Search results for: internet exchange point
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7826

Search results for: internet exchange point

4286 Improving Medication Understanding, Use and Self-Efficacy among Stroke Patients: A Randomised Controlled Trial; Study Protocol

Authors: Jamunarani Appalasamy, Tha Kyi Kyi, Quek Kia Fatt, Joyce Pauline Joseph, Anuar Zaini M. Zain

Abstract:

Background: The Health Belief Theory had always been associated with chronic disease management. Various health behaviour concepts and perception branching from this Health Belief Theory had involved with medication understanding, use, and self-efficacy which directly link to medication adherence. In a previous quantitative and qualitative study, stroke patients in Malaysia were found to be strongly believing information obtained by various sources such as the internet and social communication. This action leads to lower perception of their stroke preventative medication benefit which in long-term creates non-adherence. Hence, this study intends to pilot an intervention which uses audio-visual concept incorporated with mHealth service to enhance learning and self-reflection among stroke patients to manage their disease. Methods/Design: Twenty patients will be allocated to a proposed intervention whereas another twenty patients are allocated to the usual treatment. The intervention involves a series of developed audio-visual videos sent via mobile phone which later await for responses and feedback from the receiver (patient) via SMS or recorded calls. The primary outcome would be the medication understanding, use and self-efficacy measured over two months pre and post intervention. Secondary outcome is measured from changes of blood parameters and other self-reported questionnaires. Discussion: This study shall also assess uptake/attrition, feasibility, and acceptability of this intervention. Trial Registration: NMRR-15-851-24737 (IIR)

Keywords: health belief, medication understanding, medication use, self-efficacy

Procedia PDF Downloads 210
4285 The Withdrawal of African States from the International Criminal Court

Authors: Allwell Uwazuruike

Abstract:

With the withdrawal, in 2016, of 3 African states from the ICC, the discourse took an interesting twist. African states, or at least some of them, had now shown their resolve to part ways with the ICC and, by implication, focus on further enthroning regional control and governance through an improved continental justice system. A range of views has been expressed over the years on the allegations of bias by some African states and the continued membership of the ICC. While there may be a split on the merits of the allegations of bias, academic analysts have generally not opposed African states’ membership of the ICC nor been particularly optimistic about the prospects of an African criminal court. There is also a degree of ambivalence on whether there are positives to be taken from African states’ withdrawal from the ICC. This article examines the recent developments with the ICC and analyses whether these could be viewed from the positive (or, at least, alternative) spectrum of the AU’s spirited march towards regional sovereignty or entirely negatively from the point of view of African Heads-of-State seeking to enthrone an era of authoritarianism and non-accountability.

Keywords: international criminal court, Africa, regionalism, criminal justice

Procedia PDF Downloads 318
4284 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 394
4283 Ultrasensitive Hepatitis B Virus Detection in Blood Using Nano-Porous Silicon Oxide: Towards POC Diagnostics

Authors: N. Das, N. Samanta, L. Pandey, C. Roy Chaudhuri

Abstract:

Early diagnosis of infection like Hep-B virus in blood is important for low cost medical treatment. For this purpose, it is desirable to develop a point of care device which should be able to detect trace quantities of the target molecule in blood. In this paper, we report a nanoporous silicon oxide sensor which is capable of detecting down to 1fM concentration of Hep-B surface antigen in blood without the requirement of any centrifuge or pre-concentration. This has been made possible by the presence of resonant peak in the sensitivity characteristics. This peak is observed to be dependent only on the concentration of the specific antigen and not on the interfering species in blood serum. The occurrence of opposite impedance change within the pores and at the bottom of the pore is responsible for this effect. An electronic interface has also been designed to provide a display of the virus concentration.

Keywords: impedance spectroscopy, ultrasensitive detection in blood, peak frequency, electronic interface

Procedia PDF Downloads 389
4282 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 236
4281 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 381
4280 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 272
4279 English Test Success among Syrian Refugee Girls Attending Language Courses in Lebanon

Authors: Nina Leila Mussa

Abstract:

Background: The devastating effects of the war on Syria’s educational infrastructure has been widely reported, with millions of children denied access. However, among those who resettled in Lebanon, the impact of receiving educational assistance on their abilities to pass the English entrance exam is not well described. The aim of this study was to identify predictors of success among Syrian refugees receiving English language courses in a Lebanese university. Methods: The database of Syrian refugee girls matriculated in English courses at the American University of Beirut (AUB) was reviewed. The study period was 7/2018-09/2020. Variables compared included: family size and income, welfare status, parents’ education, English proficiency, access to the internet, and need for external help with homework. Results: For the study period, there were 28 girls enrolled. The average family size was 6 (range 4-9), with eight having completed primary, 14 secondary education, and 6 graduated high school. Eighteen were single-income families. After 12 weeks of English courses, 16 passed the Test of English as Foreign Language (TOEFL) from the first attempt, and 12 failed. Out of the 12, 8 received external help, and 6 passed on the second attempt, which brings the total number of successful passing to 22. Conclusion: Despite the tragedy of war, girls receiving assistance in learning English in Lebanon are able to pass the basic language test. Investment in enhancing those educational experiences will be determinantal in achieving widespread progress among those at-risk children.

Keywords: refugee girls, TOEFL, education, success

Procedia PDF Downloads 119
4278 3-D Numerical Simulation of Scraped Surface Heat Exchanger with Helical Screw

Authors: Rabeb Triki, Hassene Djemel, Mounir Baccar

Abstract:

Surface scraping is a passive heat transfer enhancement technique that is directly used in scraped surface heat exchanger (SSHE). The scraping action prevents the accumulation of the product on the inner wall, which intensifies the heat transfer and avoids the formation of dead zones. SSHEs are widely used in industry for several applications such as crystallization, sterilization, freezing, gelatinization, and many other continuous processes. They are designed to deal with products that are viscous, sticky or that contain particulate matter. This research work presents a three-dimensional numerical simulation of the coupled thermal and hydrodynamic behavior within a SSHE which includes Archimedes’ screw instead of scraper blades. The finite volume Fluent 15.0 was used to solve continuity, momentum and energy equations using multiple reference frame formulation. The process fluid investigated under this study is the pure glycerin. Different geometrical parameters were studied in the case of steady, non-isothermal, laminar flow. In particular, attention is focused on the effect of the conicity of the rotor and the pitch of Archimedes’ screw on temperature and velocity distribution and heat transfer rate. Numerical investigations show that the increase of the number of turns in the screw from five to seven turns leads to amelioration of heat transfer coefficient, and the increase of the conicity of the rotor from 0.1 to 0.15 leads to an increase in the rate of heat transfer. Further studies should investigate the effect of different operating parameters (axial and rotational Reynolds number) on the hydrodynamic and thermal behavior of the SSHE.

Keywords: ANSYS-Fluent, hydrodynamic behavior, scraped surface heat exchange, thermal behavior

Procedia PDF Downloads 150
4277 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 99
4276 Inappropriate Antibiotic Use: An Online Survey in Thailand

Authors: Surarong Chinwong, Namthip Intarakumhang Na Rachasima, Siyaporn Kuikhiew, Dujrudee Chinwong

Abstract:

Irrational use of medicines is a major problem in public health. Half of all patients take medicines incorrectly. An inappropriate use of antibiotics is one of the common types of irrational medicine use; for example, patients use antibiotic for treatment of common cold or diarrhea. Objectives: This cross-sectional study aimed to investigate the behaviors on antibiotic use, using amoxicillin and norfloxacin as examples, as well as sources of received health information. Methods: An online self-administered questionnaire was used to collect data from participants in Thailand between September and December 2015. Participants were asked about their behaviors on antibiotic use. Data were analyzed using descriptive statistics. Results: Of all 405 participants, most were female (65.3 %), aged 18-30 years (49.4 %), undergraduate or lower (69.7%), and civil servant or state enterprises (31.7 %). We found inappropriate behaviors in use of amoxicillin or norfloxacin: 1) there were 201/400 participants (50.3%) taking amoxicillin right away in case of having a common cold, such as having sore throat, running nose, and cough; 2) there were 170/405 participants (42.0%) using amoxicillin for relieving inflammatory symptoms, e.g. muscle inflammation or osteoarthritis; 3) there were 71/398 participants (17.8%) using amoxicillin as a muscle relaxant; 4) there were 135/398 participants (33.9%) using norfloxacin for treating diarrhea. Sources of health information received by the participants were from the internet (78.5%), the radio and/or television (42.2%), advertising publishing (33.3 %), and word of mouth (30.1%). Conclusion: This study showed improper behaviors in antibiotic use especially amoxicillin and norfloxacin. Health care providers including pharmacists should raise the public awareness on dangers of inappropriate antibiotic use and promote the rational use of antibiotics.

Keywords: antibiotic use, amoxicillin, norfloxacin, rational drug use

Procedia PDF Downloads 266
4275 Electrocatalysts for Lithium-Sulfur Energy Storage Systems

Authors: Mirko Ante, Şeniz Sörgel, Andreas Bund

Abstract:

Li-S- (Lithium-Sulfur-) battery systems provide very high specific gravimetric energy (2600 Wh/kg) and volumetric energy density (2800Wh/l). Hence, Li-S batteries are one of the key technologies for both the upcoming electromobility and stationary applications. Furthermore, the Li-S battery system is potentially cheap and environmentally benign. However, the technical implementation suffers from cycling stability, low charge and discharge rates and incomplete understanding of the complex polysulfide reaction mechanism. The aim of this work is to develop an effective electrocatalyst for the polysulfide reactions so that the electrode kinetics of the sulfur half-cell will be improved. Accordingly, the overvoltage will be decreased, and the efficiency of the cell will be increased. An enhanced electroactive surface additionally improves the charge and discharge rates. To reach this goal, functionalized electrocatalytic coatings are investigated to accelerate the kinetics of the polysulfide reactions. In order to determine a suitable electrocatalyst, apparent exchange current densities of a variety of materials (Ni, Co, Pt, Cr, Al, Cu, ITO, stainless steel) have been evaluated in a polysulfide containing electrolyte by potentiodynamic measurements and a Butler-Volmer fit including diffusion limitation. The samples have been examined by Scanning Electron Microscopy (SEM) after the potentiodynamic measurements. Up to now, our work shows that cobalt is a promising material with good electrocatalytic properties for the polysulfide reactions and good chemical stability in the system. Furthermore, an electrodeposition from a modified Watt’s nickel electrolyte with a sulfur source seems to provide an autocatalytic effect, but the electrocatalytic behavior decreases after several cycles of the current-potential-curve.

Keywords: electrocatalyst, energy storage, lithium sulfur battery, sulfur electrode materials

Procedia PDF Downloads 359
4274 Auto Classification of Multiple ECG Arrhythmic Detection via Machine Learning Techniques: A Review

Authors: Ng Liang Shen, Hau Yuan Wen

Abstract:

Arrhythmia analysis of ECG signal plays a major role in diagnosing most of the cardiac diseases. Therefore, a single arrhythmia detection of an electrocardiographic (ECG) record can determine multiple pattern of various algorithms and match accordingly each ECG beats based on Machine Learning supervised learning. These researchers used different features and classification methods to classify different arrhythmia types. A major problem in these studies is the fact that the symptoms of the disease do not show all the time in the ECG record. Hence, a successful diagnosis might require the manual investigation of several hours of ECG records. The point of this paper presents investigations cardiovascular ailment in Electrocardiogram (ECG) Signals for Cardiac Arrhythmia utilizing examination of ECG irregular wave frames via heart beat as correspond arrhythmia which with Machine Learning Pattern Recognition.

Keywords: electrocardiogram, ECG, classification, machine learning, pattern recognition, detection, QRS

Procedia PDF Downloads 361
4273 Digital Platforms: Creating Value through Network Effects under Pandemic Conditions

Authors: S. Łęgowik-Świącik

Abstract:

This article is a contribution to the research into the determinants of value creation via digital platforms in variable operating conditions. The dynamics of the market environment caused by the COVID-19 pandemic have made enterprises built on digital platforms financially successful. While many classic companies are struggling with the uncertainty of conducting a business and difficulties in the process of value creation, digital platforms create value by modifying the existing business model to meet the changing needs of customers. Therefore, the objective of this publication is to understand and explain the relationship between value creation and the conversion of the business model built on digital platforms under pandemic conditions. The considerations relating to the conceptual framework and determining the research objective allowed for adopting the hypothesis, assuming that the processes of value creation are evolving, and the measurement of these processes allows for the protection of value created and enables its growth in changing circumstances. The research methods, such as critical literature analysis and case study, were applied to accomplish the objective pursued and verify the hypothesis formulated. The empirical research was carried out based on the data from enterprises listed on the Nasdaq Stock Exchange: Amazon, Alibaba, and Facebook. The research period was the years 2018-2021. The surveyed enterprises were chosen based on the targeted selection. The problem discussed is important and current since the lack of in-depth theoretical research results in few attempts to identify the determinants of value creation via digital platforms. The above arguments led to an attempt at theoretical analysis and empirical research to fill in the gap perceived by deepening the understanding of the process of value creation through network effects via digital platforms under pandemic conditions.

Keywords: business model, digital platforms, enterprise management, pandemic conditions, value creation process

Procedia PDF Downloads 120
4272 Effect of Green Roofs to Prevent the Dissipation of Energy in Mountainous Areas

Authors: Mina Ganji Morad, Maziar Azadisoleimanieh, Sina Ganji Morad

Abstract:

A green roof is formed by green plants alive and has many positive impacts in the regional climatic, as well as indoor. Green roof system to prevent solar radiation plays a role in the cooling space. The cooling is done by reducing thermal fluctuations on the exterior of the roof and by increasing the roof heat capacity which cause to keep the space under the roof cool in the summer and heating rate increases during the winter. A roof garden is one of the recommended ways to reduce energy consumption in large cities. Despite the scale of the city green roofs have effective functions, such as beautiful view of city and decontaminating the urban landscape and reduce mental stress, and in an exchange of energy and heat from outside to inside spaces. This article is based on a review of 20 articles and 10 books and valid survey results on the positive effects of green roofs to prevent energy waste in the building. According to these publications, three of the conventional roof, green roof typical and green roof with certain administrative details (layers of glass) and the use of resistant plants and shrubs have been analyzed and compared their heat transfer. The results of these studies showed that one of the best green roof systems for mountainous climate is tree and shrub system that in addition to being resistant to climate change in mountainous regions, will benefit from the other advantages of green roof. Due to the severity of climate change in mountainous areas it is essential to prevent the waste of buildings heating and cooling energy. Proper climate design can greatly help to reduce energy.

Keywords: green roof, heat transfer, reducing energy consumption, mountainous areas, sustainable architecture

Procedia PDF Downloads 390
4271 Site Analysis’ Importance as a Valid Factor in Building Design

Authors: Mekwa Eme, Anya chukwuma

Abstract:

The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.

Keywords: analysis, climate, statistics, design

Procedia PDF Downloads 234
4270 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 28
4269 IL-33 Production in Murine Macrophages via PGE2-E Prostanoid Receptor 2/4 Signaling

Authors: Sachin K. Samuchiwal, Barbara Balestrieri, Amanda Paskavitz, Hannah Raff, Joshua A. Boyce

Abstract:

IL-33, a recently discovered member of the IL-1 cytokine family, binds to the TLR/IL1R super family receptor ST2 and induces type 2 immune responses. IL-33 is constitutively expressed in structural cells at barrier sites such as skin, lung, and intestine, and also inducibly expressed by hematopoietic cells including macrophages. Stimulation of macrophages by Lipopolysaccharide (LPS) can induce de novo IL-33 expression, and also causes the production of prostaglandin-E2 (PGE2) via cyclooxygenase (COX)-2 and microsomal PGE2 synthase-1 (mPGES-1). Because PGE2 can regulate macrophage functions through both autocrine and paracrine mechanisms, the potential interplay of endogenous PGE2 on IL-33 production was explored. Bone-marrow derived murine macrophages (bmMF) that lack either mPGES-1 or EP2 receptor expression were stimulated with LPS in the absence or presence of exogenous PGE2 along with pharmacological agonists and antagonists. The study results demonstrate that endogenous PGE2 markedly enhances LPS-induced IL-33 production by bmMFs via EP2 receptors. Moreover, exogenous PGE2 can amplify LPS-induced IL-33 expression dominantly by EP2 and partly by EP4 receptors by a pathway involving cAMP and exchange protein activated by cAMP (EPAC), but not protein kinase A (PKA). Though both IL-33 production and PGE2 generation in response to LPS require activation of both p38 MAPK and NF-κB, PGE2 did not influence this activation. In conclusion, it is demonstrated that endogenous PGE2 signaling through EP2 and EP4 receptors is a prerequisite for LPS-induced IL-33 production in bmMFs and the underlying cAMP mediated pathway involves EPAC. Since IL-33 is a critical pro-inflammatory cytokine in various pathological disorders, this PGE2-EP2/EP4-cAMP mediated pathway can be exploited to intervene in IL-33 driven pathologies.

Keywords: bone marrow macrophages, EPAC, IL-33, PGE2

Procedia PDF Downloads 174
4268 Reduced Glycaemic Impact by Kiwifruit-Based Carbohydrate Exchanges Depends on Both Available Carbohydrate and Non-Digestible Fruit Residue

Authors: S. Mishra, J. Monro, H. Edwards, J. Podd

Abstract:

When a fruit such as kiwifruit is consumed its tissues are released from the physical /anatomical constraints existing in the fruit. During digestion they may expand several-fold to achieve a hydrated solids volume far greater than the original fruit, and occupy the available space in the gut, where they surround and interact with other food components. Within the cell wall dispersion, in vitro digestion of co-consumed carbohydrate, diffusion of digestion products, and mixing responsible for mass transfer of nutrients to the gut wall for absorption, were all retarded. All of the foregoing processes may be involved in the glycaemic response to carbohydrate foods consumed with kiwifruit, such as breakfast cereal. To examine their combined role in reducing the glycaemic response to wheat cereal consumed with kiwifruit we formulated diets containing equal amounts of breakfast cereal, with the addition of either kiwifruit, or sugars of the same composition and quantity as in kiwifruit. Therefore, the only difference between the diets was the presence of non-digestible fruit residues. The diet containing the entire disperse kiwifruit significantly reduced the glycaemic response amplitude and the area under the 0-120 min incremental blood glucose response curve (IAUC), compared with the equicarbohydrate diet containing the added kiwifruit sugars. It also slightly but significantly increased the 120-180 min IAUC by preventing a postprandial overcompensation, indicating improved homeostatic blood glucose control. In a subsequent study in which we used kiwifruit in a carbohydrate exchange format, in which the kiwifruit carbohydrate partially replaced breakfast cereal in equal carbohydrate meals, the blood glucose was further reduced without a loss of satiety, and with a reduction in insulin demand. The results show that kiwifruit may be a valuable component in low glycaemic impact diets.

Keywords: carbohydrate, digestion, glycaemic response, kiwifruit

Procedia PDF Downloads 485
4267 Philippine National Police Strategies in the Implementation of 'Peace and Order Agenda for Transformation and Upholding of the Rule-Of-Law' Plan 2030

Authors: Ruby A. L. Espineli

Abstract:

The study assessed the Philippine National Police strategies in the implementation of ‘Peace and Order Agenda for Transformation and Upholding of the Rule-of-Law’ P.A.T.R.O.L Plan 2030. Its operational roadmap presents four perspectives which include resource management, learning and growth, process excellence; and community. Focused group discussion, observation, and distribution of survey questionnaire to selected PNP officers and community members were done to identify and describe the implementation, problems encountered and measures to address the problems of the PNP P.A.T.R.O.L Plan 2030. In resource management, PNP allocates most sufficient funds in providing service firearms, patrol vehicle, and internet connections. In terms of learning and growth, the attitude of PNP officers is relatively higher than their knowledge and skills. Moreover, in terms of process excellence, the PNP use several crime preventions and crime solution strategies to deliver an immediate response to calls of the community. As regards, community perspective, PNP takes effort in establishing partnership with community. It is also interesting to note that PNP officers and community were both undecided on the existence of problems encountered in the implementation of P.A.T.R.O.L Plan 2030. But, they had proactive behavior as they agreed on all the specified measures to address the problems encountered in implementation of PNP P.A.T.R.O.L. Plan 2030. A strategic framework, based on the findings was formulated in this study that could improve and entrench the harmonious working relationship between the PNP and stakeholders in the enhancement of the implementation of PNP P.A.T.R.O.L. Plan 2030.

Keywords: community perspectives, learning and growth, process excellence, resource management

Procedia PDF Downloads 223
4266 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 230
4265 Creating Systems Change: Implementing Cross-Sector Initiatives within the Justice System to Support Ontarians with Mental Health and Addictions Needs

Authors: Tania Breton, Dorina Simeonov, Shauna MacEachern

Abstract:

Ontario’s 10 Year Mental Health and Addictions Strategy has included the establishment of 18 Service Collaborative across the province; cross-sector tables in a specific region coming together to explore mental health and addiction system needs and adopting an intervention to address that need. The process is community led and supported by implementation teams from the Centre for Addiction and Mental Health (CAMH), using the framework of implementation science (IS) to enable evidence-based and sustained change. These justice initiatives are focused on the intersection of the justice system and the mental health and addiction systems. In this presentation, we will share the learnings, achievements and challenges of implementing innovative practices to the mental health and addictions needs of Ontarians within the justice system. Specifically, we will focus on the key points across the justice system - from early intervention and trauma-informed, culturally appropriate services to post-sentence support and community reintegration. Our approach to this work involves external implementation support from the CAMH team including coaching, knowledge exchange, evaluation, Aboriginal engagement and health equity expertise. Agencies supported the implementation of tools and processes which changed practice at the local level. These practices are being scaled up across Ontario and community agencies have come together in an unprecedented collaboration and there is a shared vision of the issues overlapping between the mental health, addictions and justice systems. Working with ministry partners has allowed space for innovation and created an environment where better approaches can be nurtured and spread.

Keywords: implementation, innovation, early identification, mental health and addictions, prevention, systems

Procedia PDF Downloads 357
4264 Electrical Load Estimation Using Estimated Fuzzy Linear Parameters

Authors: Bader Alkandari, Jamal Y. Madouh, Ahmad M. Alkandari, Anwar A. Alnaqi

Abstract:

A new formulation of fuzzy linear estimation problem is presented. It is formulated as a linear programming problem. The objective is to minimize the spread of the data points, taking into consideration the type of the membership function of the fuzzy parameters to satisfy the constraints on each measurement point and to insure that the original membership is included in the estimated membership. Different models are developed for a fuzzy triangular membership. The proposed models are applied to different examples from the area of fuzzy linear regression and finally to different examples for estimating the electrical load on a busbar. It had been found that the proposed technique is more suited for electrical load estimation, since the nature of the load is characterized by the uncertainty and vagueness.

Keywords: fuzzy regression, load estimation, fuzzy linear parameters, electrical load estimation

Procedia PDF Downloads 528
4263 Sensory-Based Strategies in the School Setting: A Survey of K-12 Educators

Authors: Hoda Hashemi

Abstract:

This study aimed to explore K-12 educators’ perceptions of using sensory-based strategies (SBS) with students on the autism spectrum in classroom settings. One hundred and ninety-three educators, including 107 special education teachers, 48 general education teachers, and 38 paraprofessionals, participated in this study. They answered 44 questions about using SBS in classroom settings, the degree to which they use the strategies on a 5-point Likert scale, the outcomes they targeted, and their perception of the strategies' effectiveness. The survey results indicated that most educators rated only one sensory-based strategy, which was alternated seating options, as highly effective in addressing the targeted behaviors of students on the autism spectrum. However, in some instances, educators' perceptions of the effectiveness of some strategies did not align with other research findings, highlighting the need for further evidence to confidently implement them.

Keywords: sensory-based strategies, K-12, educators, autism, survey

Procedia PDF Downloads 69
4262 Interferometric Demodulation Scheme Using a Mode-Locker Fiber Laser

Authors: Liang Zhang, Yuanfu Lu, Yuming Dong, Guohua Jiao, Wei Chen, Jiancheng Lv

Abstract:

We demonstrated an interferometric demodulation scheme using a mode-locked fiber laser. The mode-locked fiber laser is launched into a two-beam interferometer. When the ratio between the fiber path imbalance of interferometer and the laser cavity length is close to an integer, an interferometric fringe emerges as a result of vernier effect, and then the phase shift of the interferometer can be demodulated. The mode-locked fiber laser provides a large bandwidth and reduces the cost for wavelength division multiplexion (WDM). The proposed interferometric demodulation scheme can be further applied in multi-point sensing system such as fiber optics hydrophone array, seismic wave detection network with high sensitivity and low cost.

Keywords: fiber sensing, interferometric demodulation, mode-locked fiber laser, vernier effect

Procedia PDF Downloads 323
4261 EDTA Enhanced Plant Growth, Antioxidant Defense System, and Phytoextraction of Copper by Brassica napus L.

Authors: Ume Habiba, Shafaqat Ali, Mujahid Farid, Muhammad Bilal Shakoor

Abstract:

Copper (Cu) is an essential micronutrient for normal plant growth and development, but in excess, it is also toxic to plants. The present study investigated the influence of ethylenediaminetetraacetic acid (EDTA) in enhancing Cu uptake and tolerance as well as the morphological and physiological responses of Brassica napus L. seedlings under Cu stress. Four-week-old seedlings were transferred to hydroponics containing Hoagland’s nutrient solution. After 2 weeks of transplanting, three levels (0, 50, and 100 μM) of Cu were applied with or without application of 2.5 mM EDTA and plants were further grown for 8 weeks in culture media. Results showed that Cu alone significantly decreased plant growth, biomass, photosynthetic pigments, and gas exchange characteristics. Cu stress also reduced the activities of antioxidants, such as superoxide dismutase (SOD), peroxidase (POD), ascorbate peroxidase (APX), and catalase (CAT) along with protein contents. Cu toxicity increased the concentration of reactive oxygen species (ROS) as indicated by the increased production of malondialdehyde (MDA) and hydrogen peroxide (H2O2) in both leaves and roots. The application of EDTA significantly alleviated Cu-induced toxic effects in B. napus, showing remarkable improvement in all these parameters. EDTA amendment increased the activity of antioxidant enzymes by decreasing the concentrations of MDA and H2O2 both in leaves and roots of B. napus. Although, EDTA amendment with Cu significantly increased Cu uptake in roots, stems, and leaves in decreasing order of concentration but increased the growth, photosynthetic parameters, and antioxidant enzymes. These results showed that the application of EDTA can be a useful strategy for phytoextraction of Cu by B. napus from contaminated soils.

Keywords: antioxidants, biomass, copper, EDTA, phytoextraction, tolerance

Procedia PDF Downloads 404
4260 Risk and Uncertainty in Aviation: A Thorough Analysis of System Vulnerabilities

Authors: C. V. Pietreanu, S. E. Zaharia, C. Dinu

Abstract:

Hazard assessment and risks quantification are key components for estimating the impact of existing regulations. But since regulatory compliance cannot cover all risks in aviation, the authors point out that by studying causal factors and eliminating uncertainty, an accurate analysis can be outlined. The research debuts by making delimitations on notions, as confusion on the terms over time has reflected in less rigorous analysis. Throughout this paper, it will be emphasized the fact that the variation in human performance and organizational factors represent the biggest threat from an operational perspective. Therefore, advanced risk assessment methods analyzed by the authors aim to understand vulnerabilities of the system given by a nonlinear behavior. Ultimately, the mathematical modeling of existing hazards and risks by eliminating uncertainty implies establishing an optimal solution (i.e. risk minimization).

Keywords: control, human factor, optimization, risk management, uncertainty

Procedia PDF Downloads 242
4259 Evaluating the Perception of Roma in Europe through Social Network Analysis

Authors: Giulia I. Pintea

Abstract:

The Roma people are a nomadic ethnic group native to India, and they are one of the most prevalent minorities in Europe. In the past, Roma were enslaved and they were imprisoned in concentration camps during the Holocaust; today, Roma are subject to hate crimes and are denied access to healthcare, education, and proper housing. The aim of this project is to analyze how the public perception of the Roma people may be influenced by antiziganist and pro-Roma institutions in Europe. In order to carry out this project, we used social network analysis to build two large social networks: The antiziganist network, which is composed of institutions that oppress and racialize Roma, and the pro-Roma network, which is composed of institutions that advocate for and protect Roma rights. Measures of centrality, density, and modularity were obtained to determine which of the two social networks is exerting the greatest influence on the public’s perception of Roma in European societies. Furthermore, data on hate crimes on Roma were gathered from the Organization for Security and Cooperation in Europe (OSCE). We analyzed the trends in hate crimes on Roma for several European countries for 2009-2015 in order to see whether or not there have been changes in the public’s perception of Roma, thus helping us evaluate which of the two social networks has been more influential. Overall, the results suggest that there is a greater and faster exchange of information in the pro-Roma network. However, when taking the hate crimes into account, the impact of the pro-Roma institutions is ambiguous, due to differing patterns among European countries, suggesting that the impact of the pro-Roma network is inconsistent. Despite antiziganist institutions having a slower flow of information, the hate crime patterns also suggest that the antiziganist network has a higher impact on certain countries, which may be due to institutions outside the political sphere boosting the spread of antiziganist ideas and information to the European public.

Keywords: applied mathematics, oppression, Roma people, social network analysis

Procedia PDF Downloads 265
4258 Decoration of Multi-Walled Carbon Nanotubes by CdS Nanoparticles Using Magnetron Sputtering Method

Authors: Z. Ghorannevis, E. Akbarnejad, B. Aghazadeh, M. Ghoranneviss

Abstract:

Carbon nanotubes (CNTs) modified with semiconductor nanocrystalline particles may find wide applications due to their unique properties. Here Cadmium Sulfide (CdS) nanoparticles were successfully grown on Multi-Walled Carbon Nanotubes (MWNTs) via a magnetron sputtering method for the first time. The CdS/MWNTs sample was characterized with X-ray diffraction (XRD), Field Emission Scanning and High Resolution Transmission Electron Microscopies (SEM/TEM) and four point probe. The obtained images show clearly the decoration of the MWNTs by the CdS nanoparticles, and the XRD measurements indicate the CdS structure as hexagonal type. Moreover, the physical properties of the CdS/MWNTs were compared with the physical properties of the CdS nanoparticles grown on the silicon. Electrical measurements of CdS and CdS/MWNTs reveal that CdS/MWNTs has lower resistivity than the CdS sample which may be due to the higher carrier concentrations.

Keywords: CdS, MWNTs, HRTEM, magnetron sputtering

Procedia PDF Downloads 390
4257 Quality Fabric Optimization Using Genetic Algorithms

Authors: Halimi Mohamed Taher, Kordoghli Bassem, Ben Hassen Mohamed, Sakli Faouzi

Abstract:

Textile industry has been an important part of many developing countries economies such as Tunisia. This industry is confronted with a challenging and increasing competitive environment. Good quality management in production process is the key factor for retaining existence especially in raw material exploitation. The present work aims to develop an intelligent system for fabric inspection. In the first step, we have studied the method used for fabric control which takes into account the default length and localization in woven. In the second step, we have used a method based on the fuzzy logic to minimize the Demerit point indicator with appropriate total rollers length, so that the quality problem becomes multi-objective. In order to optimize the total fabric quality, we have applied the genetic algorithm (GA).

Keywords: fabric control, Fuzzy logic, genetic algorithm, quality management

Procedia PDF Downloads 581