Search results for: authentication mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2595

Search results for: authentication mechanisms

2265 Local People’s Livelihoods and Coping Strategies in the Wake of a Co-management System in the Campo Ma'an National Park, Cameroon

Authors: Nchanji Yvonne Kiki, Mala William Armand, Nchanji Eileen Bogweh, Ramcilovik-Suominen Sabaheta, Kotilainen Juha

Abstract:

The Campo Ma'an National Park was created as part of an environmental and biodiversity compensation for the Chad-Cameroon Oil Pipeline Project, which was meant to help alleviate poverty and boost the livelihood of rural communities around the area. This paper examines different strategies and coping mechanisms employed by the indigenous people and local communities to deal with the national and internationally driven conservation policies and initiatives in the case of the Campo Ma'an National Park. While most literature on park management/co-management/nature conservation has focused on the negative implications for local peoples’ livelihoods, fewer studies have investigated the strategies of local people to respond to these policies and renegotiate their position in a way that enables them to continue their traditional livelihoods using the existing local knowledge systems. This study contributes to the current literature by zooming into not only the impacts of nature conservation policies but also the local individual and collective strategies and responses to such policies and initiatives. We employ a qualitative research approach using ethnomethodology and a convivial lens to analyze data collected from October to November 2018. We find that conservation policies have worsened some existing livelihoods on the one hand and constrained livelihood improvement of indigenous people and local communities (IPLC) on the other hand. Nonetheless, the IPLC has devised individual and collective coping mechanisms to deal with these conservation interventions and the negative effects they have caused. Upon exploring these mechanisms and their effectiveness, this study proposes a management approach to conservation centered on both people and nature, based on indigenous and local people's knowledge and practices, promoting nature for and by humans and strengthening both livelihood and conservation. We take inspiration from the convivial conservation approach and thinking by Bucher and Fletcher.

Keywords: conservation policies, national park management, indigenous and local people’s experiences, livelihoods, local knowledge, coping strategies, conviviality

Procedia PDF Downloads 160
2264 Carvedilol Ameliorates Potassium Dichromate-Induced Acute Renal Injury in Rats: Plausible Role of Inflammation and Apoptosis

Authors: Bidya Dhar Sahu, Meghana Koneru, R. Shyam Sunder, Ramakrishna Sistla

Abstract:

Environmental and occupational exposure to hexavalent chromium [Cr(VI)] via textile manufacture, metallurgy, spray paints, stainless steel industries, drinking water containing chromium are often known to cause acute renal injury in humans and animals. Nephrotoxicity is the major effect of chromium poisoning. In the present study, we investigated the potential renoprotective effect and underlying mechanisms of carvedilol using rat model of potassium dichromate (K2Cr2O7)-induced nephrotoxicity. Exploration of the underlying mechanisms of carvedilol revealed that carvedilol attenuated nuclear translocation and DNA binding activity of NF-κB (p65), restored antioxidant and mitochondrial respiratory enzyme activities and attenuated apoptosis related protein expressions in kidney tissues. The serum levels of TNF-α, the renal iNOS and myeloperoxidase activity were significantly decreased in carvedilol pre-treated K2Cr2O7-induced nephrotoxic rats. These results were further supported and confirmed by histological findings. In conclusion, the findings of the present study demonstrated that carvedilol is an effective chemoprotectant against K2Cr2O7-induced nephrotoxicity in rats.

Keywords: apoptosis, carvedilol, inflammation, potassium dichromate-induced nephrotoxicity, applied pharmacology

Procedia PDF Downloads 256
2263 Phase Synchronization of Skin Blood Flow Oscillations under Deep Controlled Breathing in Human

Authors: Arina V. Tankanag, Gennady V. Krasnikov, Nikolai K. Chemeris

Abstract:

The development of respiration-dependent oscillations in the peripheral blood flow may occur by at least two mechanisms. The first mechanism is related to the change of venous pressure due to mechanical activity of lungs. This phenomenon is known as ‘respiratory pump’ and is one of the mechanisms of venous return of blood from the peripheral vessels to the heart. The second mechanism is related to the vasomotor reflexes controlled by the respiratory modulation of the activity of centers of the vegetative nervous system. Early high phase synchronization of respiration-dependent blood flow oscillations of left and right forearm skin in healthy volunteers at rest was shown. The aim of the work was to study the effect of deep controlled breathing on the phase synchronization of skin blood flow oscillations. 29 normotensive non-smoking young women (18-25 years old) of the normal constitution without diagnosed pathologies of skin, cardiovascular and respiratory systems participated in the study. For each of the participants six recording sessions were carried out: first, at the spontaneous breathing rate; and the next five, in the regimes of controlled breathing with fixed breathing depth and different rates of enforced breathing regime. The following rates of controlled breathing regime were used: 0.25, 0.16, 0.10, 0.07 and 0.05 Hz. The breathing depth amounted to 40% of the maximal chest excursion. Blood perfusion was registered by laser flowmeter LAKK-02 (LAZMA, Russia) with two identical channels (wavelength 0.63 µm; emission power, 0.5 mW). The first probe was fastened to the palmar surface of the distal phalanx of left forefinger; the second probe was attached to the external surface of the left forearm near the wrist joint. These skin zones were chosen as zones with different dominant mechanisms of vascular tonus regulation. The degree of phase synchronization of the registered signals was estimated from the value of the wavelet phase coherence. The duration of all recording was 5 min. The sampling frequency of the signals was 16 Hz. The increasing of synchronization of the respiratory-dependent skin blood flow oscillations for all controlled breathing regimes was obtained. Since the formation of respiration-dependent oscillations in the peripheral blood flow is mainly caused by the respiratory modulation of system blood pressure, the observed effects are most likely dependent on the breathing depth. It should be noted that with spontaneous breathing depth does not exceed 15% of the maximal chest excursion, while in the present study the breathing depth was 40%. Therefore it has been suggested that the observed significant increase of the phase synchronization of blood flow oscillations in our conditions is primarily due to an increase of breathing depth. This is due to the enhancement of both potential mechanisms of respiratory oscillation generation: venous pressure and sympathetic modulation of vascular tone.

Keywords: deep controlled breathing, peripheral blood flow oscillations, phase synchronization, wavelet phase coherence

Procedia PDF Downloads 184
2262 Halal Authentication for Some Product Collected from Jordanian Market Using Real-Time PCR

Authors: Omar S. Sharaf

Abstract:

The mitochondrial 12s rRNA (mt-12s rDNA) gene for pig-specific was developed to detect material from pork species in different products collected from Jordanian market. The amplification PCR products of 359 bp and 531 bp were successfully amplified from the cyt b gene of pig the amplification product using mt-12S rDNA gene were successfully produced a single band with a molecular size of 456 bp. In the present work, the PCR amplification of mtDNA of cytochrome b has been shown as a suitable tool for rapid detection of pig DNA. 100 samples from different dairy, gelatin and chocolate based products and 50 samples from baby food formula were collected and tested to a presence of any pig derivatives. It was found that 10% of chocolate based products, 12% of gelatin and 56% from dairy products and 5.2% from baby food formula showed single band from mt-12S rDNA gene.

Keywords: halal food, baby infant formula, chocolate based products, PCR, Jordan

Procedia PDF Downloads 512
2261 Understanding the Mechanisms of Salmonella Typhimurium Resistance to Cannabidiol (CDB)

Authors: Iddrisu Ibrahim, Joseph Atia Ayariga, Junhuan Xu, Daniel A. Abugri, Robertson K. Boakai, Olufemi S. Ajayi

Abstract:

The recalcitrance of pathogenic bacteria indicates that millions of people who are at risk of infection arising from chronic diseases, surgery, organ transplant, diabetes, and several other debilitating diseases present an aura of potentially untreatable illness due to resistance development. Antimicrobial resistance has successfully become a global health menace, and resistances are often acquired by bacteria through health-care-related incidence (HRI) orchestrated by multi-drug resistant (MDR) and extended drug-resistant pathogens (EDRP). To understand the mechanisms S. Typhimurium uses to resist CDB, we study the abundance of LPS modification, Ergosterols, Mysristic palmitic resistance, Oleic acid resistance of susceptible and resistant S. Typhimurium. Using qPCR, we also analyzed the expression of selected genes known for enabling resistance in S. Typhimurium. We found high abundance of LPS, Ergosterols, Mysristic palmitic resistance, Oleic acid resistance of and high expression of resistant genes in S. Typhimurium compared to the susceptible strain. LPS modification, Ergosterols, Mysristic palmitic resistance, Oleic acid and genes such as Fims, integrons, blaTEM are important indicators of resistance development of S. typhimurium.

Keywords: antimicrobials, resistance, Cannabidiol, Salmonella, blaTEM, fimA, Lipopolysaccharide, Ergosterols

Procedia PDF Downloads 48
2260 Characterization of Shrinkage-Induced Cracking of Clay Soils

Authors: Ahmad El Hajjar, Joanna Eid, Salima Bouchemella, Tariq Ouahbi, Benoit Duchemin, Said Taibi

Abstract:

In our present society, raw earth presents an alternative as an energy-saving building material for dealing with climate and environmental issues. Nevertheless, it has a sensitivity to water, due to the presence of fines, which has a direct effect on its consistency. This can be expressed during desiccation, by shrinkage deformations resulting in cracking that begins once the internal tensile stresses developed, due to suction, exceed the tensile strength of the material. This work deals with the evolution of the strain of clay samples, from the beginning of shrinkage until the initiation of crack, using the DIC (Digital Image Correlation) technique. In order to understand the origin of cracking, desiccation is studied for different boundary conditions and depending on the intrinsic characteristics of the material. On the other hand, a study of restrained shrinkage is carried out on the ring test to investigate the ultimate tensile strength from which the crack begins in the dough of clay. The purpose of this test is to find the type of reinforcement adapted to thwart in the cracking of the material. A microscopic analysis of the damaged area is necessary to link the macroscopic mechanisms of cracking to the various physicochemical phenomena at the microscopic scale in order to understand the different microstructural mechanisms and their impact on the macroscopic shrinkage.

Keywords: clayey soil, shrinkage, strain, cracking, digital image correlation

Procedia PDF Downloads 139
2259 Fouling of Regenerated Ultrafiltration Membrane in Treatment of Oily Wastewater of Palm Oil Refinery

Authors: K. F. Md Yunos, N. S. Pajar, N. S. Azmi

Abstract:

Oily wastewater in Malaysian refinery has become a big issue of water and environment pollution to be solved urgently. The results of an experimental study on separation of oily wastewaters are presented. The characteristic of filtration behavior of commercial polymer ultrafiltration (UF) membranes was evaluated in the treatment of oily wastewater from palm oil refinery. The performance of different molecular weight cut off 5kDa and 10kDa regenerated cellulose membrane were evaluated and compared and the fouling behavior were analyzed by scanning electron microscopy (SEM). The effect of pressure (0.5, 1.0, 1.5, 2.0, 2.5 bar) and sample concentration (100%, 75%, 50%, 25%) on fouling of 5kDa and 10kDa membrane were evaluated. The characteristic of the sample solutions were analyzed for turbidity, total dissolved solid (TDS), total suspended solid (TSS), BOD, and COD. The results showed that the best fit to experimental data corresponds to the cake layer formation followed by the intermediate blocking for the experimental conditions tested. A more detailed analysis of the fouling mechanisms was studied by dividing the filtration curves into different regions corresponding to the different fouling mechanisms. Intermediate blocking and cake layer formation or combinations of them were found to occur during the UF experiments depending on the operating conditions.

Keywords: fouling, oily wastewater, regenerated cellulose, ultrafiltration

Procedia PDF Downloads 391
2258 Extending BDI Multiagent Systems with Agent Norms

Authors: Francisco José Plácido da Cunha, Tassio Ferenzini Martins Sirqueira, Marx Leles Viana, Carlos José Pereira de Lucena

Abstract:

Open Multiagent Systems (MASs) are societies in which heterogeneous and independently designed entities (agents) work towards similar, or different ends. Software agents are autonomous and the diversity of interests among different members living in the same society is a fact. In order to deal with this autonomy, these open systems use mechanisms of social control (norms) to ensure a desirable social order. This paper considers the following types of norms: (i) obligation — agents must accomplish a specific outcome; (ii) permission — agents may act in a particular way, and (iii) prohibition — agents must not act in a specific way. All of these characteristics mean to encourage the fulfillment of norms through rewards and to discourage norm violation by pointing out the punishments. Once the software agent decides that its priority is the satisfaction of its own desires and goals, each agent must evaluate the effects associated to the fulfillment of one or more norms before choosing which one should be fulfilled. The same applies when agents decide to violate a norm. This paper also introduces a framework for the development of MASs that provide support mechanisms to the agent’s decision-making, using norm-based reasoning. The applicability and validation of this approach is demonstrated applying a traffic intersection scenario.

Keywords: BDI agent, BDI4JADE framework, multiagent systems, normative agents

Procedia PDF Downloads 211
2257 Syntactic Analyzer for Tamil Language

Authors: Franklin Thambi Jose.S

Abstract:

Computational Linguistics is a branch of linguistics, which deals with the computer and linguistic levels. It is also said, as a branch of language studies which applies computer techniques to linguistics field. In Computational Linguistics, Natural Language Processing plays an important role. This came to exist because of the invention of Information Technology. In computational syntax, the syntactic analyser breaks a sentence into phrases and clauses and identifies the sentence with the syntactic information. Tamil is one of the major Dravidian languages, which has a very long written history of more than 2000 years. It is mainly spoken in Tamilnadu (in India), Srilanka, Malaysia and Singapore. It is an official language in Tamilnadu (in India), Srilanka, Malaysia and Singapore. In Malaysia Tamil speaking people are considered as an ethnic group. In Tamil syntax, the sentences in Tamil are classified into four for this research, namely: 1. Main Sentence 2. Interrogative Sentence 3. Equational Sentence 4. Elliptical Sentence. In computational syntax, the first step is to provide required information regarding the head and its constituent of each sentence. This information will be incorporated to the system using programming languages. Now the system can easily analyse a given sentence with the criteria or mechanisms given to it. Providing needful criteria or mechanisms to the computer to identify the basic types of sentences using Syntactic parser in Tamil language is the major objective of this paper.

Keywords: tamil, syntax, criteria, sentences, parser

Procedia PDF Downloads 493
2256 Visualization of Wave Propagation in Monocoupled System with Effective Negative Stiffness, Effective Negative Mass, and Inertial Amplifier

Authors: Abhigna Bhatt, Arnab Banerjee

Abstract:

A periodic system with only a single coupling degree of freedom is called a monocoupled system. Monocoupled systems with mechanisms like mass in the mass system generates effective negative mass, mass connected with rigid links generates inertial amplification, and spring-mass connected with a rigid link generateseffective negative stiffness. In this paper, the representative unit cell is introduced, considering all three mechanisms combined. Further, the dynamic stiffness matrix of the unit cell is constructed, and the dispersion relation is obtained by applying the Bloch theorem. The frequency response function is also calculated for the finite length of periodic unit cells. Moreover, the input displacement signal is given to the finite length of periodic structure and using inverse Fourier transform to visualize the wave propagation in the time domain. This visualization explains the sudden attenuation in metamaterial due to energy dissipation by an embedded resonator at the resonance frequency. The visualization created for wave propagation is found necessary to understand the insights of physics behind the attenuation characteristics of the system.

Keywords: mono coupled system, negative effective mass, negative effective stiffness, inertial amplifier, fourier transform

Procedia PDF Downloads 89
2255 Multi-omics Integrative Analysis with Genome-Scale Metabolic Model Simulation Reveals Reaction Essentiality data in Human Astrocytes Under the Lipotoxic Effect of Palmitic Acid

Authors: Janneth Gonzalez, Andres Pinzon Velasco, Maria Angarita, Nicolas Mendoza

Abstract:

Astrocytes play an important role in various processes in the brain, including pathological conditions such as neurodegenerative diseases. Recent studies have shown that the increase in saturated fatty acids such as palmitic acid (PA) triggers pro-inflammatory pathways in the brain. The use of synthetic neurosteroids such as tibolone has demonstrated neuro-protective mechanisms. However, there are few studies on the neuro-protective mechanisms of tibolone, especially at the systemic (omic) level. In this study, we performed the integration of multi-omic data (transcriptome and proteome) into a human astrocyte genomic scale metabolic model to study the astrocytic response during palmitate treatment. We evaluated metabolic fluxes in three scenarios (healthy, induced inflammation by PA, and tibolone treatment under PA inflammation). We also use control theory to identify those reactions that control the astrocytic system. Our results suggest that PA generates a modulation of central and secondary metabolism, showing a change in energy source use through inhibition of folate cycle and fatty acid β-oxidation and upregulation of ketone bodies formation.We found 25 metabolic switches under PA-mediated cellular regulation, 9 of which were critical only in the inflammatory scenario but not in the protective tibolone one. Within these reactions, inhibitory, total, and directional coupling profiles were key findings, playing a fundamental role in the (de)regulation in metabolic pathways that increase neurotoxicity and represent potential treatment targets. Finally, this study framework facilitates the understanding of metabolic regulation strategies, andit can be used for in silico exploring the mechanisms of astrocytic cell regulation, directing a more complex future experimental work in neurodegenerative diseases.

Keywords: astrocytes, data integration, palmitic acid, computational model, multi-omics, control theory

Procedia PDF Downloads 98
2254 The Response of 4-Hydroxybenzoic Acid on Kv1.4 Potassium Channel Subunit Expressed in Xenopus laevis Oocytes

Authors: Fatin H. Mohamad, Jia H. Wong, Muhammad Bilal, Abdul A. Mohamed Yusoff, Jafri M. Abdullah, Jingli Zhang

Abstract:

Kv1.4 is a Shaker-related member of voltage-gated potassium channel which can be associated with cardiac action potential but can also be found in Schaffer collateral and dentate gyrus. It has two inactivation mechanisms; the fast N-type and slow C-type. Kv1.4 produces rapid current inactivation. This A type potential of Kv1.4 makes it as a target in antiepileptic drugs (AEDs) selection. In this study, 4-hydroxybenzoic acid, which can be naturally found in bamboo shoots, were tested on its enhancement effect on potassium current of Kv1.4 channel expressed in Xenopus laevis oocytes using the two-microelectrode voltage clamp method. Current obtained were recorded and analyzed with pClamp software whereas statistical analysis were done by student t-test. The ratio of final / peak amplitude is an index of the activity of the Kv1.4 channel. The less the ratio, the greater the function of Kv1.4. The decrease of ratio of which by 1µM 4-hydroxybenzoic acid (n= 7), compared with 0.1% DMSO (vehicle), was mean= 47.62%, SE= 13.76%, P= 0.026 (statistically significant). It indicated more opening of Kv1.4 channels under 4-hydroxybenzoic acid. In conclusion, 4-hydroxybenzoic acid can enhance the function of Kv1.4 potassium channels, which is regarded as one of the mechanisms of antiepileptic treatment.

Keywords: antiepileptic, Kv1.4 potassium channel, two-microelectrode voltage clamp, Xenopus laevis oocytes, 4-hydroxybenzoic acid

Procedia PDF Downloads 338
2253 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 331
2252 Pathways and Mechanisms of Lymphocytes Emigration from Newborn Thymus

Authors: Olena Grygorieva

Abstract:

Nowadays mechanisms of thymocytes emigration from the thymus to the periphery are investigated actively. We have proposed a hypothesis of thymocytes’ migration from the thymus through lymphatic vessels during periodical short-term local edema. By morphological, hystochemical methods we have examined quantity of lymphocytes, epitelioreticulocytes, mast cells, blood and lymphatic vessels in morpho-functional areas of rats’ thymuses during the first week after birth in 4 hours interval. In newborn and beginning from 8 hour after birth every 12 hours specific density of the thymus, absolute quantity of microcirculatory vessels, especially of lymphatic ones, lymphcyte-epithelial index, quantity of mast cells and their degranulative forms increase. Structure of extracellular matrix, intrathymical microenvironment and lymphocytes’ adhesive properties change. Absolute quantity of small lymphocytes in thymic cortex changes wavy. All these changes are straightly expressed from 0 till 2, from 12 till 16, from 108 till 120 hours of postnatal life. During this periods paravasal lymphatic vessels are stuffed with lymphocytes, i.e. discrete migration of lymphocytes from the thymus occurs. After rapid edema reduction, quantity of lymphatic vessels decrease, they become empty. Therefore, in the thymus of newborn periodical short-term local edema is observed, on its top discrete migration of lymphocytes from the thymus occurs.

Keywords: lymphocytes, lymphatic vessels, mast cells, thymus

Procedia PDF Downloads 201
2251 Suicide in Late-Life Major Depressive Disorder: A Review of Structural and Functional Neuroimaging Studies

Authors: Wenqiu Cao

Abstract:

Suicide prevention is a global problem that needs to be taken seriously. Investigating the mechanisms of suicide in major depressive disorder (MDD) separately through neuroimaging technology is essential for effective suicide prevention. And it’s particularly urgent in geriatric depressive patients since older adults are more likely to use rapidly deadly means, and suicidal behavior is more lethal for older adults. The current study reviews five studies related to suicide in geriatric MDD that uses neuroimaging methodology in order to analyze the relevant neurobiological mechanisms. The majority of the studies found significant white matter and grey matter reduction or lesion widespread in multiple brain regions, including the frontal and parietal regions, the midbrain, the external capsule, and the cerebellum. Regarding the cognitive impairment in geriatric MDD, the reward signals were found weakened in the paralimbic cortex. The functional magnetic resonance imaging (fMRI) studies also found hemodynamic changes in the right dorsolateral prefrontal cortex (DLPFC), orbitofrontal cortex (OFC), and right frontopolar cortex (FPC) regions in late-life MDD patients with suicidal ideation. Future studies should consider the age of depression onset, more accurate measurements of suicide, larger sample size, and longitudinal design.

Keywords: brain imaging, geriatric major depressive disorder, suicidality, suicide

Procedia PDF Downloads 114
2250 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 138
2249 Environmental Modeling of Storm Water Channels

Authors: L. Grinis

Abstract:

Turbulent flow in complex geometries receives considerable attention due to its importance in many engineering applications. It has been the subject of interest for many researchers. Some of these interests include the design of storm water channels. The design of these channels requires testing through physical models. The main practical limitation of physical models is the so called “scale effect”, that is, the fact that in many cases only primary physical mechanisms can be correctly represented, while secondary mechanisms are often distorted. These observations form the basis of our study, which centered on problems associated with the design of storm water channels near the Dead Sea, in Israel. To help reach a final design decision we used different physical models. Our research showed good coincidence with the results of laboratory tests and theoretical calculations, and allowed us to study different effects of fluid flow in an open channel. We determined that problems of this nature cannot be solved only by means of theoretical calculation and computer simulation. This study demonstrates the use of physical models to help resolve very complicated problems of fluid flow through baffles and similar structures. The study applies these models and observations to different construction and multiphase water flows, among them, those that include sand and stone particles, a significant attempt to bring to the testing laboratory a closer association with reality.

Keywords: open channel, physical modeling, baffles, turbulent flow

Procedia PDF Downloads 264
2248 Optimal Health and Older Adults: The Existential Health Dimension as a Health-Promoting Potential

Authors: Jessica Hemberg, Anna K. Forsman, Johanna Nordmyr

Abstract:

With a considerable increase in the aging population in the Nordic countries there is a call for a deeper understanding of healthy aging and its underlying mechanisms. The aim of this study is to uncover health and well-being for older adults according to their own views and understand what role the existential dimension play? The study uses a hermeneutical approach. Material was collected through focus group interviews with 18 older adults. The texts were interpreted through hermeneutical reading. The underlying mechanisms of health among older adults are described, illustrating the key prerequisites for health as being in the present. This implies ‘living on the continuums of life and death’ and in this field of forces also ‘living on the continuum of the past and the future’. Important aspects for being in the present was balancing ambivalent emotions, considering existential issues, and being in connectedness. Health for older adults may be understood in the light of the metaphor of taking it one day at a time. Being in the present was emphasized as a health potential for older adults highlighting the existential health dimension. From a societal point of view, this implies that health promotion should focus on highlighting the importance of the existential dimension of health since it holds health-promoting potentials for older adults. Optimal health for older adults requires awareness of one’s attitude to life through being in the present as a basis for a positive and healthy outlook on life.

Keywords: focus group interviews, hermeneutics, life experiences, older adults

Procedia PDF Downloads 168
2247 A Weighted Approach to Unconstrained Iris Recognition

Authors: Yao-Hong Tsai

Abstract:

This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.

Keywords: authentication, iris recognition, adaboost, local binary pattern

Procedia PDF Downloads 197
2246 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 20
2245 Climate Change and Perceived Socialization: The Role of Parents’ Climate Change Coping Style and Household Communication

Authors: Estefanya Vazquez-Casaubon, Veroline Cauberghe, Dieneke Van de Sompel, Hayley Pearce

Abstract:

Working together to reduce the anthropogenic impact should be a collective action, including effort within the household. In the matter, children are considered to have an important role in influencing the household to reduce the environmental impact through reversed socialization where children motivate and increase the concern of the parents towards environmental protection. Previous studies reveal that communication between parents and kids is key for effective reversed socialization. However, multiple barriers have been identified in the literature, such as the acceptance of the influence from the kids, the properties of the communication, among other factors. Based on the previous evidence, the present study aims to assess barriers and facilitators of communication at the household level that have an impact on reversed socialization. More precisely, the study examines how parents’ climate change coping strategy (problem-focused, meaning-focused, disregarding) influences the valence and the type of the communication related to climate change, and eventually the extent to which they report their beliefs and behaviours to be influenced by the pro-environmental perspectives of their children; i.e. reversed socialization. Via an online survey, 723 Belgian parents self-reported on communication about environmental protection and risk within their household (such as the frequency of exchange about topics related to climate change sourced from school, the household rules, imparting knowledge to the children, and outer factors like media or peer pressure, the emotional valence of the communication), their perceived socialization, and personal factors (coping mechanisms towards climate change). The results, using structural equation modelling, revealed that parents applying a problem-solving coping strategy related to climate change, appear to communicate more often in a positive than in a negative manner. Parents with a disregarding coping style towards climate change appear to communicate less often in a positive way within the household. Parents that cope via meaning-making of climate change showed to communicate less often in either a positive or negative way. Moreover, the perceived valence of the communication (positive or negative) influenced the frequency and type of household communication. Positive emotions increased the frequency of the communication overall. However, the direct effect of neither of the coping mechanisms on the reversed socialization was significant. High frequency of communication about the media, environmental views of the household members among other external topics had a positive impact on the perceived socialization, followed by discussions school-related; while parental instructing had a negative impact on the perceived socialization. Moreover, the frequency of communication was strongly affected by the perceived valence of the communication (positive or negative). The results go in line with previous evidence that a higher frequency of communication facilitates reversed socialization. Hence the results outstand how the coping mechanisms of the parents can be either a facilitator when they cope via problem-solving, while parents that disregard might avert frequent communication about climate change at the household.

Keywords: communication, parents’ coping mechanisms, environmental protection, household, perceived socialization

Procedia PDF Downloads 60
2244 Novel Molecular Mechanisms Involved in Macrophage Phenotypic Polarization

Authors: Mansi Srivastava, Uzma Saqib, Adnan Naim, Anjali Roy, Dongfang Liu, Deepak Bhatnagar, Ravinder Ravinder, Mirza S. Baig

Abstract:

Macrophages polarize to proinflammatory M1 or anti-inflammatory M2 states with distinct physiological functions. This transition within the M1 to M2 phenotypes decides the nature, duration, and severity of an inflammatory response. However, inspite of a substantial understanding of the fate of these phenotypes, the underlying molecular mechanisms are not well understood. We have investigated the role of Neuronal nitric oxide synthase (NOS1) mediated regulation of Activator protein 1 (AP-1) transcription factor in macrophages as a critical effector of macrophage phenotypic change. Activator protein 1 (AP-1) is a group of dimeric transcription factors composed of jun, Fos, and ATF family proteins. We determined that NOS1-derived nitric oxide (NO) facilitate Fos and jun interaction which induces IL12 & IL23 expression. Pharmacological inhibition of NOS1 inhibits Fos and jun interaction but increases ATF2 and Fos dimerization. Switching of Fos and jun dimer to ATF2 and jun dimerization switches phenotype from IL–12high IL-23high IL-10low to IL–12low IL-23lowIL-10high phenotype, respectively. Together, these findings highlight a key role of the TLR4-NOS1-AP1 signaling axis in regulating macrophage polarization.

Keywords: inflammation, macrophage, lipopolysaccharide (LPS), proinflammatory cytokines, activator protein 1 (AP-1), neuronal nitric oxide synthase (NOS1)

Procedia PDF Downloads 262
2243 Methods for Restricting Unwanted Access on the Networks Using Firewall

Authors: Bhagwant Singh, Sikander Singh Cheema

Abstract:

This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.

Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques

Procedia PDF Downloads 80
2242 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 372
2241 Dielectric Properties in Frequency Domain of Main Insulation System of Printed Circuit Board

Authors: Xize Dai, Jian Hao, Claus Leth Bak, Gian Carlo Montanari, Huai Wang

Abstract:

Printed Circuit Board (PCB) is a critical component applicable to power electronics systems, especially for high-voltage applications involving several high-voltage and high-frequency SiC/GaN devices. The insulation system of PCB is facing more challenges from high-voltage and high-frequency stress that can alter the dielectric properties. Dielectric properties of the PCB insulation system also determine the electrical field distribution that correlates with intrinsic and extrinsic aging mechanisms. Hence, investigating the dielectric properties in the frequency domain of the PCB insulation system is a must. The paper presents the frequency-dependent, temperature-dependent, and voltage-dependent dielectric properties, permittivity, conductivity, and dielectric loss tangents of PCB insulation systems. The dielectric properties mechanisms associated with frequency, temperature, and voltage are revealed from the design perspective. It can be concluded that the dielectric properties of PCB in the frequency domain show a strong dependence on voltage, frequency, and temperature. The voltage-, frequency-, and temperature-dependent dielectric properties are associated with intrinsic conduction behavior and polarization patterns from the perspective of dielectric theory. The results may provide some reference for the PCB insulation system design in high voltage, high frequency, and high-temperature power electronics applications.

Keywords: electrical insulation system, dielectric properties, high voltage and frequency, printed circuit board

Procedia PDF Downloads 61
2240 A Proposal for Professional Development of Mathematics Teachers in the Kingdom of Saudi Arabia According to the Orientation of Science, Technology, Engineering and Mathematics (STEM)

Authors: Ali Taher Othman Ali

Abstract:

The aim of this research is to provide a draft proposal for the professional development of mathematics teachers in accordance with the orientation of science, technology, engineering and mathematics which is known by the abbreviation STEM, as a modern and contemporary orientation in the teaching and learning of mathematics and in order to achieve the objective of the research, the researcher used the theoretical descriptive method through the induction of the literature of education and the previous studies and experiments related to the topic. The researcher concluded by providing the proposal according to five basic axes, the first axe: professional development as a system, and its requirements include: development of educational systems, and allocate sufficient budgets to support the requirements of teaching STEM, identifying mechanisms for incentives and rewards for teachers attending professional development programs based on STEM; the second: development of in-depth knowledge content and its requirements include: basic sciences content development for STEM, linking the scientific understanding of teachers with real-world issues and problems, to provide the necessary resources to expand teachers' knowledge in this area; the third: the necessary pedagogical skills of teachers in the field of STEM, and its requirements include: identification of the required training and development needs and the mechanism of determining these needs, the types of professional development programs and the mechanism of designing it, the mechanisms and places of execution, evaluation and follow-up; the fourth: professional development strategies and mechanisms in the field of STEM, and its requirements include: using a variety of strategies to enable teachers to design and transfer effective educational experiences which reflect their scientific mastery in the fields of STEM, provide learning opportunities, and developing the skills of procedural research to generate new knowledge about the STEM; the fifth: to support professional development in the area of STEM, and its requirements include: support leadership within the school, provide a clear and appropriate opportunities for professional development for teachers within the school through professional learning communities, building partnerships between the Ministry of education and the local and international community institutions. The proposal includes other factors that should be considered when implementing professional development programs for mathematics teachers in the field of STEM.

Keywords: professional development, mathematics teachers, the orientation of science, technology, engineering and mathematics (STEM)

Procedia PDF Downloads 374
2239 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus

Authors: Yantao Li, Jun Zheng

Abstract:

Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.

Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence

Procedia PDF Downloads 245
2238 HPTLC Metabolite Fingerprinting of Artocarpus champeden Stembark from Several Different Locations in Indonesia and Correlation with Antimalarial Activity

Authors: Imam Taufik, Hilkatul Ilmi, Puryani, Mochammad Yuwono, Aty Widyawaruyanti

Abstract:

Artocarpus champeden Spreng stembark (Moraceae) in Indonesia well known as ‘cempedak’ had been traditionally used for malarial remedies. The difference of growth locations could cause the difference of metabolite profiling. As a consequence, there were difference antimalarial activities in spite of the same plants. The aim of this research was to obtain the profile of metabolites that contained in A. champeden stembark from different locations in Indonesia for authentication and quality control purpose of this extract. The profiling had been performed by HPTLC-Densitometry technique and antimalarial activity had been also determined by HRP2-ELISA technique. The correlation between metabolite fingerprinting and antimalarial activity had been analyzed by Principle Component Analysis, Hierarchical Clustering Analysis and Partial Least Square. As a result, there is correlation between the difference metabolite fingerprinting and antimalarial activity from several different growth locations.

Keywords: antimalarial, artocarpus champeden spreng, metabolite fingerprinting, multivariate analysis

Procedia PDF Downloads 283
2237 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 195
2236 Numerical Simulation of Encased Composite Column Bases Subjected to Cyclic Loading

Authors: Eman Ismail, Adnan Masri

Abstract:

Energy dissipation in ductile moment frames occurs mainly through plastic hinge rotations in its members (beams and columns). Generally, plastic hinge locations are pre-determined and limited to the beam ends, where columns are designed to remain elastic in order to avoid premature instability (aka story mechanisms) with the exception of column bases, where a base is 'fixed' in order to provide higher stiffness and stability and to form a plastic hinge. Plastic hinging at steel column bases in ductile moment frames using conventional base connection details is accompanied by several complications (thicker and heavily stiffened connections, larger embedment depths, thicker foundation to accommodate anchor rod embedment, etc.). An encased composite base connection is proposed where a segment of the column beginning at the base up to a certain point along its height is encased in reinforced concrete with headed shear studs welded to the column flanges used to connect the column to the concrete encasement. When the connection is flexurally loaded, stresses are transferred to a reinforced concrete encasement through the headed shear studs, and thereby transferred to the foundation by reinforced concrete mechanics, and axial column forces are transferred through the base-plate assembly. Horizontal base reactions are expected to be transferred by the direct bearing of the outer and inner faces of the flanges; however, investigation of this mechanism is not within the scope of this research. The inelastic and cyclic behavior of the connection will be investigated where it will be subjected to reversed cyclic loading, and rotational ductility will be observed in cases of yielding mechanisms where yielding occurs as flexural yielding in the beam-column, shear yielding in headed studs, and flexural yielding of the reinforced concrete encasement. The findings of this research show that the connection is capable of achieving satisfactory levels of ductility in certain conditions given proper detailing and proportioning of elements.

Keywords: seismic design, plastic mechanisms steel structure, moment frame, composite construction

Procedia PDF Downloads 107