Infertility and problems of impaired fecundity have been a concern through ages and is also a significant clinical problem today, which affects 8-12% of couples worldwide. Of all infertility cases, ...approximately 40-50% is due to "male factor" infertility and as many as 2% of all men will exhibit suboptimal sperm parameters. It may be one or a combination of low sperm concentration, poor sperm motility, or abnormal morphology. The rates of infertility in less industrialized nations are markedly higher and infectious diseases are responsible for a greater proportion of infertility. The present literature will help in knowing the trends of male factor infertility in developing nations like India and to find out in future, various factors that may be responsible for male infertility.
We investigate numerically the evolution of a particular type of non-diffracting pulsed plasmonic beam called Airy plasmon pulses. A suitable diffraction grating is obtained by optimizing a grating ...(e.g., Phys. Rev. Lett.107, 116802 (2011)10.1103/PhysRevLett.107.116802) for maximum generation bandwidth and efficiency to excite ultrashort Airy plasmon pulses. The optimization process is based on Airy and non-Airy plasmons contributions from the diffraction grating. The time-averaged Airy plasmon pulse generated from the grating shows a bent trajectory and quasi non-diffracting properties similar to CW excited Airy plasmons. A design-parameter-dependent geometrical model is developed to explain the spatio-temporal dynamics of the Airy plasmon pulses, which predicts the pulse broadening in Airy plasmon pulses due to non-Airy plasmons emerging from the grating. This model provides a parametric design control for the potential engineering of temporally focused 2D non-diffracting pulsed plasmonic beams.
•We analyze Austinites’ opinions on connected and autonomous vehicles (CAVs).•We estimate their willingness to pay (WTP) for CAVs and related technologies.•Their average WTP for Level 3 automation is ...$3300, versus $7253 for Level 4.•Higher-income, tech-savvy males in denser settings are more interested in CAVs.•41% willing to use shared AVs at least once a week at $1/mile, vs. 15% at $2/mile.
Technological advances are bringing connected and autonomous vehicles (CAVs) to the ever-evolving transportation system. Anticipating public acceptance and adoption of these technologies is important. A recent internet-based survey polled 347 Austinites to understand their opinions on smart-car technologies and strategies. Results indicate that respondents perceive fewer crashes to be the primary benefit of autonomous vehicles (AVs), with equipment failure being their top concern. Their average willingness to pay (WTP) for adding full (Level 4) automation ($7253) appears to be much higher than that for adding partial (Level 3) automation ($3300) to their current vehicles.
Ordered probit and other model specifications estimate the impact of demographics, built-environment variables, and travel characteristics on Austinites’ WTP for adding various automation technologies and connectivity to their current and coming vehicles. It also estimates adoption rates of shared autonomous vehicles (SAVs) under different pricing scenarios ($1, $2, and $3 per mile), choice dependence on friends’ and neighbors’ adoption rates, and home-location decisions after AVs and SAVs become a common mode of transport. Higher-income, technology-savvy males, who live in urban areas, and those who have experienced more crashes have a greater interest in and higher WTP for the new technologies, with less dependence on others’ adoption rates. Such behavioral models are useful to simulate long-term adoption of CAV technologies under different vehicle pricing and demographic scenarios. These results can be used to develop smarter transportation systems for more efficient and sustainable travel.
•Use of reduced number of the necessary and sufficient constraints for defect-free crank-rocker mechanism are proposed.•Refinement scheme is applied to well-established TLBO algorithm.•A nontrivial ...crank-rocker mechanism for human knee exoskeleton is synthesized.•Synthesized mechanism is free from Circuit, Branch, and Order defect.
This paper proposes the synthesis of a human knee exoskeleton using the reduced number of necessary and sufficient constraints. The proposed human knee exoskeleton consists of a defect-free crank-rocker mechanism capable of accurately moving its coupler point along the prescribed trajectory. For synthesizing the crank-rocker mechanism based on proposed reduced number of constraints, an optimization problem is formulated to synthesize the mechanism. An algorithm based on teaching-learning-based-optimization (TLBO) is presented to solve this highly nonlinear optimization problem. The optimization minimizes the error between generated and prescribed trajectory and simultaneously avoids any defect in the synthesized mechanism. The penalty method is used to manage all the constraints. Besides a realistic nontrivial example of human knee flexion/extension, a straight line trajectory is also considered to demonstrate the effectiveness of the refinement scheme in the optimal syntheses of planar crank-rocker linkage free from all defects. The optimization problem is solved using well-established nature-inspired algorithms such as genetic algorithm (GA), particle swarm algorithm (PSO), and teaching-learning-based-optimization (TLBO) algorithm. It is found that TLBO is computationally more efficient than other algorithms used here. Additionally, the proposed human knee exoskeleton model is experimentally validated for one gait cycle.
Exchange of patient record over network required a technique to guarantee security and privacy for tele-health services. This paper presents an improved watermarking technique capable of providing ...protection of patient data by embedding multi-watermarks in medical cover image using DWT-SVD domain. Prior to embedding, Hamming code is applied to text watermark in order to reduce channel noise distortion for the sensitive data. After embedding, the watermarked medical image is encrypted then compressed. Out of two encryption method and three compression scheme tested, combination of Chaotic-LZW shows the best performance. However, HyperChaotic-LZW combination is more robust against Gaussian, JPEG compression, speckle noise and histogram equalization attacks. We illustrate the good results in terms of objective and subjective evaluation, and verify its robustness for various attacks while maintaining imperceptibility, security and compression ratio. Experimental results demonstrate that the suggested technique archives high robustness against attacks in comparison to the other scheme for medical images.
Cancer initiation and progression are the result of genetic and/or epigenetic alterations. Acetylation-mediated histone/non-histone protein modification plays an important role in the epigenetic ...regulation of gene expression. Histone modification is controlled by the balance between histone acetyltransferase and (HAT) and histone deacetylase (HDAC) enzymes. Imbalance between the activities of these two enzymes is associated with various forms of cancer. Histone deacetylase inhibitors (HDACi) regulate the activity of HDACs and are being used in cancer treatment either alone or in combination with other chemotherapeutic drugs/radiotherapy. The Food and Drug Administration (FDA) has already approved four compounds, namely vorinostat, romidepsin, belinostat, and panobinostat, as HDACi for the treatment of cancer. Several other HDACi of natural and synthetic origin are under clinical trial for the evaluation of efficiency and side-effects. Natural compounds of plant, fungus, and actinomycetes origin, such as phenolics, polyketides, tetrapeptide, terpenoids, alkaloids, and hydoxamic acid, have been reported to show potential HDAC-inhibitory activity. Several HDACi of natural and dietary origin are butein, protocatechuic aldehyde, kaempferol (grapes, green tea, tomatoes, potatoes, and onions), resveratrol (grapes, red wine, blueberries and peanuts), sinapinic acid (wine and vinegar), diallyl disulfide (garlic), and zerumbone (ginger). HDACi exhibit their antitumor effect by the activation of cell cycle arrest, induction of apoptosis and autophagy, angiogenesis inhibition, increased reactive oxygen species generation causing oxidative stress, and mitotic cell death in cancer cells. This review summarizes the HDACs classification, their aberrant expression in cancerous tissue, structures, sources, and the anticancer mechanisms of HDACi, as well as HDACi that are either FDA-approved or under clinical trials.
The availability of many-core computing platforms enables a wide variety of technical solutions for systems across the embedded, high-performance and cloud computing domains. However, large scale ...manycore systems are notoriously hard to optimise. Choices regarding resource allocation alone can account for wide variability in timeliness and energy dissipation (up to several orders of magnitude). Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency. It addresses different types of systems, aiming to harmonise the approaches to dynamic allocation across the complete spectrum between systems with little flexibility and strict real-time guarantees all the way to highly dynamic systems with soft performance requirements. Technical topics presented in the book include: • Load and Resource Models• Admission Control• Feedback-based Allocation and Optimisation• Search-based Allocation Heuristics• Distributed Allocation based on Swarm Intelligence• Value-Based AllocationEach of the topics is illustrated with examples based on realistic computational platforms such as Network-on-Chip manycore processors, grids and private cloud environments.
This article analyses tension between human rights (including secularism) and Hindutva, the Hindu nationalists’ discourse. Particular focus is put on women’s rights and the right to freedom of ...expression and dissent in India using the film Water and the controversy associated with it in the north Indian district of Varanasi in 2000. Firstly, the relation between human rights, secularism and Hindutva/Hindu nationalism is discussed conceptually. This is followed by a discussion of the narratives of Hindutva’s followers in Varanasi and their involvement in the controversy surrounding the film Water. Extracts from interviews of Hindu nationalists are included to illustrate this tension. The article concludes by claiming that Hindutva is an antithetical to secularism and human rights.
It is clear that exosomes (endosome derived vesicles) serve important roles in cellular communication both locally and distally and that the exosomal process is abnormal in cancer. Cancer cells are ...not malicious cells; they are cells that represent ‘survival of the fittest’ at its finest. All of the mutations, abnormalities, and phenomenal adaptations to a hostile microenvironment, such as hypoxia and nutrient depletion, represent the astute ability of cancer cells to adapt to their environment and to intracellular changes to achieve a single goal — survival. The aberrant exosomal process in cancer represents yet another adaptation that promotes survival of cancer. Cancer cells can secrete more exosomes than healthy cells, but more importantly, the content of cancer cells is distinct. An illustrative distinction is that exosomes derived from cancer cells contain more microRNA than healthy cells and unlike exosomes released from healthy cells, this microRNA can be associated with the RNA-induced silencing complex (RISC) which is required for processing mature and biologically active microRNA. Cancer derived exosomes have the ability to transfer metastatic potential to a recipient cell and cancer exosomes function in the physical process of invasion. In this review we conceptualize the aberrant exosomal process (formation, content selection, loading, trafficking, and release) in cancer as being partially attributed to cancer specific differences in the endocytotic process of receptor recycling/degradation and plasma membrane remodeling and the function of the endosome as a signaling entity. We discuss this concept and, to advance comprehension of exosomal function in cancer as mediators of communication, we detail and discuss exosome biology, formation, and communication in health and cancer; exosomal content in cancer; exosomal biomarkers in cancer; exosome mediated communication in cancer metastasis, drug resistance, and interfacing with the immune system; and discuss the therapeutic manipulation of exosomal content for cancer treatment including current clinical trials of exosomal therapeutics. Often referred to as cellular nanoparticles, understanding exosomes, and how cancer cells use these cellular nanoparticles in communication is at the cutting edge frontier of advancing cancer biology.
Display omitted
Display omitted
•We develop a faster encryption algorithm for medical images without compromising security.•Combination of RDWT and RSVD is used to obtain a secure key.•A secure key and scrambled ...image is used to obtain the encrypted image.•Experimental results show the proposed algorithm is secure and faster as compared to the other schemes.
In the Internet age, medical image security is very important in the field of e-healthcare. Several encryption algorithms have been developed, but they either do not achieve high security or they are computationally overhead for medical images, and thus may not be suitable for e-healthcare applications. In this paper, we develop a medical image encryption algorithm, namely FastMIE, that can provide security at low computational time. To achieve high security, we encrypt the segmented part of the image by using a key generated by redundant-discrete wavelet transform (RDWT) and randomized-singular value decomposition (RSVD) and scrambled segmented image. To reduce the computational cost, we encrypt only the significant part of the original-image instead of considering the whole image. Compared with the existing works, our FastMIE takes much less time in encrypting and has a greater ability of securing the image.