Search results for: attacks and controls
1044 Understanding the Role of Concussions as a Risk Factor for Multiple Sclerosis
Authors: Alvin Han, Reema Shafi, Alishba Afaq, Jennifer Gommerman, Valeria Ramaglia, Shannon E. Dunn
Abstract:
Adolescents engaged in contact-sports can suffer from recurrent brain concussions with no loss of consciousness and no need for hospitalization, yet they face the possibility of long-term neurocognitive problems. Recent studies suggest that head concussive injuries during adolescence can also predispose individuals to multiple sclerosis (MS). The underlying mechanisms of how brain concussions predispose to MS is not understood. Here, we hypothesize that: (1) recurrent brain concussions prime microglial cells, the tissue resident myeloid cells of the brain, setting them up for exacerbated responses when exposed to additional challenges later in life; and (2) brain concussions lead to the sensitization of myelin-specific T cells in the peripheral lymphoid organs. Towards addressing these hypotheses, we implemented a mouse model of closed head injury that uses a weight-drop device. First, we calibrated the model in male 12 week-old mice and established that a weight drop from a 3 cm height induced mild neurological symptoms (mean neurological score of 1.6+0.4 at 1 hour post-injury) from which the mice fully recovered by 72 hours post-trauma. Then, we performed immunohistochemistry on the brain of concussed mice at 72 hours post-trauma. Despite mice having recovered from all neurological symptoms, immunostaining for leukocytes (CD45) and IBA-1 revealed no peripheral immune infiltration, but an increase in the intensity of IBA1+ staining compared to uninjured controls, suggesting that resident microglia had acquired a more active phenotype. This microglia activation was most apparent in the white matter tracts in the brain and in the olfactory bulb. Immunostaining for the microglia-specific homeostatic marker TMEM119, showed a reduction in TMEM119+ area in the brain of concussed mice compared to uninjured controls, confirming a loss of this homeostatic signal by microglia after injury. Future studies will test whether single or repetitive concussive injury can worsen or accelerate autoimmunity in male and female mice. Understanding these mechanisms will guide the development of timed and targeted therapies to prevent MS from getting started in people at risk.Keywords: concussion, microglia, microglial priming, multiple sclerosis
Procedia PDF Downloads 1021043 UV Resistibility of a Carbon Nanofiber Reinforced Polymer Composite
Authors: A. Evcin, N. Çiçek Bezir, R. Duman, N. Duman
Abstract:
Nowadays, a great concern is placed on the harmfulness of ultraviolet radiation (UVR) which attacks human bodies. Nanocarbon materials, such as carbon nanotubes (CNTs), carbon nanofibers (CNFs) and graphene, have been considered promising alternatives to shielding materials because of their excellent electrical conductivities, very high surface areas and low densities. In the present work, carbon nanofibers have been synthesized from solutions of Polyacrylonitrile (PAN)/ N,N-dimethylformamide (DMF) by electrospinning method. The carbon nanofibers have been stabilized by oxidation at 250 °C for 2 h in air and carbonized at 750 °C for 1 h in H2/N2. We present the fabrication and characterization of transparent and ultraviolet (UV) shielding CNF/polymer composites. The content of CNF filler has been varied from 0.2% to 0.6 % by weight. UV Spectroscopy has been performed to study the effect of composition on the transmittance of polymer composites.Keywords: electrospinning, carbon nanofiber, characterization, composites, nanofiber, ultraviolet radiation
Procedia PDF Downloads 2251042 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 3571041 Using Structured Analysis and Design Technique Method for Unmanned Aerial Vehicle Components
Authors: Najeh Lakhoua
Abstract:
Introduction: Scientific developments and techniques for the systemic approach generate several names to the systemic approach: systems analysis, systems analysis, structural analysis. The main purpose of these reflections is to find a multi-disciplinary approach which organizes knowledge, creates universal language design and controls complex sets. In fact, system analysis is structured sequentially by steps: the observation of the system by various observers in various aspects, the analysis of interactions and regulatory chains, the modeling that takes into account the evolution of the system, the simulation and the real tests in order to obtain the consensus. Thus the system approach allows two types of analysis according to the structure and the function of the system. The purpose of this paper is to present an application of system analysis of Unmanned Aerial Vehicle (UAV) components in order to represent the architecture of this system. Method: There are various analysis methods which are proposed, in the literature, in to carry out actions of global analysis and different points of view as SADT method (Structured Analysis and Design Technique), Petri Network. The methodology adopted in order to contribute to the system analysis of an Unmanned Aerial Vehicle has been proposed in this paper and it is based on the use of SADT. In fact, we present a functional analysis based on the SADT method of UAV components Body, power supply and platform, computing, sensors, actuators, software, loop principles, flight controls and communications). Results: In this part, we present the application of SADT method for the functional analysis of the UAV components. This SADT model will be composed exclusively of actigrams. It starts with the main function ‘To analysis of the UAV components’. Then, this function is broken into sub-functions and this process is developed until the last decomposition level has been reached (levels A1, A2, A3 and A4). Recall that SADT techniques are semi-formal; however, for the same subject, different correct models can be built without having to know with certitude which model is the good or, at least, the best. In fact, this kind of model allows users a sufficient freedom in its construction and so the subjective factor introduces a supplementary dimension for its validation. That is why the validation step on the whole necessitates the confrontation of different points of views. Conclusion: In this paper, we presented an application of system analysis of Unmanned Aerial Vehicle components. In fact, this application of system analysis is based on SADT method (Structured Analysis Design Technique). This functional analysis proved the useful use of SADT method and its ability of describing complex dynamic systems.Keywords: system analysis, unmanned aerial vehicle, functional analysis, architecture
Procedia PDF Downloads 2041040 Hyperchaos-Based Video Encryption for Device-To-Device Communications
Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou
Abstract:
In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#
Procedia PDF Downloads 3711039 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2931038 Impact of Pandemics on Cities and Societies
Authors: Deepak Jugran
Abstract:
Purpose: The purpose of this study is to identify how past Pandemics shaped social evolution and cities. Methodology: A historical and comparative analysis of major historical pandemics in human history their origin, transmission route, biological response and the aftereffects. A Comprehensive pre & post pandemic scenario and focuses selectively on major issues and pandemics that have deepest & lasting impact on society with available secondary data. Results: Past pandemics shaped the behavior of human societies and their cities and made them more resilient biologically, intellectually & socially endorsing the theory of “Survival of the fittest” by Sir Charles Darwin. Pandemics & Infectious diseases are here to stay and as a human society, we need to strengthen our collective response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, & especially animals who become carriers for these viruses. Conclusion: Pandemics always resulted in great mortality, but they also improved the overall individual human immunology & collective social response; at the same time, they also improved the public health system of cities, health delivery systems, water, sewage distribution system, institutionalized various welfare reforms and overall collective social response by the societies. It made human beings more resilient biologically, intellectually, and socially hence endorsing the theory of “AGIL” by Prof Talcott Parsons. Pandemics & infectious diseases are here to stay and as humans, we need to strengthen our city response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, especially animals who always acted as carriers for these novel viruses. Pandemics over the years acted like natural storms, mitigated the prevailing social imbalances and laid the foundation for scientific discoveries. We understand that post-Covid-19, institutionalized city, state and national mechanisms will get strengthened and the recommendations issued by the various expert groups which were ignored earlier will now be implemented for reliable anticipation, better preparedness & help to minimize the impact of Pandemics. Our analysis does not intend to present chronological findings of pandemics but rather focuses selectively on major pandemics in history, their causes and how they wiped out an entire city’s population and influenced the societies, their behavior and facilitated social evolution.Keywords: pandemics, Covid-19, social evolution, cities
Procedia PDF Downloads 1121037 Development of a Stable RNAi-Based Biological Control for Sheep Blowfly Using Bentonite Polymer Technology
Authors: Yunjia Yang, Peng Li, Gordon Xu, Timothy Mahony, Bing Zhang, Neena Mitter, Karishma Mody
Abstract:
Sheep flystrike is one of the most economically important diseases affecting the Australian sheep and wool industry (>356M/annually). Currently, control of Lucillia cuprina relies almost exclusively on chemicals controls and the parasite has developed resistance to nearly all control chemicals used in the past. It is therefore critical to develop an alternative solution for the sustainable control and management of flystrike. RNA interference (RNAi) technologies have been successfully explored in multiple animal industries for developing parasites controls. This research project aims to develop a RNAi based biological control for sheep blowfly. Double-stranded RNA (dsRNA) has already proven successful against viruses, fungi and insects. However, the environmental instability of dsRNA is a major bottleneck for successful RNAi. Bentonite polymer (BenPol) technology can overcome this problem, as it can be tuned for the controlled release of dsRNA in the gut challenging pH environment of the blowfly larvae, prolonging its exposure time to and uptake by target cells. To investigate the potential of BenPol technology for dsRNA delivery, four different BenPol carriers were tested for their dsRNA loading capabilities, and three of them were found to be capable of affording dsRNA stability under multiple temperatures (4°C, 22°C, 40°C, 55°C) in sheep serum. Based on stability results, dsRNA from potential targeted genes was loaded onto BenPol carriers and tested in larvae feeding assays, three genes resulting in knockdowns. Meanwhile, a primary blowfly embryo cell line (BFEC) derived from L. cuprina embryos was successfully established, aim for an effective insect cell model for testing RNAi efficacy for preliminary assessments and screening. The results of this study establish that the dsRNA is stable when loaded on BenPol particles, unlike naked dsRNA rapidly degraded in sheep serum. The stable nanoparticle delivery system offered by BenPol technology can protect and increase the inherent stability of dsRNA molecules at higher temperatures in a complex biological fluid like serum, providing promise for its future use in enhancing animal protection.Keywords: flystrike, RNA interference, bentonite polymer technology, Lucillia cuprina
Procedia PDF Downloads 921036 Antioxidant Activity of Selected Medicinal Plants Used in Folk Medicine in Libya
Authors: Salmin Alshalmani, Ghazall M Benhusein, Ebtisam Alhadi Absomaha, Marwa I. Meshri, Hamdoon A. Mohammed, Jamal Mezogi
Abstract:
Eight wild medicinal plants used by Libyan and growing in Al-Jebel Al-Akhdar, Libya were suspected to estimate the antioxidant activity using 2,2-Diphenyl-1-Picrylhydrazyl stable free radical (DPPH). Incidences of purple colour reduction of the DPPH by testing extracts in addition to quercetin and vitamin C as positive controls reflect its ability to scavenge free radicals. All testing plants extract showed noticeable strength as antioxidant regarding its abilities to scavenge DPPH with an especial regards to Sarcopoterium spinosum.Keywords: antioxidant, scavenging activity, folk medicine, methanol extracts
Procedia PDF Downloads 6011035 Cell Patterns and Tissue Metamorphoses Based on Cell Surface Mechanism
Authors: Reyhane Hamed Kamran
Abstract:
Early stage morphogenesis requires the execution of complex systems that direct the nearby conduct of gatherings of cells. The organization of such instruments has been, for the most part, deciphered through the recognizable proof of moderated groups of flagging pathways that spatially and transiently control cell conduct. In any case, how this data is handled to control cell shape and cell elements is an open territory of examination. The structure that rises up out of differing controls, for example, cell science, material science, and formative science, focuses to bond and cortical actin arranges as controllers of cell surface mechanics. In this specific circumstance, a scope of formative marvels can be clarified by the guideline of cell surface pressure.Keywords: cell, tissue damage, morphogenesis, cell conduct
Procedia PDF Downloads 1051034 Cell Patterns and Tissue Metamorphoses Based on Cell Surface Mechanics
Authors: Narin Salehiyan
Abstract:
Early stage morphogenesis requires the execution of complex systems that direct the nearby conduct of gatherings of cells. The organization of such instruments has been, for the most part, deciphered through the recognizable proof of moderated groups of flagging pathways that spatially and transiently control cell conduct. In any case, how this data is handled to control cell shape and cell elements is an open territory of examination. The structure that rises up out of differing controls, for example, cell science, material science and formative science, focuses to bond and cortical actin arranges as controllers of cell surface mechanics. In this specific circumstance, a scope of formative marvels can be clarified by the guideline of cell surface pressure.Keywords: cell, tissue damage, morphogenesis, cell conduct
Procedia PDF Downloads 811033 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 3301032 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes
Authors: Kuo-Wei Liao, Jessica Gitomarsono
Abstract:
Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.Keywords: bridge, reliability, multi-hazards, scour
Procedia PDF Downloads 3741031 The Design of a Die for the Processing of Aluminum through Equal Channel Angular Pressing
Authors: P. G. F. Siqueira, N. G. S. Almeida, P. M. A. Stemler, P. R. Cetlin, M. T. P. Aguilar
Abstract:
The processing of metals through Equal Channel Angular Pressing (ECAP) leads to their remarkable strengthening. The ECAP dies control the amount of strain imposed on the material through its geometry, especially through the angle between the die channels, and thus the microstructural and mechanical properties evolution of the material. The present study describes the design of an ECAP die whose utilization and maintenance are facilitated, and that also controls the eventual undesired flow of the material during processing. The proposed design was validated through numerical simulations procedures using commercial software. The die was manufactured according to the present design and tested. Tests using aluminum alloys also indicated to be suitable for the processing of higher strength alloys.Keywords: ECAP, mechanical design, numerical methods, SPD
Procedia PDF Downloads 1391030 Analysis of Cracked Beams with Spalling Having Different Arrangements of the Reinforcement Bars Using Finite Element Analysis (FEA)
Authors: Rishabh Shukla, Achin Agrawal, Anupam Saxena, S. Mandal
Abstract:
The existence of a crack, affects the mechanical behaviour and various properties of a structure to a great degree. This paper focuses on recognizing the parameters that gets changed due to the formation of cracks and have a great impact on the performance of the structure. Spalling is a major concern as it leaves the reinforcement bars more susceptible to environmental attacks. Beams of cross section 300 mm × 500 mm are designed and for a calculated area of steel, two different arrangements of reinforced bars are analysed. Results are prepared for different stages of cracking for each arrangement of rebars. The parameters for both arrangements are then compared. The Finite Element Analysis (FEA) is carried out and changes in the properties like flexural strength, Elasticity and modal frequency are reported. The conclusions have been drawn by comparing the results.Keywords: cracks, elasticity, spalling, FEA
Procedia PDF Downloads 2791029 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 881028 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 151027 Lactobacillus rhamnosus GG Increases the Re-Epithelialization Rate of Model Wounds by Stimulating Keratinocyte Migration in Ex-Vivo
Authors: W. Mohammedsaeed, A. J. Mcbain, S. M. Cruickshank, C. A. O’Neill
Abstract:
Many studies have demonstrated the importance of probiotics and their potential therapeutic effects within the gut. Recently, the possible therapeutic effects of probiotics in other tissues have also begun to be investigated. Comparatively few studies have evaluated the use of topical probiotics in relation to the skin. In this study, we have conducted preliminary investigations into whether a well-known probiotic, Lactobacillus rhamnosus GG (LGG), can increase the rate of re-epithelialization in a model wound. Full-thickness skin was obtained from individuals undergoing elective cosmetic surgery. This skin was wounded using excisional punch and cultured using a serum-free medium, either in the presence or absence of L. rhamnosus GG lysate. Histological staining of the sections was performed with Haematoxylin& Eosin E to quantify “epithelial tongue length”. This is the length of the new epithelial ‘tongue’ that grows and covers the exposed dermis at the inner wound edges. The length of the new epithelial ‘tongue’ was compared in untreated section and section treated with and L. rhamnosus GG made using108CFU/ml bacterial cells. L. rhamnosus GG lysate enhanced significantly the re-epithelialisation of treated wounds compared with that of untreated wounds (P=0.005, n=3). Tongue length, at day 1 was 7.55μm 0.15, at day 3 it was 18.5μm 0.25 and at day 7 was 22.9μm 0.35. These results can be compared with untreated cultures in which tongue length was 3.25μm 0.35, day 3 was 9.65μm 0.25 and day 7 was 13.5μm 0.15 post-wounding. In ex-vivo proliferation and migration cells were measured by determining the expression of nuclear proliferation marker Ki-67 and the expression of Phosphorylated cortactin respectively demonstrated that L. rhamnosus GG significantly increased NHEK proliferation and migration rates relative to controls. However, the dominant mechanism was migration because in ex-vivo skin treated with the L. rhamnosus GG up-regulated the gene expression of the chemokine receptor and ligands CXCR2 and CXCL2 comparing with controls (P=0.02, P=0.03 respectively, n=3). High levels of CXCL2/CXCL2 have already been implicated in multiple aspects of stimulation of wound healing through activation of keratinocyte migration. These data demonstrate that lysates from Lactobacillus rhamnosus GG increase re-epithelialization by stimulation of keratinocyte migration. The current study identifies the partial mechanism that contribute to stimulating the wound-healing process ex vivo in response to L. rhamnosus GG lysate is an increase in the production of CXCL2/ CXCR2 in ex vivo models. The use of probiotic lysates potentially offers new options to develop treatments that could improve wound healing.Keywords: Lactobacillus rhamnosus GG, wounds, migration, lysate
Procedia PDF Downloads 3291026 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report
Authors: Khaled Alabduljabbar
Abstract:
Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy
Procedia PDF Downloads 891025 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges
Authors: M. Kowalski, M. Kastek, M. Szustakowski
Abstract:
Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertzKeywords: terahertz, infrared, object detection, screening camera, image processing
Procedia PDF Downloads 3571024 Role of Zinc Adminstration in Improvement of Faltering Growth in Egyption Children at Risk of Environmental Enteric Dysfunction
Authors: Ghada Mahmoud El Kassas, Maged Atta El Wakeel
Abstract:
Background: Environmental enteric dysfunction (EED) is impending trouble that flared up in the last decades to be pervasive in infants and children. EED is asymptomatic villous atrophy of the small bowel that is prevalent in the developing world and is associated with altered intestinal function and integrity. Evidence has suggested that supplementary zinc might ameliorate this damage by reducing gastrointestinal inflammation and may also benefit cognitive development. Objective: We tested whether zinc supplementation improves intestinal integrity, growth, and cognitive function in stunted children predicted to have EED. Methodology: This case–control prospective interventional study was conducted on 120 Egyptian Stunted children aged 1-10 years who recruited from the Nutrition clinic, the National research center, and 100 age and gender-matched healthy children as controls. At the primary phase of the study, Full history taking, clinical examination, and anthropometric measurements were done. Standard deviation score (SDS) for all measurements were calculated. Serum markers as Zonulin, Endotoxin core antibody (EndoCab), highly sensitive C-reactive protein (hsCRP), alpha1-acid glycoprotein (AGP), Tumor necrosis factor (TNF), and fecal markers such as myeloperoxidase (MPO), neopterin (NEO), and alpha-1-anti-trypsin (AAT) (as predictors of EED) were measured. Cognitive development was assessed (Bayley or Wechsler scores). Oral zinc at a dosage of 20 mg/d was supplemented to all cases and followed up for 6 months, after which the 2ry phase of the study included the previous clinical, laboratory, and cognitive assessment. Results: Serum and fecal inflammatory markers were significantly higher in cases compared to controls. Zonulin (P < 0.01), (EndoCab) (P < 0.001) and (AGP) (P < 0.03) markedly decreased in cases at the end of 2ry phase. Also (MPO), (NEO), and (AAT) showed a significant decline in cases at the end of the study (P < 0.001 for all). A significant increase in mid-upper arm circumference (MUAC) (P < 0.01), weight for age z-score, and skinfold thicknesses (P< 0.05 for both) was detected at end of the study, while height was not significantly affected. Cases also showed significant improvement of cognitive function at phase 2 of the study. Conclusion: Intestinal inflammatory state related to EED showed marked recovery after zinc supplementation. As a result, anthropometric and cognitive parameters showed obvious improvement with zinc supplementation.Keywords: stunting, cognitive function, environmental enteric dysfunction, zinc
Procedia PDF Downloads 1901023 Immunoglobulin G Glycosylation Profile in Influenza and COVID-19 Infected Patients
Authors: Marina Kljaković-Gašpić Batinjan, Tea Petrović, Frano Vučković, Irzal Hadžibegović, Barbara Radovani, Ivana Jurin, Lovorka Đerek, Eva Huljev, Alemka Markotić, Ivica Lukšić, Irena Trbojević-Akmačić, Gordan Lauc, Ivan Gudelj, Rok Čivljak
Abstract:
Immunoglobulin G has essential role in defense against infectious diseases, but its role cannot be fully recognized without understanding of changes in its N-glycans attached to the Fc domain. We analyzed and compared total IgG glycome in plasma samples of patients with influenza, patients with COVID-19 and healthy controls. We found similarities in IgG glycosylation changes in COVID-19 survivors and influenza patients that could be the consequence of adequate immune response to enveloped viruses, while observed changes in deceased COVID-19 patients may indicate its deviation.Keywords: COVID-19, glycosylation, immunoglobulin G, influenza, pneumonia, viral infection
Procedia PDF Downloads 1641022 Ethereum Based Smart Contracts for Trade and Finance
Authors: Rishabh Garg
Abstract:
Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance
Procedia PDF Downloads 1531021 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks
Authors: Huseyin Gokberk, Shian Gao
Abstract:
CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.Keywords: CFD, turbulence modelling, aerofoil, angle of attack
Procedia PDF Downloads 2251020 Identification of the Relationship Between Signals in Continuous Monitoring of Production Systems
Authors: Maciej Zaręba, Sławomir Lasota
Abstract:
Understanding the dependencies between the input signal, that controls the production system and signals, that capture its output, is of a great importance in intelligent systems. The method for identification of the relationship between signals in continuous monitoring of production systems is described in the paper. The method discovers the correlation between changes in the states derived from input signals and resulting changes in the states of output signals of the production system. The method is able to handle system inertia, which determines the time shift of the relationship between the input and output.Keywords: manufacturing operation management, signal relationship, continuous monitoring, production systems
Procedia PDF Downloads 921019 Backstepping Sliding Mode Control
Authors: Othmane Boughazi, Abdelmadjid Boumedienne, Hachemi Glaoui
Abstract:
This work treats the modeling and simulation of non-linear system behavior of an induction motor using backstepping sliding mode control. First, the direct field oriented control IM is derived. Then, a sliding for direct field oriented control is proposed to compensate the uncertainties, which occur in the control.Finally, the study of Backstepping sliding controls strategy of the induction motor drive. Our non linear system is simulated in MATLAB SIMULINK environment, the results obtained illustrate the efficiency of the proposed control with no overshoot, and the rising time is improved with good disturbances rejections comparing with the classical control law.Keywords: induction motor, proportional-integral, sliding mode control, backstepping sliding mode control
Procedia PDF Downloads 4861018 Chronic Pesticides Exposure and Certain Endocrine Functions Among Farmers in East Almnaif District, Ismailia, Egypt
Authors: Amani Waheed, Mostafa Kofi, Shaymaa Attia, Soha Younis, Basma Abdel Hadi
Abstract:
Background: Exposure to pesticides is one of the most important occupational risks among farmers in developing countries. Along with the wide use of pesticides in the world, the concerns over their health impacts are rapidly growing. Objective: To investigate thyroid and reproductive hormones and fasting blood glucose levels among farmers chronically exposed to pesticide from East Almnaif district, Ismailia governorate. Methods: An analytical cross-sectional study was conducted on 43 farmers with active involvement pesticides handling and 43 participants not occupationally exposed to pesticides as the control group. A structured interview questionnaire measuring the sociodemographic characteristics, pesticides exposure characteristics, and safety measures was used. General examination including measurements of height, weight, and blood pressure was done. Moreover, levels of plasma cholinesterase enzyme (PChE), glucose, as well as reproductive and thyroid hormones (TSH, T4, and testosterone) were determined. Results: There were no statistically significant differences between both groups regarding their age, educational level, smoking status, and body mass index. The mean duration of exposure was 20.60 11.06 years. Majority of farmers (76.7%) did not use any personal protective equipment (PPE) during pesticides handling. The mean systolic blood pressure among exposed farmers was greater (134.88 17.18 mm Hg) compared to control group (125 14.69 mm Hg) with statistically significant difference (p = 0.003). The mean diastolic blood pressure was higher (84.02 8.69 mm Hg) compared to control group (78.79 8.98 mm Hg) with statistically significant difference (p = 0.006). The pesticide exposed farmers had statistically significant lower level of PChE (3969.93 1841U/L) than control group (4879.29 1950.08 U/L). Additionally, TSH level was significantly higher in exposed farmers (median =1.39µIU/ml) compared to controls (median = 0.91 µIU/ml) (p=0.032). While, the exposed group had a lower T4 level (6.91 1.91 µg/dl) compared to the control group (7.79 2.10µg/dl), with the statistically significant difference between the two groups (p = 0.045). The exposed group had significantly lower level of testosterone hormone (median=3.37 ng/ml) compared to the control group (median= 6.22 ng/ml) (p=0.003). While, the exposed farmers had statistically insignificant higher level of fasting blood glucose (median =89 mg/dl) than the controls (median=88 mg/dl). Furthermore, farmers who did not use PPE had statistically significant lower level of T4 (6.57 1.81µg/dl) than farmers who used PPE during handling of pesticides (8.01 1.89 µg/dl). Conclusion: Chronic exposure to pesticides exerts disturbing action on reproductive function and thyroid function of the male farmers.Keywords: chronic occupational pesticide exposure, Diabetes mellitus, male reproductive hormones, thyroid function
Procedia PDF Downloads 1361017 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4501016 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 2301015 A Method for Improving the Embedded Runge Kutta Fehlberg 4(5)
Authors: Sunyoung Bu, Wonkyu Chung, Philsu Kim
Abstract:
In this paper, we introduce a method for improving the embedded Runge-Kutta-Fehlberg 4(5) method. At each integration step, the proposed method is comprised of two equations for the solution and the error, respectively. This solution and error are obtained by solving an initial value problem whose solution has the information of the error at each integration step. The constructed algorithm controls both the error and the time step size simultaneously and possesses a good performance in the computational cost compared to the original method. For the assessment of the effectiveness, EULR problem is numerically solved.Keywords: embedded Runge-Kutta-Fehlberg method, initial value problem, EULR problem, integration step
Procedia PDF Downloads 463