Search results for: Kerberos Authentication Protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1288

Search results for: Kerberos Authentication Protocol

598 Simultaneous Production of Forskolin and Rosmarinic Acid in vitro Cultures of Coleus Forskohlii Briq

Authors: Ennus Tajuddin Tamboli, Madhukar Garg, Mohd. Mujeeb, Sayeed Ahmad

Abstract:

An efficient protocol for simultaneous production of forskolin and rosmarinic acid in in vitro callus derived from the leaves of Coleus forskohlii Briq. has been developed. MS media was used for the establishment of cultures and NAA + 6-BA (1.0 ppm) was found best for callus growth. The callus was further subjected to treatment with various elicitor/precursors viz. chitosan, thidiazuron and methyl jasmonate to observe their effect on production of biomass and accumulation of secondary metabolites. The content of forskolin and rosmarinic acid were estimated by HPTLC, in comparison to natural explant which showed 2 fold and 10 fold rise in forskolin and rosmarinic acid content, respectively. Methy1 jasmonate 50 µM was found best for production of forskolin, whereas thidiazuron showed best results in the yield of rosmarinic acid, separately in static culture. However, combined treatment in suspension culture showed moderated effect for increase in secondary metabolites but the biomass increased significantly as compared to static culture.

Keywords: plant tissue culture, secondary metabolites, coleus, forskolin, rosmarinic acid, HPTLC

Procedia PDF Downloads 343
597 ArcGIS as a Tool for Infrastructure Documentation and Asset Management: Establishing a GIS for Computer Network Documentation

Authors: John Segars

Abstract:

Built out of a real-world need to have better, more detailed, asset and infrastructure documentation, this project will lay out the case for using the database functionality of ArcGIS as a tool to track and maintain infrastructure location, status, maintenance and serviceability. Workflows and processes will be presented and detailed which may be applied to an organizations’ infrastructure needs that might allow them to make use of the robust tools which surround the ArcGIS platform. The end result is a value-added information system framework with a geographic component e.g., the spatial location of various I.T. assets, a detailed set of records which not only documents location but also captures the maintenance history for assets along with photographs and documentation of these various assets as attachments to the numerous feature class items. In addition to the asset location and documentation benefits, the staff will be able to log into the devices and pull SNMP (Simple Network Management Protocol) based query information from within the user interface. The entire collection of information may be displayed in ArcGIS, via a JavaScript based web application or via queries to the back-end database. The project is applicable to all organizations which maintain an IT infrastructure but specifically targets post-secondary educational institutions where access to ESRI resources is generally already available in house.

Keywords: ESRI, GIS, infrastructure, network documentation, PostgreSQL

Procedia PDF Downloads 181
596 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 334
595 Exploring the Relationship between the Adoption of Environmental Processes, Policies, Techniques and Environmental Operational Performance

Authors: Renata Konadu

Abstract:

Over the last two decades, the concept of environmental management and its related issues have received increased attention in global discourse and on management research agenda due to climate change and other environmental challenges. To abate and avert these challenges, diverse environmental policies, strategies and practices have been adopted by businesses and economies as a whole. Extant literature has placed much emphasis on whether improved environmental operational performance improves firm performance. However, there is a huge gap in the literature with regards to whether the adoption of environmental management practices and policies has a direct relationship with environmental operational performance (EOP). The current paper is intended to provide a comprehensive perspective of how different aspects of environmental management can relate to firms EOP. Using a panel regression analysis of 149 large listed firms in the UK, the study found evidence of both negative and positive statistically significant link between some Environmental Policies (EP), Environmental Processes (EPR), Environmental Management Systems (EMS) and EOP. The findings suggest that in terms of relating EP, EPR and EMS to Greenhouse Gases (GHGs) emissions for instance, the latter should be viewed separately in Scopes 1, 2 and 3 as developed by GHG protocol. The results have useful implication for policy makers and managers when designing strategies and policies to reduce negative environmental impacts.

Keywords: environmental management, environmental operational performance, GHGs, large listed firms

Procedia PDF Downloads 254
594 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 148
593 Electrocatalytic Amino Acid Synthesis from Biomass-Derivable Keto Acids over Ball-Milled Carbon Nanotubes

Authors: Yiying Xiao, Chia Wei Lim, Jinquan Chang, Qixin Yuan, Lei Wang, Ning Yan

Abstract:

Electrocatalytic reductive amination (ERA) offers an attractive way to make organonitrogen chemicals from renewable feedstock. Here, we report carbon nanotube (CNT) as an effective catalyst for the ERA of biomass-derivable α-keto acids into amino acids using NH₃ as the nitrogen source. Through a facile ball milling (BM) treatment, the intrinsic defects in the CNTs were increased while the electrocatalytic activity of CNTs converting 2-ketoglutaric acid into glutamic acid was enhanced by approximately seven times. A high Faradaic efficiency (FE) of ~90% with a corresponding glutamic acid formation rate up to 180.9 mmol•g⁻¹𝒸ₐₜt•h⁻¹ was achieved, and ~60% molar yield of glutamic acid was obtained after 8 h of electrolysis. Electrokinetic analyses indicate that the BM-CNTs catalysed ERA exhibits first-order dependences on the substrate and NH₃, with a rate-determining step (RDS) involving the first electron transfer. Following this protocol, a number of amino acids were prepared with moderate to high FEs and formation rates. Significantly, we synthesised long carbon chain amino acids, which typically face lower yields using the existing methods.

Keywords: amino acids, carbon nanotubes, electrocatalysis, reductive amination, α-keto acids

Procedia PDF Downloads 83
592 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children

Authors: R. M. Chandler, A. J. Stringer

Abstract:

In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.

Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric

Procedia PDF Downloads 136
591 Battling with Patriarchy: Political Sexuality and Gender Democracy in Nigeria

Authors: Lenshie, Nsemba Edward

Abstract:

This paper examines political sexuality as an identity construct, which imparts on democratic practices globally. The manifestation of political sexuality reflect on the dynamics of social, economic, cultural and political relations among different gender affecting a number of issues, such as the questions of citizenship, poverty alleviation, property rights, ownership and inheritance, rights to sexual consent, polygamous marriage, governance and representation among other issues. This paper is concerned with the aspect of political participation among different genders in Nigeria. This paper posit that political sexuality is an outcome of ‘sexuality differences’, which seeks to glorify and gratify the superiority of a particular sexuality over another. Political sexuality, therefore, motivate and exacerbate socio-cultural, economic, and political struggles among different sexualities. The paper asserts further that majority of women have been discriminated, sexually harassed, and are often denied certain rights and privileges in Nigeria. A few number of women who have found themselves at the corridors of government have used the Beijing protocol on Women to demand for ‘affirmative action’ to expand their political space. It contends that the ‘affirmative action’ in Nigeria is far from achieving it throughout the country. The paper conclude that women require more than just a ‘self-rediscovery’ to assertively demand for a more and proper inclusion in Nigeria’s democratic process.

Keywords: gender democracy, identity, politics, political sexuality

Procedia PDF Downloads 436
590 CLOUD Japan: Prospective Multi-Hospital Study to Determine the Population-Based Incidence of Hospitalized Clostridium difficile Infections

Authors: Kazuhiro Tateda, Elisa Gonzalez, Shuhei Ito, Kirstin Heinrich, Kevin Sweetland, Pingping Zhang, Catia Ferreira, Michael Pride, Jennifer Moisi, Sharon Gray, Bennett Lee, Fred Angulo

Abstract:

Clostridium difficile (C. difficile) is the most common cause of antibiotic-associated diarrhea and infectious diarrhea in healthcare settings. Japan has an aging population; the elderly are at increased risk of hospitalization, antibiotic use, and C. difficile infection (CDI). Little is known about the population-based incidence and disease burden of CDI in Japan although limited hospital-based studies have reported a lower incidence than the United States. To understand CDI disease burden in Japan, CLOUD (Clostridium difficile Infection Burden of Disease in Adults in Japan) was developed. CLOUD will derive population-based incidence estimates of the number of CDI cases per 100,000 population per year in Ota-ku (population 723,341), one of the districts in Tokyo, Japan. CLOUD will include approximately 14 of the 28 Ota-ku hospitals including Toho University Hospital, which is a 1,000 bed tertiary care teaching hospital. During the 12-month patient enrollment period, which is scheduled to begin in November 2018, Ota-ku residents > 50 years of age who are hospitalized at a participating hospital with diarrhea ( > 3 unformed stools (Bristol Stool Chart 5-7) in 24 hours) will be actively ascertained, consented, and enrolled by study surveillance staff. A stool specimen will be collected from enrolled patients and tested at a local reference laboratory (LSI Medience, Tokyo) using QUIK CHEK COMPLETE® (Abbott Laboratories). which simultaneously tests specimens for the presence of glutamate dehydrogenase (GDH) and C. difficile toxins A and B. A frozen stool specimen will also be sent to the Pfizer Laboratory (Pearl River, United States) for analysis using a two-step diagnostic testing algorithm that is based on detection of C. difficile strains/spores harboring toxin B gene by PCR followed by detection of free toxins (A and B) using a proprietary cell cytotoxicity neutralization assay (CCNA) developed by Pfizer. Positive specimens will be anaerobically cultured, and C. difficile isolates will be characterized by ribotyping and whole genomic sequencing. CDI patients enrolled in CLOUD will be contacted weekly for 90 days following diarrhea onset to describe clinical outcomes including recurrence, reinfection, and mortality, and patient reported economic, clinical and humanistic outcomes (e.g., health-related quality of life, worsening of comorbidities, and patient and caregiver work absenteeism). Studies will also be undertaken to fully characterize the catchment area to enable population-based estimates. The 12-month active ascertainment of CDI cases among hospitalized Ota-ku residents with diarrhea in CLOUD, and the characterization of the Ota-ku catchment area, including estimation of the proportion of all hospitalizations of Ota-ku residents that occur in the CLOUD-participating hospitals, will yield CDI population-based incidence estimates, which can be stratified by age groups, risk groups, and source (hospital-acquired or community-acquired). These incidence estimates will be extrapolated, following age standardization using national census data, to yield CDI disease burden estimates for Japan. CLOUD also serves as a model for studies in other countries that can use the CLOUD protocol to estimate CDI disease burden.

Keywords: Clostridium difficile, disease burden, epidemiology, study protocol

Procedia PDF Downloads 261
589 Thyroid Hormones and Thyrotropin Status in Nepalese Postmenopausal Women

Authors: S. A. Khan, B. Mishra, O. Sherchan

Abstract:

Background and Aims: Thyroid disorder is the most common endocrine disorder after diabetes mellitus. Females are more vulnerable to this disease, and old age is an important risk factor. This study was undertaken to investigate the burden of thyroid disorder in Nepalese postmenopausal women. Methods: In the present cross-sectional study, we included 271 post-menopausal women. Three ml of blood was collected following standard protocol after taking the written consent. Serum was separated and analyzed for free T3, free T4, and Thyroid Stimulating Hormone (TSH) by Chemiluminescence Immunoassay (CLIA) method in Snibe Maglumi 1000 analyzer. Data obtained was analyzed in SPSS Version 21. P < 0.05 was set for statistical significant at 95% Confidence Interval (CI). Results: Majority of the participants belong to Janjati (46.5%) ethnicity, followed by Brahmin/Chhetri (41.7%), residing either in urban or suburban locality. Most of them were non-vegetarian, non-smoker, and non-alcoholic. Subjects were divided into hyperthyroid (TSH < 0.3 uIU/ml), hypothyroid (TSH > 4.5 uIU/ml), and euthyroid (TSH=0.3-4.5 uIU/ml) based on TSH value. We reported 10.3% hyperthyroid and 29.2% hypothyroid cases. TSH was significantly correlated with T3 (r=-0.244; p < 0.001) T4 (r=-0.398; p < 0.001); age (r=-0.138; p=0.023) and BMI (r=0.123; p=0.043). Multiple linear regression model for TSH reveals only T3 and T4 were significantly associated with TSH (p < 0.001; p=0.001). Conclusion: To conclude, nearly 39.5% of the postmenopausal women had thyroid disorder. Postmenopausal women are vulnerable to thyroid disorder; therefore, requires regular thyroid monitoring.

Keywords: thyroid stimulating hormone, TSH, T3, T4, thyroid disorder

Procedia PDF Downloads 131
588 A Simulation of Patient Queuing System on Radiology Department at Tertiary Specialized Referral Hospital in Indonesia

Authors: Yonathan Audhitya Suthihono, Ratih Dyah Kusumastuti

Abstract:

The radiology department in a tertiary referral hospital faces service operation challenges such as huge and various patient arrival, which can increase the probability of patient queuing. During the COVID-19 pandemic, it is mandatory to apply social distancing protocol in the radiology department. A strategy to prevent the accumulation of patients at one spot would be required. The aim of this study is to identify an alternative solution which can reduce the patient’s waiting time in radiology department. Discrete event simulation (DES) is used for this study by constructing several improvement scenarios with Arena simulation software. Statistical analysis is used to test the validity of the base case scenario model and to investigate the performance of the improvement scenarios. The result of this study shows that the selected scenario is able to reduce patient waiting time significantly, which leads to more efficient services in a radiology department, be able to serve patients more effectively, and thus increase patient satisfaction. The result of the simulation can be used by the hospital management to improve the operational performance of the radiology department.

Keywords: discrete event simulation, hospital management patient queuing model, radiology department services

Procedia PDF Downloads 119
587 Renewable Energy Micro-Grid Control Using Microcontroller in LabVIEW

Authors: Meena Agrawal, Chaitanya P. Agrawal

Abstract:

The power systems are transforming and becoming smarter with innovations in technologies to enable embark simultaneously upon the sustainable energy needs, rising environmental concerns, economic benefits and quality requirements. The advantages provided by inter-connection of renewable energy resources are becoming more viable and dependable with the smart controlling technologies. The limitation of most renewable resources have their diversity and intermittency causing problems in power quality, grid stability, reliability, security etc. is being cured by these efforts. A necessitate of optimal energy management by intelligent Micro-Grids at the distribution end of the power system has been accredited to accommodate sustainable renewable Distributed Energy Resources on large scale across the power grid. All over the world Smart Grids are emerging now as foremost concern infrastructure upgrade programs. The hardware setup includes NI cRIO 9022, Compact Reconfigurable Input Output microcontroller board connected to the PC on a LAN router with three hardware modules. The Real-Time Embedded Controller is reconfigurable controller device consisting of an embedded real-time processor controller for communication and processing, a reconfigurable chassis housing the user-programmable FPGA, Eight hot-swappable I/O modules, and graphical LabVIEW system design software. It has been employed for signal analysis, controls and acquisition and logging of the renewable sources with the LabVIEW Real-Time applications. The employed cRIO chassis controls the timing for the module and handles communication with the PC over the USB, Ethernet, or 802.11 Wi-Fi buses. It combines modular I/O, real-time processing, and NI LabVIEW programmable. In the presented setup, the Analog Input Module NI 9205 five channels have been used for input analog voltage signals from renewable energy sources and NI 9227 four channels have been used for input analog current signals of the renewable sources. For switching actions based on the programming logic developed in software, a module having Electromechanical Relays (single-pole single throw) with 4-Channels, electrically isolated and LED indicating the state of that channel have been used for isolating the renewable Sources on fault occurrence, which is decided by the logic in the program. The module for Ethernet based Data Acquisition Interface ENET 9163 Ethernet Carrier, which is connected on the LAN Router for data acquisition from a remote source over Ethernet also has the module NI 9229 installed. The LabVIEW platform has been employed for efficient data acquisition, monitoring and control. Control logic utilized in program for operation of the hardware switching Related to Fault Relays has been portrayed as a flowchart. A communication system has been successfully developed amongst the sources and loads connected on different computers using Hypertext transfer protocol, HTTP or Ethernet Local Stacked area Network TCP/IP protocol. There are two main I/O interfacing clients controlling the operation of the switching control of the renewable energy sources over internet or intranet. The paper presents experimental results of the briefed setup for intelligent control of the micro-grid for renewable energy sources, besides the control of Micro-Grid with data acquisition and control hardware based on a microcontroller with visual program developed in LabVIEW.

Keywords: data acquisition and control, LabVIEW, microcontroller cRIO, Smart Micro-Grid

Procedia PDF Downloads 333
586 The Accuracy of Measures for Screening Adults for Spiritual Suffering in Health Care Settings: A Systematic Review

Authors: Sayna Bahraini, Wendy Gifford, Ian Graham, Liquaa Wazni, Suzettee Bremault-Phillips, Rebekah Hackbusch, Catrine Demers, Mary Egan

Abstract:

Objective: Guidelines for palliative and spiritual care emphasize the importance of screening patients for spiritual suffering. The aim of this review was to synthesize the research evidence on the accuracy of measures used to screen adults for spiritual suffering. Methods: A systematic review has been conducted. We searched five scientific databases to identify relevant articles. Two independent reviewers screened extracted data and assessed study methodological quality. Results: We identified five articles that yielded information on 24 spiritual screening measures. Among all identified measures, the 2-item Meaning/Joy & Self-Described Struggle has the highest sensitivity (82-87%), and the revised Rush protocol has the highest specificity (81-90%). The methodological quality of all included studies was low. Significance of Results: While most of the identified spiritual screening measures are brief (comprise 1 to 12 number of items), few have sufficient accuracy to effectively screen patients for spiritual suffering. We advise clinicians to use their critical appraisal skills and clinical judgment when selecting and using any of the identified measures to screen for spiritual suffering.

Keywords: screening, suffering, spirituality, diagnostic test accuracy, systematic review

Procedia PDF Downloads 142
585 Managing Gender Based Violence in Nigeria: A Legal Conundrum

Authors: Foluke Dada

Abstract:

The Prevalence of gender-based violence in Nigeria is of such concern and magnitude that the government has intervened by ratifying international instruments such as the convention on the elimination of all forms of discrimination against women, the declaration on the elimination of violence against women; the protocol to the African charter on human and people’s rights on the rights of women, etc. By promulgating domestic laws that sought to prevent the perpetration of Gender-based violence and also protect victims from future occurrences. Nigeria principally has two legal codes creating criminal offenses and punishments for breach of those offenses, the Criminal Code Law, applying to most states in Southern Nigeria and the Penal Code applying to states in Northern Nigeria. Individual State laws such as the Ekiti State and Lagos State Gender-Based Violence laws are also discussed. This paper addresses Gender-Based Violence in Nigeria and exposes the inadequacies in the laws and their application. The paper postulates that there is a need for more workable public policy that strengthens the social structure fortified by the law in order to engender the necessary changes and provide the opportunity for government to embark on grassroots-based advocacy that engage the victims and sensitize them of their rights and how they can enjoy some of the protections afforded by the laws.

Keywords: gender, violence, human rights, law and policy

Procedia PDF Downloads 611
584 Transformation of Glycals to Chiral Fused Aromatic Cores via Annulative π-Extension Reaction with Arynes

Authors: Nazar Hussain, Debaraj Mukherjee

Abstract:

Carbohydrate-derived chiral intermediates which contain arrays of defined stereocenters have found enormous applications in organic synthesis due to their inherent functional group, stereochemical and structural diversities as well as their ready availability. Stereodiversity of these classes of molecules has motivated synthetic organic chemistry over the years. One major challenge is control of relative configuration during construction of acyclic fragments. Here, we show that The Diels Alder addition of arynes to appropriately substituted vinyl/aryl glycals followed by π-extension via pyran ring opening smoothly furnished meta-disubstituted fused aromatic cores containing a stereo-defined orthogonally protected chiral side chain. The method is broad in terms of aryl homologation affording benzene, naphthalene, and phenanthrene derivatives. Base-induced deprotonation followed by cleavage of the allylic C-O bond appears to be the crucial steps leading to the development of aromaticity, which is the driving force behind the annulative π-extension process. The present protocol can be used for the synthesis of meta-disubstituted naphthalene aldehydes and substrates for aldolases.

Keywords: vinyl/C-2 aryl glycal, arynes, cyclization, ring opening

Procedia PDF Downloads 255
583 From a Distance: A Grounded Theory Study of Incarcerated Filipino Elderly's Separation Anxiety

Authors: Allan B. de Guzman, Rochelle Gabrielle R. Gatan, Ira Bianca Mae G. Gesmundo, Astley Justine H. Golosinda

Abstract:

Background: While in prison, the elderly, like the younger prisoners, face specific problems and deprivations arising directly from their imprisonment, one of which is forced separation from family and loved ones. Despite the numerous studies that examined the impact of separation and separation anxiety on the emotions and behavior of young individuals, little is known about separation anxiety in the elderly population. Objective: This grounded theory study purports to describe the process of separation anxiety among incarcerated Filipino elderly men. Method: Individual interviews and participant observations were conducted with 25 incarcerated elderly Filipino men who are first-time prisoners, sentenced to lifetime imprisonment and were analyzed using constant comparative method. Results: Following Strauss and Corbin’s protocol, a four-part process emerged to describe the studied layer of human experience. The Tectonic Model of Separation Anxiety among incarcerated Filipino elderly men comprises of four phases: Winkling, Wilting, Weeding, and Weaving. Conclusion: This study has inductively and creatively explored the process of separation anxiety among the Filipino incarcerated elderly men. Findings of this study invite nurses and other clinicians to identify developmentally appropriate strategies and interventions for this vulnerable and neglected sector of society.

Keywords: elderly, grounded theory, separation anxiety, Filipino, incarcerated

Procedia PDF Downloads 364
582 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 393
581 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm

Authors: Swati Kishor Zode, Rahul Ambekar

Abstract:

Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.

Keywords: classification, homomorphic encryption, clinical decision support, privacy

Procedia PDF Downloads 330
580 Optimization of Cacao Fermentation in Davao Philippines Using Sustainable Method

Authors: Ian Marc G. Cabugsa, Kim Ryan Won, Kareem Mamac, Manuel Dee, Merlita Garcia

Abstract:

An optimized cacao fermentation technique was developed for the cacao farmers of Davao City Philippines. Cacao samples with weights ranging from 150-250 kilograms were collected from various cacao farms in Davao City and Zamboanga City Philippines. Different fermentation techniques were used starting with design of the sweat box, prefermentation conditionings, number of days for fermentation and number of turns. As the beans are being fermented, its temperature was regularly monitored using a digital thermometer. The resultant cacao beans were assessed using physical and chemical means. For the physical assessment, the bean cut test, bean count tests, and sensory test were used. Quantification of theobromine, caffeine, and antioxidants in the form of equivalent quercetin was used for chemical assessment. Both the theobromine and caffeine were analyzed using HPLC method while the antioxidant was analyzed spectrometrically. To come up with the best fermentation procedure, the different assessment were given priority coefficients wherein the physical tests – taste test, cut, and bean count tests were given priority over the results of the chemical test. The result of the study was an optimized fermentation protocol that is readily adaptable and transferable to any cacao cooperatives or groups in Mindanao or even Philippines as a whole.

Keywords: cacao, fermentation, HPLC, optimization, Philippines

Procedia PDF Downloads 452
579 Reliability of Swine Estrous Detector Probe in Dairy Cattle Breeding

Authors: O. O. Leigh, L. C. Agbugba, A. O. Oyewunmi, A. E. Ibiam, A. Hassan

Abstract:

Accuracy of insemination timing is a key determinant of high pregnancy rates in livestock breeding stations. The estrous detector probes are a recent introduction into the Nigerian livestock farming sector. Many of these probes are species-labeled and they measure changes in the vaginal mucus resistivity (VMR) during the stages of the estrous cycle. With respect to size and shaft conformation, the Draminski® swine estrous detector probe (sEDP) is quite similar to the bovine estrous detector probe. We investigated the reliability of the sEDP at insemination time on two farms designated as FM A and FM B. Cows (Bunaji, n=20 per farm) were evaluated for VMR at 16th h post standard OvSynch protocol, with concurrent insemination on FM B only. The difference in the mean VMR between FM A (221 ± 24.36) Ohms and FM B (254 ± 35.59) Ohms was not significant (p > 0.05). Sixteen cows (80%) at FM B were later (day 70) confirmed pregnant via rectal palpation and calved at term. These findings suggest consistency in VMR evaluated with sEDP at insemination as well as a high predictability for VMR associated with good pregnancy rates in dairy cattle. We conclude that Draminski® swine estrous detector probe is reliable in determining time of insemination in cattle breeding stations.

Keywords: dairy cattle, insemination, swine estrous probe, vaginal mucus resistivity

Procedia PDF Downloads 124
578 Delivering Safer Clinical Trials; Using Electronic Healthcare Records (EHR) to Monitor, Detect and Report Adverse Events in Clinical Trials

Authors: Claire Williams

Abstract:

Randomised controlled Trials (RCTs) of efficacy are still perceived as the gold standard for the generation of evidence, and whilst advances in data collection methods are well developed, this progress has not been matched for the reporting of adverse events (AEs). Assessment and reporting of AEs in clinical trials are fraught with human error and inefficiency and are extremely time and resource intensive. Recent research conducted into the quality of reporting of AEs during clinical trials concluded it is substandard and reporting is inconsistent. Investigators commonly send reports to sponsors who are incorrectly categorised and lacking in critical information, which can complicate the detection of valid safety signals. In our presentation, we will describe an electronic data capture system, which has been designed to support clinical trial processes by reducing the resource burden on investigators, improving overall trial efficiencies, and making trials safer for patients. This proprietary technology was developed using expertise proven in the delivery of the world’s first prospective, phase 3b real-world trial, ‘The Salford Lung Study, ’ which enabled robust safety monitoring and reporting processes to be accomplished by the remote monitoring of patients’ EHRs. This technology enables safety alerts that are pre-defined by the protocol to be detected from the data extracted directly from the patients EHR. Based on study-specific criteria, which are created from the standard definition of a serious adverse event (SAE) and the safety profile of the medicinal product, the system alerts the investigator or study team to the safety alert. Each safety alert will require a clinical review by the investigator or delegate; examples of the types of alerts include hospital admission, death, hepatotoxicity, neutropenia, and acute renal failure. This is achieved in near real-time; safety alerts can be reviewed along with any additional information available to determine whether they meet the protocol-defined criteria for reporting or withdrawal. This active surveillance technology helps reduce the resource burden of the more traditional methods of AE detection for the investigators and study teams and can help eliminate reporting bias. Integration of multiple healthcare data sources enables much more complete and accurate safety data to be collected as part of a trial and can also provide an opportunity to evaluate a drug’s safety profile long-term, in post-trial follow-up. By utilising this robust and proven method for safety monitoring and reporting, a much higher risk of patient cohorts can be enrolled into trials, thus promoting inclusivity and diversity. Broadening eligibility criteria and adopting more inclusive recruitment practices in the later stages of drug development will increase the ability to understand the medicinal products risk-benefit profile across the patient population that is likely to use the product in clinical practice. Furthermore, this ground-breaking approach to AE detection not only provides sponsors with better-quality safety data for their products, but it reduces the resource burden on the investigator and study teams. With the data taken directly from the source, trial costs are reduced, with minimal data validation required and near real-time reporting enables safety concerns and signals to be detected more quickly than in a traditional RCT.

Keywords: more comprehensive and accurate safety data, near real-time safety alerts, reduced resource burden, safer trials

Procedia PDF Downloads 84
577 Screening of Four Malaysian Isolated Endophytes with Candesartan in a Microtiter Plate

Authors: Rasha Saad, Jean Frederic Weber, Fatimah Bebe, Sadia Sultan

Abstract:

The goal of study was to screen the effects of candesartan and four endophytic fungi for their potential in microbial biotransformation. In this experiment, four types of unidentified fungi with the codes of TH2L1, TH2R10, TH1P35 and TH1S46 were used in screening process by MECFUS (Microtiter plate, Elicitors, Combination, Freeze-drying, UHPLC, Statistical analysis) protocol. The experiment was carried out by using 96-well microtiter plate (MTP) with different media and elicitors. Various media with two concentrations of Potato Dextrose Broth (PDB) and elicitors used were to induce the production of secondary metabolites from the fungi as well as the biotransformation of the drug compound. After incubation, cultures were extracted by freeze drying method and finally analyzed by ultra-High performance Liquid Chromatography (uHPLC). The extracts analyzed by uHPLC followed by LC/Ms, demonstrated the presence of biotransformation products from the drug compound and elicitation of the secondary metabolism from the fungi by the occurrence of the additional peaks. From the four fungi, TH1S46 showed highly potential produced secondary metabolites as well as the biotransformation of candesartan. For other fungi, they responded when candesartan was introduced. Moreover, the additional peaks produced in uHPLC need to be further investigation by using LC-MS or NMR.

Keywords: biotransformation, candesartan, endophytes, secondary metabolites

Procedia PDF Downloads 261
576 Random Subspace Neural Classifier for Meteor Recognition in the Night Sky

Authors: Carlos Vera, Tetyana Baydyk, Ernst Kussul, Graciela Velasco, Miguel Aparicio

Abstract:

This article describes the Random Subspace Neural Classifier (RSC) for the recognition of meteors in the night sky. We used images of meteors entering the atmosphere at night between 8:00 p.m.-5: 00 a.m. The objective of this project is to classify meteor and star images (with stars as the image background). The monitoring of the sky and the classification of meteors are made for future applications by scientists. The image database was collected from different websites. We worked with RGB-type images with dimensions of 220x220 pixels stored in the BitMap Protocol (BMP) format. Subsequent window scanning and processing were carried out for each image. The scan window where the characteristics were extracted had the size of 20x20 pixels with a scanning step size of 10 pixels. Brightness, contrast and contour orientation histograms were used as inputs for the RSC. The RSC worked with two classes and classified into: 1) with meteors and 2) without meteors. Different tests were carried out by varying the number of training cycles and the number of images for training and recognition. The percentage error for the neural classifier was calculated. The results show a good RSC classifier response with 89% correct recognition. The results of these experiments are presented and discussed.

Keywords: contour orientation histogram, meteors, night sky, RSC neural classifier, stars

Procedia PDF Downloads 138
575 Effect of Pomegranate (Punica granatum) Seed Oil on Keratinocytes in Patients with Atopic Dermatitis

Authors: Fardis Teifoori, Mehdi Dehghani, Idoia Postigo, Jorge Martinez

Abstract:

Introduction: Many skin disorders, such as atopic dermatitis (AD), is characterized by inflammation, infection, and hyperplasia. In this work, keratinocytes from AD patients are used to study the pomegranate seed oil properties for skin care. Material and methods: Isolated keratinocytes from patients with AD were cultured and stimulated by IL-9 (20 ng/ml) and TNF-α (50ng/ml) for 48h to induce vascular endothelial growth factor (VEGF) and Regulated upon activation, normal T cell expressed and secreted (RANTES) production, respectively, in the presence of different concentrations of pomegranate seed oil (20, 50, 100, and 200 µM). Finally, the concentrations of RANTES and VEGF in the cell culture supernatant were quantified according to the standard protocol of commercial ELISA kits. Results: The results indicated that pomegranate seed oil concentrations of 50, 100, and 200 µM could significantly inhibit the production of VEGF and RANTES by stimulating keratinocytes with IL-9 (20 ng/ml) and TNF-α (50ng/ml), respectively. The decrease in VEGF and RANTES concentration in the presence of the pomegranate seed oil concentrations of 20 and 50 uM was not significant. Conclusion: It was concluded that pomegranate seed oil (PSO) counteracts atopic dermatitis conditions dose-dependently: with the highest effect at the concentration of 200 µM. We suggest that the inexpensive and easily available pomegranate seed oil is a good candidate for cosmetics and clinical utilization for skin care.

Keywords: atopic dermatitis, pomegranate, Punica granatum, RANTES, VEGF

Procedia PDF Downloads 79
574 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things

Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin

Abstract:

With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.

Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)

Procedia PDF Downloads 160
573 Solubility Measurements in the Context of Nanoregulation

Authors: Ratna Tantra

Abstract:

From a risk assessment point of view, solubility is a property that has been identified as being important. If nanomaterial is completely soluble, then its disposal can be treated much in the same way as ‘ordinary’ chemicals, which subsequently will simplify testing and characterization regimes. The measurement of solubility has been highlighted as important in a pan-European project, Framework Programme (FP) 7 NANoREG. Some of the project outputs surrounding this topic will be presented here, in which there are two parts. First, a review on existing methods capable of measuring nanomaterial solubility will be discussed. Second, a case study will be presented based on using colorimetry methods to quantify dissolve zinc from ZnO nanomaterial upon exposure to digestive juices. The main findings are as follows: a) there is no universal method for nanomaterial solubility testing. The method chosen will be dependent on sample type and nano-specific application/scenario. b) The colorimetry results show a positive correlation between particle concentration and amount of [Zn2+] released; this was expected c) results indicate complete dissolution of the ZnO nanomaterial, as a result of the digestion protocol but only a fraction existing as free ions. Finally, what differentiates the F7 NANoREG project over other projects is the need for participating research laboratories to follow a set of defined protocols, necessary to establish quality control and assurance. The methods and results associated with mandatory testing that carried out by all partners in NANoREG will be discussed.

Keywords: nanomaterials, nanotoxicology, solubility, zinc oxide

Procedia PDF Downloads 335
572 Real Time Traffic Performance Study over MPLS VPNs with DiffServ

Authors: Naveed Ghani

Abstract:

With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.

Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2

Procedia PDF Downloads 426
571 Electric Vehicle Market Penetration Impact on Greenhouse Gas Emissions for Policy-Making: A Case Study of United Arab Emirates

Authors: Ahmed Kiani

Abstract:

The United Arab Emirates is clearly facing a multitude of challenges in curbing its greenhouse gas emissions to meet its pre-allotted framework of Kyoto protocol and COP21 targets due to its hunger for modernization, industrialization, infrastructure growth, soaring population and oil and gas activity. In this work, we focus on the bonafide zero emission electric vehicles market penetration in the country’s transport industry for emission reduction. We study the global electric vehicle market trends, the complementary battery technologies and the trends by manufacturers, emission standards across borders and prioritized advancements which will ultimately dictate the terms of future conditions for the United Arab Emirate transport industry. Based on our findings and analysis at every stage of current viability and state-of-transport-affairs, we postulate policy recommendations to local governmental entities from a supply and demand perspective covering aspects of technology, infrastructure requirements, change in power dynamics, end user incentives program, market regulators behavior and communications amongst key stakeholders. 

Keywords: electric vehicles, greenhouse gas emission reductions, market analysis, policy recommendations

Procedia PDF Downloads 309
570 Uncovering Underwater Communication for Multi-Robot Applications via CORSICA

Authors: Niels Grataloup, Micael S. Couceiro, Manousos Valyrakis, Javier Escudero, Patricia A. Vargas

Abstract:

This paper benchmarks the possible underwater communication technologies that can be integrated into a swarm of underwater robots by proposing an underwater robot simulator named CORSICA (Cross platfORm wireleSs communICation simulator). Underwater exploration relies increasingly on the use of mobile robots, called Autonomous Underwater Vehicles (AUVs). These robots are able to reach goals in harsh underwater environments without resorting to human divers. The introduction of swarm robotics in these scenarios would facilitate the accomplishment of complex tasks with lower costs. However, swarm robotics requires implementation of communication systems to be operational and have a non-deterministic behaviour. Inter-robot communication is one of the key challenges in swarm robotics, especially in underwater scenarios, as communication must cope with severe restrictions and perturbations. This paper starts by presenting a list of the underwater propagation models of acoustic and electromagnetic waves, it also reviews existing transmitters embedded in current robots and simulators. It then proposes CORSICA, which allows validating the choices in terms of protocol and communication strategies, whether they are robot-robot or human-robot interactions. This paper finishes with a presentation of possible integration according to the literature review, and the potential to get CORSICA at an industrial level.

Keywords: underwater simulator, robot-robot underwater communication, swarm robotics, transceiver and communication models

Procedia PDF Downloads 300
569 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 297