Search results for: nuclear threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1609

Search results for: nuclear threats

1069 Optical Coherence Tomography in Parkinson’s Disease: A Potential in-vivo Retinal α-Synuclein Biomarker in Parkinson’s Disease

Authors: Jessica Chorostecki, Aashka Shah, Fen Bao, Ginny Bao, Edwin George, Navid Seraji-Bozorgzad, Veronica Gorden, Christina Caon, Elliot Frohman

Abstract:

Background: Parkinson’s Disease (PD) is a neuro degenerative disorder associated with the loss of dopaminergic cells and the presence α-synuclein (AS) aggregation in of Lewy bodies. Both dopaminergic cells and AS are found in the retina. Optical coherence tomography (OCT) allows high-resolution in-vivo examination of retinal structure injury in neuro degenerative disorders including PD. Methods: We performed a cross-section OCT study in patients with definite PD and healthy controls (HC) using Spectral Domain SD-OCT platform to measure the peripapillary retinal nerve fiber layer (pRNFL) thickness and total macular volume (TMV). We performed intra-retinal segmentation with fully automated segmentation software to measure the volume of the RNFL, ganglion cell layer (GCL), inner plexiform layer (IPL), inner nuclear layer (INL), outer plexiform layer (OPL), and the outer nuclear layer (ONL). Segmentation was performed blinded to the clinical status of the study participants. Results: 101 eyes from 52 PD patients (mean age 65.8 years) and 46 eyes from 24 HC subjects (mean age 64.1 years) were included in the study. The mean pRNFL thickness was not significantly different (96.95 μm vs 94.42 μm, p=0.07) but the TMV was significantly lower in PD compared to HC (8.33 mm3 vs 8.58 mm3 p=0.0002). Intra-retinal segmentation showed no significant difference in the RNFL volume between the PD and HC groups (0.95 mm3 vs 0.92 mm3 p=0.454). However, GCL, IPL, INL, and ONL volumes were significantly reduced in PD compared to HC. In contrast, the volume of OPL was significantly increased in PD compared to HC. Conclusions: Our finding of the enlarged OPL corresponds with mRNA expression studies showing localization of AS in the OPL across vertebrate species and autopsy studies demonstrating AS aggregation in the deeper layers of retina in PD. We propose that the enlargement of the OPL may represent a potential biomarker of AS aggregation in PD. Longitudinal studies in larger cohorts are warranted to confirm our observations that may have significant implications in disease monitoring and therapeutic development.

Keywords: Optical Coherence Tomography, biomarker, Parkinson's disease, alpha-synuclein, retina

Procedia PDF Downloads 438
1068 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 45
1067 Attention-Based Spatio-Temporal Approach for Fire and Smoke Detection

Authors: Alireza Mirrashid, Mohammad Khoshbin, Ali Atghaei, Hassan Shahbazi

Abstract:

In various industries, smoke and fire are two of the most important threats in the workplace. One of the common methods for detecting smoke and fire is the use of infrared thermal and smoke sensors, which cannot be used in outdoor applications. Therefore, the use of vision-based methods seems necessary. The problem of smoke and fire detection is spatiotemporal and requires spatiotemporal solutions. This paper presents a method that uses spatial features along with temporal-based features to detect smoke and fire in the scene. It consists of three main parts; the task of each part is to reduce the error of the previous part so that the final model has a robust performance. This method also uses transformer modules to increase the accuracy of the model. The results of our model show the proper performance of the proposed approach in solving the problem of smoke and fire detection and can be used to increase workplace safety.

Keywords: attention, fire detection, smoke detection, spatio-temporal

Procedia PDF Downloads 203
1066 Detailed Investigation of Thermal Degradation Mechanism and Product Characterization of Co-Pyrolysis of Indian Oil Shale with Rubber Seed Shell

Authors: Bhargav Baruah, Ali Shemsedin Reshad, Pankaj Tiwari

Abstract:

This work presents a detailed study on the thermal degradation kinetics of co-pyrolysis of oil shale of Upper Assam, India with rubber seed shell, and lab-scale pyrolysis to investigate the influence of pyrolysis parameters on product yield and composition of products. The physicochemical characteristics of oil shale and rubber seed shell were studied by proximate analysis, elemental analysis, Fourier transform infrared spectroscopy and X-ray diffraction. The physicochemical study showed the mixture to be of low moisture, high ash, siliceous, sour with the presence of aliphatic, aromatic, and phenolic compounds. The thermal decomposition of the oil shale with rubber seed shell was studied using thermogravimetric analysis at heating rates of 5, 10, 20, 30, and 50 °C/min. The kinetic study of the oil shale pyrolysis process was performed on the thermogravimetric (TGA) data using three model-free isoconversional methods viz. Friedman, Flynn Wall Ozawa (FWO), and Kissinger Akahira Sunnose (KAS). The reaction mechanisms were determined using the Criado master plot. The understanding of the composition of Indian oil shale and rubber seed shell and pyrolysis process kinetics can help to establish the experimental parameters for the extraction of valuable products from the mixture. Response surface methodology (RSM) was employed usinf central composite design (CCD) model to setup the lab-scale experiment using TGA data, and optimization of process parameters viz. heating rate, temperature, and particle size. The samples were pre-dried at 115°C for 24 hours prior to pyrolysis. The pyrolysis temperatures were set from 450 to 650 °C, at heating rates of 2 to 20°C/min. The retention time was set between 2 to 8 hours. The optimum oil yield was observed at 5°C/min and 550°C with a retention time of 5 hours. The pyrolytic oil and gas obtained at optimum conditions were subjected to characterization using Fourier transform infrared spectroscopy (FT-IR) gas chromatography and mass spectrometry (GC-MS) and nuclear magnetic resonance spectroscopy (NMR).

Keywords: Indian oil shale, rubber seed shell, co-pyrolysis, isoconversional methods, gas chromatography, nuclear magnetic resonance, Fourier transform infrared spectroscopy

Procedia PDF Downloads 146
1065 The South African Polycentric Water Resource Governance-Management Nexus: Parlaying an Institutional Agent and Structured Social Engagement

Authors: J. H. Boonzaaier, A. C. Brent

Abstract:

South Africa, a water scarce country, experiences the phenomenon that its life supporting natural water resources is seriously threatened by the users that are totally dependent on it. South Africa is globally applauded to have of the best and most progressive water laws and policies. There are however growing concerns regarding natural water resource quality deterioration and a critical void in the management of natural resources and compliance to policies due to increasing institutional uncertainties and failures. These are in accordance with concerns of many South African researchers and practitioners that call for a change in paradigm from talk to practice and a more constructive, practical approach to governance challenges in the management of water resources. A qualitative theory-building case study through longitudinal action research was conducted from 2014 to 2017. The research assessed whether a strategic positioned institutional agent can be parlayed to facilitate and execute WRM on catchment level by engaging multiple stakeholders in a polycentric setting. Through a critical realist approach a distinction was made between ex ante self-deterministic human behaviour in the realist realm, and ex post governance-management in the constructivist realm. A congruence analysis, including Toulmin’s method of argumentation analysis, was utilised. The study evaluated the unique case of a self-steering local water management institution, the Impala Water Users Association (WUA) in the Pongola River catchment in the northern part of the KwaZulu-Natal Province of South Africa. Exploiting prevailing water resource threats, it expanded its ancillary functions from 20,000 to 300,000 ha. Embarking on WRM activities, it addressed natural water system quality assessments, social awareness, knowledge support, and threats, such as: soil erosion, waste and effluent into water systems, coal mining, and water security dimensions; through structured engagement with 21 different catchment stakeholders. By implementing a proposed polycentric governance-management model on a catchment scale, the WUA achieved to fill the void. It developed a foundation and capacity to protect the resilience of the natural environment that is critical for freshwater resources to ensure long-term water security of the Pongola River basin. Further work is recommended on appropriate statutory delegations, mechanisms of sustainable funding, sufficient penetration of knowledge to local levels to catalyse behaviour change, incentivised support from professionals, back-to-back expansion of WUAs to alleviate scale and cost burdens, and the creation of catchment data monitoring and compilation centres.

Keywords: institutional agent, water governance, polycentric water resource management, water resource management

Procedia PDF Downloads 139
1064 Spatial Distribution and Habitat Preference of Indian Pangolin (Manis crassicaudata) in Madhesh Province, Nepal

Authors: Asmit Neupane, Narayan Prasad Gautam, Prabin Bhusal

Abstract:

Indian pangolin, locally called as ‘Salak’, ‘Sal machha’, ‘Pakho machha’, is a globally endangered species, nationally categorized as a critically endangered species, protected under the National Parks and Wildlife Conservation (NPWC) Act 1973 and appended in Appendix I of CITES. Indian pangolins occur in the tropical areas of Terai region and Chure foothills of eastern Nepal, and India, Bangladesh, Pakistan, and Sri Lanka. They utilize a wide range of habitats, including primary and secondary tropical forest, limestone forest, bamboo forest, grassland, and agricultural lands. So, in regard to this fact, this research is aimed to provide detailed information regarding the current distribution pattern, status, habitat preference, prevailing threats and attitude of local people towards species conservation in Madhesh Province, Nepal. The study was conducted in four CFs, two from Bara district and two from Dhanusha district. The study area comprised of Churia range and foothills with tropical and sub-tropical vegetation. A total of 24 transects were established, each of 500*50 m2, where indirect signs of Indian pangolin, including active/old burrows, pugmarks and scratches, were found. Altogether 93 burrows were found, where only 20 were active burrows. Similarly, a vegetation survey and social survey was also conducted. The data was analyzed using Stata 16 and SPSS software. Distance from settlement, ground cover, aspect, presence/absence of ants/termites and human disturbance were the important habitat parameters having statistically significant relationship with the distribution of Indian pangolin in the area. The species was found to prefer an elevation of 360 to 540m, 0-15º slope, red soil, North-east aspect, moderate crown and ground cover, without fire and rocks, vicinity of water, roads, settlement, Sal dominated forest and minimum disturbed by human activities. Similarly, the attitude of local people towards Indian pangolin conservation was found to be significantly different with respect to age, sex and education level. The study concludes that majority of active burrows were found in Churia hills, which indicates that Indian pangolin population is gradually moving uphill towards higher elevation as hilly area supports better prey availability and also less human disturbance. Further studies are required to investigate microhabitat preferences, seasonal variability and impacts of climate change on the distribution, habitat and prey availability of Indian pangolin for the sustainable conservation of this species.

Keywords: conservation, IUCN red list, local participation, small mammal, status, threats

Procedia PDF Downloads 80
1063 X-Ray Photoelectron Spectroscopy Analyses of Candidate Materials for Advanced Nuclear Reactors

Authors: Marie Kudrnová, Jana Rejková

Abstract:

The samples of supplied INCONEL 601, 617, 625, and HASTELLOY C-22 alloys and experimental nickel alloy MoNiCr were examined by XPS (X-ray photoelectron spectroscopy) before and after exposure. The experiment was performed in a mixture of LiCl-KCl salt (58.2-41.8 wt. %). The exposure conditions were 440°C, pressure 0.2 MPa, 500 hours in an inert argon atmosphere. The XPS analysis shows that a thin oxide layer composed of metal oxides such as NiO, Cr₂O₃, and Nb₂O₅ was formed. After sputtering the exposed surface with Ar ions, metals were also detected in the elemental state, indicating a very thin protective oxide layer with a thickness in units of up to tens of nanometers.

Keywords: XPS, MSR, nickel alloy, metal oxides

Procedia PDF Downloads 80
1062 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 151
1061 Democracy Leadership and Good Governance in Nigerias Fourth Republic

Authors: Salisu Adamu Abdullahi, Yusuf Abdullahi Manu

Abstract:

Nigeria returned to a democratically elected government on May 29, 1999. This signaled the beginning of the journey into the Fourth Republic. The return has received popular endorsement by the electorates as the level of enthusiasm was high due to the yearnings and expectations by the electorate that democracy will bring about the much-desired change required by the general mass. As democracy would allow for popular participation through periodic elections and so on. The paper examines democracy, leadership, and challenges of good governance in Nigerias Fourth Republic. It utilizes secondary source of data and content analysis as a methodology. It argues that Nigerias practice of democracy over the years is marred by flagrant abuse of the principles of good governance by the ruling elite. This has posed threats to the survival of democracy due to non-adherence to one of the cardinal principles of democracy which is good governance. The paper recommends among others that the anti-corruption law is amended in such a way that death penalties be issued to those found wanting by the law.

Keywords: democracy, democratic consolidation, challenges, good governance

Procedia PDF Downloads 351
1060 [Keynote Speech]: Competitive Evaluation of Power Plants in Energy Policy

Authors: Beril Tuğrul

Abstract:

Electrical energy is the most important form of energy and electrical power plants have highest impact factor in energy policy. This study is in relation with evaluation of various power plants including fossil fuels, nuclear and renewable energy based power plants. The power plants evaluated with regard to their overall impact that considered for establishing of the plants. Both positive and negative impacts of power plant operation are compared view of different arguments. Then calculate the impact factor by using variation linear extrapolation for each argument. With this study, power plants assessed with the different point of view and clarified objectively.

Keywords:

Procedia PDF Downloads 524
1059 A Challenge to Conserve Moklen Ethnic House: Case Study in Tubpla Village, Phang Nga Province, Southern Thailand

Authors: M. Attavanich, H. Kobayashi

Abstract:

Moklen is a sub-group of ethnic minority in Thailand. In the past, they were vagabonds of the sea. Their livelihood relied on the sea but they built temporary shelters to avoid strong wind and waves during monsoon season. Recently, they have permanently settled on land along coastal area and mangrove forest in Phang Nga and Phuket Province, Southern Thailand. Moklen people have their own housing culture: the Moklen ethnic house was built from local natural materials, indicating a unique structure and design. Its wooden structure is joined by rattan ropes. The construction process is very unique because of using body-based unit of measurement for design and construction. However, there are several threats for those unique structures. One of the most important threats on Moklen ethnic house is tsunami. Especially the 2004 Indian Ocean Tsunami caused widely damage to Southern Thailand and Phang Nga province was the most affected area. In that time, Moklen villages which are located along the coastal area also affected calamitously. In order to recover the damage in affected villages, mostly new modern style houses were provided by aid agencies. This process has caused a significant impact on Moklen housing culture. Not only tsunami, but also modernization has an influence on the changing appearance of the Moklen houses and the effect of modernization has been started to experience before the tsunami. As a result, local construction knowledge is very limited nowadays because the number of elderly people in Moklen has been decreasing drastically. Last but not the least, restrictions of construction materials which are originally provided from accessible mangroves, create limitations in building a Moklen house. In particular, after the Reserved Forest Act, wood chopping without any permission has become illegal. These are some of the most important reasons for Moklen ethnic houses to disappear. Nevertheless, according to the results of field surveys done in 2013 in Phang Nga province, it is found out that some Moklen ethnic houses are still available in Tubpla Village, but only a few. Next survey in the same area in 2014 showed that number of Moklen houses in the village has been started to increase significantly. That proves that there is a high potential to conserve Moklen houses. Also the project of our research team in February 2014 contributed to continuation of Moklen ethnic house. With the cooperation of the village leader and our team, it was aimed to construct a Moklen house with the help of local participants. For the project, villagers revealed the building knowledge and techniques, and in the end, project helped community to understand the value of their houses. Also, it was a good opportunity for Moklen children to learn about their culture. In addition, NGOs recently have started to support ecotourism projects in the village. It not only helps to preserve a way of life, but also contributes to preserve indigenous knowledge and techniques of Moklen ethnic house. This kind of supporting activities are important for the conservation of Moklen ethnic houses.

Keywords: conservation, construction project, Moklen Ethnic House, 2004 Indian Ocean tsunami

Procedia PDF Downloads 309
1058 The Strategy of the International Organization for Migration in Dealing with the Phenomenon of Migration

Authors: Djehich Mohamed Yousri

Abstract:

Nowadays, migration has become a phenomenon that attracts the attention of researchers, countries, agencies, and national and international bodies. Wars and climate change, demographics, poverty, natural disasters, and epidemics are all threats that are contributing daily to forcing more people to migrate. There are those who resort to emigration because of the deteriorating political conditions in their country, others resort to emigration to improve their financial situation, and others emigrate from their country for fear of some penalties and judgments issued against them. In the field of migration, becoming a member of the United Nations as a "relevant organization" gives the United Nations a clear mandate on migration. Its primary goal is to facilitate the management of international migration in an orderly and humane manner. In order to achieve this goal, the organization adopts an international policy to meet the challenges posed in the field of migration. This paper attempts to study the structure of this international organization and its strategy in dealing with the phenomenon of international migration.

Keywords: international organization for migration, immigrants, immigrant rights, resettlement, migration organization strategy

Procedia PDF Downloads 121
1057 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 178
1056 Estimation of Hydrogen Production from PWR Spent Fuel Due to Alpha Radiolysis

Authors: Sivakumar Kottapalli, Abdesselam Abdelouas, Christoph Hartnack

Abstract:

Spent nuclear fuel generates a mixed field of ionizing radiation to the water. This radiation field is generally dominated by gamma rays and a limited flux of fast neutrons. The fuel cladding effectively attenuates beta and alpha particle radiation. Small fraction of the spent nuclear fuel exhibits some degree of fuel cladding penetration due to pitting corrosion and mechanical failure. Breaches in the fuel cladding allow the exposure of small volumes of water in the cask to alpha and beta ionizing radiation. The safety of the transport of radioactive material is assured by the package complying with the IAEA Requirements for the Safe Transport of Radioactive Material SSR-6. It is of high interest to avoid generation of hydrogen inside the cavity which may to an explosive mixture. The risk of hydrogen production along with other radiation gases should be analyzed for a typical spent fuel for safety issues. This work aims to perform a realistic study of the production of hydrogen by radiolysis assuming most penalizing initial conditions. It consists in the calculation of the radionuclide inventory of a pellet taking into account the burn up and decays. Westinghouse 17X17 PWR fuel has been chosen and data has been analyzed for different sets of enrichment, burnup, cycles of irradiation and storage conditions. The inventory is calculated as the entry point for the simulation studies of hydrogen production by radiolysis kinetic models by MAKSIMA-CHEMIST. Dose rates decrease strongly within ~45 μm from the fuel surface towards the solution(water) in case of alpha radiation, while the dose rate decrease is lower in case of beta and even slower in case of gamma radiation. Calculations are carried out to obtain spectra as a function of time. Radiation dose rate profiles are taken as the input data for the iterative calculations. Hydrogen yield has been found to be around 0.02 mol/L. Calculations have been performed for a realistic scenario considering a capsule containing the spent fuel rod. Thus, hydrogen yield has been debated. Experiments are under progress to validate the hydrogen production rate using cyclotron at > 5MeV (at ARRONAX, Nantes).

Keywords: radiolysis, spent fuel, hydrogen, cyclotron

Procedia PDF Downloads 521
1055 Intracellular Sphingosine-1-Phosphate Receptor 3 Contributes to Lung Tumor Cell Proliferation

Authors: Michela Terlizzi, Chiara Colarusso, Aldo Pinto, Rosalinda Sorrentino

Abstract:

Sphingosine-1-phosphate (S1P) is a membrane-derived bioactive phospholipid exerting a multitude of effects on respiratory cell physiology and pathology through five S1P receptors (S1PR1-5). Higher levels of S1P have been registered in a broad range of respiratory diseases, including inflammatory disorders and cancer, although its exact role is still elusive. Based on our previous study in which we found that S1P/S1PR3 is involved in an inflammatory pattern via the activation of Toll-like Receptor 9 (TLR9), highly expressed on lung cancer cells, the main goal of the current study was to better understand the involvement of S1P/S1PR3 pathway/signaling during lung carcinogenesis, taking advantage of a mouse model of first-hand smoke exposure and of carcinogen-induced lung cancer. We used human samples of Non-Small Cell Lung Cancer (NSCLC), a mouse model of first-hand smoking, and of Benzo(a)pyrene (BaP)-induced tumor-bearing mice and A549 lung adenocarcinoma cells. We found that the intranuclear, but not the membrane, localization of S1PR3 was associated to the proliferation of lung adenocarcinoma cells, the mechanism that was correlated to human and mouse samples of smoke-exposure and carcinogen-induced lung cancer, which were characterized by higher utilization of S1P. Indeed, the inhibition of the membrane S1PR3 did not alter tumor cell proliferation after TLR9 activation. Instead, according to the nuclear localization of sphingosine kinase (SPHK) II, the enzyme responsible for the catalysis of the S1P last step synthesis, the inhibition of the kinase completely blocked the endogenous S1P-induced tumor cell proliferation. These results prove that the endogenous TLR9-induced S1P can on one side favor pro-inflammatory mechanisms in the tumor microenvironment via the activation of cell surface receptors, but on the other tumor progression via the nuclear S1PR3/SPHK II axis, highlighting a novel molecular mechanism that identifies S1P as one of the crucial mediators for lung carcinogenesis-associated inflammatory processes and that could provide differential therapeutic approaches especially in non-responsive lung cancer patients.

Keywords: sphingosine-1-phosphate (S1P), S1P Receptor 3 (S1PR3), smoking-mice, lung inflammation, lung cancer

Procedia PDF Downloads 201
1054 Tourism a Ray of Hope to Peace: Case Study of Kashmir

Authors: Khurshid Ahmad Sheikh

Abstract:

This study describes tourism can be a ray of hope to overcome terrorism, especially in places having great tourism potential but could not successfully market their breathtaking beauty and enormous tourism potential because of terrorism threats. It is not so that the area is dangerous, but it does not look attractive. In Asia, regardless of a famous and most important tourist destination, the growth of tourism in Kashmir is stalled by terrorism in the valley. Kashmir has many seasonal tourist destinations like Walur Lake, Pahalgam, Sonamarg, Gulmarg, Dal Lake and other undiscovered virgin tourist destinations, which makes it the preferred tourist destination throughout the year. This research is based on the ideas of the local people who are suffering because of this social evil and have seen changes happen from prosperity to perish. Tourism can be the right adopted measure that brings back life to its virgin origin and makes it a heaven for the rest of the world. Tourism has the power to heal up all the wounds which have been created in this long gap of war and terrorism. In this paper, we will describe the influence of tourism is be the best solution for the harmony and fortune of Kashmir.

Keywords: Kashmir, tourism, solution to peace, culture

Procedia PDF Downloads 126
1053 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
1052 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 87
1051 Analyzing a Human Rights Approach to Poverty and Development Goals in the ASEAN Region

Authors: Nithya Devi

Abstract:

Poverty, hunger and water scarcity are threats to human rights and are assaults on human dignity. The very existence of man is questioned when his basic rights are violated. Addressing this social phenomenon should be a key objective of any human rights discourse. The origins of these problems have various root causes. For Asia, colonisation was an essential factor that caused great inequalities in the distribution of wealth. In the post-colonial era, the colonised states were developing nations grappling with these issues. Today, some of the developing states have progressed to developed nations. However, others remain as economically vulnerable countries. Within states, the widening income gap poses further threat to human rights. Hence ASEAN states have prioritised socio-economic rights, particularly basic needs, in the human rights discourse in this region. To date, poverty and development goals are given primary importance. This paper seeks to show how a human rights approach has dealt with poverty and development goals in this region and evaluates its effectiveness in addressing these concerns.

Keywords: ASEAN, development, human rights, poverty

Procedia PDF Downloads 350
1050 The Role and Challenges of Media in the Transformation of Contemporary Nigeria Democracies

Authors: Henry Okechukwu Onyeiwu

Abstract:

The role of media in the transformation of contemporary Nigeria's democracies is multifaceted and profoundly impactful. As Nigeria navigates its complex socio-political landscape, media serves as both a catalyst for democratic engagement and a platform for public discourse. This paper explores the various dimensions through which media influences democracy in Nigeria, including its role in informing citizens, shaping public opinion, and providing a forum for diverse voices. The increasing penetration of social media has revolutionized the political sphere, empowering citizens to participate in governance and hold leaders accountable. However, challenges such as misinformation, censorship, and media bias continue to pose significant threats to democratic integrity. This study critically analyzes the interplay between traditional and new media, highlighting their contributions to electoral processes, civic education, and advocacy for human rights. Ultimately, the findings illustrate that while media is a crucial agent for democratic transformation, its potential can only be realized through a commitment to journalistic integrity and the promotion of media literacy among the Nigerian populace. The media plays a critical role in shaping public democracies in Nigeria, yet it faces a myriad of challenges that hinder its effectiveness. This paper examines the various obstacles confronting media broadcasting in Nigeria, which range from political interference and censorship to issues of professionalism and the proliferation of fake news. Political interference is particularly pronounced, as government entities and political actors often attempt to control narratives, compromising the independence of media outlets. This control often manifests in the form of censorship, where journalists face threats and harassment for reporting on sensitive topics related to governance, corruption, and human rights abuses. Moreover, the rapid rise of social media has introduced a dual challenge; while it offers a platform for citizen engagement and diverse viewpoints, it also facilitates the spread of misinformation and propaganda. The lack of media literacy among the populace exacerbates this issue, as citizens often struggle to discern credible information from false narratives. Additionally, economic constraints deeply affect the sustainability and independence of many broadcasting organizations. Advertisers may unduly influence content, leading to sensationalism over substantive reporting. This paper argues that for media to effectively contribute to Nigerian public democracies, there needs to be a concerted effort to address these challenges. Strengthening journalistic ethics, enhancing regulatory frameworks, and promoting media literacy among citizens are essential steps in fostering a more vibrant and accountable media landscape. Ultimately, this research underscores the necessity of a resilient media ecosystem that can truly support democratic processes, empower citizens, and hold power to account in contemporary Nigeria.

Keywords: media, democracy, socio-political, governance

Procedia PDF Downloads 23
1049 Long Time Oxidation Behavior of Machined 316 Austenitic Stainless Steel in Primary Water Reactor

Authors: Siyang Wang, Yujin Hu, Xuelin Wang, Wenqian Zhang

Abstract:

Austenitic stainless steels are widely used in nuclear industry to manufacture critical components owing to their excellent corrosion resistance at high temperatures. Almost all the components used in nuclear power plants are produced by surface finishing (surface cold work) such as milling, grinding and so on. The change of surface states induced by machining has great influence on the corrosion behavior. In the present study, long time oxidation behavior of machined 316 austenitic stainless steel exposed to simulated pressure water reactor environment was investigated considering different surface states. Four surface finishes were produced by electro-polishing (P), grinding (G), and two milling (M and M1) processes respectively. Before oxidation, the surface Vickers micro-hardness, surface roughness of each type of sample was measured. Corrosion behavior of four types of sample was studied by using oxidation weight gain method for six oxidation periods. The oxidation time of each period was 120h, 216h, 336h, 504h, 672h and 1344h, respectively. SEM was used to observe the surface morphology of oxide film in several period. The results showed that oxide film on austenitic stainless steel has a duplex-layer structure. The inner oxide film is continuous and compact, while the outer layer is composed of oxide particles. The oxide particle consisted of large particles (nearly micron size) and small particles (dozens of nanometers to a few hundred nanometers). The formation of oxide particle could be significantly affected by the machined surface states. The large particle on cold worked samples (grinding and milling) appeared earlier than electro-polished one, and the milled sample has the largest particle size followed by ground one and electro-polished one. For machined samples, the large particles were almost distributed along the direction of machining marks. Severe exfoliation was observed on one milled surface (M) which had the most heavily cold worked layer, while rare local exfoliation occurred on the ground sample (G) and the other milled sample (M1). The electro-polished sample (P) entirely did not exfoliate.

Keywords: austenitic stainless steel, oxidation, machining, SEM

Procedia PDF Downloads 287
1048 Realization of Sustainable Urban Society by Personal Electric Transporter and Natural Energy

Authors: Yuichi Miyamoto

Abstract:

In regards to the energy sector in the modern period, two points were raised. First is a vast and growing energy demand, and second is an environmental impact associated with it. The enormous consumption of fossil fuel to the mobile unit is leading to its rapid depletion. Nuclear power is not the only problem. A modal shift that utilizes personal transporters and independent power, in order to realize a sustainable society, is very effective. The paper proposes that the world will continue to work on this. Energy of the future society, innovation in battery technology and the use of natural energy is a big key. And it is also necessary in order to save on energy consumption.

Keywords: natural energy, modal shift, personal transportation, battery

Procedia PDF Downloads 410
1047 Miniaturizing the Volumetric Titration of Free Nitric Acid in U(vi) Solutions: On the Lookout for a More Sustainable Process Radioanalytical Chemistry through Titration-On-A-Chip

Authors: Jose Neri, Fabrice Canto, Alastair Magnaldo, Laurent Guillerme, Vincent Dugas

Abstract:

A miniaturized and automated approach for the volumetric titration of free nitric acid in U(VI) solutions is presented. Free acidity measurement refers to the acidity quantification in solutions containing hydrolysable heavy metal ions such as U(VI), U(IV) or Pu(IV) without taking into account the acidity contribution from the hydrolysis of such metal ions. It is, in fact, an operation having an essential role for the control of the nuclear fuel recycling process. The main objective behind the technical optimization of the actual ‘beaker’ method was to reduce the amount of radioactive substance to be handled by the laboratory personnel, to ease the instrumentation adjustability within a glove-box environment and to allow a high-throughput analysis for conducting more cost-effective operations. The measurement technique is based on the concept of the Taylor-Aris dispersion in order to create inside of a 200 μm x 5cm circular cylindrical micro-channel a linear concentration gradient in less than a second. The proposed analytical methodology relies on the actinide complexation using pH 5.6 sodium oxalate solution and subsequent alkalimetric titration of nitric acid with sodium hydroxide. The titration process is followed with a CCD camera for fluorescence detection; the neutralization boundary can be visualized in a detection range of 500nm- 600nm thanks to the addition of a pH sensitive fluorophore. The operating principle of the developed device allows the active generation of linear concentration gradients using a single cylindrical micro channel. This feature simplifies the fabrication and ease of use of the micro device, as it does not need a complex micro channel network or passive mixers to generate the chemical gradient. Moreover, since the linear gradient is determined by the liquid reagents input pressure, its generation can be fully achieved in faster intervals than one second, being a more timely-efficient gradient generation process compared to other source-sink passive diffusion devices. The resulting linear gradient generator device was therefore adapted to perform for the first time, a volumetric titration on a chip where the amount of reagents used is fixed to the total volume of the micro channel, avoiding an important waste generation like in other flow-based titration techniques. The associated analytical method is automated and its linearity has been proven for the free acidity determination of U(VI) samples containing up to 0.5M of actinide ion and nitric acid in a concentration range of 0.5M to 3M. In addition to automation, the developed analytical methodology and technique greatly improves the standard off-line oxalate complexation and alkalimetric titration method by reducing a thousand fold the required sample volume, forty times the nuclear waste per analysis as well as the analysis time by eight-fold. The developed device represents, therefore, a great step towards an easy-to-handle nuclear-related application, which in the short term could be used to improve laboratory safety as much as to reduce the environmental impact of the radioanalytical chain.

Keywords: free acidity, lab-on-a-chip, linear concentration gradient, Taylor-Aris dispersion, volumetric titration

Procedia PDF Downloads 388
1046 Rising Individual Responsibility in Healthcare: A Case Study of China

Authors: Ziyu Liu, Martin Buijsen

Abstract:

Although great achievements have been made since the beginning of the Chinese healthcare system reform in 1978, there still remain unresolved problems. Currently, the two leading social issues are accessibility and affordability of healthcare. Facing those challenges, Chinese government initiated the third round of healthcare system reform, accompanied by an array of measures. The newly launched strategies show a tendency to deliver healthcare as welfare goods, achieving equality through an ex-post perspective instead of an ex-ante view. However, if the reform efforts rely solely on the notion of “welfare”, the wrong idea of the government as the only duty-bearer in healthcare will arise. Several major threats, such as high costs as a result of inefficiencies and free riding then become imminent. Therefore, on the basis of Dworkin’s theory, this paper argues that individual responsibility should be introduced when constructing a sustainable healthcare system. And it should be equally highlighted as the duties of government. Furthermore, the notion of individual responsibility is believed to be necessary for promoting the justice of a healthcare system.

Keywords: Chinese healthcare system reform, individual responsibility, right to healthcare, social justice

Procedia PDF Downloads 509
1045 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 143
1044 Location Management in Wireless Sensor Networks with Mobility

Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar

Abstract:

Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.

Keywords: mobility management, motes, multihop, wireless sensor networks

Procedia PDF Downloads 420
1043 Exploring the Applications of Modular Forms in Cryptography

Authors: Berhane Tewelday Weldhiwot

Abstract:

This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.

Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory

Procedia PDF Downloads 21
1042 A Review on the Necessities of Green Building in Bangladesh and Its Construction Process

Authors: Syeda Afsana Azad

Abstract:

Climate change, due to the release of greenhouse gases into the atmosphere has been recognized as one of the biggest threats to the present world. The condition of the earth is getting worse day by day due to climate change. Bangladesh is considered to be one of the most vulnerable countries to climate change due to large population, sharp urbanization, etc. Construction of green building is a very good solution to reduce the greenhouse effect. Green building technology refers to that kind of structures which are environmentally friendly and resource-efficient throughout a building’s service life. This technology can provide at least 50% energy saving opportunity to the nation. The necessity of the construction of structures in an environment-friendly way is increasing now. This study shows the scenario of rapid population growth, urbanization, necessity of green building in Bangladesh and also discusses the construction process of green building. As the present climate condition of Bangladesh is not friendly, construction of green building is very much needed. To battle climate change, it is mandatory to construct green building.

Keywords: Bangladesh, climate change, green building, green house effect

Procedia PDF Downloads 379
1041 Catch Composition and Amount of Illegal and Unreported Fishing in Iranian Coastal Waters - Hormozgan Province

Authors: Yasemi Mehran, Parsa Mehran, Farzingohar Mehrnaz

Abstract:

Illegal, unreported, and unregulated (IUU) fishing has been identified as one of the most serious threats to the sustainability of the world’s fisheries. In the present study, illegal and unreported fishing of different species in waters of Persian Gulf and Oman Sea (Hormozgan province) were evaluated. Among 47 species of 33 families identified in this study, with 39 species belong to teleosts, 4 species belong to elasmobranchs and 4 species belong to invertebrate. The total weight of illegal and unreported catch were 78525.22 tonnes. Maximum and minimum values were found for Dussumiera acuta (20640.74 tonnes) and Tenualosa ilisha (0.733 tonnes), respectively. The most commercial species group was scombridae, carangidae and clupeidae, respectively. Teleosts with 91.15%, elasmobranchs with 4.82 and invertebrates with 4.03% constituted total weight of illegal and unreported fishing. Results of this study provide valuable information in order to access a sustainable management on fish resources.

Keywords: catch composition, illegal, unreported fishing, Hormozgan province

Procedia PDF Downloads 298
1040 A Cross-Sectional Study Assessing Communication Practices among Doctors at a University Hospital in Pakistan

Authors: Muhammad Waqas Baqai, Noman Shahzad, Rehman Alvi

Abstract:

Communication among health care givers is the essence of quality patient care and any compromise results in errors and inefficiency leading to cumbersome outcomes. The use of smartphone among health professionals has increased tremendously. Almost every health professional carries it and majority of them uses a third party communication software called whatsApp for work related communications. It gives instant access to the person responsible for any particular query and therefore helps in efficient and timely decision making. It is also an easy way of sharing medical documents, multimedia and provides platform for consensual decision making through group discussions. However clinical communication through whatsApp has some demerits too including reduction in verbal communication, worsening professional relations, unprofessional behavior, risk of confidentiality breach and threats from cyber-attacks. On the other hand the traditional pager device being used in many health care systems is a unidirectional communication that lacks the ability to convey any information other than the number to which the receiver has to respond. Our study focused on these two widely used modalities of communication among doctors of the largest tertiary care center of Pakistan i.e. The Aga Khan University Hospital. Our aim was to note which modality is considered better and has fewer threats to medical data. Approval from ethical review committee of the institute was taken prior to conduction of this study. We submitted an online survey form to all the interns and residents working at our institute and collected their response in a month’s time. 162 submissions were recorded and analyzed using descriptive statistics. Only 20% of them were comfortable with using pagers exclusively, 52% with whatsApp and 28% with both. 65% think that whatsApp is time-saving and quicker than pager. 54% of them considered whatsApp to be causing nuisance from work related notifications in their off-work hours. 60% think that they are more likely to miss information through pager system because of the unidirectional nature. Almost all (96%) of residents and interns found whatsApp to be useful in terms of saving information for future reference. For urgent issues, majority (70%) preferred pager over whatsApp and also pager was considered more valid in terms of hospital policies and legal issues. Among major advantages of whatsApp as listed by them were; easy mass communication, sharing of clinical pictures, universal access and no need of carrying additional device. However the major drawback of using whatsApp for clinical communication that everyone shared was threat to patients’ confidentiality as clinicians usually share pictures of wounds, clinical documents etc. Lastly we asked them if they think there is a need of a separate application for instant communication dedicated to clinical communication only and 90% responded positively. Therefore, we concluded that both modalities have their merits and demerits but the greatest drawback with whatsApp is the risk of breach in patients’ confidentiality and off-work disturbance. Hence, we recommend a more secure, institute-run application for all intra hospital communications where they can share documents, pictures etc. easily under a controlled environment.

Keywords: WhatsApp, pager, clinical communication, confidentiality

Procedia PDF Downloads 147