Search results for: host defense peptides
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1456

Search results for: host defense peptides

856 Inhibition of Food Borne Pathogens by Bacteriocinogenic Enterococcus Strains

Authors: Neha Farid

Abstract:

Due to the abuse of antimicrobial medications in animal feed, the occurrence of multi-drug resistant (MDR) pathogens in foods is currently a growing public health concern on a global scale. MDR infections have the potential to penetrate the food chain by posing a serious risk to both consumers and animals. Food pathogens are those biological agents that have the tendency to cause pathogenicity in the host body upon ingestion. The major reservoirs of foodborne pathogens include food-producing fauna like cows, pigs, goats, sheep, deer, etc. The intestines of these animals are highly condensed with several different types of food pathogens. Bacterial food pathogens are the main cause of foodborne disease in humans; almost 66% of the reported cases of food illness in a year are caused by the infestation of bacterial food pathogens. When ingested, these pathogens reproduce and survive or form different kinds of toxins inside host cells causing severe infections. The genus Listeria consists of gram-positive, rod-shaped, non-spore-forming bacteria. The disease caused by Listeria monocytogenes is listeriosis or gastroenteritis, which induces fever, vomiting, and severe diarrhea in the affected body. Campylobacter jejuni is a gram-negative, curved-rod-shaped bacteria causing foodborne illness. The major source of Campylobacter jejuni is livestock and poultry; particularly, chicken is highly colonized with Campylobacter jejuni. Serious public health concerns include the widespread growth of bacteria that are resistant to antibiotics and the slowing in the discovery of new classes of medicines. The objective of this study is to provide some potential antibacterial activities with certain broad-range antibiotics and our desired bacteriocins, i.e., Enterococcus faecium from specific strains preventing microbial contamination pathways in order to safeguard the food by lowering food deterioration, contamination, and foodborne illnesses. The food pathogens were isolated from various sources of dairy products and meat samples. The isolates were tested for the presence of Listeria and Campylobacter by gram staining and biochemical testing. They were further sub-cultured on selective media enriched with the growth supplements for Listeria and Campylobacter. All six strains of Listeria and Campylobacter were tested against ten antibiotics. Campylobacter strains showed resistance against all the antibiotics, whereas Listeria was found to be resistant only against Nalidixic Acid and Erythromycin. Further, the strains were tested against the two bacteriocins isolated from Enterococcus faecium. It was found that bacteriocins showed better antimicrobial activity against food pathogens. They can be used as a potential antimicrobial for food preservation. Thus, the study concluded that natural antimicrobials could be used as alternatives to synthetic antimicrobials to overcome the problem of food spoilage and severe food diseases.

Keywords: food pathogens, listeria, campylobacter, antibiotics, bacteriocins

Procedia PDF Downloads 57
855 Structural Analysis of the Burkh Anticline in Fars Zone, in the Zagros Fold-Thrust Belt

Authors: A. Afroogh, R. Ramazani Omali, N. Hafezi Moghaddas, A. Nohegar

Abstract:

Burkh anticline is located in Southeast of Zagros fold-thrust belt in the Fars Province. Geometric analyses of the anticline have been carried out to estimate the closure of the Dehram Group in order to evaluate its potential for gas reservoirs. Geometric analyses of the Burkh anticline indicate that the fold geometry is rather similar to that of the detachment folds. Based on the data from the geometric analysis, seven structural cross section the anticlines are drawn and using the cross sections, a structural contour for Dehram Group is constructed. The calculated values for the anticline closure prohibits this structure as it is not an appropriate host to gas reservoirs.

Keywords: Burkh anticline, Zagros fold-thrust belt, geometric analyses, vertical and horizontal closure, Dehram group

Procedia PDF Downloads 338
854 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 172
853 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy

Authors: Lingaraju Dumpala, Narasa Raju Gosangi

Abstract:

Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.

Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA

Procedia PDF Downloads 120
852 Tips for Effective Intercultural Collaboration on the Evaluation of an International Program

Authors: Athanase Gahungu, Karen Freeman

Abstract:

Different groups of stakeholders expect the evaluation of an international, grant-funded program to inform them of the worth of the program - the funder, the agency operating the program and its community, and the citizens of the country where the program is implemented. This paper summarizes the challenges that intercultural teams of researchers faced as they crisscrossed a host country while evaluating a teaching and learning materials program, and offers useful tips for effective collaboration. Firstly, was recommended that the teams be representative of the cultures involved, and have the required research and program evaluation skills. Secondly, cultures involved must consistently establish and maintain a shared performance system. Thirdly, successful team members must be self-aware, inter-culturally knowledgeable, not just in communication, but in conceptualizing the political and social context of international grant-funded projects.

Keywords: program evaluation, international collaboration, intercultural, shared performance

Procedia PDF Downloads 529
851 Ad Hocism Aiding Sufferings of Urban Refugees in Nepal: A Case Study of Pakistani Ahmadi Refugees

Authors: Shishir Lamichhane

Abstract:

Nepal neither is a party to any international refugee instruments nor does it have a national legislation to govern the refugee concerns legislated in the international legal instruments. In the absence of both of these, Nepal has adopted a rather ad hoc approach to dealing with refugees. Whereas Nepali state’s ad hocism seems to be paying off well with prominent (and mainstream) refugee populations of Bhutanese and Tibetans, urban refugees like Pakistani Ahmadiyya refugees have been left mostly at the odds. This paper is an attempt to reflect how the ad hoc approach taken by the host country (Nepal) is resulting in the further persecution of the Pakistani Ahmadiyya refugees and is lined up with arguments about how the basic rights of these refugees are being violated in the absence of a proper law. Relevant information regarding urban refugees residing in Kathmandu has been gathered by applying Empirical Research Methodology, while the paper also reviews pertinent literature already available on the case of Ahmadiya community.

Keywords: Pakistan, Ahmadiya community, Nepal, urban refugees

Procedia PDF Downloads 210
850 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law

Authors: Gashaw Sisay Zenebe

Abstract:

Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.

Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL

Procedia PDF Downloads 51
849 The Relationships Between Citizenship Acquisition and Ethnic Identity of Immigrant Women in Taiwan

Authors: Yuan-Yu Chiang, Yu-Han Tseng, Chin-Chen Wen

Abstract:

Many southeast-Asia women migrate to Taiwan by marriage, and it usually takes 4 to 8 years for them to acquire Taiwanese citizenship. This study investigates the relationships between their citizenship acquisition and whether they develop Taiwanese identities. One hundred and ninety-two immigrant women were measured using Multigroup Ethnic Identity Measure-Revised and a global 10-point ethnic identity question. Correlation tests and hierarchical regression were performed to explore whether acquiring citizenship would help immigrant women to develop Taiwanese identities. The results revealed that citizenship acquisition does help immigrant women to identify with Taiwanese society symbolically. However, the results also indicated that acquiring citizenship would not help these immigrant women become involved in deeper cultural exploration of Taiwan nor would it encourage them to make commitments to the host society.

Keywords: immigrants, international marriage, ethnic identity, Taiwan

Procedia PDF Downloads 404
848 Wettability Alter of a Sandstone Rock by Graphene Oxide Adsorption

Authors: J. Gómez, J. Rodriguez, N. Santos, E. Mejía-Ospino

Abstract:

The wettability of the minerals present in a reservoir is a determining property in the recovery factor. One of the strategies proposed to increase recovery is based on altering the wettability of oil reservoir rocks. Approximately 60% of world crude oil reservoirs have sandstone-type host rocks; for that, it is very important to develop efficient methodologies to alter the wettability of these rocks. In this study, the alteration of the wettability of a sandstone rock due to graphene oxide (GO) adsorption was evaluated. The effect of GO concentration, salinity, Ca2+ ions, and pH on interfacial tension and contact angle was determined. The results show that GO adsorption induces significant changes in rock wettability. For high GO concentrations and low salinity, pH proved to be a determining factor in the alteration of wettability. Under certain conditions, surface wettability changes from highly oleophilic (144,8°) to intermediate oil wettability (91,2°).

Keywords: enhanced oil recovery, graphene oxide, interfacial tension, nanofluid, wettability

Procedia PDF Downloads 96
847 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 66
846 The Involvement of the Homing Receptors CCR7 and CD62L in the Pathogenesis of Graft-Versus-Host Disease

Authors: Federico Herrera, Valle Gomez García de Soria, Itxaso Portero Sainz, Carlos Fernández Arandojo, Mercedes Royg, Ana Marcos Jimenez, Anna Kreutzman, Cecilia MuñozCalleja

Abstract:

Introduction: Graft-versus-host disease (GVHD) still remains the major complication associated with allogeneic stem cell transplantation (SCT). The pathogenesis involves migration of donor naïve T-cells into recipient secondary lymphoid organs. Two molecules are important in this process: CD62L and CCR7, which are characteristically expressed in naïve/central memory T-cells. With this background, we aimed to study the influence of CCR7 and CD62L on donor lymphocytes in the development and severity of GVHD. Material and methods: This single center study included 98 donor-recipient pairs. Samples were collected prospectively from the apheresis product and phenotyped by flow cytometry. CCR7 and CD62L expression in CD4+ and CD8+ T-cells were compared between patients who developed acute (n=40) or chronic GVHD (n=33) and those who did not (n=38). Results: The patients who developed acute GVHD were transplanted with a higher percentage of CCR7+CD4+ T-cells (p = 0.05) compared to the no GVHD group. These results were confirmed when these patients were divided in degrees according to the severity of the disease; the more severe disease, the higher percentage of CCR7+CD4+ T-cells. Conversely, chronic GVHD patients received a higher percentage of CCR7+CD8+ T-cells (p=0.02) in comparison to those who did not develop the complication. These data were also confirmed when patients were subdivided in degrees of the disease severity. A multivariable analysis confirmed that percentage of CCR7+CD4+ T-cells is a predictive factor of acute GVHD whereas the percentage of CCR7+CD8+ T-cells is a predictive factor of chronic GVHD. In vitro functional assays (migration and activation assays) supported the idea of CCR7+ T-cells were involved in the development of GVHD. As low levels of CD62L expression were detected in all apheresis products, we tested the hypothesis that CD62L was shed during apheresis procedure. Comparing CD62L surface levels in T-cells from the same donor immediately before collecting the apheresis product, and the final apheresis product we found that this process down-regulated CD62L in both CD4+ and CD8+ T cells (p=0.008). Interestingly, when CD62L levels were analysed in days 30 or 60 after engraftment, they recovered to baseline (p=0.008). However, to investigate the relation between CD62L expression and the development of GVHD in the recipient samples after the engraftment, no differences were observed comparing patients with GVHD to those who did not develop the disease. Discussion: Our prospective study indicates that the CCR7+ T-cells from the donor, which include naïve and central memory T-cells, contain the alloreactive cells with a high ability to mediate GVHD (in the case of both migration and activation). Therefore we suggest that the proportion and functional properties of CCR7+CD4+ and CCR7+CD8+ T-cells in the apheresis could act as a predictive biomarker to both acute and chronic GVHD respectively. Importantly, our study precludes that CD62L is lost in the apheresis and therefore it is not a reliable biomarker for the development of GVHD.

Keywords: CCR7, CD62L, GVHD, SCT

Procedia PDF Downloads 279
845 Improving the Biocontrol of the Argentine Stem Weevil; Using the Parasitic Wasp Microctonus hyperodae

Authors: John G. Skelly, Peter K. Dearden, Thomas W. R. Harrop, Sarah N. Inwood, Joseph Guhlin

Abstract:

The Argentine stem weevil (ASW; L. bonariensis) is an economically important pasture pest in New Zealand, which causes about $200 million of damage per annum. Microctonus hyperodae (Mh), a parasite of the ASW in its natural range in South America, was introduced into New Zealand to curb the pasture damage caused by the ASW. Mh is an endoparasitic wasp that lays its eggs in the ASW halting its reproduction. Mh was initially successful at preventing ASW proliferation and reducing pasture damage. The effectiveness of Mh has since declined due to decreased parasitism rates and has resulted in increased pasture damage. Although the mechanism through which ASW has developed resistance to Mh has not been discovered, it has been proposed to be due to the different reproductive modes used by Mh and the ASW in New Zealand. The ASW reproduces sexually, whereas Mh reproduces asexually, which has been hypothesised to have allowed the ASW to ‘out evolve’ Mh. Other species within the Microctonus genus reproduce both sexually and asexually. Strains of Microctonus aethiopoides (Ma), a species closely related to Mh, reproduce either by sexual or asexual reproduction. Comparing the genomes of sexual and asexual Microctonus may allow for the identification of the mechanism of asexual reproduction and other characteristics that may improve Mh as a biocontrol agent. The genomes of Mh and three strains of Ma, two of which reproduce sexually and one reproduces asexually, have been sequenced and annotated. The French (MaFR) and Moroccan (MaMO) reproduce sexually, whereas the Irish strain (MaIR) reproduces asexually. Like Mh, The Ma strains are also used as biocontrol agents, but for different weevil species. The genomes of Mh and MaIR were subsequently upgraded using Hi-C, resulting in a set of high quality, highly contiguous genomes. A subset of the genes involved in mitosis and meiosis, which have been identified though the use of Hidden Markov Models generated from genes involved in these processes in other Hymenoptera, have been catalogued in Mh and the strains of Ma. Meiosis and mitosis genes were broadly conserved in both sexual and asexual Microctonus species. This implies that either the asexual species have retained a subset of the molecular components required for sexual reproduction or that the molecular mechanisms of mitosis and meiosis are different or differently regulated in Microctonus to other insect species in which these mechanisms are more broadly characterised. Bioinformatic analysis of the chemoreceptor compliment in Microctonus has revealed some variation in the number of olfactory receptors, which may be related to host preference. Phylogenetic analysis of olfactory receptors highlights variation, which may be able to explain different host range preferences in the Microctonus. Hi-C clustering implies that Mh has 12 chromosomes, and MaIR has 8. Hence there may be variation in gene regulation between species. Genome alignment of Mh and MaIR implies that there may be large scale genome structural variation. Greater insight into the genetics of these agriculturally important group of parasitic wasps may be beneficial in restoring or maintaining their biocontrol efficacy.

Keywords: argentine stem weevil, asexual, genomics, Microctonus hyperodae

Procedia PDF Downloads 142
844 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 376
843 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 177
842 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 487
841 Phylogenetic Study of L1 Protein Human Papillomavirus Type 16 From Cervical Cancer Patients in Bandung

Authors: Fitri Rahmi Fadhilah, Edhyana Sahiratmadja, Ani Melani Maskoen, Ratu Safitri, Supartini Syarif, Herman Susanto

Abstract:

Cervical cancer is the second most common cancer in women after breast cancer. In Indonesia, the incidence of cervical cancer cases is estimated at 25-40 per 100,000 women per year. Human papillomavirus (HPV) infection is a major cause of cervical cancer, and HPV-16 is the most common genotype that infects the cervical tissue. The major late protein L1 may be associated with infectivity and pathogenicity and its variation can be used to classify HPV isolates. The aim of this study was to determine the phylogenetic tree of HPV 16 L1 gene from cervical cancer patient isolates in Bandung. After confirming HPV-16 by Linear Array Genotyping Test, L1 gene was amplified using specific primers and subject for sequencing. Phylogenetic analysis revealed that HPV 16 from Bandung was in the subgroup of Asia and East Asia, showing the close host-agent relationship among the Asian type.

Keywords: L1 HPV 16, cervical cancer, bandung, phylogenetic

Procedia PDF Downloads 491
840 Ukrainians Professors in a Luso-Hispanophone Brazilian Border Region: a Case-Study on the Management of Multilingualism in Higher Education

Authors: Isis Ribeiro Berger

Abstract:

In view of recent war conflicts between Russia and Ukraine, the government of Paraná State, in Brazil, started a program to host Ukrainian scientists in state universities in 2022. The initiative aimed at integrating these scientists into the Brazilian academic community, strengthening the role of universities in producing science and innovation even in times of war, as well as fostering Higher Education internationalization. Paraná state was a pioneer in this initiative due to the fact it has been home to the largest contingent of immigrants and descendants of Ukrainians in Brazil because of migratory processes that began at the end of the 19th century. One of the universities receiving Ukrainian scientists is in Foz do Iguaçu, a city that borders Argentina and Paraguay. It is a multilingual environment, whose majority languages are Portuguese (the official language of Brazil), Spanish (the official language of both Argentina and Paraguay), as well as Guarani (the co-official indigenous language of Paraguay). It is in such a sociolinguistic environment that two Ukrainian professors began their activities within the scope of an Interdisciplinary Postgraduate Program (master’s and doctorate degree). This case study, whose theme is the management of multilingualism, was developed within the scope of Language Policy. It aimed at identifying the attitudes of both Ukrainian professors and postgraduate students towards multilingualism in this context, given the plural linguistic repertoire of the academic community, as well as identifying the language management strategies for the construction of knowledge implemented by the program and in the classroom by these participants. Therefore, the study was conducted under a qualitative approach, for which surveys and interviews were adopted as part of its methodological procedures. Data revealed the presence of different languages in the classroom (Portuguese, Spanish, English and Ukrainian), which made pedagogical practices challenging for both professors and students, whose levels of knowledge in the different languages varied significantly. The results indicate that multilingualism was the norm as the means of instruction adopted in this context, in which bilingual Portuguese-English-Ukrainian instruction was used by the professors in their lectures. Although English has been privileged for the internationalization of Higher Education in various contexts, it was not used as an exclusive means of instruction in this case, mostly because it is a predominantly Portuguese-Spanish-speaking environment. In addition, the professors counted on the mediation of an interpreter hired by the program since not every student had sufficient knowledge of English as part of their repertoires. The findings also suggest Portuguese is the language that most of the participants of this study prefer, both because it is the mother tongue of majority, and because it is the official language of the host country to the professors, who have sought to integrate to the local culture and community. This research is inserted in the Axis: Multilingualism and Education, of the UNESCO Chair on Language Policies for Multilingualism to which this study is related.

Keywords: attitudes, border region, multilingualism management, Ukrainian professors

Procedia PDF Downloads 56
839 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 195
838 Biomimetic Strategies to Design Non-Toxic Antimicrobial Textiles

Authors: Isabel Gouveia

Abstract:

Antimicrobial textile materials may significantly reduce the risk of infections and because they are able to absorb substances from the skin and release therapeutic compounds to the skin, they can also find applications as complementary therapy of skin-diseases as part of standard management. Although functional textiles may be a promising area in skin disease/injury management, as part of standard management, few offer complementary treatment even though they are well known to reduce scratching and aiding emollient absorption, reducing infection, and alleviating pruritus. The reason for this may rely on the low quality of supporting evidence and negative effect that antimicrobial agents may exert on skin microbiome, as for example additional irritation of the vulnerable skin, and by causing resistant bacteria. Several antimicrobial agents have been tested in textiles: quaternary ammonium compounds, silver, polyhexamethylene-biguanides and triclosan have been used, with success. They have powerful bactericidal activity but the majority have a reduce spectrum of microbial inhibition and may cause skin irritation, ecotoxicity and bacteria resistance. Furthermore, the rising flow of strains resistant to last-resort antibiotics rekindles interest in alternative strategies. In this regard, new functional textiles incorporating highly specific antimicrobial agents towards pathogenic bacteria, are required. Recent research has been conducted on naturally occurring antimicrobials as novel alternatives to antibiotics. Conscious of this need our team firstly reported new approaches using L-cysteine and antimicrobial peptides (AMP). Briefly, we were able to develop different immobilization processes towards 6 Log Reduction against bacteria such as S. aureus and K. pneumoniae. Therefore, here we present several innovative antimicrobial textiles incorporating AMP and L-Cysteine which may open new avenues for the medical textiles market and biomaterials in general. Team references will be discussed as an overview and for comparison purposes in terms of potential therapeutic applications.

Keywords: Antimicrobials, Antimicrobial Textiles, Biomedical Textiles, Biomimetic surface functionalization

Procedia PDF Downloads 111
837 Prison Pipeline or College Pathways: Transforming the Urban Classroom

Authors: Marcia J. Watson

Abstract:

The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.

Keywords: college access, higher education, school-to-prison pipeline, urban education reform

Procedia PDF Downloads 525
836 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications

Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav

Abstract:

Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.

Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)

Procedia PDF Downloads 274
835 Information Visualization Methods Applied to Nanostructured Biosensors

Authors: Osvaldo N. Oliveira Jr.

Abstract:

The control of molecular architecture inherent in some experimental methods to produce nanostructured films has had great impact on devices of various types, including sensors and biosensors. The self-assembly monolayers (SAMs) and the electrostatic layer-by-layer (LbL) techniques, for example, are now routinely used to produce tailored architectures for biosensing where biomolecules are immobilized with long-lasting preserved activity. Enzymes, antigens, antibodies, peptides and many other molecules serve as the molecular recognition elements for detecting an equally wide variety of analytes. The principles of detection are also varied, including electrochemical methods, fluorescence spectroscopy and impedance spectroscopy. In this presentation an overview will be provided of biosensors made with nanostructured films to detect antibodies associated with tropical diseases and HIV, in addition to detection of analytes of medical interest such as cholesterol and triglycerides. Because large amounts of data are generated in the biosensing experiments, use has been made of computational and statistical methods to optimize performance. Multidimensional projection techniques such as Sammon´s mapping have been shown more efficient than traditional multivariate statistical analysis in identifying small concentrations of anti-HIV antibodies and for distinguishing between blood serum samples of animals infected with two tropical diseases, namely Chagas´ disease and Leishmaniasis. Optimization of biosensing may include a combination of another information visualization method, the Parallel Coordinate technique, with artificial intelligence methods in order to identify the most suitable frequencies for reaching higher sensitivity using impedance spectroscopy. Also discussed will be the possible convergence of technologies, through which machine learning and other computational methods may be used to treat data from biosensors within an expert system for clinical diagnosis.

Keywords: clinical diagnosis, information visualization, nanostructured films, layer-by-layer technique

Procedia PDF Downloads 322
834 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 198
833 Biodiversity of Aphid Species (Homoptera: Aphididae) in Hyderabad District, Sindh, Pakistan

Authors: Mahpara Pirzada, Mansoor Ali Shah, Saima Pthan, Kamal Khan, Faiza

Abstract:

Present study based on biodiversity of aphid in different crops of Hyderabad district and its, surrounding area to observe the biodiversity of aphids, host plant range of the aphids in Hyderabad and their population also infestation and yield loss aphid on different crops. We have surveyed different fields of Hyderabad, Jamshoro, and collected the aphids from various parts of plants, grasses, and herb with the help of camel brush. They have been brought to the laboratory into plastic jars and preserved in Glycerin (Glycerol). As a result, 383 individuals belonging to 3 species were identified. These identified species were Aphis fabae, Myzus persicae, and Brevicoryne brassicae. Out of the 3 habitats the maximum richness, evenness, and diversity were recorded in agriculture crops followed by flowering vegetables and minimum in fodder crops. The most abundant specie is Myzus persicae.

Keywords: aphid species, biodiversity, Homoptera:Aphididae, Pakistan

Procedia PDF Downloads 313
832 Protection of Chinese Enterprises’ Overseas Investments Under Bilateral Investment Treaties Under the Belt and Road Initiative

Authors: Bo Sun, Ni Zhong

Abstract:

Bilateral investment treaties have played a role in the construction of the Belt and Road, providing institutional protection for Chinese companies' overseas investments. However, such treaties between China and countries along the Belt and Road were signed in the 1980s and 1990s, and their provisions are outdated and insufficiently detailed to provide adequate legal protection for Chinese investors when they initiate investment arbitration against host countries. By studying cases involving China in international investment arbitration, this paper suggests that China should pay attention to further clarifying the identity of "investors", the scope of disputes that can be submitted to arbitration, and the concept of "indirect expropriation" when updating bilateral investment treaties in the future, in order to reduce the risk of losing cases for Chinese investors.

Keywords: belt and road, bilateral investment agreement, investment arbitration, indirect expropriation

Procedia PDF Downloads 241
831 The Face Sync-Smart Attendance

Authors: Bekkem Chakradhar Reddy, Y. Soni Priya, Mathivanan G., L. K. Joshila Grace, N. Srinivasan, Asha P.

Abstract:

Currently, there are a lot of problems related to marking attendance in schools, offices, or other places. Organizations tasked with collecting daily attendance data have numerous concerns. There are different ways to mark attendance. The most commonly used method is collecting data manually by calling each student. It is a longer process and problematic. Now, there are a lot of new technologies that help to mark attendance automatically. It reduces work and records the data. We have proposed to implement attendance marking using the latest technologies. We have implemented a system based on face identification and analyzing faces. The project is developed by gathering faces and analyzing data, using deep learning algorithms to recognize faces effectively. The data is recorded and forwarded to the host through mail. The project was implemented in Python and Python libraries used are CV2, Face Recognition, and Smtplib.

Keywords: python, deep learning, face recognition, CV2, smtplib, Dlib.

Procedia PDF Downloads 41
830 pH and Temperature Triggered Release of Doxorubicin from Hydogen Bonded Multilayer Films of Polyoxazolines

Authors: Meltem Haktaniyan, Eda Cagli, Irem Erel Goktepe

Abstract:

Polymers that change their properties in response to different stimuli (e.g. light, temperature, pH, ionic strength or magnetic field) are called ‘smart’ or ‘stimuli-responsive polymers’. These polymers have been widely used in biomedical applications such as sensors, gene delivery, drug delivery or tissue engineering. Temperature-responsive polymers have been studied extensively for controlled drug delivery applications. As regard of pseudo-peptides, poly (2-alky-2-oxazoline)s are considered as good candidates for delivery systems due to their stealth behavior and nontoxicity. In order to build responsive multilayer films for controlled drug release applications from surface, Layer by layer technique (LBL) is a powerful technique with an advantage of nanometer scale control over spatial architecture and morphology. Multilayers can be constructed on surface where non-covalent interactions including electrostatic interactions, hydrogen bonding, and charge-transfer or hydrophobic-hydrophobic interactions. In the present study, hydrogen bounded multilayer films of poly (2-alky-2-oxazoline) s with tannic acid were prepared in order to use as a platform to release Doxorubicin (DOX) from surface with pH and thermal triggers. For this purpose, poly (2-isopropyl-2-oxazoline) (PIPOX) and poly (2-ethyl-2-oxazoline) (PETOX) were synthesized via cationic ring opening polymerization (CROP) with hydroxyl end groups. Two polymeric multilayer systems ((PETOX)/(DOX)-(TA) complexes and (PIPOX)/(DOX)-(TA) complexes) were designed to investigate of controlled release of Doxorubicin (DOX) from surface with pH and thermal triggers. The drug release profiles from the multilayer thin films with alterations of pH and temperature will been examined with UV-Vis Spectroscopy and Fluorescence Spectroscopy.

Keywords: temperature responsive polymers, h-bonded multilayer films, drug release, polyoxazoline

Procedia PDF Downloads 300
829 Enhanced Phytoremediation Using Endophytic Microbes

Authors: Raymond Oriebe Anyasi, Harrison Atagana

Abstract:

The use of a plant in the detoxification of several toxin is been known to be enhanced by various microbial endophytes which have been reported to be contained in plants growing in any contaminated soil. Plants in their natural state are mostly colonized by endophytes which in the process forms symbiotic associations with the host plants. These benefits that the endophytes offer to the plants include amongst others to: Enhance plants growth through the production of various phytohormones; increase in the resistance of environmental stresses; produce important bioactive metabolites; help in the fixing of nitrogen in the plants organelles; help in the metal translocation and accumulation in plants; assist in the production of enzymes involves the degradation of organic contaminants. Therefore recognizing these natural processes of the microbes will enable the understanding of the effective mechanism for enhanced phytoremediation. The aim of this study was to survey the progressiveness in the study involving endophyte-assisted phytoremediation of contaminants; highlighting various pollutants, the plants used, the endophytes studied as well as the type of interaction between the plants and the microbes so as to proffer a better future prospect for the technology.

Keywords: phytoremediation, endophytes, microbes, pollution, environmental management, plants

Procedia PDF Downloads 334
828 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm

Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap

Abstract:

The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.

Keywords: beta defensin 3, bos taurus, docking, homology modeling

Procedia PDF Downloads 280
827 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 324