Search results for: genetic data protection issues
30715 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 8830714 Klippel Feil Syndrome: A Case Report and Review of Literature
Authors: Rim Frikha, Nouha Bouayed Abdelmoula, Afifa Sellami, Salima Daoud, Tarek Rebai
Abstract:
Klippel-Feil Syndrome (KFS) is characterized by congenital vertebral fusion of the cervical spine resulting from faulty segmentation along the embryo's developing axis. A wide spectrum of associated anomalies may be present. This heterogeneity has complicated elucidation of the genetic etiology and management of the syndrome. We report a case of an isolated Klippel-Feil Syndrome with C5-C6 fusion on the cervical spine. It‘s the rarest form of congenital fused cervical vertebrae which is predisposed to the risk of spinal cord injury and neurologic problems. The aim of this paper was to review clinical heterogeneity; radiographic abnormalities and genetic etiology in Klippel-Feil Syndrome. We insist in comprehensive evaluation and delineation of diagnostic and prognostic classes.Keywords: Klippel–Feil anomaly, genetic, clinical heterogeneity, radiographic abnormalities
Procedia PDF Downloads 48430713 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 8830712 A First Step towards Automatic Evolutionary for Gas Lifts Allocation Optimization
Authors: Younis Elhaddad, Alfonso Ortega
Abstract:
Oil production by means of gas lift is a standard technique in oil production industry. To optimize the total amount of oil production in terms of the amount of gas injected is a key question in this domain. Different methods have been tested to propose a general methodology. Many of them apply well-known numerical methods. Some of them have taken into account the power of evolutionary approaches. Our goal is to provide the experts of the domain with a powerful automatic searching engine into which they can introduce their knowledge in a format close to the one used in their domain, and get solutions comprehensible in the same terms, as well. These proposals introduced in the genetic engine the most expressive formal models to represent the solutions to the problem. These algorithms have proven to be as effective as other genetic systems but more flexible and comfortable for the researcher although they usually require huge search spaces to justify their use due to the computational resources involved in the formal models. The first step to evaluate the viability of applying our approaches to this realm is to fully understand the domain and to select an instance of the problem (gas lift optimization) in which applying genetic approaches could seem promising. After analyzing the state of the art of this topic, we have decided to choose a previous work from the literature that faces the problem by means of numerical methods. This contribution includes details enough to be reproduced and complete data to be carefully analyzed. We have designed a classical, simple genetic algorithm just to try to get the same results and to understand the problem in depth. We could easily incorporate the well mathematical model, and the well data used by the authors and easily translate their mathematical model, to be numerically optimized, into a proper fitness function. We have analyzed the 100 curves they use in their experiment, similar results were observed, in addition, our system has automatically inferred an optimum total amount of injected gas for the field compatible with the addition of the optimum gas injected in each well by them. We have identified several constraints that could be interesting to incorporate to the optimization process but that could be difficult to numerically express. It could be interesting to automatically propose other mathematical models to fit both, individual well curves and also the behaviour of the complete field. All these facts and conclusions justify continuing exploring the viability of applying the approaches more sophisticated previously proposed by our research group.Keywords: evolutionary automatic programming, gas lift, genetic algorithms, oil production
Procedia PDF Downloads 16230711 Data, Digital Identity and Antitrust Law: An Exploratory Study of Facebook’s Novi Digital Wallet
Authors: Wanjiku Karanja
Abstract:
Facebook has monopoly power in the social networking market. It has grown and entrenched its monopoly power through the capture of its users’ data value chains. However, antitrust law’s consumer welfare roots have prevented it from effectively addressing the role of data capture in Facebook’s market dominance. These regulatory blind spots are augmented in Facebook’s proposed Diem cryptocurrency project and its Novi Digital wallet. Novi, which is Diem’s digital identity component, shall enable Facebook to collect an unprecedented volume of consumer data. Consequently, Novi has seismic implications on internet identity as the network effects of Facebook’s large user base could establish it as the de facto internet identity layer. Moreover, the large tracts of data Facebook shall collect through Novi shall further entrench Facebook's market power. As such, the attendant lock-in effects of this project shall be very difficult to reverse. Urgent regulatory action is therefore required to prevent this expansion of Facebook’s data resources and monopoly power. This research thus highlights the importance of data capture to competition and market health in the social networking industry. It utilizes interviews with key experts to empirically interrogate the impact of Facebook’s data capture and control of its users’ data value chains on its market power. This inquiry is contextualized against Novi’s expansive effect on Facebook’s data value chains. It thus addresses the novel antitrust issues arising at the nexus of Facebook’s monopoly power and the privacy of its users’ data. It also explores the impact of platform design principles, specifically data portability and data portability, in mitigating Facebook’s anti-competitive practices. As such, this study finds that Facebook is a powerful monopoly that dominates the social media industry to the detriment of potential competitors. Facebook derives its power from its size, annexure of the consumer data value chain, and control of its users’ social graphs. Additionally, the platform design principles of data interoperability and data portability are not a panacea to restoring competition in the social networking market. Their success depends on the establishment of robust technical standards and regulatory frameworks.Keywords: antitrust law, data protection law, data portability, data interoperability, digital identity, Facebook
Procedia PDF Downloads 12330710 Genetic Diversity of Sugar Beet Pollinators
Authors: Ksenija Taški-Ajdukovic, Nevena Nagl, Živko Ćurčić, Dario Danojević
Abstract:
Information about genetic diversity of sugar beet parental populations is of a great importance for hybrid breeding programs. The aim of this research was to evaluate genetic diversity among and within populations and lines of diploid sugar beet pollinators, by using SSR markers. As plant material were used eight pollinators originating from three USDA-ARS breeding programs and four pollinators from Institute of Field and Vegetable Crops, Novi Sad. Depending on the presence of self-fertility gene, the pollinators were divided into three groups: autofertile (inbred lines), autosterile (open-pollinating populations), and group with partial presence of autofertility gene. A total of 40 SSR primers were screened, out of which 34 were selected for the analysis of genetic diversity. A total of 129 different alleles were obtained with mean value 3.2 alleles per SSR primer. According to the results of genetic variability assessment the number and percentage of polymorphic loci was the maximal in pollinators NS1 and tester cms2 while effective number of alleles, expected heterozygosis and Shannon’s index was highest in pollinator EL0204. Analysis of molecular variance (AMOVA) showed that 77.34% of the total genetic variation was attributed to intra-varietal variance. Correspondence analysis results were very similar to grouping by neighbor-joining algorithm. Number of groups was smaller by one, because correspondence analysis merged IFVCNS pollinators with CZ25 into one group. Pollinators FC220, FC221 and C 51 were in the next group, while self-fertile pollinators CR10 and C930-35 from USDA-Salinas were separated. On another branch were self-sterile pollinators ЕL0204 and ЕL53 from USDA-East Lansing. Sterile testers cms1 and cms2 formed separate group. The presented results confirmed that SSR analysis can be successfully used in estimation of genetic diversity within and among sugar beet populations. Since the tested pollinator differed considering the presence of self-fertility gene, their heterozygosity differed as well. It was lower in genotypes with fixed self-fertility genes. Since the most of tested populations were open-pollinated, which rarely self-pollinate, high variability within the populations was expected. Cluster analysis grouped populations according to their origin.Keywords: auto fertility, genetic diversity, pollinator, SSR, sugar beet
Procedia PDF Downloads 46030709 Just Child Protection Practice for Immigrant and Racialized Families in Multicultural Western Settings: Considerations for Context and Culture
Authors: Sarah Maiter
Abstract:
Heightened globalization, migration, displacement of citizens, and refugee needs is putting increasing demand for approaches to social services for diverse populations that responds to families to ensure the safety and protection of vulnerable members while providing supports and services. Along with this social works re-focus on socially just approaches to practice increasingly asks social workers to consider the challenging circumstances of families when providing services rather than a focus on individual shortcomings alone. Child protection workers then struggle to ensure safety of children while assessing the needs of families. This assessment can prove to be difficult when providing services to immigrant, refugee, and racially diverse families as understanding of and familiarity with these families is often limited. Furthermore, child protection intervention in western countries is state mandated having legal authority when intervening in the lives of families where child protection concerns have been identified. Within this context, racialized immigrant and refugee families are at risk of misunderstandings that can result in interventions that are overly intrusive, unhelpful, and harsh. Research shows disproportionality and overrepresentation of racial and ethnic minorities, and immigrant families in the child protection system. Reasons noted include: a) possibilities of racial bias in reporting and substantiating abuse, b) struggles on the part of workers when working with families from diverse ethno-racial backgrounds and who are immigrants and may have limited proficiency in the national language of the country, c) interventions during crisis and differential ongoing services for these families, d) diverse contexts of these families that poses additional challenges for families and children, and e) possible differential definitions of child maltreatment. While cultural and ethnic diversity in child rearing approaches have been cited as contributors to child protection concerns, this approach should be viewed cautiously as it can result in stereotyping and generalizing that then results in inappropriate assessment and intervention. However, poverty and the lack of social supports, both well-known contributors to child protection concerns, also impact these families disproportionately. Child protection systems, therefore, need to continue to examine policy and practice approaches with these families that ensures safety of children while balancing the needs of families. This presentation provides data from several research studies that examined definitions of child maltreatment among a sample of racialized immigrant families, experiences of a sample of immigrant families with the child protection system, concerns of a sample of child protection workers in the provision of services to these families, and struggles of families in the transitions to their new country. These studies, along with others provide insights into areas of consideration for practice that can contribute to safety for children while ensuring just and equitable responses that have greater potential for keeping families together rather than premature apprehension and removal of children to state care.Keywords: child protection, child welfare services, immigrant families, racial and ethnic diversity
Procedia PDF Downloads 29230708 Single Pass Design of Genetic Circuits Using Absolute Binding Free Energy Measurements and Dimensionless Analysis
Authors: Iman Farasat, Howard M. Salis
Abstract:
Engineered genetic circuits reprogram cellular behavior to act as living computers with applications in detecting cancer, creating self-controlling artificial tissues, and dynamically regulating metabolic pathways. Phenemenological models are often used to simulate and design genetic circuit behavior towards a desired behavior. While such models assume that each circuit component’s function is modular and independent, even small changes in a circuit (e.g. a new promoter, a change in transcription factor expression level, or even a new media) can have significant effects on the circuit’s function. Here, we use statistical thermodynamics to account for the several factors that control transcriptional regulation in bacteria, and experimentally demonstrate the model’s accuracy across 825 measurements in several genetic contexts and hosts. We then employ our first principles model to design, experimentally construct, and characterize a family of signal amplifying genetic circuits (genetic OpAmps) that expand the dynamic range of cell sensors. To develop these models, we needed a new approach to measuring the in vivo binding free energies of transcription factors (TFs), a key ingredient of statistical thermodynamic models of gene regulation. We developed a new high-throughput assay to measure RNA polymerase and TF binding free energies, requiring the construction and characterization of only a few constructs and data analysis (Figure 1A). We experimentally verified the assay on 6 TetR-homolog repressors and a CRISPR/dCas9 guide RNA. We found that our binding free energy measurements quantitatively explains why changing TF expression levels alters circuit function. Altogether, by combining these measurements with our biophysical model of translation (the RBS Calculator) as well as other measurements (Figure 1B), our model can account for changes in TF binding sites, TF expression levels, circuit copy number, host genome size, and host growth rate (Figure 1C). Model predictions correctly accounted for how these 8 factors control a promoter’s transcription rate (Figure 1D). Using the model, we developed a design framework for engineering multi-promoter genetic circuits that greatly reduces the number of degrees of freedom (8 factors per promoter) to a single dimensionless unit. We propose the Ptashne (Pt) number to encapsulate the 8 co-dependent factors that control transcriptional regulation into a single number. Therefore, a single number controls a promoter’s output rather than these 8 co-dependent factors, and designing a genetic circuit with N promoters requires specification of only N Pt numbers. We demonstrate how to design genetic circuits in Pt number space by constructing and characterizing 15 2-repressor OpAmp circuits that act as signal amplifiers when within an optimal Pt region. We experimentally show that OpAmp circuits using different TFs and TF expression levels will only amplify the dynamic range of input signals when their corresponding Pt numbers are within the optimal region. Thus, the use of the Pt number greatly simplifies the genetic circuit design, particularly important as circuits employ more TFs to perform increasingly complex functions.Keywords: transcription factor, synthetic biology, genetic circuit, biophysical model, binding energy measurement
Procedia PDF Downloads 47330707 A Paradigm Shift in Patent Protection-Protecting Methods of Doing Business: Implications for Economic Development in Africa
Authors: Odirachukwu S. Mwim, Tana Pistorius
Abstract:
Since the early 1990s political and economic pressures have been mounted on policy and law makers to increase patent protection by raising the protection standards. The perception of the relation between patent protection and development, particularly economic development, has evolved significantly in the past few years. Debate on patent protection in the international arena has been significantly influenced by the perception that there is a strong link between patent protection and economic development. The level of patent protection determines the extent of development that can be achieved. Recently there has been a paradigm shift with a lot of emphasis on extending patent protection to method of doing business generally referred to as Business Method Patenting (BMP). The general perception among international organizations and the private sectors also indicates that there is a strong correlation between BMP protection and economic growth. There are two diametrically opposing views as regards the relation between Intellectual Property (IP) protection and development and innovation. One school of thought promotes the view that IP protection improves economic development through stimulation of innovation and creativity. The other school advances the view that IP protection is unnecessary for stimulation of innovation and creativity and is in fact a hindrance to open access to resources and information required for innovative and creative modalities. Therefore, different theories and policies attach different levels of protection to BMP which have specific implications for economic growth. This study examines the impact of BMP protection on development by focusing on the challenges confronting economic growth in African communities as a result of the new paradigm in patent law. (Africa is used as a single unit in this study but this should not be construed as African homogeneity. Rather, the views advanced in this study are used to address the common challenges facing many communities in Africa). The study reviews (from the point of views of legal philosophers, policy makers and decisions of competent courts) the relevant literature, patent legislation particularly the International Treaty, policies and legal judgments. Findings from this study suggest that over and above the various criticisms levelled against the extreme liberal approach to the recognition of business methods as patentable subject matter, there are other specific implications that are associated with such approach. The most critical implication of extending patent protection to business methods is the locking-up of knowledge which may hamper human development in general and economic development in particular. Locking up knowledge necessary for economic advancement and competitiveness may have a negative effect on economic growth by promoting economic exclusion, particularly in African communities. This study suggests that knowledge of BMP within the African context and the extent of protection linked to it is crucial in achieving a sustainable economic growth in Africa. It also suggests that a balance is struck between the two diametrically opposing views.Keywords: Africa, business method patenting, economic growth, intellectual property, patent protection
Procedia PDF Downloads 12630706 Protection of Patients and Staff in External Beam Radiotherapy Using Linac in Kenya
Authors: Calvince Okome Odeny
Abstract:
There is a current action to increase radiotherapy services in Kenya. The National government of Kenya, in collaboration with the county governments, has embarked on building radiotherapy centers in all 47 regions of the country. As these new centers are established in Kenya, it has to be ensured that minimum radiation safety standards are in place prior to operation. For full implementation of this, it is imperative that more Research and training for regulators are done on radiation protection, and safety and national regulatory infrastructure is geared towards ensuring radiation protection and safety in all aspects of the use of external radiotherapy practices. The present work aims at reviewing the level of protection and safety for patients and staff during external beam radiotherapy using Linac in Kenya and provides relevant guidance to improve protection and safety. A retrospective evaluation was done to verify whether those occupationally exposed workers and patients are adequately protected from the harmful effect of radiation exposure during the treatment procedures using Linac. The project was experimental Research, also including an analysis of resource documents obtained from the literature and international organizations. The critical findings of the work revealed that the key elements of protection of occupationally exposed workers and patients include a comprehensive quality Management system governing all planned activities from siting, safety, and design of the Facility, construction, acceptance testing, commissioning, operation, and decommissioning of the Facility; Government empowering the Regulatory Authority to license Medical Linear facilities and to enforce the applicable regulations to ensure adequate protection; A comprehensive Radiation Protection and Safety program must be established to ensure adequate safety and protection of workers and patients during treatment planning and treatment delivery of patients and categories of staff associated with the Facility must be well educated and trained to perform professionally with a commitment to sound safety culture. Relevant recommendations from the findings are shared with the Medical Linear Accelerator facilities and the regulatory authority to provide guidance and continuous improvement of protection and safety to improve regulatory oversight.Keywords: oncology, radiotherapy, protection, staff
Procedia PDF Downloads 7530705 AI as a Tool Hindering Digital Education
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.Keywords: AI, digital education, education tools, motivation and engagement
Procedia PDF Downloads 2830704 Social Protection Reforms in Indonesia: Towards a Life Cycle Based Social Protection System
Authors: Dyah Larasati, Karishma Alize Huda, Sri Kusumastuti Rahayu, Martin Daniel Siyaranamual
Abstract:
Indonesia continues to reform its social protection system to provide the needed protection for its citizen. Indonesia Social Protection consisted of social assistance programs (non-contributory/tax-financed) specifically targeted for the poor and at-risk and social security/insurance program (contributory system). The social assistance programs have mostly been implemented since 1998. The national health insurance has been implemented since 2014 and the employment social insurance since 2015. One major reform implemented has been improving the targeting performance of its major social assistance portfolios including (1) Food Assistance for the poor families (Rastra and BPNT/noncash foods assistance); (2) Education Assistance for poor children; (3) Conditional Cash Transfer for poor families (PKH); and (4) Subsidized beneficiaries of National Health Insurance (JKN-PBI) for the poor and at-risk individuals. For the Social Insurance (through BPJS Employment program), several initiatives have been implemented to expand the program contributing members, although it mostly benefits the formal sector workers. However, major gaps still exist especially for the emerging middle-income groups who typically work at the informal sectors. They have yet to get the protection needed to sustain their social and economic growth. Since 2017, TNP2K (the National Team for Poverty Reduction) under the Vice President office has led the social protection discourse as the government understands the need to address vulnerabilities across the lifecycle and prioritize support to the most at-risk population particularly the elderly, young children and people with disabilities. Discussion and advocacy to recommend for more investment is continuing in order for the government to establish a comprehensive social protection system in the near future (2020-2024) that protects children through an inclusive child benefit program; build a system to benefit more working-age adults (including individuals with disabilities) and a three-tier elderly protection as they reach 65 years.Keywords: poverty reduction, social assistance, social insurance, social protection
Procedia PDF Downloads 17930703 Optimization Analysis of a Concentric Tube Heat Exchanger with Field Synergy Principle
Abstract:
The paper investigates the optimization analysis to the heat exchanger design, mainly with response surface method and genetic algorithm to explore the relationship between optimal fluid flow velocity and temperature of the heat exchanger using field synergy principle. First, finite volume method is proposed to calculate the flow temperature and flow rate distribution for numerical analysis. We identify the most suitable simulation equations by response surface methodology. Furthermore, a genetic algorithm approach is applied to optimize the relationship between fluid flow velocity and flow temperature of the heat exchanger. The results show that the field synergy angle plays vital role in the performance of a true heat exchanger.Keywords: optimization analysis, field synergy, heat exchanger, genetic algorithm
Procedia PDF Downloads 30730702 Molecular Detection and Isolation of Benzimidazole Resistant Haemonchus contortus from Pakistan
Authors: K. Ali, M. F. Qamar, M. A. Zaman, M. Younus, I. Khan, S. Ehtisham-ul-Haque, R. Tamkeen, M. I. Rashid, Q. Ali
Abstract:
This study centers on molecular identification of Haemonchus contortus and isolation of Benz-imidazoles (BZ) resistant strains. Different abattoirs’ of two geographic regions of Punjab (Pakistan) were frequently visited for the collection of worms. Out of 1500 (n=1500) samples that were morphologically confirmed as H. contortus, 30 worms were subjected to molecular procedures for isolation of resistant strains. Resistant worms (n=8) were further subjected to DNA gene sequencing. Bio edit sequence alignment editor software was used to detect the possible mutation, deletion, replacement of nucleotides. Genetic diversity was noticed and genetic variation existing in β-tubulin isotype 1 of the H. contortus population of small ruminants of different regions considered in this study. H. contortus showed three different type of genetic sequences. 75%, 37.5%, 25% and 12.5% of the studied samples showed 100% query cover and identity with isolates and clones of China, UK, Australia and other countries, respectively. Interestingly the neighbor countries such as India and Iran haven’t many similarities with the Pakistani isolates. Thus, it suggests that population density of same genetic makeup H. contortus is scattered worldwide rather than clustering in a single region.Keywords: Haemonchus contortus, Benzimidazole resistant, β-tubulin-1 gene, abattoirs
Procedia PDF Downloads 17530701 Procedure to Optimize the Performance of Chemical Laser Using the Genetic Algorithm Optimizations
Authors: Mohammedi Ferhate
Abstract:
This work presents details of the study of the entire flow inside the facility where the exothermic chemical reaction process in the chemical laser cavity is analyzed. In our paper we will describe the principles of chemical lasers where flow reversal is produced by chemical reactions. We explain the device for converting chemical potential energy laser energy. We see that the phenomenon thus has an explosive trend. Finally, the feasibility and effectiveness of the proposed method is demonstrated by computer simulationKeywords: genetic, lasers, nozzle, programming
Procedia PDF Downloads 9430700 A Review on Big Data Movement with Different Approaches
Authors: Nay Myo Sandar
Abstract:
With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques
Procedia PDF Downloads 8630699 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework
Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi
Abstract:
Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency
Procedia PDF Downloads 15230698 Comparison between Continuous Genetic Algorithms and Particle Swarm Optimization for Distribution Network Reconfiguration
Authors: Linh Nguyen Tung, Anh Truong Viet, Nghien Nguyen Ba, Chuong Trinh Trong
Abstract:
This paper proposes a reconfiguration methodology based on a continuous genetic algorithm (CGA) and particle swarm optimization (PSO) for minimizing active power loss and minimizing voltage deviation. Both algorithms are adapted using graph theory to generate feasible individuals, and the modified crossover is used for continuous variable of CGA. To demonstrate the performance and effectiveness of the proposed methods, a comparative analysis of CGA with PSO for network reconfiguration, on 33-node and 119-bus radial distribution system is presented. The simulation results have shown that both CGA and PSO can be used in the distribution network reconfiguration and CGA outperformed PSO with significant success rate in finding optimal distribution network configuration.Keywords: distribution network reconfiguration, particle swarm optimization, continuous genetic algorithm, power loss reduction, voltage deviation
Procedia PDF Downloads 18730697 Evolving Credit Scoring Models using Genetic Programming and Language Integrated Query Expression Trees
Authors: Alexandru-Ion Marinescu
Abstract:
There exist a plethora of methods in the scientific literature which tackle the well-established task of credit score evaluation. In its most abstract form, a credit scoring algorithm takes as input several credit applicant properties, such as age, marital status, employment status, loan duration, etc. and must output a binary response variable (i.e. “GOOD” or “BAD”) stating whether the client is susceptible to payment return delays. Data imbalance is a common occurrence among financial institution databases, with the majority being classified as “GOOD” clients (clients that respect the loan return calendar) alongside a small percentage of “BAD” clients. But it is the “BAD” clients we are interested in since accurately predicting their behavior is crucial in preventing unwanted loss for loan providers. We add to this whole context the constraint that the algorithm must yield an actual, tractable mathematical formula, which is friendlier towards financial analysts. To this end, we have turned to genetic algorithms and genetic programming, aiming to evolve actual mathematical expressions using specially tailored mutation and crossover operators. As far as data representation is concerned, we employ a very flexible mechanism – LINQ expression trees, readily available in the C# programming language, enabling us to construct executable pieces of code at runtime. As the title implies, they model trees, with intermediate nodes being operators (addition, subtraction, multiplication, division) or mathematical functions (sin, cos, abs, round, etc.) and leaf nodes storing either constants or variables. There is a one-to-one correspondence between the client properties and the formula variables. The mutation and crossover operators work on a flattened version of the tree, obtained via a pre-order traversal. A consequence of our chosen technique is that we can identify and discard client properties which do not take part in the final score evaluation, effectively acting as a dimensionality reduction scheme. We compare ourselves with state of the art approaches, such as support vector machines, Bayesian networks, and extreme learning machines, to name a few. The data sets we benchmark against amount to a total of 8, of which we mention the well-known Australian credit and German credit data sets, and the performance indicators are the following: percentage correctly classified, area under curve, partial Gini index, H-measure, Brier score and Kolmogorov-Smirnov statistic, respectively. Finally, we obtain encouraging results, which, although placing us in the lower half of the hierarchy, drive us to further refine the algorithm.Keywords: expression trees, financial credit scoring, genetic algorithm, genetic programming, symbolic evolution
Procedia PDF Downloads 11730696 The Analysis of the Protection of Historical and Cultural Heritage in the Development of Cities: Taking Quzhou Ancient City as an Example
Authors: Zhen Shu
Abstract:
The historical and cultural heritage demonstrates the wisdom of the entire nation and it has left its own traces in the process of urban construction. It has very important instructional significance for the construction of modern cities and the development of cultural aspects of modern people. The Protection of historical and cultural heritage has become an inevitable choice for the development of modern civilization. This paper discusses the relationship between urban development and historic preservation. And it emphasizes the important value of strengthening the protection of historical and cultural heritage in urban construction, introduces the value of cultural heritage, the process of historic preservation and its problems in Quzhou, Zhejiang Province. In conclusion, we puts forward some Suggestions for strengthening the protection of historical heritage in the process of urban construction.Keywords: cultural heritage, historic preservation, Quzhou ancient city, urban development
Procedia PDF Downloads 27930695 Data Stream Association Rule Mining with Cloud Computing
Authors: B. Suraj Aravind, M. H. M. Krishna Prasad
Abstract:
There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.Keywords: data stream, association rule mining, cloud computing, frequent itemsets
Procedia PDF Downloads 50130694 Control of a Quadcopter Using Genetic Algorithm Methods
Authors: Mostafa Mjahed
Abstract:
This paper concerns the control of a nonlinear system using two different methods, reference model and genetic algorithm. The quadcopter is a nonlinear unstable system, which is a part of aerial robots. It is constituted by four rotors placed at the end of a cross. The center of this cross is occupied by the control circuit. Its motions are governed by six degrees of freedom: three rotations around 3 axes (roll, pitch and yaw) and the three spatial translations. The control of such system is complex, because of nonlinearity of its dynamic representation and the number of parameters, which it involves. Numerous studies have been developed to model and stabilize such systems. The classical PID and LQ correction methods are widely used. If the latter represent the advantage to be simple because they are linear, they reveal the drawback to require the presence of a linear model to synthesize. It also implies the complexity of the established laws of command because the latter must be widened on all the domain of flight of these quadcopter. Note that, if the classical design methods are widely used to control aeronautical systems, the Artificial Intelligence methods as genetic algorithms technique receives little attention. In this paper, we suggest comparing two PID design methods. Firstly, the parameters of the PID are calculated according to the reference model. In a second phase, these parameters are established using genetic algorithms. By reference model, we mean that the corrected system behaves according to a reference system, imposed by some specifications: settling time, zero overshoot etc. Inspired from the natural evolution of Darwin's theory advocating the survival of the best, John Holland developed this evolutionary algorithm. Genetic algorithm (GA) possesses three basic operators: selection, crossover and mutation. We start iterations with an initial population. Each member of this population is evaluated through a fitness function. Our purpose is to correct the behavior of the quadcopter around three axes (roll, pitch and yaw) with 3 PD controllers. For the altitude, we adopt a PID controller.Keywords: quadcopter, genetic algorithm, PID, fitness, model, control, nonlinear system
Procedia PDF Downloads 43130693 Distinctive Features of Legal Relations in the Area of Subsoil Use, Renewal and Protection in Ukraine
Authors: N. Maksimentseva
Abstract:
The issue of public administration in subsoil use, renewal and protection is of high importance for Ukraine since it is strongly linked to energy security of the state as well as it shall facilitate the people of Ukraine to efficiently implement its propitiatory rights towards natural resources and redistribution of national wealth. As it is stipulated in the Article 11 of the Subsoil Code of Ukraine (the Code) the authorities that administer the industry are limited to central executive bodies and local governments. In particular, it is stipulated in the Code that the Ukraine’s Cabinet of Ministers carries out public administration in geological exploration, production and protection of subsoil. Other state bodies of public administration include central public authority responsible for state environmental protection policies; central public authority in charge of implementation of state geological exploration and efficient subsoil use policies; central authority in charge of state health and safety control policies. There are also public authorities in the Autonomous Republic of Crimea; local executive bodies and other state authorities and local self-government authorities in compliance with laws of Ukraine. This article is devoted to the analysis of the legal relations in the area of public administration of subsoil use, renewal and protection in Ukraine. The main approaches to study the essence of legal relations in the named area as well as its tasks, functions and methods are analyzed. It is concluded in this article that legal relationship in the field of public administration of subsoil use, renewal and protection is characterized by specifics of its task (development of natural resources).Keywords: legal relations, public administration, subsoil code of Ukraine, subsoil use, renewal and protection
Procedia PDF Downloads 35530692 An Investigation of Environmental Education Knowledge for Sustainable Development in High School Sectors in UK
Authors: Abolaji Mayowa Akinyele
Abstract:
The purpose of this study was to investigate student’s awareness, Knowledge and understanding of environmental issues for sustainable development. Findings revealed that; despite the positive attitude shown by students towards environmental education, a relatively low level of understanding of environmental concept was recorded in school settings regardless of efforts by government and other environmental agencies at creating awareness about environmental related issues. This brought about the investigation of students environmental education knowledge in high school settings. About 205 Students were randomly selected for data collection using validated instruments titled student’s knowledge and attitude questionnaire as well as student’s response to questions (interview) concerning global warming. T-test statistics, chi-square and simple percentage were the major statistical tools employed in data analysis. This study revealed that environment based-education (school curriculum) as well as efforts by government/environmental agencies (mass media) plays a major role in promoting students understanding, of environmental concepts, awareness of major environmental issues and positive attitude towards natural environment.Keywords: environmental issues, sustainable development, students attitude, students knowledge
Procedia PDF Downloads 45630691 Is Maternity Discrimination Pushing Women out of Work? A Case Study of Maternity Experiences of Working Women in Malaysia
Authors: Nor Hafizah Selamat, Intan Hashima Mohd Hashim, Noraida Endut, Shariffah Suraya Syed Jamaludin, Sharifah Zahhura Syed Abdullah, Suziana Mat Yasin, Nurul Jannah Ambak
Abstract:
In Malaysia, report on discrimination against pregnant women at work does exist, and this issue should be taken seriously as large proportion of women in the workforce in Malaysia are of reproductive age. It has been well established that women tend to leave the workforce because of their responsibility in raising the family, to care for family members and, also due to lack of work-life balance. In this case, women find themselves disadvantaged in career and job advancements due to gender roles and expectations connected with maternity. This maternity discrimination have pushed women out of work although The Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW), to which Malaysia is a party, considers discrimination on the ground of maternity is a form of gender discrimination because it hinders women of their effective right to work and requires that special protection be provided for women during maternity to ensure their ability to enjoy the right to work (Article 11(2). What factors prevent women from returning to work and at the same time performing their gender roles expectations? Using semi-structured in-depth interviews this paper explores the experiences of maternity discrimination and their perspectives towards their work employment. 15 women employees who were pregnant or had given birth during her employment period in public and private organizations in Malaysia were participated in this study. While data were analyzed using narrative analysis, respondents were asked on issues related to managing pregnancy, maternity leave and returning to work. The findings revealed that several respondents from private companies stated that they were either dismissed or forced to take unpaid leave due to the company policies. In some cases, respondents also shared how they were treated poorly that they felt that they had to leave their jobs. However, in public organization, the maternity policy implemented showed the support that the employees received from their employer. Study shows that supportive family and employers will encourage employees to return to work. Reasonable adjustments in terms of maternity policies at workplace such as allowing sufficient time in postnatal appointments, offering clear explanation on maternity issues at workplace are something that employees expected from their employers.Keywords: maternity discrimination, women and work, gender, maternity protection, Malaysia
Procedia PDF Downloads 11830690 Study of Pathogenicity and Characterization of Fusarium oxysporum f.sp. albedinis by Isozymes Systemes
Authors: Abouamama Sidaoui, Noureddine Karkachi, Mebrouk Kihal
Abstract:
The characteristics of Fusarium oxysporium f.sp. albedinis (Foa) isolates were investigated using electrophoretic studies of isozymes systems (esterase and phosphatase). All the (F.o.a) isolates were pathogenic to the date palm seedlings cultivar Deglet Nour, but they did not induce any disease symptoms on control plants. Fusarium sp. isolated from soil did not show aggression against these seedlings. The isoenzymes profiles revealed polymorphic bands. The data were subjected to analysis with the JMP method. The isolates were delineated into two main groups A and B which were divided into sub-groups. 19 isolates create the group A, and four isolates (E1, E2, E3 and M15A) formed the group B. Analysis of isozyme banding patterns was found to be a reliable marker technology, efficient, and effective tools to find the genetic variability among isolates isolated in different geographical areas.Keywords: genetic diversity, Fusarium oxysporium f. sp. albedinis, isozyme analysis, pathogenicity
Procedia PDF Downloads 21830689 Policy Brief/Note of Philippine Health Issues: Human Rights Violations Committed on Healthcare Workers
Authors: Trina Isabel Santiago, Daniel Chua, Jumee Tayaban, Joseph Daniel Timbol, Joshua Yanes
Abstract:
Numerous instances of human rights violations on healthcare workers have been reported during the COVID-19 pandemic in the Philippines. This brief aims to explore these civil and political rights violations and propose recommendations to address these. Our review shows that a wide range of civic and political human rights violations have been committed by individual citizens and government agencies on individual healthcare workers and health worker groups. These violations include discrimination, red-tagging, evictions, illegal arrests, and acts of violence ranging from chemical attacks to homicide. If left unchecked, these issues, compounded by the pandemic, may lead to the exacerbations of the pre-existing problems of the Philippine healthcare system. Despite all pre-existing reports by human rights groups and public media articles, there still seems to be a lack of government action to condemn and prevent these violations. The existence of government agencies which directly contribute to these violations with the lack of condemnation from other agencies further propagate the problem. Given these issues, this policy brief recommends the establishment of an interagency task force for the protection of human rights of healthcare workers as well as the expedited passing of current legislative bills towards the same goal. For more immediate action, we call for the establishment of a dedicated hotline for these incidents with adequate appointment and training of point persons, construction of clear guidelines, and closer collaboration between government agencies in being united against these issues.Keywords: human rights violations, healthcare workers, COVID-19 pandemic, Philippines
Procedia PDF Downloads 62930688 Impact of Population Size on Symmetric Travelling Salesman Problem Efficiency
Authors: Wafa' Alsharafat, Suhila Farhan Abu-Owida
Abstract:
Genetic algorithm (GA) is a powerful evolutionary searching technique that is used successfully to solve and optimize problems in different research areas. Genetic Algorithm (GA) considered as one of optimization methods used to solve Travel salesman Problem (TSP). The feasibility of GA in finding a TSP solution is dependent on GA operators; encoding method, population size, termination criteria, in general. In specific, crossover and its probability play a significant role in finding possible solutions for Symmetric TSP (STSP). In addition, the crossover should be determined and enhanced in term reaching optimal or at least near optimal. In this paper, we spot the light on using a modified crossover method called modified sequential constructive crossover and its impact on reaching optimal solution. To justify the relevance of a parameter value in solving the TSP, a set comparative analysis conducted on different crossover methods values.Keywords: genetic algorithm, crossover, mutation, TSP
Procedia PDF Downloads 22730687 Genetic Algorithm and Multi Criteria Decision Making Approach for Compressive Sensing Based Direction of Arrival Estimation
Authors: Ekin Nurbaş
Abstract:
One of the essential challenges in array signal processing, which has drawn enormous research interest over the past several decades, is estimating the direction of arrival (DOA) of plane waves impinging on an array of sensors. In recent years, the Compressive Sensing based DoA estimation methods have been proposed by researchers, and it has been discovered that the Compressive Sensing (CS)-based algorithms achieved significant performances for DoA estimation even in scenarios where there are multiple coherent sources. On the other hand, the Genetic Algorithm, which is a method that provides a solution strategy inspired by natural selection, has been used in sparse representation problems in recent years and provides significant improvements in performance. With all of those in consideration, in this paper, a method that combines the Genetic Algorithm (GA) and the Multi-Criteria Decision Making (MCDM) approaches for Direction of Arrival (DoA) estimation in the Compressive Sensing (CS) framework is proposed. In this method, we generate a multi-objective optimization problem by splitting the norm minimization and reconstruction loss minimization parts of the Compressive Sensing algorithm. With the help of the Genetic Algorithm, multiple non-dominated solutions are achieved for the defined multi-objective optimization problem. Among the pareto-frontier solutions, the final solution is obtained with the multiple MCDM methods. Moreover, the performance of the proposed method is compared with the CS-based methods in the literature.Keywords: genetic algorithm, direction of arrival esitmation, multi criteria decision making, compressive sensing
Procedia PDF Downloads 14630686 Genomic Diversity and Relationship among Arabian Peninsula Dromedary Camels Using Full Genome Sequencing Approach
Authors: H. Bahbahani, H. Musa, F. Al Mathen
Abstract:
The dromedary camels (Camelus dromedarius) are single-humped even-toed ungulates populating the African Sahara, Arabian Peninsula, and Southwest Asia. The genome of this desert-adapted species has been minimally investigated using autosomal microsatellite and mitochondrial DNA markers. In this study, the genomes of 33 dromedary camel samples from different parts of the Arabian Peninsula were sequenced using Illumina Next Generation Sequencing (NGS) platform. These data were combined with Genotyping-by-Sequencing (GBS) data from African (Sudanese) dromedaries to investigate the genomic relationship between African and Arabian Peninsula dromedary camels. Principle Component Analysis (PCA) and average genome-wide admixture analysis were be conducted on these data to tackle the objectives of these studies. Both of the two analyses conducted revealed phylogeographic distinction between these two camel populations. However, no breed-wise genetic classification has been revealed among the African (Sudanese) camel breeds. The Arabian Peninsula camel populations also show higher heterozygosity than the Sudanese camels. The results of this study explain the evolutionary history and migration of African dromedary camels from their center of domestication in the southern Arabian Peninsula. These outputs help scientists to further understand the evolutionary history of dromedary camels, which might impact in conserving the favorable genetic of this species.Keywords: dromedary, genotyping-by-sequencing, Arabian Peninsula, Sudan
Procedia PDF Downloads 205