 Mb shared by all affected individuals between markers D1S2706 and D1S1596. A maximum two-point LOD score of 2.55 with markers D1S2700 and multipoint LOD score of 3.42 with marker D1S1661 were obtained. BSND mutation, that is, p.I12T, cosegregated in all extant members of our pedigree. BSND mutations can cause nonsyndromic hearing loss, and it is a second report for this mutation. The respected protein, that is, BSND, was first modeled, and then, the identified mutation was further analyzed by using different bioinformatics tools; finally, this protein and its mutant was docked with CLCNKB and REN, interactions of BSND, respectively

    How do private practitioners in Pakistan manage children suspected having tuberculosis? A cross sectional study

    Get PDF
    Background In Pakistan, private providers provide a large portion of health care, including for tuberculosis (TB). All TB patients are supposed to be reported to the National Tuberculosis Program (NTP), which provides drugs free of charge in addition to monitoring, supervision, and support. However, diagnosis of TB in children is difficult. We aimed to assess the private health care providers’ investigation practices and management of childhood TB. Methods We used a cross-sectional study, which was based on a national survey measuring under-reporting of children with TB in 12 selected districts in Pakistan from April–June, 2016. We explored the practices of the private health care providers, including the health care workers i.e. general practitioners, pediatricians, pulmonologists and chest specialists, who were involved in the diagnosis of TB in children under 15 years for investigating and managing children suspected having TB. Results Among 6519 presumptive child TB cases, a total of 5193(79.7%) children under 15 years were diagnosed as TB by private health care providers during second quarter, 2016. Only 187(2.9%) were notified to NTP. The majority of presumptive child TB cases reported cough, fever, and failure to thrive; few had TB contacts with pulmonary TB patients. Failure to thrive, loss of body weight and absence of BCG (Bacillus Calmette–GuĂ©rin) scar was more common in female children. Private providers relied on chest X-ray in 46.1%, while tuberculin skin test and Gene-Xpert MTB/RIF testing was little utilized. Bacteriological confirmation was present in 7.6%, and clinical assessment was the only basis for diagnosis in 39.3%. Of children with presumptive TB, only 955(14.6%) children were treated by private provider, while 3121(47.9%) cases were referred for diagnosis and 2443(37.5%) were referred after diagnosis for treatment; among all the referred, 3812(68.5%) were sent for investigations to District TB Centre (NTP). Conclusion This study showed that many private providers referred children suspected having TB to laboratories for further diagnosis, but the cases identified in these investigations were often not notified to the NTP. This problem could be resolved by strengthening the referral linkages between private health providers, NTP laboratories and treatment centres through capacity building and training of their staff.publishedVersio

    Utility of Inferior Turbinoplasty in the Autonomic System

    Get PDF
    The inferior turbinates are important anatomical nasal structures that provide warmth, humidification, and filtration of the inspired air to provide optimal conditioning for lung function. Besides these well-established basic functions, the turbinates are also important in immune function as the interface between the airway and the environment. Proper functioning of the inferior turbinates relies on an intact autonomic system, which maintains homeostasis within the nasal cavity. The autonomic nervous system innervates the submucosal glands and the vasculature within the inferior turbinate, resulting in control of major turbinate functions: nasal secretions, nasal patency, and amount of warmth and humidification provided. This study will summarize the normal and abnormal autonomic processes that contribute to the inferior turbinate as an autonomic organ

    Comparison of post-dural puncture headache incidence among patients undergoing spinal anaesthesia for elective caesarean section by using quincke 25-G and 29-G spinal needles

    Get PDF
    Background: Multiple complications including hypotension, nausea, vomiting, urinary retention, transient neurological symptoms and headache have been associated with spinal anaesthesia. Importantly, post dural puncture headache (PDPH) varies with the type and size of spinal needle employed for inducing anaesthesia. Here, we aimed to compare the frequency of PDPH in patients underwent spinal anaesthesia for elective caesarean section using 25-gauge (G) and 29-G Quincke spinal needle.Methods: We designed a randomized control trial at Obstetrics and Gynecology Operation Theatres, Jinnah Hospital, Lahore. A total of 152 patients having age 30.28±8.21 years were enrolled in the study and divided into two groups each comprising of 76 patients. In group 1, spinal anaesthesia was performed using 25-G Quincke spinal needle while in group 2 spinal anaesthesia was administered employing 29-G Quincke spinal needle. A standard dose of 10.5-12.0 mg (1.4-1.6 ml) of 0.75% bupivacaine is infiltrated in subarachnoid space at lumber region L3-L4 or L4-L5 following aseptic measures. The patients were evaluated for PDPH during the follow up period.Results: The previous history of PDPH was observed in 20.39% patients. The comparative study showed that the PDPH was observed in 12 (15.7%) patients in group 1 while the group 2 revealed PDPH in only 2 (2.6%) patients.Conclusions: Thus 29-G spinal needle can be regarded as a better option to reduce PDPH in patients subjected to spinal anaesthesia for elective cesarean in contrast to the use of 25-G Quincke spinal needle

    A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions

    Get PDF
    The Internet of Things (IoT) can enable seamless communication between millions of billions of objects. As IoT applications continue to grow, they face several challenges, including high latency, limited processing and storage capacity, and network failures. To address these stated challenges, the fog computing paradigm has been introduced, purpose is to integrate the cloud computing paradigm with IoT to bring the cloud resources closer to the IoT devices. Thus, it extends the computing, storage, and networking facilities toward the edge of the network. However, data processing and storage occur at the IoT devices themselves in the fog-based IoT network, eliminating the need to transmit the data to the cloud. Further, it also provides a faster response as compared to the cloud. Unfortunately, the characteristics of fog-based IoT networks arise traditional real-time security challenges, which may increase severe concern to the end-users. However, this paper aims to focus on fog-based IoT communication, targeting real-time security challenges. In this paper, we examine the layered architecture of fog-based IoT networks along working of IoT applications operating within the context of the fog computing paradigm. Moreover, we highlight real-time security challenges and explore several existing solutions proposed to tackle these challenges. In the end, we investigate the research challenges that need to be addressed and explore potential future research directions that should be followed by the research community.©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/fi=vertaisarvioitu|en=peerReviewed
    • 

    corecore