Search results for: integrity violations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 893

Search results for: integrity violations

533 Household Wealth and Portfolio Choice When Tail Events Are Salient

Authors: Carlson Murray, Ali Lazrak

Abstract:

Robust experimental evidence of systematic violations of expected utility (EU) establishes that individuals facing risk overweight utility from low probability gains and losses when making choices. These findings motivated development of models of preferences with probability weighting functions, such as rank dependent utility (RDU). We solve for the optimal investing strategy of an RDU investor in a dynamic binomial setting from which we derive implications for investing behavior. We show that relative to EU investors with constant relative risk aversion, commonly measured probability weighting functions produce optimal RDU terminal wealth with significant downside protection and upside exposure. We additionally find that in contrast to EU investors, RDU investors optimally choose a portfolio that contains fair bets that provide payo↵s that can be interpreted as lottery outcomes or exposure to idiosyncratic returns. In a calibrated version of the model, we calculate that RDU investors would be willing to pay 5% of their initial wealth for the freedom to trade away from an optimal EU wealth allocation. The dynamic trading strategy that supports the optimal wealth allocation implies portfolio weights that are independent of initial wealth but requires higher risky share after good stock return histories. Optimal trading also implies the possibility of non-participation when historical returns are poor. Our model fills a gap in the literature by providing new quantitative and qualitative predictions that can be tested experimentally or using data on household wealth and portfolio choice.

Keywords: behavioral finance, probability weighting, portfolio choice

Procedia PDF Downloads 406
532 An Investigation of the University Council’s Image: A Case of Suan Sunandha Rajabhat University

Authors: Phitsanu Phunphetchphan

Abstract:

The purposes of this research was to investigate opinions of Rajabhat University staff towards performance of the university council committee by focusing on (1) personal characteristics of the committees; (2) duties designated by the university council; and (3) relationship between university council and staff. The population of this study included all high level of management from Suan Sunandha Rajabhat University which made a total of 200 respondents. Data analysis included frequency, percentage, mean and standard deviation. The findings revealed that the majority of staff rated the performance of university council at a high level. The 'overall appropriate qualification of the university council' was rated as the highest score while 'good governance' was rated as the lowest mean score. Moreover, the findings also revealed that the relationship between university council’s members and the staff was rated at a high level while 'the integrity of policy implementation' was rated as the lowest score.

Keywords: investigation, performance, university council, management

Procedia PDF Downloads 224
531 Management of Mycotoxin Production and Fungicide Resistance by Targeting Stress Response System in Fungal Pathogens

Authors: Jong H. Kim, Kathleen L. Chan, Luisa W. Cheng

Abstract:

Control of fungal pathogens, such as foodborne mycotoxin producers, is problematic as effective antimycotic agents are often very limited. Mycotoxin contamination significantly interferes with the safe production of foods or crops worldwide. Moreover, expansion of fungal resistance to commercial drugs or fungicides is a global human health concern. Therefore, there is a persistent need to enhance the efficacy of commercial antimycotic agents or to develop new intervention strategies. Disruption of the cellular antioxidant system should be an effective method for pathogen control. Such disruption can be achieved with safe, redox-active compounds. Natural phenolic derivatives are potent redox cyclers that inhibit fungal growth through destabilization of the cellular antioxidant system. The goal of this study is to identify novel, redox-active compounds that disrupt the fungal antioxidant system. The identified compounds could also function as sensitizing agents to conventional antimycotics (i.e., chemosensitization) to improve antifungal efficacy. Various benzo derivatives were tested against fungal pathogens. Gene deletion mutants of the yeast Saccharomyces cerevisiae were used as model systems for identifying molecular targets of benzo analogs. The efficacy of identified compounds as potent antifungal agents or as chemosensitizing agents to commercial drugs or fungicides was examined with methods outlined by the Clinical Laboratory Standards Institute or the European Committee on Antimicrobial Susceptibility Testing. Selected benzo derivatives possessed potent antifungal or antimycotoxigenic activity. Molecular analyses by using S. cerevisiae mutants indicated antifungal activity of benzo derivatives was through disruption of cellular antioxidant or cell wall integrity system. Certain benzo analogs screened overcame tolerance of Aspergillus signaling mutants, namely mitogen-activated protein kinase mutants, to fludioxonil fungicide. Synergistic antifungal chemosensitization greatly lowered minimum inhibitory or fungicidal concentrations of test compounds, including inhibitors of mitochondrial respiration. Of note, salicylaldehyde is a potent antimycotic volatile that has some practical application as a fumigant. Altogether, benzo derivatives targeting cellular antioxidant system of fungi (along with cell wall integrity system) effectively suppress fungal growth. Candidate compounds possess the antifungal, antimycotoxigenic or chemosensitizing capacity to augment the efficacy of commercial antifungals. Therefore, chemogenetic approaches can lead to the development of novel antifungal intervention strategies, which enhance the efficacy of established microbe intervention practices and overcome drug/fungicide resistance. Chemosensitization further reduces costs and alleviates negative side effects associated with current antifungal treatments.

Keywords: antifungals, antioxidant system, benzo derivatives, chemosensitization

Procedia PDF Downloads 231
530 The Influence of Fiber Fillers on the Bonding Safety of Structural Adhesives: A Fracture Analytical Evaluation

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives have established themselves as an innovative joining technology in the industry. Their strengths lie in joining different materials, avoiding structural weakening as in welding or screwing, and enabling lightweight construction methods. Now there are a variety of ways to improve the efficiency and effectiveness of bonded joints. One way is to add fiber fillers. This leads to an improvement in adhesion and cohesion (structural integrity). In this study, the effectiveness of fiber-modified adhesives for bonding different construction materials is reviewed. A series of experimental tests were performed using the fracture analytical GF principle to study the adhesive bonding safety and performance of the joint. Three different structural adhesive systems based on epoxy, CA/A hybrid, and PUR were modified with different fiber materials on different substrates. The results show that significant performance improvements can be achieved and that bonding reliability can be sustainably increased.

Keywords: fiber-modified adhesives, bonding safety, GF-principle, fracture analysis

Procedia PDF Downloads 150
529 Impact of Very Small Power Producers (VSPP) on Control and Protection System in Distribution Networks

Authors: Noppatee Sabpayakom, Somporn Sirisumrannukul

Abstract:

Due to incentive policies to promote renewable energy and energy efficiency, high penetration levels of very small power producers (VSPP) located in distribution networks have imposed technical barriers and established new requirements for protection and control of the networks. Although VSPPs have economic and environmental benefit, they may introduce negative effects and cause several challenges on the issue of protection and control system. This paper presents comprehensive studies of possible impacts on control and protection systems based on real distribution systems located in a metropolitan area. A number of scenarios were examined primarily focusing on state of islanding, and un-disconnected VSPP during faults. It is shown that without proper measures to address the issues, the system would be unable to maintain its integrity of electricity power supply for disturbance incidents.

Keywords: control and protection systems, distributed generation, renewable energy, very small power producers

Procedia PDF Downloads 457
528 Networked Radar System to Increase Safety of Urban Railroad Crossing

Authors: Sergio Saponara, Luca Fanucci, Riccardo Cassettari, Ruggero Piernicola, Marco Righetto

Abstract:

The paper presents an innovative networked radar system for detection of obstacles in a railway level crossing scenario. This Monitoring System (MS) is able to detect moving or still obstacles within the railway level crossing area automatically, avoiding the need of human presence for surveillance. The MS is also connected to the National Railway Information and Signaling System to communicate in real-time the level crossing status. The architecture is compliant with the highest Safety Integrity Level (SIL4) of the CENELEC standard. The number of radar sensors used is configurable at set-up time and depends on how large the level crossing area can be. At least two sensors are expected and up four can be used for larger areas. The whole processing chain that elaborates the output sensor signals, as well as the communication interface, is fully-digital, was designed in VHDL code and implemented onto a Xilinx Virtex 6.

Keywords: radar for safe mobility, railroad crossing, railway, transport safety

Procedia PDF Downloads 458
527 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 175
526 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 333
525 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 129
524 Geotechnical Distress Evaluation of a Damaged Structure

Authors: Zulfiqar Ali, Umar Saleem, Muhammad Junaid, Rizwan Tahir

Abstract:

Gulzar Mahal is a heritage site located in the city of Bahawalpur, Pakistan. The site is under a process of degradation, as cracks are appearing on the walls, roofs, and floor around the building due to differential settlement. To preserve the integrity of the structure, a geotechnical distress evaluation was carried out to evaluate the causal factors and recommend remediation measures. The research involved the characterization of the problematic soil and analysis of the observed distress with respect to the geotechnical properties. Both conventional lab and field tests were used in conjunction with the unconventional techniques like; Electrical Resistivity Tomography (ERT) and FEA. The temporal, geophysical and geotechnical evaluations have concluded that the foundation soil over the past was subjected to variations in the land use, poor drainage patterns, overloading and fluctuations in groundwater table all contributing to the differential settlements manifesting in the form of the visible shear crack across the length and breadth of the building.

Keywords: differential settlement, distress evaluation, finite element analysis, Gulzar Mahal

Procedia PDF Downloads 102
523 The Impact of Artificial Intelligence on Digital Crime

Authors: Á. L. Bendes

Abstract:

By the end of the second decade of the 21st century, artificial intelligence (AI) has become an unavoidable part of everyday life and has necessarily aroused the interest of researchers in almost every field of science. This is no different in the case of jurisprudence, whose main task is not only to create its own theoretical paradigm related to AI. Perhaps the biggest impact on digital crime is artificial intelligence. In addition, the need to create legal frameworks suitable for the future application of the law has a similar importance. The prognosis according to which AI can reshape the practical application of law and, ultimately, the entire legal life is also of considerable importance. In the past, criminal law was basically created to sanction the criminal acts of a person, so the application of its concepts with original content to AI-related violations is not expected to be sufficient in the future. Taking this into account, it is necessary to rethink the basic elements of criminal law, such as the act and factuality, but also, in connection with criminality barriers and criminal sanctions, several new aspects have appeared that challenge both the criminal law researcher and the legislator. It is recommended to continuously monitor technological changes in the field of criminal law as well since it will be timely to re-create both the legal and scientific frameworks to correctly assess the events related to them, which may require a criminal law response. Artificial intelligence has completely reformed the world of digital crime. New crimes have appeared, which the legal systems of many countries do not or do not adequately regulate. It is considered important to investigate and sanction these digital crimes. The primary goal is prevention, for which we need a comprehensive picture of the intertwining of artificial intelligence and digital crimes. The goal is to explore these problems, present them, and create comprehensive proposals that support legal certainty.

Keywords: artificial intelligence, chat forums, defamation, international criminal cooperation, social networking, virtual sites

Procedia PDF Downloads 58
522 The Applicability of Just Satisfaction in Inter-State Cases: A Case Study of Cyprus versus Turkey

Authors: Congrui Chen

Abstract:

The European Court of Human Rights (hereinafter ECtHR) delivered its judgment of just satisfaction on the case of Cyprus v. Turkey, ordering a lump sum of 9,000,000 euros as the just compensation. It is the first time that the ECtHR applied the Article 41 of just compensation in an inter-state case, and it stands as the highest amount of just compensation awarded in the history of the ECtHR. The Cyprus v. Turkey case, which represents the most crucial contribution to European peace in the history of the court. This thesis uses the methodologies of textual research, comparison analysis, and case law study to go further on the following two questions specifically:(i) whether the just compensation is applicable in an inter-state case; (ii) whether such just compensation is of punitive nature. From the point of view of general international law, the essence of the case is the state's responsibility for the violation of individual rights. In other words, the state takes a similar diplomatic protection approach to seek relief. In the course of the development of international law today, especially with the development of international human rights law, States that have a duty to protect human rights should bear corresponding responsibilities for their violations of international human rights law. Under the specific system of the European Court of Human Rights, the just compensation for article 41 is one of the specific ways of assuming responsibility. At the regulatory level, the European Court of Human Rights makes it clear that the just satisfaction of article 41 of the Convention does not include punitive damages, as it relates to the issue of national sovereignty. Nevertheless, it is undeniable that the relief to the victim and the punishment to the responsible State are two closely integrated aspects of responsibility. In other words, compensatory compensation has inherent "punitive".

Keywords: European Court of Human Right, inter-state cases, just satisfaction, punitive damages

Procedia PDF Downloads 253
521 A Deep Learning Approach to Detect Complete Safety Equipment for Construction Workers Based on YOLOv7

Authors: Shariful Islam, Sharun Akter Khushbu, S. M. Shaqib, Shahriar Sultan Ramit

Abstract:

In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwear. The suggested method precisely locates these safety items by using the YOLO v7 (You Only Look Once) object detection algorithm. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research contributes to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry.

Keywords: deep learning, safety equipment detection, YOLOv7, computer vision, workplace safety

Procedia PDF Downloads 49
520 Adsorption and Desorption of Emerging Water Contaminants on Activated Carbon Fabrics

Authors: S. Delpeux-Ouldriane, M. Gineys, S. Masson, N. Cohaut, L. Reinert, L. Duclaux, F. Béguin

Abstract:

Nowadays, a wide variety of organic contaminants are present at trace concentrations in wastewater effluents. In order to face these pollution problems, the implementation of the REACH European regulation has defined lists of targeted pollutants to be eliminated selectively in water. It therefore implies the development of innovative and more efficient remediation techniques. In this sense, adsorption processes can be successfully used to achieve the removal of organic compounds in waste water treatment processes, especially at low pollutant concentration. Especially, activated carbons possessing a highly developed porosity demonstrate high adsorption capacities. More specifically, carbon cloths show high adsorption rates, an easily handling, a good mechanical integrity and regeneration potentialities. When loaded with pollutants, these materials can be indeed regenerated using an electrochemical polarization.

Keywords: nanoporous carbons, activated carbon cloths, adsorption, micropollutants, emerging contaminants, regeneration, electrochemistry

Procedia PDF Downloads 379
519 A Study of Lurking Behavior: The Desire Perspective

Authors: Hsiu-Hua Cheng, Chi-Wei Chen

Abstract:

Lurking behaviour is common in information-seeking oriented communities. Transferring users with lurking behaviour to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behaviour in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behaviour. This study offers an approach to understanding the determinants of lurking behaviour in online contexts.

Keywords: lurking behaviour, the ecological cognition framework, Information-seeking oriented virtual communities, desire

Procedia PDF Downloads 252
518 Beyond Juridical Approaches: The Role of Sociological Approach in Promoting Human Rights of Migrants

Authors: Ali Aghahosseini Dehaghani

Abstract:

Every year in this globalized world, thousands of migrants leave their countries hoping to find a better situation of life in other parts of the world. In this regard, many questions, from a human rights point of view, have been raised about how this phenomenon should be managed in the host countries. Although legal approaches such as legislation and litigation are inevitable in the way to respect the human rights of migrants, there is an increasing consensus about the fact that a strict juridical approach is inadequate to protect as well as to prevent violations of migrants’ rights. Indeed, given the multiplicity of factors that affect and shape the application of these rights and considering the fact that law is a social phenomenon, what is needed is an interdisciplinary approach, which combines both juridical approaches and perspectives from other disciplines. In this respect, a sociological approach is important because it shows the social processes through which human rights of migrants have been constructed or violated in particular social situations. Sociologists who study international migration ask the questions such as how many people migrate, who migrates, why people migrate, what happens to them once they arrive in the host country, how migration affects sending and receiving communities, the extent to which migrants help the economy, the effects of migration on crimes, and how migrants change the local communities. This paper is an attempt to show how sociology can promote human rights of migrants. To this end, the article first explores the usefulness and value of an interdisciplinary approach to realize how and to what extent sociology may improve and promote the human rights of migrants in the destination country. It then examines mechanisms which help to reach to a systematic integration of law and sociological discipline to advance migrants’ rights as well as to encourage legal scholars to consider the implications of societal structures in their works.

Keywords: human rights, migrants, sociological approach, interdisciplinary study

Procedia PDF Downloads 424
517 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 62
516 Surface Integrity Improvement for Selective Laser Melting (SLM) Additive Manufacturing of C300 Parts Using Ball Burnishing

Authors: Adrian Travieso Disotuar, J. Antonio Travieso Rodriguez, Ramon Jerez Mesa, Montserrat Vilaseca

Abstract:

The effect of the non-vibration-assisted and vibration-assisted ball burnishing on both the surface and mechanical properties of C300 obtained by Selective Laser Melting additive manufacturing technology is studied in this paper. Different vibration amplitudes preloads, and burnishing strategies were tested. A topographical analysis was performed to determine the surface roughness of the different conditions. Besides, micro tensile tests were carried out in situ on Scanning Electron Microscopy to elucidate the post-treatment effects on damaging mechanisms. Experiments show that vibration-assisted ball burnishing significantly enhances mechanical properties compared to the non-vibration-assisted method. Moreover, it was found that the surface roughness was significantly improved with respect to the reference surface.

Keywords: additive manufacturing, ball burnishing, mechanical properties, metals, surface roughness

Procedia PDF Downloads 53
515 Research of Acoustic Propagation within Marine Riser in Deepwater Drilling

Authors: Xiaohui Wang, Zhichuan Guan, Roman Shor, Chuanbin Xu

Abstract:

Early monitoring and real-time quantitative description of gas intrusion under the premise of ensuring the integrity of the drilling fluid circulation system will greatly improve the accuracy and effectiveness of deepwater gas-kick monitoring. Therefore, in order to study the propagation characteristics of ultrasonic waves in the gas-liquid two-phase flow within the marine riser, in this paper, a numerical simulation method of ultrasonic propagation in the annulus of the riser was established, and the credibility of the numerical analysis was verified by the experimental results of the established gas intrusion monitoring simulation experimental device. The numerical simulation can solve the sound field in the gas-liquid two-phase flow according to different physical models, and it is easier to realize the single factor control. The influence of each parameter on the received signal can be quantitatively investigated, and the law with practical guiding significance can be obtained.

Keywords: gas-kick detection, ultrasonic, void fraction, coda wave velocity

Procedia PDF Downloads 134
514 Non-Steroidal Microtubule Disrupting Analogues Induce Programmed Cell Death in Breast and Lung Cancer Cell Lines

Authors: Marcel Verwey, Anna M. Joubert, Elsie M. Nolte, Wolfgang Dohle, Barry V. L. Potter, Anne E. Theron

Abstract:

A tetrahydroisoquinolinone (THIQ) core can be used to mimic the A,B-ring of colchicine site-binding microtubule disruptors such as 2-methoxyestradiol in the design of anti-cancer agents. Steroidomimeric microtubule disruptors were synthesized by introducing C'2 and C'3 of the steroidal A-ring to C'6 and C'7 of the THIQ core and by introducing a decorated hydrogen bond acceptor motif projecting from the steroidal D-ring to N'2. For this in vitro study, four non-steroidal THIQ-based analogues were investigated and comparative studies were done between the non-sulphamoylated compound STX 3450 and the sulphamoylated compounds STX 2895, STX 3329 and STX 3451. The objective of this study was to investigate the modes of cell death induced by these four THIQ-based analogues in A549 lung carcinoma epithelial cells and metastatic breast adenocarcinoma MDA-MB-231 cells. Cytotoxicity studies to determine the half maximal growth inhibitory concentrations were done using spectrophotometric quantification via crystal violet staining and lactate dehydrogenase (LDH) assays. Microtubule integrity and morphologic changes of exposed cells were investigated using polarization-optical transmitted light differential interference contrast microscopy, transmission electron microscopy and confocal microscopy. Flow cytometric quantification was used to determine apoptosis induction and the effect that THIQ-based analogues have on cell cycle progression. Signal transduction pathways were elucidated by quantification of the mitochondrial membrane integrity, cytochrome c release and caspase 3, -6 and -8 activation. Induction of autophagic cell death by the THIQ-based analogues was investigated by morphological assessment of fluorescent monodansylcadaverine (MDC) staining of acidic vacuoles and by quantifying aggresome formation via flow cytometry. Results revealed that these non-steroidal microtubule disrupting analogues inhibited 50% of cell growth at nanomolar concentrations. Immunofluorescence microscopy indicated microtubule depolarization and the resultant mitotic arrest was further confirmed through cell cycle analysis. Apoptosis induction via the intrinsic pathway was observed due to depolarization of the mitochondrial membrane, induction of cytochrome c release as well as, caspase 3 activation. Potential involvement of programmed cell death type II was observed due to the presence of acidic vacuoles and aggresome formation. Necrotic cell death did not contribute significantly, indicated by stable LDH levels. This in vitro study revealed the induction of the intrinsic apoptotic pathway as well as possible involvement of autophagy after exposure to these THIQ-based analogues in both MDA-MB-231- and A549 cells. Further investigation of this series of anticancer drugs still needs to be conducted to elucidate the temporal, mechanistic and functional crosstalk mechanisms between the two observed programmed cell deaths pathways.

Keywords: apoptosis, autophagy, cancer, microtubule disruptor

Procedia PDF Downloads 230
513 Consideration of Failed Fuel Detector Location through Computational Flow Dynamics Analysis on Primary Cooling System Flow with Two Outlets

Authors: Sanghoon Bae, Hanju Cha

Abstract:

Failed fuel detector (FFD) in research reactor is a very crucial instrument to detect the anomaly from failed fuels in the early stage around primary cooling system (PCS) outlet prior to the decay tank. FFD is considered as a mandatory sensor to ensure the integrity of fuel assemblies and mitigate the consequence from a failed fuel accident. For the effective function of FFD, the location of them should be determined by contemplating the effect from coolant flow around two outlets. For this, the analysis on computational flow dynamics (CFD) should be first performed how the coolant outlet flow including radioactive materials from failed fuels are mixed and discharged through the outlet plenum within certain seconds. The analysis result shows that the outlet flow is well mixed regardless of the position of failed fuel and ultimately illustrates the effect of detector location.

Keywords: computational flow dynamics (CFD), failed fuel detector (FFD), fresh fuel assembly (FFA), spent fuel assembly (SFA)

Procedia PDF Downloads 225
512 The Impact of Political Leadership on Cameroon’s Economic Development From 2000 to 2023

Authors: Okpu Enoh Ndip Nkongho

Abstract:

The type of political leadership in place impacts a state's economic development or underdevelopment directly and indirectly. One of the main challenges to Cameroon's economic development may be ineffective or misguided political leadership. The economy of the Cameroon state has declined significantly due to a number of factors, including a lack of effective and feasible economic policies, a reliance on crude oil that is excessive, tribal politics, the threat of insurgency, bribery, and corruption, violations of human rights, neglect of other sectors like science, technology, education, and transportation, and a careless attitude on the part of the administrators toward the general public. As a result, the standard of living has decreased, foreign exchange has decreased, and the value of the Cameroonian currency has depreciated. Therefore, from 2000 to 2023, this paper focused on the relationship between political leadership and economic development in Cameroon and offered suggestions for improving political leadership that will, in turn, lead to the country's economy getting back on track. The study employed a qualitative technique, with the framework for the investigation derived from the trait theory of leadership. According to the information provided above, the paper was able to conclude that there is a lack of cooperation between the three branches of government in Cameroon. This is shown in situations when one branch operates independently of the others and refuses to function as a backup when needed. The study recommended that the Executive collaborate closely with the National Assembly to speed action on some key legislation required to stimulate economic development. On the other hand, there is a need for more clarity and consistency in the government's policy orientation. There is no doubt that our current economic troubles are at least partially the result of a lack of economic policy leadership and confidence.

Keywords: politics, leadership, economic, development, Cameroon

Procedia PDF Downloads 28
511 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 360
510 Antimicrobial Properties of Copper in Gram-Negative and Gram-Positive Bacteria

Authors: Travis J. Meyer, Jasodra Ramlall, Phyo Thu, Nidhi Gadura

Abstract:

For centuries humans have used the antimicrobial properties of copper to their advantage. Yet, after all these years the underlying mechanisms of copper mediated cell death in various microbes remain unclear. We had explored the hypothesis that copper mediated increased levels of lipid peroxidation in the membrane fatty acids is responsible for increased killing inEscherichia coli. In this study we show that in both gram positive (Staphylococcus aureus) and gram negative (Pseudomonas aeruginosa) bacteria there is a strong correlation between copper mediated cell death and increased levels of lipid peroxidation. Interestingly, the non-spore forming gram positive bacteria as well as gram negative bacteria show similar patterns of cell death, increased levels of lipid peroxidation, as well as genomic DNA degradation, however there is some difference inloss in membrane integrity upon exposure to copper alloy surface.

Keywords: antimicrobial, copper, gram positive, gram negative

Procedia PDF Downloads 455
509 Destruction of History and the Syrian Conflict: Upholding the Cultural Integrity of Dura Europos

Authors: Justine A. Lloyd

Abstract:

Since the onset of the Syrian Civil War in 2011, the ancient city of Dura-Europos has faced widespread destruction and looting. The site is one of many places in the country the terrorist group ISIS has specifically targeted, allegedly due to its particular representations of Syrian history and culture. However, looted art and artifacts are the extremist group’s second largest source of income, only after oil. The protection of this site is important to both academics and the millions who have called Syria a home, as it aids in the nation’s sense of identity, reveals developments in the arts, and contributes to humanity’s collective history. At a time when Syria’s culture is being flattened, this sense of cultural expression is especially important to maintain. Creating an awareness of the magnitude of the issue at hand begins with an examination of the rich history of the ancient fortress city. Located on the western bank of the Euphrates River, Dura-Europos contains artifacts dating back to the Hellenistic, Parthian, and Roman periods. Though a great deal of the art and artifacts have remained safe in institutions such as the National Museum of Damascus and the Yale University Art Gallery, hundreds of looting pits and use of heavy machinery on the site has severely set back the investigative progress made by archaeologists over the last century, as well as the prospect of future excavation. Further research draws on the current destruction of the site by both ISIS and opportunists involved with the black market. Because Dura-Europos is located in a war stricken region, the acquisition of data and possibility of immediate action is particularly challenging. Resources gained from local reports, in addition to technology such as satellite imagery, however, have provided a firm starting point for the evaluation of the state of the site. The Syrian Ministry of Culture, UNESCO, and numerous Syrian and global organizations provide insight into the historic city’s past, present issues, and future plans to ensure that the cultural integrity of the site is upheld. Though over seventy percent of Dura-Europos has been completely decimated, this research challenges the notion that physically destroyed sites are lost forever. This paper assesses preventative measures that can take place to ensure the preservation of the site’s art and architecture, including examining possible solutions to the damage, such as digital reconstruction, replication, and distribution of information through exhibitions and other forms of publically accessible information. In order to investigate any possible retribution, research also includes the necessary information pertaining the global laws and regulations dealing with cultural heritage, as it directly affects the ways in which this situation can be dealt with. With the countless experts and citizens dedicated to the importance of cultural heritage, the prospect of honoring and valuing elements of Dura-Europos is possible—whether physically preserved or otherwise.

Keywords: antiquities law, archaeological sites, restitution, Syrian Civil War

Procedia PDF Downloads 148
508 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries

Authors: Mohammed S. Alqahtani, Paulo J. Bartolo

Abstract:

External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.

Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization

Procedia PDF Downloads 133
507 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 267
506 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 360
505 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 454
504 Evaluation of the Causes of Exposure to Mobbing of Employees in the Public Sector in Turkey

Authors: Taner Cindik, Ferya Tas Ciftci

Abstract:

Mobbing in the public sector and specific issues (i.e., the demand for non-pecuniary damages) regarding mobbing have become very important in the light of the precedents constituted by the Turkish Council of State in 2010. The legal scope of mobbing is not able to be determined since the concept of mobbing is not defined in Turkish law system. This study aims to reveal three major problems caused by the lack of laws related to mobbing in the Turkish legal system. First, the absence of an arrangement for disciplinary penalties leads that general provisions in the disciplinary law are implemented. This situation, therefore, causes difficulties in practice. Second, not being drawn of the lines in the topic concerning mobbing in public sector leads confusions in being direction of hostility. Third, the fact that there is a legal gap on seeking non-pecuniary compensation when employees in public sector are exposed to mobbing might make it difficult to obtain non-pecuniary compensation. Within the context of these major problems, civil servants in Turkey do not have enough protection mechanism. However, some possible legal arrangements will help civil servants to protect against mobbing. This study may be considered important because of the fact that mobbing in the public sector is at a significant level and has not been evaluated in this context before. This research is mainly a study of Turkish legal system and evaluates critically law case to determine legal problems. As a result of this study, three main problems might be identified because there is legal gap regarding mobbing in the public sector. In conclusion, the introduction of the major problems related to mobbing in this study might shed light on making the proper regulations of this subject in Turkish law system. In this respect, the plaintiff will be provided convenience in the point of non-pecuniary damages and this study will guide the assessment of legal liability of those who implement mobbing.

Keywords: human rights violations, mobbing, public sector, direction of hostility, non-pecuniary compensation, disciplinary law

Procedia PDF Downloads 221