Search results for: ESD protocols
316 Opacity Synthesis with Orwellian Observers
Authors: Moez Yeddes
Abstract:
The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.Keywords: security policies, opacity, formal verification, orwellian observation
Procedia PDF Downloads 226315 Therapeutic Application of Light and Electromagnetic Fields to Reduce Hyper-Inflammation Triggered by COVID-19
Authors: Blanche Aguida, Marootpong Pooam, Nathalie Jourdan, Margaret Ahmad
Abstract:
COVID-19-related morbidity is associated with exaggerated inflammation and cytokine production in the lungs, leading to acute respiratory failure. The cellular mechanisms underlying these so-called ‘cytokine storms’ are regulated through the Toll-like receptor 4 (TLR4) signaling pathway and by reactive oxygen species (ROS). Both light (photobiomodulation) and magnetic fields (e.g., pulsed electromagnetic field) stimulation are non-invasive therapies known to confer anti-inflammatory effects and regulate ROS signaling pathways. Here we show that daily exposure to two 10-minute intervals of moderate-intensity infra-red light significantly lowered the inflammatory response induced via the TLR4 receptor signaling pathway in human cell cultures. Anti-inflammatory effects were likewise achieved by electromagnetic field exposure of cells to daily 10-minute intervals of either pulsed electromagnetic fields (PEMF) or to low-level static magnetic fields. Because current illumination and electromagnetic field therapies have no known side effects and are already approved for some medical uses, we have here developed protocols for verification in clinical trials of COVID 19 infection. These treatments are affordable, simple to implement, and may help to resolve the acute respiratory distress of COVID 19 patients both in the home and in the hospital.Keywords: COVID 19, electromagnetic fields therapy, inflammation, photobiomodulation therapy
Procedia PDF Downloads 144314 Smart Disassembly of Waste Printed Circuit Boards: The Role of IoT and Edge Computing
Authors: Muhammad Mohsin, Fawad Ahmad, Fatima Batool, Muhammad Kaab Zarrar
Abstract:
The integration of the Internet of Things (IoT) and edge computing devices offers a transformative approach to electronic waste management, particularly in the dismantling of printed circuit boards (PCBs). This paper explores how these technologies optimize operational efficiency and improve environmental sustainability by addressing challenges such as data security, interoperability, scalability, and real-time data processing. Proposed solutions include advanced machine learning algorithms for predictive maintenance, robust encryption protocols, and scalable architectures that incorporate edge computing. Case studies from leading e-waste management facilities illustrate benefits such as improved material recovery efficiency, reduced environmental impact, improved worker safety, and optimized resource utilization. The findings highlight the potential of IoT and edge computing to revolutionize e-waste dismantling and make the case for a collaborative approach between policymakers, waste management professionals, and technology developers. This research provides important insights into the use of IoT and edge computing to make significant progress in the sustainable management of electronic wasteKeywords: internet of Things, edge computing, waste PCB disassembly, electronic waste management, data security, interoperability, machine learning, predictive maintenance, sustainable development
Procedia PDF Downloads 33313 A More Sustainable Decellularized Plant Scaffold for Lab Grown Meat with Ocean Water
Authors: Isabella Jabbour
Abstract:
The world's population is expected to reach over 10 billion by 2050, creating a significant demand for food production, particularly in the agricultural industry. Cellular agriculture presents a solution to this challenge by producing meat that resembles traditionally produced meat, but with significantly less land use. Decellularized plant scaffolds, such as spinach leaves, have been shown to be a suitable edible scaffold for growing animal muscle, enabling cultured cells to grow and organize into three-dimensional structures that mimic the texture and flavor of conventionally produced meat. However, the use of freshwater to remove the intact extracellular material from these plants remains a concern, particularly when considering scaling up the production process. In this study, two protocols were used, 1X SDS and Boom Sauce, to decellularize spinach leaves with both distilled water and ocean water. The decellularization process was confirmed by histology, which showed an absence of cell nuclei, DNA and protein quantification. Results showed that spinach decellularized with ocean water contained 9.9 ± 1.4 ng DNA/mg tissue, which is comparable to the 9.2 ± 1.1 ng DNA/mg tissue obtained with DI water. These findings suggest that decellularized spinach leaves using ocean water hold promise as an eco-friendly and cost-effective scaffold for laboratory-grown meat production, which could ultimately transform the meat industry by providing a sustainable alternative to traditional animal farming practices while reducing freshwater use.Keywords: cellular agriculture, plant scaffold, decellularization, ocean water usage
Procedia PDF Downloads 96312 Comparison of Two Online Intervention Protocols on Reducing Habitual Upper Body Postures: A Randomized Trial
Authors: Razieh Karimian, Kim Burton, Mohammad Mehdi Naghizadeh, Maryam Karimian
Abstract:
Introduction: Habitual upper body postures are associated with online learning during the COVID-19 pandemic. This study explored whether adding an exercise routine to an ergonomic advice intervention improves these postures. Methods: In this randomized trial, 42 male adolescent students with a forward head posture were randomly divided into two equal groups, one allocated to ergonomic advice alone and the other to ergonomic advice plus an exercise routine. The angles of forward head, shoulder, and back postures were measured with a photogrammetric profile technique before and after the 8-week intervention period. Findings: During home quarantine, 76% of the students used their mobile phones, while 35% used a table-chair-computer for online learning. While significant reductions of the forward, shoulder, and back angles were found in both groups (P < 0.001), the effect was significantly greater in the exercise group (P < 0.001: forward head, shoulder, and back angles reduced by some 9, 6, and 5 degrees respectively, compared with 4 degrees in the forward head, and 2 degrees in the shoulder and back angles for ergonomic advice alone. Conclusion: The exercise routine produced a greater improvement in habitual upper body postures than ergonomic advice alone, a finding that may extend beyond online learning at home.Keywords: randomized trial, online learning, adolescent, posture, exercise, ergonomic advice
Procedia PDF Downloads 66311 Distribution of Spotted Fever Group in Ixodid Ticks, Domestic Cattle and Buffalos of Faisalabad District, Punjab, Pakistan
Authors: Muhammad Sohail Sajid, Qurat-ul-Ain, Zafar Iqbal, Muhammad Nisar Khan, Asma Kausar, Adil Ejaz
Abstract:
Rickettsiosis, caused by a Spotted Fever Group Rickettsiae (SFGR), is considered as an emerging infectious disease from public and veterinary perspective. The present study reports distribution of SFGR in the host (buffalo and cattle) and vector (ticks) population determined through gene specific amplification through PCR targeting outer membrane protein (ompA). Tick and blood samples were collected using standard protocols through convenient sampling from district Faisalabad. Ticks were dissected to extract salivary glands (SG). Blood and tick SG pools were subjected to DNA extraction and amplification of ompA using PCR. Overall prevalence of SFGR was reported as 21.5% and 33.6 % from blood and ticks, respectively. Hyalomma anatolicum was more prevalent tick associated with SFGR as compared to Rhipicephalus sp. Higher prevalence of SFGR was reported in cattle (25%) population as compared to that of buffalo (17.07%). On seasonal basis, high SFGR prevalence was recorded during spring season (48.1%, 26.32%, 17.76%) as compared to winter (27.9%, 21.43%, 15.38%) in vector and host (cattle and buffalo respectively) population. Sequencing analysis indicated that rickettsial endo-symbionts were associated with ticks of the study area. These results provided baseline information about the prevalence of SFGR in vector and host population.Keywords: Rickettsia, livestock, polymerase chain reaction, sequencing, ticks, vectors
Procedia PDF Downloads 273310 Design and Development of Optical Sensor Based Ground Reaction Force Measurement Platform for GAIT and Geriatric Studies
Authors: K. Chethana, A. S. Guru Prasad, S. N. Omkar, B. Vadiraj, S. Asokan
Abstract:
This paper describes an ab-initio design, development and calibration results of an Optical Sensor Ground Reaction Force Measurement Platform (OSGRFP) for gait and geriatric studies. The developed system employs an array of FBG sensors to measure the respective ground reaction forces from all three axes (X, Y and Z), which are perpendicular to each other. The novelty of this work is two folded. One is in its uniqueness to resolve the tri axial resultant forces during the stance in to the respective pure axis loads and the other is the applicability of inherently advantageous FBG sensors which are most suitable for biomechanical instrumentation. To validate the response of the FBG sensors installed in OSGRFP and to measure the cross sensitivity of the force applied in other directions, load sensors with indicators are used. Further in this work, relevant mathematical formulations are presented for extracting respective ground reaction forces from wavelength shifts/strain of FBG sensors on the OSGRFP. The result of this device has implications in understanding the foot function, identifying issues in gait cycle and measuring discrepancies between left and right foot. The device also provides a method to quantify and compare relative postural stability of different subjects under test, which has implications in post surgical rehabilitation, geriatrics and optimizing training protocols for sports personnel.Keywords: balance and stability, gait analysis, FBG applications, optical sensor ground reaction force platform
Procedia PDF Downloads 404309 Feasibility of Using Bike Lanes in Conjunctions with Sidewalks for Ground Drone Applications in Last Mile Delivery for Dense Urban Areas
Authors: N. Bazyar Shourabi, K. Nyarko, C. Scott, M. Jeihnai
Abstract:
Ground drones have the potential to reduce the cost and time of making last-mile deliveries. They also have the potential to make a huge impact on human life. Despite this potential, little work has gone into developing a suitable feasibility model for ground drone delivery in dense urban areas. Today, most of the experimental ground delivery drones utilize sidewalks only, with just a few of them starting to use bike lanes, which a significant portion of some urban areas have. This study works on the feasibility of using bike lanes in conjunction with sidewalks for ground drone applications in last-mile delivery for dense urban areas. This work begins with surveying bike lanes and sidewalks within the city of Boston using Geographic Information System (GIS) software to determine the percentage of coverage currently available within the city. Then six scenarios are examined. Based on this research, a mathematical model is developed. The daily cost of delivering packages using each scenario is calculated by the mathematical model. Comparing the drone delivery scenarios with the traditional method of package delivery using trucks will provide essential information concerning the feasibility of implementing routing protocols that combine the use of sidewalks and bike lanes. The preliminary results of the model show that ground drones that can travel via sidewalks or bike lanes have the potential to significantly reduce delivery cost.Keywords: ground drone, intelligent transportation system, last-mile delivery, sidewalk robot
Procedia PDF Downloads 147308 Wire Localization Procedures in Non-Palpable Breast Cancers: An Audit Report and Review of Literature
Authors: Waqas Ahmad, Eisha Tahir, Shahper Aqeel, Imran Khalid Niazi, Amjad Iqbal
Abstract:
Background: Breast conservation surgery applies a number of techniques for accurate localization of lesions. Wire localization remains the method of choice in non-palpable breast cancers post-neoadjuvant chemotherapy. Objective: The aim of our study was to determine the accuracy of wire localization procedures in our department and compare it with internationally set protocols as per the Royal College of Radiologists. Post wire mammography, as well as the margin status of the postoperative specimen, assessed the accuracy of the procedure. Methods: We retrospectively reviewed the data of 225 patients who presented to our department from May 2014 to June 2015 post neoadjuvant chemotherapy with non-palpable cancers. These patients are candidates for wire localized lumpectomies either under ultrasound or stereotactic guidance. Metallic marker was placed in all the patients at the time of biopsy. Post wire mammogram was performed in all the patients and the distance of the wire tip from the marker was calculated. The presence or absence of the metallic clip in the postoperative specimen, as well as the marginal status of the postoperative specimen, was noted. Results: 157 sonographic and 68 stereotactic wire localization procedures were performed. 95% of the wire tips were within 1 cm of the metallic marker. Marginal status was negative in 94% of the patients in histopathological specimen. Conclusion: Our audit report declares more than 95% accuracy of image guided wire localization in successful excision of non-palpable breast lesions.Keywords: breast, cancer, non-palpable, wire localization
Procedia PDF Downloads 312307 Promoting Organizational Learning Facing the Complexity of Public Healthcare: How to Design a Voluntary, Learning-Oriented Benchmarking
Authors: Rachel M. Lørum, Henrik Eriksson, Frida Smith
Abstract:
Purpose: In recent years, the use of benchmarks for the improvement of healthcare has become increasingly common. There has been an increasing interest in why improvement initiatives so often fail to eliminate the problems they aspire to solve. Benchmarking comes with its fair share of challenges and problems, such as capturing the dynamics and complexities of the care environments, among others. In this study, we demonstrate how learning-oriented, voluntary benchmarks in the complex environment of public healthcare could be designed. Findings: Our four most important findings were the following: first, important organizational learning (OL) regarding the complexity of the service and implications on how to design a benchmark for learning and improvement occurred during the process. Second, participation by a wide range of professionals and stakeholders was crucial for capturing the complexity of people and organizations and increasing the quality of the template. Third, the continuous dialogue between all organizations involved was an important tool for ongoing organizational learning throughout the process. The last important finding was the impact of the facilitator’s role through supporting progress, coordination, and dialogue. Design: We chose participatory design as the research design. Data were derived from written materials such as e-mails, protocols, observational notes, and reflection notes collected during a period of 1.5 years. Originality: Our main contributions are the identification of important strategies, initiatives, and actors to involve when designing voluntary benchmarks for learning and improvement.Keywords: organizational learning, quality improvement, learning-oriented benchmark, healthcare, patient safety
Procedia PDF Downloads 114306 Knowledge of the Doctors Regarding International Patient Safety Goal
Authors: Fatima Saeed, Abdullah Mudassar
Abstract:
Introduction: Patient safety remains a global priority in the ever-evolving healthcare landscape. At the forefront of this endeavor are the International Patient Safety Goals (IPSGs), a standardized framework designed to mitigate risks and elevate the quality of care. Doctors, positioned as primary caregivers, wield a pivotal role in upholding and adhering to IPSGs, underscoring the critical significance of their knowledge and understanding of these goals. This research embarks on a comprehensive exploration into the depth of Doctors ' comprehension of IPSGs, aiming to unearth potential gaps and provide insights for targeted educational interventions. Established by influential healthcare bodies, including the World Health Organization (WHO), IPSGs represent a universally applicable set of objectives spanning crucial domains such as medication safety, infection control, surgical site safety, and patient identification. Adherence to these goals has exhibited substantial reductions in adverse events, fostering an overall enhancement in the quality of care. This study operates on the fundamental premise that an informed Doctors workforce is indispensable for effectively implementing IPSGs. A nuanced understanding of these goals empowers Doctors to identify potential risks, advocate for necessary changes, and actively contribute to a safety-centric culture within healthcare institutions. Despite the acknowledged importance of IPSGs, there is a growing concern that nurses may need more knowledge to integrate these goals into their practice seamlessly. Methodology: A Comprehensive research methodology covering study design, setting, duration, sample size determination, sampling technique, and data analysis. It introduces the philosophical framework guiding the research and details material, methods, and the analysis framework. The descriptive quantitative cross-sectional study in teaching care hospitals utilized convenient sampling over six months. Data collection involved written informed consent and questionnaires, analyzed with SPSS version 23, presenting results graphically and descriptively. The chapter ensures a clear understanding of the study's design, execution, and analytical processes. Result: The survey results reveal a substantial distribution across hospitals, with 34.52% in MTIKTH and 65.48% in HMC MTI. There is a notable prevalence of patient safety incidents, emphasizing the significance of adherence to IPSGs. Positive trends are observed, including 77.0% affirming the "time-out" procedure, 81.6% acknowledging effective healthcare provider communication, and high recognition (82.7%) of the purpose of IPSGs to improve patient safety. While the survey reflects a good understanding of IPSGs, areas for improvement are identified, suggesting opportunities for targeted interventions. Discussion: The study underscores the need for tailored care approaches and highlights the bio-socio-cultural context of 'contagion,' suggesting areas for further research amid antimicrobial resistance. Shifting the focus to patient safety practices, the survey chapter provides a detailed overview of results, emphasizing workplace distribution, patient safety incidents, and positive reflections on IPSGs. The findings indicate a positive trend in patient safety practices with areas for improvement, emphasizing the ongoing need for reinforcing safety protocols and cultivating a safety-centric culture in healthcare. Conclusion: In summary, the survey indicates a positive trend in patient safety practices with a good understanding of IPSGs among participants. However, identifying areas for potential improvement suggests opportunities for targeted interventions to enhance patient safety further. Ongoing efforts to reinforce adherence to safety protocols, address identified gaps, and foster a safety culture will contribute to continuous improvements in patient care and outcomes.Keywords: infection control, international patient safety, patient safety practices, proper medication
Procedia PDF Downloads 55305 Optimizing DWDM Networks with Zero-Touch Provisioning for High-Capacity Data Transmission
Authors: Saqib Warsi
Abstract:
The evolution of optical communication technologies is pivotal in meeting the growing data demand driven by emerging technologies such as 5G, IoT, and upcoming 6G networks. This paper presents advancements in Dense Wavelength Division Multiplexing (DWDM) systems, focusing on the integration of Zero Touch Provisioning (ZTP) for simplified deployment and the ability to scale data transmission over single fiber pairs. The proposed methodology leverages high-capacity DWDM channels capable of supporting data rates exceeding 800G, ensuring future-proof solutions for both residential and enterprise communication infrastructures. Moreover, this paper examines the impact of these technologies on operational efficiency by minimizing the need for manual configuration, leading to reduced costs and faster deployment timelines. We also explore how the integration of optical amplifiers, Optical Line Amplifier (OLA) alternatives, and optical control plane protocols (such as ASON, GMPLS, OpenFlow, and SDN) play a critical role in enhancing the flexibility, scalability, and energy efficiency of optical networks. By focusing on optical solutions, this paper seeks to address the future challenges of reducing fiber pair consumption and improving network performance without compromising on capacity or reliability.Keywords: zero-touch provisioning (ZTP), dense wavelength division multiplexing (DWDM), optical networks, optical control plane (ASON, GMPLS, OpenFlow, SDN)
Procedia PDF Downloads 3304 Dental Ethics versus Malpractice, as Phenomenon with a Growing Trend
Authors: Saimir Heta, Kers Kapaj, Rialda Xhizdari, Ilma Robo
Abstract:
Dealing with emerging cases of dental malpractice with justifications that stem from the clear rules of dental ethics is a phenomenon with an increasing trend in today's dental practice. Dentists should clearly understand how far the limit of malpractice goes, with or without minimal or major consequences, for the affected patient, which can be justified as a complication of dental treatment, in support of the rules of dental ethics in the dental office. Indeed, malpractice can occur in cases of lack of professionalism, but it can also come as a consequence of anatomical and physiological limitations in the implementation of the dental protocols, predetermined and indicated by the patient in the paragraph of the treatment plan in his personal card. This study is of the review type with the aim of the latest findings published in the literature about the problem of dealing with these phenomena. The combination of keywords is done in such a way with the aim to give the necessary space for collecting the right information in the networks of publications about this field, always first from the point of view of the dentist and not from that of the lawyer or jurist. From the findings included in this article, it was noticed the diversity of approaches towards the phenomenon depends on the different countries based on the legal basis that these countries have. There is a lack of or a small number of articles that touch on this topic, and these articles are presented with a limited number of data on the same topic. Conclusions: Dental malpractice should not be hidden under the guise of various dental complications that we justify with the strict rules of ethics for patients treated in the dental chair. The individual experience of dental malpractice must be published with the aim of serving as a source of experience for future generations of dentists.Keywords: dental ethics, malpractice, professional protocol, random deviation
Procedia PDF Downloads 97303 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents
Authors: U. Ugochukwu, J. Lee, P. Conley
Abstract:
According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.Keywords: ergonomics, hazard, on-boarding, surveillance, workplace
Procedia PDF Downloads 330302 Identification of Knee Dynamic Profiles in High Performance Athletes with the Use of Motion Tracking
Authors: G. Espriú-Pérez, F. A. Vargas-Oviedo, I. Zenteno-Aguirrezábal, M. D. Moya-Bencomo
Abstract:
One of the injuries with a higher incidence among university-level athletes in the North of Mexico is presented in the knee. This injury generates absenteeism in training and competitions for at least 8 weeks. There is no active quantitative methodology, or protocol, that directly contributes to the clinical evaluation performed by the medical personnel at the prevalence of knee injuries. The main objective is to contribute with a quantitative tool that allows further development of preventive and corrective measures to these injuries. The study analyzed 55 athletes for 6 weeks, belonging to the disciplines of basketball, volleyball, soccer and swimming. Using a motion capture system (Nexus®, Vicon®), a three-dimensional analysis was developed that allows the measurement of the range of movement of the joint. To focus on the performance of the lower limb, eleven different movements were chosen from the Functional Performance Test, Functional Movement Screen, and the Cincinnati Jump Test. The research identifies the profile of the natural movement of a healthy knee, with the use of medical guidance, and its differences between each sport. The data recovered by the single-leg crossover hop managed to differentiate the type of knee movement among athletes. A maximum difference of 60° of offset was found in the adduction movement between male and female athletes of the same discipline. The research also seeks to serve as a guideline for the implementation of protocols that help identify the recovery level of such injuries.Keywords: Cincinnati jump test, functional movement screen, functional performance test, knee, motion capture system
Procedia PDF Downloads 126301 Design of SAE J2716 Single Edge Nibble Transmission Digital Sensor Interface for Automotive Applications
Authors: Jongbae Lee, Seongsoo Lee
Abstract:
Modern sensors often embed small-size digital controller for sensor control, value calibration, and signal processing. These sensors require digital data communication with host microprocessors, but conventional digital communication protocols are too heavy for price reduction. SAE J2716 SENT (single edge nibble transmission) protocol transmits direct digital waveforms instead of complicated analog modulated signals. In this paper, a SENT interface is designed in Verilog HDL (hardware description language) and implemented in FPGA (field-programmable gate array) evaluation board. The designed SENT interface consists of frame encoder/decoder, configuration register, tick period generator, CRC (cyclic redundancy code) generator/checker, and TX/RX (transmission/reception) buffer. Frame encoder/decoder is implemented as a finite state machine, and it controls whole SENT interface. Configuration register contains various parameters such as operation mode, tick length, CRC option, pause pulse option, and number of nibble data. Tick period generator generates tick signals from input clock. CRC generator/checker generates or checks CRC in the SENT data frame. TX/RX buffer stores transmission/received data. The designed SENT interface can send or receives digital data in 25~65 kbps at 3 us tick. Synthesized in 0.18 um fabrication technologies, it is implemented about 2,500 gates.Keywords: digital sensor interface, SAE J2716, SENT, verilog HDL
Procedia PDF Downloads 305300 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 61299 Digital Forensic Exploration Framework for Email and Instant Messaging Applications
Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed
Abstract:
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.Keywords: forensics, network sessions, packet reconstruction, packet reordering
Procedia PDF Downloads 344298 Insights Into Serotonin-Receptor Binding and Stability via Molecular Dynamics Simulations: Key Residues for Electrostatic Interactions and Signal Transduction
Authors: Arunima Verma, Padmabati Mondal
Abstract:
Serotonin-receptor binding plays a key role in several neurological and biological processes, including mood, sleep, hunger, cognition, learning, and memory. In this article, we performed molecular dynamics simulation to examine the key residues that play an essential role in the binding of serotonin to the G-protein-coupled 5-HT₁ᴮ receptor (5-HT₁ᴮ R) via electrostatic interactions. An end-point free energy calculation method (MM-PBSA) determines the stability of the 5-HT1B R due to serotonin binding. The single-point mutation of the polar or charged amino acid residues (Asp129, Thr134) on the binding sites and the calculation of binding free energy validate the importance of these residues in the stability of the serotonin-receptor complex. Principal component analysis indicates the serotonin-bound 5-HT1BR is more stabilized than the apo-receptor in terms of dynamical changes. The difference dynamic cross-correlations map shows the correlation between the transmembrane and mini-Go, which indicates signal transduction happening between mini-Go and the receptor. Allosteric communication reveals the key nodes for signal transduction in 5-HT1BR. These results provide useful insights into the signal transduction pathways and mutagenesis study to regulate the functionality of the complex. The developed protocols can be applied to study local non-covalent interactions and long-range allosteric communications in any protein-ligand system for computer-aided drug design.Keywords: allostery, CADD, MD simulations, MM-PBSA
Procedia PDF Downloads 87297 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects
Authors: Ma Yuzhe, Burra Venkata Durga Kumar
Abstract:
The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.Keywords: Linux, operating system, system management, security
Procedia PDF Downloads 111296 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity
Procedia PDF Downloads 48295 Ovarian Hormones and Antioxidants Biomarkers in Dromedary Camels Synchronized with Controlled Intravaginal Drug Release/Ovsynch GPG Program during Breeding Season
Authors: Heba Hozyen, Ragab Mohamed, Amal Abd El Hameed, Amal Abo El-Maaty
Abstract:
This study aimed to investigate the effect of CIDR and ovsynch (Gonadotropin-prostaglandine-gonadotropin GPG) protocols for synchronization of follicular waves of dromedary camels on ovarian hormones, oxidative stress and conception during breeding season. Twelve dark colored dromedary camels were divided into two equal groups. The first group was subjected to CIDR insertion for 7 days and blood samples were collected each other day from the day of CIDR insertion (day 0) till day 21. The other group was subjected to GPG system (Ovsynch) and blood samples were collected daily for 11 days. Progesterone (P4) and estradiol were assayed using commercial ELISA diagnostic EIA kits. Catalase (CAT), total antioxidants capacity (TAC), glutathione reduced (GHD), lipid peroxide product (malondialdehyde, MDA) and nitric oxide (NO) were measured colorimetrically using spectrophotometer. Results revealed that CIDR treated camels had significantly high P4 (P= 0.0001), estradiol (P= 0.0001), CAT (P= 0.034), NO (P= 0.016) and TAC (P= 0.04) but significantly low MDA (P= 0.001) and GHD (P= 0.003) compared to GPG treated ones. Camels inserted with CIDR had higher conception rate (66.7%) compared to those treated with GPG (33%). In conclusion, camels treated with CIDR had higher hormonal response and antioxidant capacity than those synchronized with GPG which positively reflected on their conception rate. The better response of camels to CIDR and the higher conception compared to GPG protocol recommends its use for future reproductive management in camels.Keywords: antioxidants, camel, CIDR, season, steroid hormones
Procedia PDF Downloads 292294 Sustainable and Efficient Recovery of Polyhydroxyalkanoate Polymer from Cupriavidus necator Using Environment Friendly Solvents
Authors: Geeta Gahlawat, Sanjeev Kumar Soni
Abstract:
An imprudent use of environmentally hazardous petrochemical-based plastics and limited availability of fossil fuels have provoked research interests towards production of biodegradable plastics - polyhydroxyalkanoate (PHAs). However, the industrial application of PHAs based products is primarily restricted by their high cost of recovery and extraction protocols. Moreover, solvents used for the extraction and purification are toxic and volatile which causes adverse environmental hazards. Development of efficient downstream recovery strategies along with utilization of non-toxic solvents will accelerate their commercialization. In this study, various extraction strategies were designed for sustainable and cost-effective recovery of PHAs from Cupriavidus necator using non-toxic environment friendly solvents viz. 1,2-propylene carbonate, ethyl acetate, isoamyl alcohol, butyl acetate. The effect of incubation time i.e. 10, 30 and 50 min and temperature i.e. 60, 80, 100, 120°C was tested to identify the most suitable solvent. PHAs extraction using a recyclable solvent, 1,2 propylene carbonate, showed the highest recovery yield (90%) and purity (93%) at 120°C and 30 min incubation. Ethyl acetate showed the better capacity to recover PHAs from cells than butyl acetate. Extraction with ethyl acetate exhibited high recovery yield and purity of 96% and 92%, respectively at 100°C. Effect of non-toxic surfactant such as linear alkylbenzene sulfonic acid (LAS) was also studied at 40, 60 and 80°C, and detergent pH range of 3.0, 5.0, 7.0 and 9.0 for the extraction of PHAs from the cells. LAS gave highest yield of 86% and purity of 88% at temperature 80°C and 5.0 pH.Keywords: polyhydroxyalkanoates, Cupriavidus necator, extraction, recovery yield
Procedia PDF Downloads 510293 The Role of the Linguistic Mediator in Relation to Culturally Oriented Crimes
Authors: Andreas Aceranti, Simonetta Vernocchi, Elisabetta Aldrovandi, Marco Colorato, Carolina Ascrizzi
Abstract:
Nowadays, especially due to an increasing flow of migration and uncontrolled globalisation, linguistic, cultural and religious differences can be a major obstacle for people belonging to different ethnic groups. Each group has its own traditional background, which, in addition to its positive aspects, also includes extremely unpleasant and dramatic situations: culture-related crimes. We analysed several cases belonging to this category of crime which is becoming more and more present in Europe, creating not only a strong social rift dictated by the misunderstanding between migrants and host populations but also by the isolation and ghettoisation of subjects classified as 'different'. Such social rejection, in fact, represents a great source of stress and frustration for those who seek to be part of the community and can generate phenomena of rebellion that result in violent acts. Similar situations must be addressed by the figure of the cultural-linguistic mediator who, thanks to his or her multidisciplinary knowledge, assumes the role of a 'bridge', thus helping the process of awareness and understanding within the social group through the use of various tools, including awareness-raising campaigns and interventions in both the school and social-health sectors. By analysing how the notions of culture and offense have evolved throughout history until they have merged into a single principle and, secondly, how the figure of the language mediator represents a fundamental role in the resolution of conflicts related to cultural diversity has helped us define the basis for new protocols in dealing with such crimes. Especially we have to define the directions of further investigations that we will carry out in the next months.Keywords: cultural crimes, hatred crimes, immigration, cultural mediation
Procedia PDF Downloads 79292 Percentage Change in the Selected Skinfold Measurements of Male Students of University of Delhi Due to Progressive and Constant Load of Physical Training
Authors: Seema Kaushik
Abstract:
Skinfold measurements provide considerably meaningful and consistent information about subcutaneous fat and its distribution. Physical activities in the form of conditioning and/or training leads to various structural, functional and mechanical changes and numerous training programmes exist for the improvement of physical fitness, however, most of the studies are conducted on foreign soil with foreign population as sample, which may/may not be applicable to the Indian conditions. Moreover, there is not even a single training/ conditioning programme that caters to the need of male students of University of Delhi with regard to various skinfold thickness measurements. Hence, the present study aimed at studying the effect of progressive and constant load training on selected skinfold measurements of male students of University of Delhi in form of percentage change. The sample size for the study was 90 having three groups of male; 30 samples in each group (mean age = 20.04±0.49 years). The variables included triceps, sub-scapular, supra-iliac and calf skinfolds. The experimental design adopted for the study was multi-group repeated measure design. Three different groups were measured four times repeatedly at an interval of 6 weeks, on completion of each of the three meso-cycles. Standard landmarks and protocols were followed to measure the selected variables. Mean, standard deviation and percentage were computed to analyze the data statistically. The study concluded that both the progressive and constant load of physical training bring changes in the skinfold thickness measurements of male students of University of Delhi.Keywords: constant load, progressive load, physical training, skinfold measurements
Procedia PDF Downloads 322291 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 81290 Evolutionary Swarm Robotics: Dynamic Subgoal-Based Path Formation and Task Allocation for Exploration and Navigation in Unknown Environments
Authors: Lavanya Ratnabala, Robinroy Peter, E. Y. A. Charles
Abstract:
This research paper addresses the challenges of exploration and navigation in unknown environments from an evolutionary swarm robotics perspective. Path formation plays a crucial role in enabling cooperative swarm robots to accomplish these tasks. The paper presents a method called the sub-goal-based path formation, which establishes a path between two different locations by exploiting visually connected sub-goals. Simulation experiments conducted in the Argos simulator demonstrate the successful formation of paths in the majority of trials. Furthermore, the paper tackles the problem of inter-collision (traffic) among a large number of robots engaged in path formation, which negatively impacts the performance of the sub-goal-based method. To mitigate this issue, a task allocation strategy is proposed, leveraging local communication protocols and light signal-based communication. The strategy evaluates the distance between points and determines the required number of robots for the path formation task, reducing unwanted exploration and traffic congestion. The performance of the sub-goal-based path formation and task allocation strategy is evaluated by comparing path length, time, and resource reduction against the A* algorithm. The simulation experiments demonstrate promising results, showcasing the scalability, robustness, and fault tolerance characteristics of the proposed approach.Keywords: swarm, path formation, task allocation, Argos, exploration, navigation, sub-goal
Procedia PDF Downloads 42289 Trauma System in England: An Overview and Future Directions
Authors: Raheel Shakoor Siddiqui, Sanjay Narayana Murthy, Manikandar Srinivas Cheruvu, Kash Akhtar
Abstract:
Major trauma is a dynamic public health epidemic that is continuously evolving. Major trauma care services rely on multi-disciplinary team input involving highly trained pre and in-hospital critical care teams. Pre-hospital critical care teams (PHCCTs), major trauma centres (MTCs), trauma units, and rehabilitation facilities all form an efficient and organised trauma system. England comprises 27 MTCs funded by the National Health Service (NHS). Major trauma care entails enhanced resuscitation protocols coupled with the expertise of dedicated trauma teams and rapid radiological imaging to improve trauma outcomes. Literature reports a change in the demographic of major trauma as elderly patients (silver trauma) with injuries sustained from a fall of 2 metres or less commonly present to services. Evidence of an increasing population age with multiple comorbidities necessitates treatment within the first hour of injury (golden hour) to improve trauma survival outcomes. Staffing and funding pressures within the NHS have subsequently led to a shortfall of available physician-led PHCCTs. Thus, there is a strong emphasis on targeted research and funding to appropriately deploy resources to deprived areas. This review article will discuss the current English trauma system whilst critically appraising present challenges, identifying insufficiencies, and recommending aims for an improved future trauma system in England.Keywords: trauma, orthopaedics, major trauma, trauma system, trauma network
Procedia PDF Downloads 188288 Testing the Possibility of Healthy Individuals to Mimic Fatigability in Multiple Sclerotic Patients
Authors: Emmanuel Abban Sagoe
Abstract:
A proper functioning of the Central Nervous System ensures that we are able to accomplish just about everything we do as human beings such as walking, breathing, running, etc. Myelinated neurons throughout the body which transmit signals at high speeds facilitate these actions. In the case of MS, the body’s immune system attacks the myelin sheath surrounding the neurons and overtime destroys the myelin sheaths. Depending upon where the destruction occurs in the brain symptoms can vary from person to person. Fatigue is, however, the biggest problem encountered by an MS sufferer. It is very often described as the bedrock upon which other symptoms of MS such challenges in balance and coordination, dizziness, slurred speech, etc. may occur. Classifying and distinguishing between perceptions based fatigue and performance based fatigability is key to identifying appropriate treatment options for patients. Objective methods for assessing motor fatigability is also key to providing clinicians and physiotherapist with critical information on the progression of the symptom. This study tested if the Fatigue Index Kliniken Schmieder assessment tool can detect fatigability as seen in MS patients when healthy subjects with no known history of neurological pathology mimic abnormal gaits. Thirty three healthy adults between ages 18-58years volunteered as subjects for the study. The subjects, strapped with RehaWatch sensors on both feet, completed 6 gait protocols of normal and mimicked fatigable gaits for 60 seconds per each gait and at 1.38889m/s treadmill speed following clear instructions given.Keywords: attractor attributes, fatigue index Kliniken Schmieder, gait variability, movement pattern
Procedia PDF Downloads 123287 Estimation of Effective Radiation Dose Following Computed Tomography Urography at Aminu Kano Teaching Hospital, Kano Nigeria
Authors: Idris Garba, Aisha Rabiu Abdullahi, Mansur Yahuza, Akintade Dare
Abstract:
Background: CT urography (CTU) is efficient radiological examination for the evaluation of the urinary system disorders. However, patients are exposed to a significant radiation dose which is in a way associated with increased cancer risks. Objectives: To determine Computed Tomography Dose Index following CTU, and to evaluate organs equivalent doses. Materials and Methods: A prospective cohort study was carried at a tertiary institution located in Kano northwestern. Ethical clearance was sought and obtained from the research ethics board of the institution. Demographic, scan parameters and CT radiation dose data were obtained from patients that had CTU procedure. Effective dose, organ equivalent doses, and cancer risks were estimated using SPSS statistical software version 16 and CT dose calculator software. Result: A total of 56 patients were included in the study, consisting of 29 males and 27 females. The common indication for CTU examination was found to be renal cyst seen commonly among young adults (15-44yrs). CT radiation dose values in DLP, CTDI and effective dose for CTU were 2320 mGy cm, CTDIw 9.67 mGy and 35.04 mSv respectively. The probability of cancer risks was estimated to be 600 per a million CTU examinations. Conclusion: In this study, the radiation dose for CTU is considered significantly high, with increase in cancer risks probability. Wide radiation dose variations between patient doses suggest that optimization is not fulfilled yet. Patient radiation dose estimate should be taken into consideration when imaging protocols are established for CT urography.Keywords: CT urography, cancer risks, effective dose, radiation exposure
Procedia PDF Downloads 345