Search results for: man in middle attack
1679 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry
Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena
Abstract:
Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.Keywords: botrytis cinerea, blueberry, GC/MS, VOCs
Procedia PDF Downloads 2411678 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks
Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad
Abstract:
In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.Keywords: network security, intrusion detection, honeypot, snort, nmap
Procedia PDF Downloads 5681677 Automatic Intelligent Analysis of Malware Behaviour
Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato
Abstract:
In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.Keywords: malware behaviour, modelling, parsing, search, pattern matching
Procedia PDF Downloads 3321676 China's BRI and Germany's Baghdad Railroad – a Realist Analysis of Hegemonic Conflict and the Circumvention of Maritime Power
Authors: Kamen Kirov
Abstract:
In the late 19th and early 20th centuries, Britain dominated global trade and finance in large part due to its maritime superiority. Germany, a land power, sought to undermine Britain’s position as the primary hegemon but ultimately could not challenge Britain’s maritime position or capabilities. This drove Germany to seek alternative strategies to weaken Britain’s position. Notably, it pushed Germany to create a reliable overland link through the Balkans to the Middle East via railroad. This article will seek to draw parallels between the German-British hegemonic conflict of the early 20th century and the Chinese-American hegemonic conflict taking place today using both secondary historical sources and current scholarly discussions of the changing international sphere. In doing so, it will provide useful insights into how China might attempt to outflank American power. The article will demonstrate that in many ways, the strategic positions and approaches of the early-20th century Germany and modern China are similar. Both countries were faced with a vastly superior foe with respect to maritime and economic power, and in both cases, their response was to undermine their rival hegemon by creating new overland infrastructure. Furthermore, in both cases, a major goal of creating new overland links was to gain further access to and control over Middle Eastern energy markets. It seems that in the modern day, China is conducting such a policy on a much grander scale than Germany did in the early 20th century—which may result in negative consequences for the US strategic position.Keywords: belt and road Initiative, hegemonic conflict, maritime power, realism
Procedia PDF Downloads 1821675 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 4401674 Food Security in the Middle East and North Africa
Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz
Abstract:
To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.Keywords: diet, food insecurity, global food security index, nutrition, sustainability
Procedia PDF Downloads 3541673 Major Sucking Pests of Rose and Their Seasonal Abundance in Bangladesh
Authors: Md Ruhul Amin
Abstract:
This study was conducted in the experimental field of the Department of Entomology, Bangabandhu Sheikh Mujibur Rahman Agricultural University, Gazipur, Bangladesh during November 2017 to May 2018 with a view to understanding the seasonal abundance of the major sucking pests namely thrips, aphid and red spider mite on rose. The findings showed that the thrips started to build up their population from the middle of January with abundance 1.0 leaf⁻¹, increased continuously, reached to the peak level (2.6 leaf⁻¹) in the middle of February and then declined. Aphid started to build up their population from the second week of November with abundance 6.0 leaf⁻¹, increased continuously, reached to the peak level (8.4 leaf⁻¹) in the last week of December and then declined. Mite started to build up their population from the first week of December with abundance 0.8 leaf⁻¹, increased continuously, reached to the peak level (8.2 leaf⁻¹) in the second week of March and then declined. Thrips and mite prevailed until the last week of April, and aphid showed their abundance till last week of May. The daily mean temperature, relative humidity, and rainfall had an insignificant negative correlation with thrips and significant negative correlation with aphid abundance. The daily mean temperature had significant positive, relative humidity had an insignificant positive, and rainfall had an insignificant negative correlation with mite abundance. The multiple linear regression analysis showed that the weather parameters together contributed 38.1, 41.0 and 8.9% abundance on thrips, aphid and mite on rose, respectively and the equations were insignificant.Keywords: aphid, mite, thrips, weather factors
Procedia PDF Downloads 1621672 The Impact of the Media in the Implementation of Qatar’s Foreign Policy on the Public Opinion of the People of the Middle East (2011-2023)
Authors: Negar Vkilbashi, Hassan Kabiri
Abstract:
Modern diplomacy, in its general form, refers to the people and not the governments, and diplomacy tactics are more addressed to the people than to the governments. Media diplomacy and cyber diplomacy are also one of the sub-branches of public diplomacy and, in fact, the role of media in the process of influencing public opinion and directing foreign policy. Mass media, including written, radio and television, theater, satellite, internet, and news agencies, transmit information and demands. What the Qatari government tried to implement in the countries of the region during the Arab Spring and after was through its important media, Al Jazeera. The embargo on Qatar began in 2017, when Saudi Arabia, the United Arab Emirates, Bahrain, and Egypt imposed a land, sea, and air blockade against the country. The media tool constitutes the cornerstone of soft power in the field of foreign policy, which Qatari leaders have consistently resorted to over the past two decades. Undoubtedly, the role it played in covering the events of the Arab Spring has created geopolitical tensions. The United Arab Emirates and other neighboring countries sometimes criticize Al Jazeera for providing a platform for the Muslim Brotherhood, Hamas, and other Islamists to promote their ideology. In 2011, at the same time as the Arab Spring, Al Jazeera reached the peak of its popularity. Al Jazeera's live coverage of protests in Tunisia, Egypt, Yemen, Libya, and Syria helped create a unified narrative of the Arab Spring, with audiences tuning in every Friday to watch simultaneous protests across the Middle East. Al Jazeera operates in three groups: First, it is a powerful base in the hands of the government so that it can direct and influence Arab public opinion. Therefore, this network has been able to benefit from the unlimited financial support of the Qatar government to promote its desired policies and culture. Second, it has provided an attractive platform for politicians and scientific and intellectual elites, thus attracting their support and defense from the government and its rulers. Third, during the last years of Prince Hamad's reign, the Al Jazeera network formed a deterrent weapon to counter the media and political struggle campaigns. The importance of the research is that this network covers a wide range of people in the Middle East and, therefore, has a high influence on the decision-making of countries. On the other hand, Al Jazeera is influential as a tool of public diplomacy and soft power in Qatar's foreign policy, and by studying it, the results of its effectiveness in the past years can be examined. Using a qualitative method, this research analyzes the impact of the media on the implementation of Qatar's foreign policy on the public opinion of the people of the Middle East. Data collection has been done by the secondary method, that is, reading related books, magazine articles, newspaper reports and articles, and analytical reports of think tanks. The most important findings of the research are that Al Jazeera plays an important role in Qatar's foreign policy in Qatar's public diplomacy. So that, in 2011, 2017 and 2023, it played an important role in Qatar's foreign policy in various crises. Also, the people of Arab countries use Al-Jazeera as their first reference.Keywords: Al Jazeera, Qatar, media, diplomacy
Procedia PDF Downloads 781671 The Soft and Hard Palate Cleft’s Impact on the Auditory Tube Function
Authors: Fedor Semenov
Abstract:
One of the most widespread facial bones’ malformations – the congenital palatoschisis – significant impact on drainage and ventilation of the middle ear through the incorrect work of soft palate muscles, which results in recurrent middle ear inflammation and subsequently leads to the hearing dysfunction. The purpose of this research is to evaluate the auditory tube function and hearing condition before the operative treatment (uranoplasty) and after 3 and 12 months. 42 patients aged from 6 months to 17 years who had soft and hard palate cleft and B and C type tympanogram were included in that study. The examination includes otoscopy, pure tone audiometry (for patients older than 8 years – 11 patients), tympanometry. According to the otoscopy results all the patients were divided into two groups: those who had a retracted eardrum and those who had a normal one. The results of pure tone audiometry showed that there were six patients with an air-bone gap of more than 10 dB and the five with normal audiograms. According to the results of this research, uranoplasty demonstrated strongly positive effects on the auditory tube function: normalization of eardrum view upon otoscopy was observed in 64% of children with a retracted eardrum three month after surgery and 85 % twelve months. The quantity of patients with A-type of tympanogram improved in 25 children out of 41 in 3 month and in 35 out of 41 in twelve months after operation. While before the operative treatment, six patients older than 8 years had had an air-bone gap of more than 10 dB; only two of them still had it in 12 months, and the others’ audiograms were normal. To sum it up, the uranoplasty showed a significant contribution in the restoration of auditory tube functioning. Some patients had signs of auditory dysfunction even after the operative treatment. That group of children needs further treatment by an otorhinolaryngologist.Keywords: auditory tube dysfunction, palatoschisis, uranoplasy, otitis
Procedia PDF Downloads 61670 Treatment and Conservation of an Antique Stone Stela by Nano Calcium Hydroxide with Nano Silica in Egyptian Museum of Cairo
Authors: Elhussein Ahmed Elsayed
Abstract:
An ancient limestone stela dating back to the epoch of the middle kingdom and displayed in the exhibition hall of the middle kingdom, it was discovered in Lisht in Giza, registered with No. 3045 and as a result of its display in an inappropriate display as a result of the use of natural lighting in the display, Represented in sunlight through windows opened day and night. The alternation of these daily changes between the temperature degrees of night and day, both daily and seasonally, causes the expansion and contraction of the rocks and then weakens their cohesion, causing fragmentation. This is indeed the current situation of this stela displayed in the hall, in addition to the damage and fading of colors, as well as the use of a high-viscosity restoration material in the consolidation that led to the attraction of dust and dirt and its adhesion to the surface. The color faded as a result of the lack of lighting control inside the exhibition hall, the remnants of the existing colors were blurred as a result of applying a consolidation material with a high viscosity, which led to the attraction of dust and dirt, and then blurring the colors on the inscription. Examinations and analyzes were carried out on the block, and the results of the examination with a polarized microscope showed that it is of primitive limestone, which contains fossils and microorganisms, which helps to damage. The analysis using the Raman device also showed that the high-viscosity material used in restoration in the past is Paralloid B72. The stone stela was consolidated by using two materials; Nano calcium hydroxide with Nano silica in the form of (Core-shell) at a concentration of 10% and it was applied using the brush.Keywords: Egyptian museum, stone stela, treatment, nano materials, nano silica
Procedia PDF Downloads 761669 Solar Collectors for Northern Countries
Authors: Ilze Pelece, Imants Ziemelis, Henriks Putans
Abstract:
Traditionally the solar energy has been used in southern countries, but it has been used also in northern ones. Most popular kind of use of solar energy in Latvia is solar collector for water heating. Traditionally flat-plate solar collectors are used because of simplicity of manufacturing. However, some peculiarities in use of solar energy in northern countries must be taken into account. In northern countries, there is lower irradiance, but longer day and longer path of the sun during summer. Therefore traditional flat-plate solar collectors are not appropriate enough in northern countries, but new forms must be developed. There are two forms of solar collectors - cylindrical and semi-spherical – proposed in this work. Such collectors can be made both for water or air heating. Theoretical calculations and measurements of energy gain from those two collectors have been done. Results show that daily energy sum received by the semi-spherical collector from the sun at the middle of summer is 1.43 times more than that of the flat one, but for the cylindrical collector, it is 1.74 times more than that of the flat one or equal to that of the tracking to sun flat-plate collector. The resulting difference in energy gain from collector will be not so large because of the difference in heat loses. Heat can be decreased by switching off the water circulation pump when the sun is covered by clouds. For this purpose solar batteries, powered pump can be used instead of complicated and expensive automatics. Even more important than overall energy gain is the fact that semi-spherical and cylindrical collectors work all day (17 hours in the middle of summer at 57 northern latitudes), while flat-plate collector only about 11 hours. Yearly energy sum received by the collector from the sun is 1.5 and 1.9 times larger for the semi-spherical and cylindrical collector respectively as for the flat one. The cylindrical solar collector is easier to manufacture, but semi-spherical one is more aesthetical and durable against the impact of the wind. Although solar collectors for water and air heating are studied in this article, main ideas are applicable also for solar batteries.Keywords: cylindric, semi-spherical, solar collector, solar energy, water heating
Procedia PDF Downloads 2661668 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2681667 Pioneer Synthesis and Characterization of Boron Containing Hard Materials
Authors: Gülşah Çelik Gül, Figen Kurtuluş
Abstract:
The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction
Procedia PDF Downloads 5931666 Simulation and Synoptic Investigation of a Severe Dust Storm in Urmia Lake in the Middle East
Authors: Nasim Hossein Hamzeh, Karim Shukurov, Abbas Ranjbar Saadat Abadi, Alaa Mhawish, Christian Opp
Abstract:
Deserts are the main dust sources in the world. Also, recently driedLake beds have caused environmental problems inthe surrounding areas in the world. In this study, the Urmia Lake was the source of dustfromApril 24 to April 25, 2017.The local dust storm was combined with another large-scale dust storm that originated from Saudi Arabia and Iraq 1-2 days earlier. Synoptic investigation revealed that the severe dust storm was made by a strong Black Sea cyclone and a low-pressure system over the Middle East and Central Iraq in conjunction a high-pressure system and associated with a high gradient contour and a quasi-stationary long-wave trough over the east and south of the Mediterranean Sea. Based on HYSPLIT 72 hours backward and forward trajectories, the most probable dust transport routes to and from the Urmia Lake region are estimated. Using the concentration weighted trajectory (CWT) method based on 24 hours backward and 24 hours forward trajectories, the spatial distributions of potential sources of PM10 observed in the Urmia Lake region on April 23-26, 2017. Also, the vertical profile of dust particles using the WRF-Chem model with two dust schemes showed dust ascending up to 5 km from the lake. Also, the dust schemes outputs shows that the PM10 fluctuating changes are 12 hours earlier than the measured surface PM10 at five air pollution monitoring stations around the Urmia Lake in 23-26 April 2017.Keywords: dust storm, synoptic investigation, WRF-chem model, urmia lake, lagrangian trajectory
Procedia PDF Downloads 2141665 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 1661664 The Impact of Artificial Intelligence on Pharmacy and Pharmacology
Authors: Mamdouh Milad Adly Morkos
Abstract:
Despite having the greatest rates of mortality and morbidity in the world, low- and middle-income (LMIC) nations trail high-income nations in terms of the number of clinical trials, the number of qualified researchers, and the amount of research information specific to their people. Health inequities and the use of precision medicine may be hampered by a lack of local genomic data, clinical pharmacology and pharmacometrics competence, and training opportunities. These issues can be solved by carrying out health care infrastructure development, which includes data gathering and well-designed clinical pharmacology training in LMICs. It will be advantageous if there is international cooperation focused at enhancing education and infrastructure and promoting locally motivated clinical trials and research. This paper outlines various instances where clinical pharmacology knowledge could be put to use, including pharmacogenomic opportunities that could lead to better clinical guideline recommendations. Examples of how clinical pharmacology training can be successfully implemented in LMICs are also provided, including clinical pharmacology and pharmacometrics training programmes in Africa and a Tanzanian researcher's personal experience while on a training sabbatical in the United States. These training initiatives will profit from advocacy for clinical pharmacologists' employment prospects and career development pathways, which are gradually becoming acknowledged and established in LMICs. The advancement of training and research infrastructure to increase clinical pharmacologists' knowledge in LMICs would be extremely beneficial because they have a significant role to play in global healthKeywords: electromagnetic solar system, nano-material, nano pharmacology, pharmacovigilance, quantum theoryclinical simulation, education, pharmacology, simulation, virtual learning low- and middle-income, clinical pharmacology, pharmacometrics, career development pathways
Procedia PDF Downloads 811663 Identification of Clay Mineral for Determining Reservoir Maturity Levels Based on Petrographic Analysis, X-Ray Diffraction and Porosity Test on Penosogan Formation Karangsambung Sub-District Kebumen Regency Central Java
Authors: Ayu Dwi Hardiyanti, Bernardus Anggit Winahyu, I. Gusti Agung Ayu Sugita Sari, Lestari Sutra Simamora, I. Wayan Warmada
Abstract:
The Penosogan Formation sandstone, that has Middle Miosen age, has been deemed as a reservoir potential based on sample data from sandstone outcrop in Kebakalan and Kedawung villages, Karangsambung sub-district, Kebumen Regency, Central Java. This research employs the following analytical methods; petrography, X-ray diffraction (XRD), and porosity test. Based on the presence of micritic sandstone, muddy micrite, and muddy sandstone, the Penosogan Formation sandstone has a fine-coarse granular size and middle-to-fine sorting. The composition of the sandstone is mostly made up of plagioclase, skeletal grain, and traces of micrite. The percentage of clay minerals based on petrographic analysis is 10% and appears to envelop grain, resulting enveloping grain which reduces the porosity of rocks. The porosity types as follows: interparticle, vuggy, channel, and shelter, with an equant form of cement. Moreover, the diagenesis process involves compaction, cementation, authigenic mineral growth, and dissolving due to feldspar alteration. The maturity of the reservoir can be seen through the X-ray diffraction analysis results, using ethylene glycol solution for clay minerals fraction transformed from smectite–illite. Porosity test analysis showed that the Penosogan Formation sandstones has a porosity value of 22% based on the Koeseomadinata classification, 1980. That shows high maturity is very influential for the quality of reservoirs sandstone of the Penosogan Formation.Keywords: sandstone reservoir, Penosogan Formation, smectite, XRD
Procedia PDF Downloads 1741662 Uncertainty and Volatility in Middle East and North Africa Stock Market during the Arab Spring
Authors: Ameen Alshugaa, Abul Mansur Masih
Abstract:
This paper sheds light on the economic impacts of political uncertainty caused by the civil uprisings that swept the Arab World and have been collectively known as the Arab Spring. Measuring documented effects of political uncertainty on regional stock market indices, we examine the impact of the Arab Spring on the volatility of stock markets in eight countries in the Middle East and North Africa (MENA) region: Egypt, Lebanon, Jordon, United Arab Emirate, Qatar, Bahrain, Oman and Kuwait. This analysis also permits testing the existence of financial contagion among equity markets in the MENA region during the Arab Spring. To capture the time-varying and multi-horizon nature of the evidence of volatility and contagion in the eight MENA stock markets, we apply two robust methodologies on consecutive data from November 2008 to March 2014: MGARCH-DCC, Continuous Wavelet Transforms (CWT). Our results indicate two key findings. First, the discrepancies between volatile stock markets of countries directly impacted by the Arab Spring and countries that were not directly impacted indicate that international investors may still enjoy portfolio diversification and investment in MENA markets. Second, the lack of financial contagion during the Arab Spring suggests that there is little evidence of cointegration among MENA markets. Providing a general analysis of the economic situation and the investment climate in the MENA region during and after the Arab Spring, this study bear significant importance for policy makers, local and international investors, and market regulators.Keywords: Portfolio Diversification , MENA Region , Stock Market Indices, MGARCH-DCC, Wavelet Analysis, CWT
Procedia PDF Downloads 2921661 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 3851660 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 621659 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2281658 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review
Authors: M. Cortés, E. Vera, M. Avella
Abstract:
Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites
Procedia PDF Downloads 4441657 Diabetes Prevalence and Quality of Life of Female Nursing Students in Riyadh
Authors: Alyaa Farouk AbdelFattah Ibrahim, Agnes Monica, Dolores I. Cabansag
Abstract:
The prevalence of diabetes mellitus is reaching epidemic proportions in many parts of the world causing an increasing public health concern. Cases of Type 2 diabetes are rapidly increasing in the Middle East region. Deprived of lifestyle deviations, a section of the Middle East’s inhabitants will be pretentious by 2035. As all sociocultural factors have created unhealthy lifestyles, which have become part of the social norms within Saudi society, thereby increased the prevalence of sedentary lifestyle and obesity in women living in Saudi Arabia. So, this study aimed to assess the impact of diabetes mellitus on quality of life of female nursing students in King Saud bin Abdulaziz University for Health Sciences, Riyadh. In a crossectional study design, 151 nursing students at King Saud bin Abdulaziz University for health sciences in Riyadh were included in the study. Biosociodemographic questionnaire and Short-Form 36 (SF-36) Health Related Quality of life Survey Arabic version were used for data collection, and all included students were screened for random blood glucose level. Results depicted that among 151 subjects included in the study 17 (11.3%) had diagnosed medical problems, and 29.4% of those participants with medical problems were diabetics. Univariate regression model for the relation between diabetes mellitus and overall percent score of SF-36 health survey domains showed no statistically significant difference between diabetic and non-diabetic subjects 0.990(0.931-1.053). In conclusion, although the diabetes prevalence was high among the study subjects it did not affect their quality of life may be due to age of the study population.Keywords: diabetes mellitus, diabetes prevalence, quality of life, university students' health
Procedia PDF Downloads 1811656 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4321655 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 3941654 Neuroprotective Effect of Crocus sativus against Cerebral Ischemia in Rats
Authors: Rehab F. Abdel-Rahman, Sally A. El Awdan, Rehab R. Hegazy, Dina F. Mansour, Hanan A. Ogaly, Marwan Abdelbaset
Abstract:
Disorders of the cerebral circulation are the leading cause of numerous neurological and psychiatric illnesses. The transient middle cerebral artery occlusion model (MCAO) is considered to be a reliable and reproducible rodent model of cerebral ischemia. The purpose of the current study was to examine the neuroprotective effects of Crocus sativus (saffron) in a rat model of left middle cerebral artery MCAO. Male Wistar rats were anesthetized and subjected to 1 h of MCAO followed by 48 h reperfusion or sham surgery. One group of the ischemia operated animals was kept as left brain ischemia/reperfusion (I/R). Another 2 operated groups received saffron extract (100 or 200 mg/kg, i.p) four times (60 min before the surgery, during the surgery, and on days 1 and 2 after the occlusion). During the experiment, behavioral tests were performed. After 72 h the animals were euthanized and their left brain hemispheres were used in the biochemical, histopathological, and immunohistochemical studies. Saffron administration revealed an improvement in I/R-induced alteration of locomotor balance and coordination ability of rats. Moreover, saffron decreased the brain content of malondialdehyde, nitric oxide, brain natriuretic peptide and vascular endothelial growth factor with significant increase of reduced glutathione. Immunohistochemical evaluation of caspase-3 and Bax protein expression revealed reduction in I/R-enhanced apoptosis in saffron treated rats. In conclusion, saffron treatment decreases ischemic brain injury in association with inhibition of apoptotic and oxidative cell death in a dose dependent manner.Keywords: caspase-3, cerebral ischemia, Crocus sativus, rats, vascular endothelial growth factor
Procedia PDF Downloads 2581653 Gender Roles in Modern Indian Marriages
Authors: Parul Bhandari
Abstract:
An image of a modern and progressive India garners the rhetoric of ‘choice’ marriages, gender egalitarian relationships, and search for ‘love’ in conjugal unions. Such an image especially resonates with the lives of young professionals, who, largely belonging to the middle class, consider themselves to be the global face India. While this rhetoric of ‘progress’ and ‘love’ is abounding in both Indian and non-Indian public discourses, it is imperative to scientifically analyse the veracity of these claims. This paper thus queries and problematises the notions of being modern and progressive, through the lens of gender roles as expected and desired in a process of matchmaking. The fieldwork conducted is based on qualitative methodology, involving in-depth interviews with 100 highly qualified professionals, (60 men and 40 women), between the age of 24-31, belonging to the Hindu religion and of varied castes and communities, who are residing in New Delhi, and are in the process of spouse-selection or have recently completed it. Further, an analysis of the structure and content of matrimonial websites, which have fast emerged as the new method of matchmaking, was also undertaken. The main finding of this paper is that gender asymmetries continue to determine a suitable match, whether in ‘arranged’ or ‘love’ marriages. This is demonstrated by analysing the expectations of gender roles and gender practices of both men and women, to construct an ideal of a ‘good match’. On the basis of the interviews and the content of matrimonial websites, the paper discusses the characteristics of a ‘suitable boy’ and a ‘suitable girl’, and the ways in which these are received (practiced or criticised) by the young men and women themselves. It is then concluded that though an ideal of ‘compatibility’ and love determines conjugal desires, traditional gender roles, that, for example, consider men as the primary breadwinner and women as responsible for the domestic sphere, continue to dictate urban Indian marriages.Keywords: gender, India, marriage, middle class
Procedia PDF Downloads 2701652 Teacher Training in Saudi Arabia: A Blend of Old and New
Authors: Ivan Kuzio
Abstract:
The GIZ/TTC project is the first of its kind in the Middle East, which allows the development of a teaching training programme to degree level based on modern methodologies. The graduates from this college are part of the Saudization programme and will, over the next four years be part of and eventually run the new Colleges of Excellence. The new Colleges of Excellence are being developed to create a local vocationally trained workforce and will run initially alongside the current Colleges of Technology.Keywords: blended learning, pedagogy, training, key competencies, social skills, cognitive development
Procedia PDF Downloads 3101651 Global Production of Systematic Reviews on Population Health Issues in the Middle East and North Africa: Preliminary Results of a Systematic Overview and Bibliometric Analysis, 2008-2016
Authors: Karima Chaabna, Sohaila Cheema, Amit Abraham, Hekmat Alrouh, Ravinder Mamtani, Javaid I. Sheikh
Abstract:
We aimed to assess the production of systematic reviews (SRs) that synthesize observational studies discussing population health issues in the Middle East and North Africa (MENA). Two independent reviewers systematically searched MEDLINE through PubMed. Between 2008-2016, 5,747 articles (reviews, systematic reviews, and meta-analyses) were identified. Following a multi-stage screening process, 387 SRs (with or without meta-analysis) on population health issues in the MENA were included in our overview. Citation numbers for each SR were retrieved from Google Scholar. Impact factor of the journal during the publication year for the included SRs was retrieved from the Institute of Scientific Information’s Journal Citation Report. We conducted linear regression analysis to assess time trends of number of publications according to SRs’ characteristics. We characterized a linear statistically significant increase in the annual numbers of SRs that summarize observational studies on the MENA population health (p-value<0.0001, R2=0.95), from 15 in 2008 to 81 in 2016. Our analysis reveals also linear statistically significant increases in numbers of SRs published by authors affiliated to institutions located inside MENA and/or neighboring countries (N=113, p-value < 0.0001, R²=0.90), by authors located outside MENA (N=155, p-value=0.0007, R²=0.82), and by collaborating authors affiliated to institutions located outside MENA and inside the region and/or in MENA’s neighboring countries (total number of SRs (N)= 119, p-value=0.0004, R²=0.85). Furthermore, these SRs were published in journals with an IF ranging from 0 to 47.8 (median=2.1). Linear statistically significant increases in numbers of published SRs were demonstrated in journals’ impact factor (IF) categories (IF=[0-2[: R²=0.79, p-value=0.0012; IF=[2-4[:R²=0.86, p-value=0.0003; and IF=[4-6[:R²=0.53, p-value=0.026). Additionally, annual numbers of citations to the SRs varied between 0 and 471 (median=7). While each year, a couple of SRs were getting more than 50 annual citations, there were linear statistically significant increases in numbers of published SRs with an annual number of citations at [0-10[(R²=0.89, p-value=0.00014) and at [10-50[ (R²=0.76, p-value=0.0021). Between 2008-2016, increasingly SRs that summarize observational studies on population health issues in the MENA were published. Authors of these SRs were located inside and/or outside the MENA region and an increasing number of collaborations were seen. Increasing numbers of SRs were predominantly observed in journals with an IF between zero and six. Interestingly, SRs covering MENA region countries were being increasingly cited, indicating an escalation of interest in this region’s population health issues.Keywords: bibliometric, citation, impact factor, Middle East and North Africa, population health, systematic review
Procedia PDF Downloads 1551650 Review of the Road Crash Data Availability in Iraq
Authors: Abeer K. Jameel, Harry Evdorides
Abstract:
Iraq is a middle income country where the road safety issue is considered one of the leading causes of deaths. To control the road risk issue, the Iraqi Ministry of Planning, General Statistical Organization started to organise a collection system of traffic accidents data with details related to their causes and severity. These data are published as an annual report. In this paper, a review of the available crash data in Iraq will be presented. The available data represent the rate of accidents in aggregated level and classified according to their types, road users’ details, and crash severity, type of vehicles, causes and number of causalities. The review is according to the types of models used in road safety studies and research, and according to the required road safety data in the road constructions tasks. The available data are also compared with the road safety dataset published in the United Kingdom as an example of developed country. It is concluded that the data in Iraq are suitable for descriptive and exploratory models, aggregated level comparison analysis, and evaluation and monitoring the progress of the overall traffic safety performance. However, important traffic safety studies require disaggregated level of data and details related to the factors of the likelihood of traffic crashes. Some studies require spatial geographic details such as the location of the accidents which is essential in ranking the roads according to their level of safety, and name the most dangerous roads in Iraq which requires tactic plan to control this issue. Global Road safety agencies interested in solve this problem in low and middle-income countries have designed road safety assessment methodologies which are basing on the road attributes data only. Therefore, in this research it is recommended to use one of these methodologies.Keywords: road safety, Iraq, crash data, road risk assessment, The International Road Assessment Program (iRAP)
Procedia PDF Downloads 256