Search results for: cyber defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 726

Search results for: cyber defense

216 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 158
215 The Role of Attachment and Dyadic Coping in Shaping Relational Intimacy

Authors: Anna Wendolowska, Dorota Czyzowska

Abstract:

An intimate relationship is a significant factor that influences romantic partners’ well-being. In the face of stress, avoidant partners often employ a defense-against-intimacy strategy, leading to reduced relationship satisfaction, intimacy, interdependence, and longevity. Dyadic coping can buffer the negative effects of stress on relational satisfaction. Emotional competence mediates the relationship between insecure attachment and intimacy. In the current study, the link between attachment, different forms of dyadic coping, and various aspects of relationship satisfaction was examined. Both partners completed the attachment style questionnaire, the well matching couple questionnaire, and the dyadic coping inventory. The data was analyzed using the actor–partner interdependence model. The results highlighted a negative association between insecure-avoidant attachment style and intimacy. The actor effects of avoidant attachment on relational intimacy for women and for men were significant, whilst the partner effects for both spouses were not significant. The emotion-focused common dyadic coping moderated the relationship between avoidance of attachment and the partner's sense of intimacy. After controlling for the emotion-focused common dyadic coping, the actor effect of attachment on intimacy for men was slightly weaker, and the actor effect for women turned out to be insignificant. The emotion-focused common dyadic coping weakened the negative association between insecure attachment and relational intimacy. The impact of adult attachment and dyadic coping significantly contributes to subjective relational well-being.

Keywords: adult attachment, dyadic coping, relational intimacy, relationship satisfaction

Procedia PDF Downloads 154
214 Investigations of Metals and Metal-Antibrowning Agent Effects on Polyphenol Oxidase Activity from Red Poppy Leaf

Authors: Gulnur Arabaci

Abstract:

Heavy metals are one of the major groups of contaminants in the environment and many of them are toxic even at very low concentration in plants and animals. However, some metals play important roles in the biological function of many enzymes in living organisms. Metals such as zinc, iron, and cooper are important for survival and activity of enzymes in plants, however heavy metals can inhibit enzyme which is responsible for defense system of plants. Polyphenol oxidase (PPO) is a copper-containing metalloenzyme which is responsible for enzymatic browning reaction of plants. Enzymatic browning is a major problem for the handling of vegetables and fruits in food industry. It can be increased and effected with many different futures such as metals in the nature and ground. In the present work, PPO was isolated and characterized from green leaves of red poppy plant (Papaver rhoeas). Then, the effect of some known antibrowning agents which can form complexes with metals and metals were investigated on the red poppy PPO activity. The results showed that glutathione was the most potent inhibitory effect on PPO activity. Cu(II) and Fe(II) metals increased the enzyme activities however, Sn(II) had the maximum inhibitory effect and Zn(II) and Pb(II) had no significant effect on the enzyme activity. In order to reduce the effect of heavy metals, the effects of metal-antibrowning agent complexes on the PPO activity were determined. EDTA and metal complexes had no significant effect on the enzyme. L-ascorbic acid and metal complexes decreased but L-ascorbic acid-Cu(II)-complex had no effect. Glutathione–metal complexes had the best inhibitory effect on Red poppy leaf PPO activity.

Keywords: inhibition, metal, red poppy, poly phenol oxidase (PPO)

Procedia PDF Downloads 323
213 Predicting the Next Offensive Play Types will be Implemented to Maximize the Defense’s Chances of Success in the National Football League

Authors: Chris Schoborg, Morgan C. Wang

Abstract:

In the realm of the National Football League (NFL), substantial dedication of time and effort is invested by both players and coaches in meticulously analyzing the game footage of their opponents. The primary aim is to anticipate the actions of the opposing team. Defensive players and coaches are especially focused on deciphering their adversaries' intentions to effectively counter their strategies. Acquiring insights into the specific play type and its intended direction on the field would confer a significant competitive advantage. This study establishes pre-snap information as the cornerstone for predicting both the play type (e.g., deep pass, short pass, or run) and its spatial trajectory (right, left, or center). The dataset for this research spans the regular NFL season data for all 32 teams from 2013 to 2022. This dataset is acquired using the nflreadr package, which conveniently extracts play-by-play data from NFL games and imports it into the R environment as structured datasets. In this study, we employ a recently developed machine learning algorithm, XGBoost. The final predictive model achieves an impressive lift of 2.61. This signifies that the presented model is 2.61 times more effective than random guessing—a significant improvement. Such a model has the potential to markedly enhance defensive coaches' ability to formulate game plans and adequately prepare their players, thus mitigating the opposing offense's yardage and point gains.

Keywords: lift, NFL, sports analytics, XGBoost

Procedia PDF Downloads 53
212 Development of a Diagnostic Device to Predict Clinically Significant Inflammation Associated with Cardiac Surgery

Authors: Mohamed Majrashi, Patricia Connolly, Terry Gourlay

Abstract:

Cardiopulmonary bypass is known to cause inflammatory response during open heart surgery. It includes the initiation of different cascades such as coagulation, complement system and cytokines. Although the immune system is body’s key defense mechanism against external assault, when overexpressed, it can be injurious to the patient, particularly in a cohort of patients in which there is a heightened and uncontrolled response. The inflammatory response develops in these patients to an exaggerated level resulting in an autoimmune injury and may lead to poor postoperative outcomes (systemic inflammatory response syndrome and multi-organs failure). Previous studies by this group have suggested a correlation between the level of IL6 measured in patient’s blood before surgery and after polymeric activation and the observed inflammatory response during surgery. Based upon these findings, the present work is aimed at using this response to develop a test which can be used prior to the open heart surgery to identify the high-risk patients before their operation. The work will be accomplished via three main clinical phases including some pilot in-vitro studies, device development and clinical investigation. Current findings from studies using animal blood, employing DEHP and DEHP plasticized PVC materials as the activator, support the earlier results in patient samples. Having established this relationship, ongoing work will focus on developing an activated lateral flow strip technology as a screening device for heightened inflammatory propensity.

Keywords: cardiopulmonary bypass, cytokines, inflammatory response, overexpression

Procedia PDF Downloads 279
211 Effect of Zinc-Lysine on Growth, Photosynthesis, Oxidative Stress and Antioxidant System and Chromium Uptake in Rice under Cr Stress

Authors: Shafaqat Ali, Afzal Hussain, Muhammad Rizwan, Longhua Wu

Abstract:

Chromium (Cr) is one of the widespread and toxic trace elements present in the agricultural land. Chromium can enter into the food chain mainly through agricultural crops grown on Cr-contaminated soils such as rice (Oryza sativa L.). The current study was done to evaluate the effects of increasing concentrations foliar applied zinc (Zn) chelated with lysine (Zn-lys) (0, 10, 20, and 30 mg L⁻¹) on rice biomass, photosynthesis, oxidative stress, key antioxidant enzyme activities and Cr uptake under increasing levels of Cr in the soil (0, 100, 500 mg kg⁻¹). Cr-induced toxicity reduced the height of plants, biomass, chlorophyll contents, gas exchange parameters, and antioxidant enzyme activities while increased the Cr concentrations and oxidative stress (malondialdehyde, electrolyte leakage, and H₂O₂) in shoots and roots than control plants. Foliar application of Zn-lys increased the plant growth, photosynthesis, Zn concentrations, and enzyme activities in rice seedlings. In addition, Zn-lys reduced the Cr concentrations and oxidative stress compared to the respective Cr treatments alone. The present results indicate that foliar Zn-lys stimulates the antioxidant defense system in rice, increase the rice growth while reduced the Cr concentrations in plants by promoting the Zn uptake and photosynthesis. Taken together, foliar spray of Zn-lys chelate can efficiently be employed for improving plant growth and Zn contents while reducing Cr concentration in rice grown in Cr-contaminated and Zn-deficient soils.

Keywords: antioxidants, chromium, zinc-lysine, oxidative stress, photosynthesis, tolerance

Procedia PDF Downloads 188
210 Antioxidant Defense Mechanisms in Murine Epidermis and Dermis and Their Responses to Ultraviolet Light

Authors: Ben Abderrahmane Ayoub El Fateh, Bnina Rachid

Abstract:

A comprehensive comparison of antioxidant defenses in the dermis and epidermis and their response to exposure to ultraviolet (UV) irradiation has not previously been attempted. In this study, enzymic and non-enzymic antioxidants in epidermis and dermis of hairless mice were compared. Enzyme activities are presented both as units/gram of skin and units/milligram of protein; arguments are presented for the superiority of skin wet weight as a reference base. Catalase, glutathione peroxidase, and glutathione reductase (units/gram of skin) were higher in the epidermis than dermis by 49%, 86%, and 74%, respectively. Superoxide dismutase did not follow this pattern. Lipophilic antioxidants ( -tocopherol, ubiquinol 9, and ubiquinone 9) and hydrophilic antioxidants (ascorbic acid, dehydroascorbic acid, and glutathione) were 24–95% higher in the epidermis than in dermis. In contrast, oxidized glutathione was 60% lower in the epidermis than in dermis. Mice were irradiated with solar light to examine the response of these cutaneous layers to UV irradiation. After irradiation with 25 J/cm2 (UVA + UVB, from a solar simulator), 10 times the minimum erythemal dose, epidermal and dermal catalase and superoxide dismutase activities were greatly decreased. Tocopherol, ubiquinol 9, ubiquinone 9, ascorbic acid, dehydroascorbic acid, and reduced glutathione decreased in both epidermis and dermis by 26-93%. Oxidizedgiutathione showed a slight, non-significant increase. Because the reduction in total ascorbate and catalase was much more severe in the epidermis than dermis, it can be concluded that UV light is more damaging to the antioxidant defenses in the epidermis than in the dermis.

Keywords: antioxidant defenses, enzymic, epidermis, oxidizedgiutathione

Procedia PDF Downloads 435
209 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 135
208 An Economic Analysis of Bottled Drinking Water Industry in India

Authors: Swadhin Mondal

Abstract:

While safe drinking water is an effective defense against the infection of water borne diseases, a large number of populations suffering from these diseases do not have access to safe drinking water due inadequacy of supply. Private entrepreneurs entered this sector and made bottled drinking water available by supplying various kinds of bottled water. In this study we found that the bottled drinking water industry has experienced a spectacular growth over the past two decades and it has a huge growth potential because of rising demand for safe drinking. High profit margin (217 %) is the main attraction to the entrepreneur to invest in this industry. Health awareness, lack of safe drinking water facilities, rising income, urbanization, migration and rising trend in tourism industries are the major influencing factors of demand for bottled drinking water (BDW). This industry also partially fulfills the demand for drinking water. More than 2 percent of household’s demands were met by this industry and many more households (additional 4 percent) coping with BDW during water crisis. Poor households spend around 4 percent of their total monthly household’s consumption expenditure on BDW which may have an adverse impact on household because households could have spent this for purchasing other goods. Like other developed counties, a large section of Indian households are shifting from their traditional sources of water to BDW. However, there are some concerns about the quality of BDW. Many cases, BDW contains chemical toxins at more than permissible level that can be harmful for health. Hence, there is an urgent need for appropriate intervention to regulate price, reduce potential harm and improve the quality of water provided by this industry.

Keywords: drinking water, public health public failure, privatization, development, public policy

Procedia PDF Downloads 328
207 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 156
206 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 52
205 YHV-Responsive Gene Expression under the Influence of PmRelish Regulation

Authors: Suwattana Visetnan, Premruethai Supungul, Sureerat Tang, Ikuo Hirono, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

In animals, infection by Gram-negative bacteria and certain viruses activates the Imd signaling pathway wherein the a NF-κB transcription factor, Relish, is a key regulatory protein for the synthesis of antimicrobial proteins. Infection by yellow head virus (YHV) activates the Imd pathway. To investigate the expression of genes involved in YHV infection and under the influence of PmRelish regulation, RNA interference and suppression subtractive hybridization (SSH) are employed. The genes in forward library expressed in shrimp after YHV infection and under the activity of PmRelish were obtained by subtracting the cDNAs from YHV-infected and PmRelish-knockdown shrimp with cDNAs from YHV-infected shrimp. Opposite subtraction gave a reverse library whereby an alternative set of genes under YHV infection and no PmRelish expression was obtained. Sequencing of 252 and 99 cDNA clones from the respective forward and reverse libraries were done and annotated through blast search against the GenBank sequences. Genes involved in defense and homeostasis were abundant in both libraries, 31% and 23% in the forward and reverse libraries, respectively. They were predominantly antimicrobial proteins, proteinases and proteinase inhibitors. The expression of antimicrobial protein genes, ALFPm3, crustinPm1, penaeidin3 and penaeidin5 were tested under PmRelish silencing and Gram-negative bacterium V. harveyi infection. Together with the results previously reported, the expression of penaeidin5 and also penaeidin3 but not ALFPm3 and crustinPm1 were under the regulation of PmRelish in the Imd pathway.

Keywords: relish, yellow head virus, penaeus monodon, antimicrobial proteins

Procedia PDF Downloads 209
204 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 254
203 Effect of Relaxation Techniques on Immunological Properties of Breast Milk

Authors: Ahmed Ali Torad

Abstract:

Background: Breast feeding maintains the maternal fetal immunological link, favours the transmission of immune-competence from the mother to her infant and is considered an important contributory factor to the neo natal immune defense system. Purpose: This study was conducted to investigate the effect of relaxation techniques on immunological properties of breast milk. Subjects and Methods: Thirty breast feeding mothers with a single, mature infant without any complications participated in the study. Subjects will be recruited from outpatient clinic of obstetric department of El Kasr El-Aini university hospital in Cairo. Mothers were randomly divided into two equal groups using coin toss method: Group (A) (relaxation training group) (experimental group): It will be composed of 15 women who received relaxation training program in addition to breast feeding and nutritional advices and Group (B) (control group): It will be composed of 15 women who received breast feeding and nutritional advices only. Results: The results showed that mean mother’s age was 28.4 ± 3.68 and 28.07 ± 4.09 for group A and B respectively, there were statistically significant differences between pre and post values regarding cortisol level, IgA level, leucocyte count and infant’s weight and height and there is only statistically significant differences between both groups regarding post values of all immunological variables (cortisol – IgA – leucocyte count). Conclusion: We could conclude that there is a statistically significant effect of relaxation techniques on immunological properties of breast milk.

Keywords: relaxation, breast, milk, immunology, lactation

Procedia PDF Downloads 113
202 Medical Nutritional Therapy in Human Immunodeficiency Virus Infection with Tuberculosis and Severe Malnutrition: A Case Report

Authors: Lista Andriyati, Nurpudji A Taslim

Abstract:

The human immunodeficiency virus (HIV) patients have potential nutritional and metabolic problems. HIV is a virus that attacks cells T helper and impairs the function of immune cells. Infected individuals gradually become immunodeficient, results in increased susceptibility to a wide range of infections such as tuberculosis (TB). Malnutrition has destructive effects on the immune system and host defense mechanisms. Effective and proper nutritional therapies are important to improve medical outcomes and quality of life, which is associated with functional improvement. A case of 38-years old man admitted to hospital with loss of consciousness and was diagnosed HIV infection and relapse lung TB with severe malnutrition, fever, oral candidiasis, anemia (6.3 g/dL), severe hypoalbuminemia (1.9 g/dL), severe hypokalemia (2.2 mmol/L), immune depletion (1085 /µL) and elevated liver enzyme (ALT 1198/AST 375 U/L). Nutritional intervention by giving 2300 kcal of energy, protein 2 g/IBW/day, carbohydrate 350 g, fat 104 g through enteral and parenteral nutrition. Supplementations administered are zinc, vitamin A, vitamin B1, vitamin B6, vitamin B12, vitamin C, vitamin D, and snakehead fish extract high content of protein albumin (Pujimin®). After 46 days, there are clinical and metabolic improvement in Hb (6.3 to 11.2 g/dL), potassium (2.2 to 3.4 mmol/L), albumin (1.9 to 2.3 g/dL), ALT 1198 to 47/AST 375 to 68 U/L) and improved awareness. In conclusion, nutritional therapy in HIV infection with adequate macronutrients and micronutrients fulfillment and immunonutrition is very important to avoid cachexia and to improve nutritional status and immune disfunction.

Keywords: HIV, hypoalbuminemia, malnutrition, tuberculosis

Procedia PDF Downloads 122
201 Heuristic Algorithms for Time Based Weapon-Target Assignment Problem

Authors: Hyun Seop Uhm, Yong Ho Choi, Ji Eun Kim, Young Hoon Lee

Abstract:

Weapon-target assignment (WTA) is a problem that assigns available launchers to appropriate targets in order to defend assets. Various algorithms for WTA have been developed over past years for both in the static and dynamic environment (denoted by SWTA and DWTA respectively). Due to the problem requirement to be solved in a relevant computational time, WTA has suffered from the solution efficiency. As a result, SWTA and DWTA problems have been solved in the limited situation of the battlefield. In this paper, the general situation under continuous time is considered by Time based Weapon Target Assignment (TWTA) problem. TWTA are studied using the mixed integer programming model, and three heuristic algorithms; decomposed opt-opt, decomposed opt-greedy, and greedy algorithms are suggested. Although the TWTA optimization model works inefficiently when it is characterized by a large size, the decomposed opt-opt algorithm based on the linearization and decomposition method extracted efficient solutions in a reasonable computation time. Because the computation time of the scheduling part is too long to solve by the optimization model, several algorithms based on greedy is proposed. The models show lower performance value than that of the decomposed opt-opt algorithm, but very short time is needed to compute. Hence, this paper proposes an improved method by applying decomposition to TWTA, and more practical and effectual methods can be developed for using TWTA on the battlefield.

Keywords: air and missile defense, weapon target assignment, mixed integer programming, piecewise linearization, decomposition algorithm, military operations research

Procedia PDF Downloads 334
200 Programmed Cell Death in Datura and Defensive Plant Response toward Tomato Mosaic Virus

Authors: Asma Alhuqail, Nagwa Aref

Abstract:

Programmed cell death resembles a real nature active defense in Datura metel against TMV after three days of virus infection. Physiological plant response was assessed for asymptomatic healthy and symptomatic infected detached leaves. The results indicated H2O2 and Chlorophyll-a as the most potential parameters. Chlorophyll-a was considered the only significant predictor variant for the H2O2 dependent variant with a P value of 0.001 and R-square of 0.900. The plant immune response was measured within three days of virus infection using the cutoff value of H2O2 (61.095 lmol/100 mg) and (63.201 units) for the tail moment in the Comet Assay. Their percentage changes were 255.12% and 522.40% respectively which reflects the stress of virus infection in the plant. Moreover, H2O2 showed 100% specificity and sensitivity in the symptomatic infected group using the receiver-operating characteristic (ROC). All tested parameters in the symptomatic infected group had significant correlations with twenty-five positive and thirty-one negative correlations where the P value was <0.05 and 0.01. Chlorophyll-a parameter had a crucial role of highly significant correlation between total protein and salicylic acid. Contrarily, this correlation with tail moment unit was (r = _0.930, P <0.01) where the P value was < 0.01. The strongest significant negative correlation was between Chlorophyll-a and H2O2 at P < 0.01, while moderate negative significant correlation was seen for Chlorophyll-b where the P value < 0.05. The present study discloses the secret of the three days of rapid transient production of activated oxygen species (AOS) that was enough for having potential quantitative physiological parameters for defensive plant response toward the virus.

Keywords: programmed cell death, plant–adaptive immune response, hydrogen peroxide (H2O2), physiological parameters

Procedia PDF Downloads 243
199 Eye Tracking Syntax in Language Education

Authors: Marcus Maia

Abstract:

The present study reports and discusses the use of eye tracking qualitative data in reading workshops in Brazilian middle and high schools and in Generative Syntax and Sentence Processing courses at the undergraduate and graduate levels at the Federal University of Rio de Janeiro, respectively. Both endeavors take the sentential level as the proper object to be metacognitively explored in language education (cf. Chomsky, Gallego & Ott, 2019) to develop innate science forming capacity and knowledge of language. In both projects, non-discrepant qualitative eye tracking data collected and quantitatively analyzed in experimental syntax and psycholinguistic studies carried out in Lapex (Experimental Psycholinguistics Laboratory of the Federal University of Rio de Janeiro) were displayed to students as a point of departure, triggering discussions. Classes would generally start with the display of videos showing eye tracking data, such as gaze plots and heatmaps from several studies in Psycholinguistics and Experimental Syntax that we had already developed in our laboratory. The videos usually triggered discussions with students about linguistic and psycholinguistic issues, such as the reading of sentences for gist, garden-path sentences, syntactic and semantic anomalies, the filled-gap effect, island effects, direct and indirect cause, and recursive constructions, among other topics. Active, problem-solving based methodologies were employed with the objective of stimulating student participation. The communication also discusses the importance of developing full literacy, epistemic vigilance and intellectual self-defense in an infodemic world in the lines of Maia (2022).

Keywords: reading, educational psycholinguistics, eye-tracking, active methodology

Procedia PDF Downloads 61
198 Therapeutical Role of Copper Oxide Nanoparticles (CuO NPs) for Breast Cancer Therapy

Authors: Dipranjan Laha, Parimal Karmakar

Abstract:

Metal oxide nanoparticles are well known to generate oxidative stress and deregulate normal cellular activities. Among these, transition metals copper oxide nanoparticles (CuO NPs) are more compelling than others and able to modulate different cellular responses. In this work, we have synthesized and characterized CuO NPs by various biophysical methods. These CuO NPs (~30 nm) induce autophagy in human breast cancer cell line, MCF7 in a time and dose-dependent manner. Cellular autophagy was tested by MDC staining, induction of green fluorescent protein light chain 3 (GFP-LC3B) foci by confocal microscopy, transfection of pBABE-puro mCherry-EGFP-LC3B plasmid and western blotting of autophagy marker proteins LC3B, beclin1, and ATG5. Further, inhibition of autophagy by 3-Methyladenine (3-MA) decreased LD50 doses of CuO NPs. Such cell death was associated with the induction of apoptosis as revealed by FACS analysis, cleavage of PARP, dephosphorylation of Bad and increased cleavage product of caspase3. siRNA-mediated inhibition of autophagy-related gene beclin1 also demonstrated similar results. Finally, induction of apoptosis by 3-MA in CuO NPs treated cells were observed by TEM. This study indicates that CuO NPs are a potent inducer of autophagy which may be a cellular defense against the CuO NPs mediated toxicity and inhibition of autophagy switches the cellular response into apoptosis. A combination of CuO NPs with the autophagy inhibitor is essential to induce apoptosis in breast cancer cells. Acknowledgments: The authors would like to acknowledge for financial support for this research work to the Department of Biotechnology (No. BT/PR14661/NNT/28/494/2010), Government of India.

Keywords: nanoparticle, autophagy, apoptosis, siRNA-mediated inhibition

Procedia PDF Downloads 436
197 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 382
196 Study on the Process of Detumbling Space Target by Laser

Authors: Zhang Pinliang, Chen Chuan, Song Guangming, Wu Qiang, Gong Zizheng, Li Ming

Abstract:

The active removal of space debris and asteroid defense are important issues in human space activities. Both of them need a detumbling process, for almost all space debris and asteroid are in a rotating state, and it`s hard and dangerous to capture or remove a target with a relatively high tumbling rate. So it`s necessary to find a method to reduce the angular rate first. The laser ablation method is an efficient way to tackle this detumbling problem, for it`s a contactless technique and can work at a safe distance. In existing research, a laser rotational control strategy based on the estimation of the instantaneous angular velocity of the target has been presented. But their calculation of control torque produced by a laser, which is very important in detumbling operation, is not accurate enough, for the method they used is only suitable for the plane or regularly shaped target, and they did not consider the influence of irregular shape and the size of the spot. In this paper, based on the triangulation reconstruction of the target surface, we propose a new method to calculate the impulse of the irregularly shaped target under both the covered irradiation and spot irradiation of the laser and verify its accuracy by theoretical formula calculation and impulse measurement experiment. Then we use it to study the process of detumbling cylinder and asteroid by laser. The result shows that the new method is universally practical and has high precision; it will take more than 13.9 hours to stop the rotation of Bennu with 1E+05kJ laser pulse energy; the speed of the detumbling process depends on the distance between the spot and the centroid of the target, which can be found an optimal value in every particular case.

Keywords: detumbling, laser ablation drive, space target, space debris remove

Procedia PDF Downloads 78
195 Genome-Wide Expression Profiling of Cicer arietinum Heavy Metal Toxicity

Authors: B. S. Yadav, A. Mani, S. Srivastava

Abstract:

Chickpea (Cicer arietinum L.) is an annual, self-pollinating, diploid (2n = 2x = 16) pulse crop that ranks second in world legume production after common bean (Phaseolus vulgaris). ICC 4958 flowers approximately 39 days after sowing under peninsular Indian conditions and the crop matures in less than 90 days in rained environments. The estimated collective yield losses due to abiotic stresses (6.4 million t) have been significantly higher than for biotic stresses (4.8 million t). Most legumes are known to be salt sensitive, and therefore, it is becoming increasingly important to produce cultivars tolerant to high-salinity in addition to other abiotic and biotic stresses for sustainable chickpea production. Our aim was to identify the genes that are involved in the defence mechanism against heavy metal toxicity in chickpea and establish the biological network of heavy metal toxicity in chickpea. ICC4958 variety of chick pea was taken and grown in normal condition and 150µM concentration of different heavy metal salt like CdCl₂, K₂Cr2O₇, NaAsO₂. At 15th day leave samples were collected and stored in RNA Later solution microarray was performed for checking out differential gene expression pattern. Our studies revealed that 111 common genes that involved in defense mechanism were up regulated and 41 genes were commonly down regulated during treatment of 150µM concentration of CdCl₂, K₂Cr₂O₇, and NaAsO₂. Biological network study shows that the genes which are differentially expressed are highly connected and having high betweenness and centrality.

Keywords: abiotic stress, biological network, chickpea, microarray

Procedia PDF Downloads 188
194 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 39
193 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 114
192 Chromatographic Fingerprint Analysis of Methanolic Extract of Camellia sinensis Linn. Leaves

Authors: Babar Ali, Mohammad Rashid, Showkat Rasool Mir, Mohammad Ali, Saiba Shams

Abstract:

Background: The plant Camellia sinensis (Theaceae) is an evergreen shrub indigenous to Assam (India) and parts of China and Japan. Traditional Chinese medicine has recommended green tea for headaches, body aches and pains, digestion, enhancement of immune defense, detoxification, as an energizer and to prolong life. The leaves have more than 700 chemical constituents, among which flavanoids, amino acids, vitamins (C, E, K), caffeine and polysaccharides. Adulteration and substitution may affect the quality of formulation containing tea leaves. Standardization of medicinal preparation is essential for further therapeutic results and for global acceptance. Hence, chromatographic fingerprint profiles were carried out for establishing the standards. Materials and methods: TLC studies for methanolic extracts of the leaves of Camellia sinensis were carried out in a new developed solvent system, Toluene: Ethyl acetate: Formic acid (7:3:1). TLC plates were dried in air, visualized in UV at wavelengths 254 nm and 366 nm and photographed. Results: Results provide valuable clue regarding their polarity and selection of solvents for separation of phytochemicals. Fingerprinting of methanolic extract of Camellia sinensis leaves revealed the presence of various phytochemicals in UV at 254 nm and 366 nm. Conclusion: Fingerprint profile is quite helpful in setting up of standards and thus to keep a check on intentional/unintentional adulteration. TLC offers major advantages over other conventional chromatographic techniques such as unsurpassed flexibility (esp. stationary and mobile phase), choice of detection wavelength, user friendly, rapid and cost effective.

Keywords: Cammelia sinensis Linn., standardization, methanolic extract, thin layer chromatography

Procedia PDF Downloads 421
191 Humoral and Cytokine Responses to Major Human Cytomegalovirus Antigens in Mouse Model

Authors: Sahar Essa, Hussain A. Safar, Raj Raghupathy

Abstract:

Human cytomegalovirus (CMV) continues to be a source of severe complications in immunologically immature and immunocompromised hosts. Effective CMV vaccines that help diminish CMV disease in transplant patients and avoid congenital infection are of great importance. Though the exact roles of defense mechanisms are unidentified, viral-specific antibodies and cytokine responses are known to be involved in controlling CMV infections. CMV envelope glycoprotein B (UL55/gB), matrix proteins (UL83/pp65, UL99/pp28, UL32/pp150), and assembly protein UL80a/pp38 are known to be targets of antiviral immune responses. We immunized mice intraperitoneally with these five CMV-related proteins (commercial) for their ability to induce specific antibody responses (in-house immunoassay) and cytokine production (commercial assay) in a mouse model. We observed a significant CMV-antigen-specific antibody response to pp38 and pp65 (E/C ˃2.0, p˂0.001). Mice immunized with pp38 had significantly higher concentrations of GM-CSF, IFN-α, IL-2 IL-4, IL-5, and IL-17A (p˂0.05). Mice immunized with pp65 showed significantly higher concentrations of GM-CSF, IFN-γ, IL-2 IL-4, IL-10, IL-12, IL-17A, and TNF-α. Th1 to Th2 cytokines ratios revealed a Th1 cytokine bias in mice immunized with pp38, pp65, pp150, and gB. We suggest that stimulation with multiple CMV-related proteins, which include pp38, pp65, and gB antigens, will allow both humoral and cellular immune responses to be efficiently activated, thus serving as appropriate CMV antigens for future vaccines.

Keywords: cytomegalovirus, UL99/pp28, UL80a/pp38, UL83/pp65, UL32/pp150, UL55/gB, CMV-antigen-specific antibody, CMV antigen-specific cytokine responses

Procedia PDF Downloads 75
190 Simulation and Fabrication of Plasmonic Lens for Bacteria Detection

Authors: Sangwoo Oh, Jaewoo Kim, Dongmin Seo, Jaewon Park, Yongha Hwang, Sungkyu Seo

Abstract:

Plasmonics has been regarded one of the most powerful bio-sensing modalities to evaluate bio-molecular interactions in real-time. However, most of the plasmonic sensing methods are based on labeling metallic nanoparticles, e.g. gold or silver, as optical modulation markers, which are non-recyclable and expensive. This plasmonic modulation can be usually achieved through various nano structures, e.g., nano-hole arrays. Among those structures, plasmonic lens has been regarded as a unique plasmonic structure due to its light focusing characteristics. In this study, we introduce a custom designed plasmonic lens array for bio-sensing, which was simulated by finite-difference-time-domain (FDTD) approach and fabricated by top-down approach. In our work, we performed the FDTD simulations of various plasmonic lens designs for bacteria sensor, i.e., Samonella and Hominis. We optimized the design parameters, i.e., radius, shape, and material, of the plasmonic lens. The simulation results showed the change in the peak intensity value with the introduction of each bacteria and antigen i.e., peak intensity 1.8711 a.u. with the introduction of antibody layer of thickness of 15nm. For Salmonella, the peak intensity changed from 1.8711 a.u. to 2.3654 a.u. and for Hominis, the peak intensity changed from 1.8711 a.u. to 3.2355 a.u. This significant shift in the intensity due to the interaction between bacteria and antigen showed a promising sensing capability of the plasmonic lens. With the batch processing and bulk production of this nano scale design, the cost of biological sensing can be significantly reduced, holding great promise in the fields of clinical diagnostics and bio-defense.

Keywords: plasmonic lens, FDTD, fabrication, bacteria sensor, salmonella, hominis

Procedia PDF Downloads 267
189 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 160
188 Saponins vs Anthraquinones: Different Chemicals, Similar Ecological Roles in Marine Symbioses

Authors: Guillaume Caulier, Lola Brasseur, Patrick Flammang, Pascal Gerbaux, Igor Eeckhaut

Abstract:

Saponins and quinones are two major groups of secondary metabolites widely distributed in the biosphere. More specifically, triterpenoid saponins and anthraquinones are mainly found in a wide variety of plants, bacteria and fungi. In the animal kingdom, these natural organic compounds are rare and only found in small quantities in arthropods, marine sponges and echinoderms. In this last group, triterpenoid saponins are specific to holothuroids (sea cucumbers) while anthraquinones are the chemical signature of crinoids (feather stars). Depending on the species, they present different molecular cocktails. Despite presenting different chemical properties, these molecules share numerous similarities. This study compares the biological distribution, the pharmacological effects and the ecological roles of holothuroid saponins and crinoid anthraquinones. Both of them have been defined as allomones repelling predators and parasites (i.e. chemical defense) and have interesting pharmacological properties (e.g. anti-bacterial, anti-fungal, anti-cancer). Our study investigates the chemical ecology of two symbiotic associations models; between the snapping shrimp Synalpheus stimpsonii associated with crinoids and the Harlequin crab Lissocarcinus orbicularis associated with holothuroids. Using behavioral experiments in olfactometers, chemical extractions and mass spectrometry analyses, we discovered that saponins and anthraquinones present a second ecological role: the attraction of obligatory symbionts towards their hosts. They can, therefore, be defined as kairomones. This highlights a new paradigm in marine chemical ecology: Chemical repellents are attractants to obligatory symbionts because they constitute host specific chemical signatures.

Keywords: anthraquinones, kairomones, marine symbiosis, saponins, attractant

Procedia PDF Downloads 195
187 A Real-Time Moving Object Detection and Tracking Scheme and Its Implementation for Video Surveillance System

Authors: Mulugeta K. Tefera, Xiaolong Yang, Jian Liu

Abstract:

Detection and tracking of moving objects are very important in many application contexts such as detection and recognition of people, visual surveillance and automatic generation of video effect and so on. However, the task of detecting a real shape of an object in motion becomes tricky due to various challenges like dynamic scene changes, presence of shadow, and illumination variations due to light switch. For such systems, once the moving object is detected, tracking is also a crucial step for those applications that used in military defense, video surveillance, human computer interaction, and medical diagnostics as well as in commercial fields such as video games. In this paper, an object presents in dynamic background is detected using adaptive mixture of Gaussian based analysis of the video sequences. Then the detected moving object is tracked using the region based moving object tracking and inter-frame differential mechanisms to address the partial overlapping and occlusion problems. Firstly, the detection algorithm effectively detects and extracts the moving object target by enhancing and post processing morphological operations. Secondly, the extracted object uses region based moving object tracking and inter-frame difference to improve the tracking speed of real-time moving objects in different video frames. Finally, the plotting method was applied to detect the moving objects effectively and describes the object’s motion being tracked. The experiment has been performed on image sequences acquired both indoor and outdoor environments and one stationary and web camera has been used.

Keywords: background modeling, Gaussian mixture model, inter-frame difference, object detection and tracking, video surveillance

Procedia PDF Downloads 470