Search results for: attacks and controls
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1584

Search results for: attacks and controls

894 The Applicability of International Humanitarian Law to Non-State Actors

Authors: Yin Cheung Lam

Abstract:

In 1949, the ratification of the Geneva Conventions heralded the international community’s adoption of a new universal and non-discriminatory approach to human rights in situations of conflict. However, with the proliferation of international terrorism after the 9/11 attacks on the United States (U.S.), the international community’s uneven and contradictory implementations of international humanitarian law (IHL) questioned its agenda of universal human rights. Specifically, the derogation from IHL has never been so pronounced in the U.S. led ‘War on Terror’. While an extensive literature has ‘assessed the impact’ of the implementation of the Geneva Conventions, limited attention has been paid to interrogating the ways in which the Geneva Conventions and its resulting implementation have functioned to discursively reproduce certain understandings of human rights between states and non-state actors. Through a discursive analysis of the Geneva Conventions and the conceptualization of human rights in relation to terrorism, this thesis problematises the way in which the U.S. has understood and reproduced understandings of human rights. Using the U.S. ‘War on Terror’ as an example, it seeks to extend previous analyses of the U.S.’ practice of IHL through a qualitative discursive analysis of the human rights content that appears in the Geneva Conventions in addition to the speeches and policy documents on the ‘War on Terror’.

Keywords: discursive analysis, human rights, non-state actors, war on terror

Procedia PDF Downloads 606
893 Detection of High Fructose Corn Syrup in Honey by Near Infrared Spectroscopy and Chemometrics

Authors: Mercedes Bertotto, Marcelo Bello, Hector Goicoechea, Veronica Fusca

Abstract:

The National Service of Agri-Food Health and Quality (SENASA), controls honey to detect contamination by synthetic or natural chemical substances and establishes and controls the traceability of the product. The utility of near-infrared spectroscopy for the detection of adulteration of honey with high fructose corn syrup (HFCS) was investigated. First of all, a mixture of different authentic artisanal Argentinian honey was prepared to cover as much heterogeneity as possible. Then, mixtures were prepared by adding different concentrations of high fructose corn syrup (HFCS) to samples of the honey pool. 237 samples were used, 108 of them were authentic honey and 129 samples corresponded to honey adulterated with HFCS between 1 and 10%. They were stored unrefrigerated from time of production until scanning and were not filtered after receipt in the laboratory. Immediately prior to spectral collection, honey was incubated at 40°C overnight to dissolve any crystalline material, manually stirred to achieve homogeneity and adjusted to a standard solids content (70° Brix) with distilled water. Adulterant solutions were also adjusted to 70° Brix. Samples were measured by NIR spectroscopy in the range of 650 to 7000 cm⁻¹. The technique of specular reflectance was used, with a lens aperture range of 150 mm. Pretreatment of the spectra was performed by Standard Normal Variate (SNV). The ant colony optimization genetic algorithm sample selection (ACOGASS) graphical interface was used, using MATLAB version 5.3, to select the variables with the greatest discriminating power. The data set was divided into a validation set and a calibration set, using the Kennard-Stone (KS) algorithm. A combined method of Potential Functions (PF) was chosen together with Partial Least Square Linear Discriminant Analysis (PLS-DA). Different estimators of the predictive capacity of the model were compared, which were obtained using a decreasing number of groups, which implies more demanding validation conditions. The optimal number of latent variables was selected as the number associated with the minimum error and the smallest number of unassigned samples. Once the optimal number of latent variables was defined, we proceeded to apply the model to the training samples. With the calibrated model for the training samples, we proceeded to study the validation samples. The calibrated model that combines the potential function methods and PLSDA can be considered reliable and stable since its performance in future samples is expected to be comparable to that achieved for the training samples. By use of Potential Functions (PF) and Partial Least Square Linear Discriminant Analysis (PLS-DA) classification, authentic honey and honey adulterated with HFCS could be identified with a correct classification rate of 97.9%. The results showed that NIR in combination with the PT and PLS-DS methods can be a simple, fast and low-cost technique for the detection of HFCS in honey with high sensitivity and power of discrimination.

Keywords: adulteration, multivariate analysis, potential functions, regression

Procedia PDF Downloads 125
892 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 284
891 Effects of Heat Source Position on Heat Transfer in an Inclined Square Enclosure Filled with Nanofluids

Authors: Khamis Al Kalbani

Abstract:

The effects of a uniform heat source position on the heat transfer flow inside an inclined square enclosure filled with different types of nanofluids having various shapes of the nanoparticles are investigated numerically following one component thermal equilibrium model. The effects of the Brownian diffusion of the nanoparticles, magnetic field intensity and orientation are taken into consideration in nanofluid modeling. The heat source is placed in the middle of a wall of the enclosure while the opposite wall of it is kept at different temperature. The other walls of the enclosure are kept insulated. The results indicate that the heat source position significantly controls the heat transfer rates of the nanofluids. The distributions of the average heat transfer rates varying the position of the heat source with respect to the geometry inclination angle are calculated for the first time. The outcomes of the present research may be helpful for designing solar thermal collectors, radiators, building insulators and advanced cooling of a nuclear system.

Keywords: heat source, inclined, square enclosure, nanofluids

Procedia PDF Downloads 306
890 Mesotrione and Tembotrione Applied Alone or in Tank-Mix with Atrazine on Weed Control in Elephant Grass

Authors: Alexandre M. Brighenti

Abstract:

The experiment was carried out in Valença, Rio de Janeiro State, Brazil, to evaluate the selectivity and weed control of carotenoid biosynthesis inhibiting herbicides applied alone or in combination with atrazine in elephant grass crop. The treatments were as follows: mesotrione (0.072 and 0.144 kg ha-1 + 0.5% v/v mineral oil - Assist®), tembotrione (0.075 and 0.100 kg ha-1 + 0.5% v/v mineral oil - Aureo®), atrazine + mesotrione (1.25 + 0.072 kg ha-1 + 0.5% v/v mineral oil - Assist®), atrazine + tembotrione (1.25 + 0.100 kg ha-1 + 0.5% v/v mineral oil - Aureo®), atrazine + mesotrione (1.25 + 0.072 kg ha-1), atrazine + tembotrione (1.25 + 0.100 kg ha-1) and two controls (hoed and unhoed check). Two application rates of mesotrione with the addition of mineral oil or the tank mixture of atrazine plus mesotrione, with or without the addition of mineral oil, did not provide injuries capable to reduce elephant grass forage yield. Tembotrione was phytotoxic to elephant grass when applied with mineral oil. Atrazine and tembotrione in a tank-mix, with or without mineral oil, were also phytotoxic to elephant grass. All treatments provided satisfactory weed control.

Keywords: forage, Napier grass, pasture, Pennisetum purpureum, weeds

Procedia PDF Downloads 283
889 Evaluation of Rehabilitation in Ischemic Stroke

Authors: Amirmohammad Dahouri

Abstract:

Each year, more than 795,000 individuals in the United States grieve a stroke, and by 2030, it is predictable that 4% of the U.S. people will have had a stroke. Ischemic stroke, accounting for about 80% of all strokes, is one of the main causes of disability. The goal of stroke rehabilitation is to help patients return to physical and mental functions and relearn the required aids to living everyday life. This flagging has an adverse effect on patients’ quality of life and affects their daily living activities. In recent years, the rehabilitation of ischemic stroke attractions more attention in the world. A review of the rudimentary perceptions of stroke rehabilitation that are price stressing to all specialists who delicacy patients with stroke. Ideas are made for patients on how to functionally manage daily activities after they have qualified for a stroke. It is vital for home healthcare clinicians to understand the process from acute events to medical equilibrium and rehabilitation to adaptation. Different sources such as Pub Med Google Scholar and science direct have been used and various contemporary articles in this era have been analyzed. The care plan must also foundation actual actions to protect against recurrent stroke, as stroke patients are generally at significant risk for further ischemic or hemorrhagic attacks. Here, we review evidence of rehabilitation in treating post-stroke impairment.

Keywords: rehabilitation, stroke, ischemic, hemorrhagic, brain

Procedia PDF Downloads 163
888 An Efficient Algorithm of Time Step Control for Error Correction Method

Authors: Youngji Lee, Yonghyeon Jeon, Sunyoung Bu, Philsu Kim

Abstract:

The aim of this paper is to construct an algorithm of time step control for the error correction method most recently developed by one of the authors for solving stiff initial value problems. It is achieved with the generalized Chebyshev polynomial and the corresponding error correction method. The main idea of the proposed scheme is in the usage of the duplicated node points in the generalized Chebyshev polynomials of two different degrees by adding necessary sample points instead of re-sampling all points. At each integration step, the proposed method is comprised of two equations for the solution and the error, respectively. The constructed algorithm controls both the error and the time step size simultaneously and possesses a good performance in the computational cost compared to the original method. Two stiff problems are numerically solved to assess the effectiveness of the proposed scheme.

Keywords: stiff initial value problem, error correction method, generalized Chebyshev polynomial, node points

Procedia PDF Downloads 573
887 Earthquakes' Magnitude and Density Controls by Mechanical Stratigraphy in the Zagros, Iran

Authors: Asaad Pireh

Abstract:

The Zagros fold and thrust belt is one of the most active seismic zones of Iran where hosts many people and considerable oil and gas resources. The Zagros fold and thrust belt, based on its stratigraphy has been divided into three provinces. Mechanical stratigraphy of these provinces is different together. Statistical analyses all of earthquakes which has happened in the Zagros fold and thrust belt from 1964 up to December 2014, shows that strong earthquakes have occurred within the southeastern part of these subdivisions which has a smaller ratio of incompetent to competent thickness and in the northwestern part of these subdivisions which has a greater ratio of incompetent to competent thickness has occurred the weakest earthquakes. The southeastern part of the Zagros has a higher seismic risk and northwestern part of these fold belt have a lower seismic risk.

Keywords: earthquake, mechanical stratigraphy, seismic risk, Zagros

Procedia PDF Downloads 145
886 Ruminal Fermentation of Biologically Active Nitrate- and Nitro-Containing Forages

Authors: Robin Anderson, David Nisbet

Abstract:

Nitrate, 3-nitro-1-propionic acid (NPA) and 3-nitro-1-propanol (NPOH) are biologically active chemicals that can accumulate naturally in rangeland grasses forages consumed by grazing cattle, sheep and goats. While toxic to livestock if accumulations and amounts consumed are high enough, particularly in animals having no recent exposure to the forages, these chemicals are known to be potent inhibitors of methane-producing bacteria inhabiting the rumen. Consequently, there is interest in examining their potential use as anti-methanogenic compounds to decrease methane emissions by grazing ruminants. Presently, rumen microbes, collected freshly from a cannulated Holstein cow maintained on 50:50 corn based concentrate:alfalfa diet were mixed (10 mL fluid) in 18 x 150 mm crimp top tubes with 0.5 of high nitrate-containing barley (Hordeum vulgare; containing 272 µmol nitrate per g forage dry matter), and NPA- or NPOH- containing milkvetch forages (Astragalus canadensis and Astragalus miser containing 80 and 174 soluble µmol NPA or NPOH/g forage dry matter respectively). Incubations containing 0.5 g alfalfa (Medicago sativa) were used as controls. Tubes (3 per each respective forage) were capped and incubated anaerobically (using oxygen free carbon dioxide) for 24 h at 39oC after which time amounts of total gas produced were measured via volume displacement and headspace samples were analyzed by gas chromatography to determine concentrations of hydrogen and methane. Fluid samples were analyzed by gas chromatography to measure accumulations of fermentation acids. A completely randomized analysis of variance revealed that the nitrate-containing barley and both the NPA- and the NPOH-containing milkvetches significantly decreased methane production, by > 50%, when compared to methane produced by populations incubated similarly with alfalfa (70.4 ± 3.6 µmol/ml incubation fluid). Accumulations of hydrogen, which are typically increased when methane production is inhibited, by incubations with the nitrate-containing barley and the NPA- and NPOH-containing milkvetches did not differ from accumulations observed in the alfalfa controls (0.09 ± 0.04 µmol/mL incubation fluid). Accumulations of fermentation acids produced in the incubations containing the high-nitrate barley and the NPA- and NPOH-containing milkvetches likewise did not differ from accumulations observed in incubations containing alfalfa (123.5 ± 10.8, 36.0 ± 3.0, 17.1 ± 1.5, 3.5 ± 0.3, 2.3 ± 0.2, 2.2 ± 0.2 µmol/mL incubation fluid for acetate, propionate, butyrate, valerate, isobutyrate, and isovalerate, respectively). This finding indicates the microbial populations did not compensate for the decreased methane production via compensatory changes in production of fermentative acids. Stoichiometric estimation of fermentation balance revealed that > 77% of reducing equivalents generated during fermentation of the forages were recovered in fermentation products and the recoveries did not differ between the alfalfa incubations and those with the high-nitrate barley or the NPA- or NPOH-containing milkvetches. Stoichiometric estimates of amounts of hexose fermented similarly did not differ between the nitrate-, NPA and NPOH-containing incubations and those with the alfalfa, averaging 99.6 ± 37.2 µmol hexose consumed/mL of incubation fluid. These results suggest that forages containing nitrate, NPA or NPOH may be useful to reduce methane emissions of grazing ruminants provided risks of toxicity can be effectively managed.

Keywords: nitrate, nitropropanol, nitropropionic acid, rumen methane emissions

Procedia PDF Downloads 128
885 Low-Cost Robotic-Assisted Laparoscope

Authors: Ege Can Onal, Enver Ersen, Meltem Elitas

Abstract:

Laparoscopy is a surgical operation, well known as keyhole surgery. The operation is performed through small holes, hence, scars of a patient become much smaller, patients can recover in a short time and the hospital stay becomes shorter in comparison to an open surgery. Several tools are used at laparoscopic operations; among them, the laparoscope has a crucial role. It provides the vision during the operation, which will be the main focus in here. Since the operation area is very small, motion of the surgical tools might be limited in laparoscopic operations compared to traditional surgeries. To overcome this limitation, most of the laparoscopic tools have become more precise, dexterous, multi-functional or automated. Here, we present a robotic-assisted laparoscope that is controlled with pedals directly by a surgeon. Thus, the movement of the laparoscope might be controlled better, so there will not be a need to calibrate the camera during the operation. The need for an assistant that controls the movement of the laparoscope will be eliminated. The duration of the laparoscopic operation might be shorter since the surgeon will directly operate the camera.

Keywords: laparoscope, laparoscopy, low-cost, minimally invasive surgery, robotic-assisted surgery

Procedia PDF Downloads 342
884 The Role of ALDH2 Genotypes in Bipolar II Disorder Comorbid with Anxiety Disorder

Authors: Yun-Hsuan Chang, Chih-Chun Huang, Ru-Band Lu

Abstract:

Dopamine, metabolized to 3,4-dihydroxyphenylacetic acid (DOPAC) by aldehyde dehydrogenase 2 (ALDH2), ALDH2*1/*1, and ALDH2*1/*2+ALDH*2/*2 equally carried in Han Chinese. The relationship between dopamine metabolic enzyme and cognitive performance in bipolar II disorder comorbid with anxiety disorder (AD) remains unclear. This study proposed to explore the association between ALDH2 polymorphisms, anxiety comorbidity in bipolar II disorder. One hundred and ninety-seven BPII with or without AD comorbidity were recruited and compared with 130 Health controls (HC). A polymerase chain reaction and restriction fragment length polymorphism analysis was used to determine genotypes for ALDH2, and neuropsychological battery was performed. Two factor analyses with AD comorbidity and ALDH2 showed a significant main effect of ALDH2 on attention and marginally significant interaction between AD and ALDH2 memory performance. The ALDH2 polymorphisms may play a different role in the neuropsychological performance on varied neuropsychological performance in BPII comorbid with and without AD.

Keywords: anxiety disorder, bipolar II disorder, comorbidity, genetic

Procedia PDF Downloads 635
883 Effect of Crude oil Contamination on the Morphological Traits and Protein Content of Avicennia Marina

Authors: Babak Moradi, Hassan Zare-Maivan

Abstract:

A greenhouse investigation has been conducted to study the effect of crude oil on morphology and protein content of Avicennia marina plant. Avicennia marina seeds were sown in different concentrations of the crude oil mixed soil (i.e., 2.5, 5, 7.5, and 10 w/w). Controls and replicates were also set up. Morphological traits were recorded 4 months after plantation. Avicennia marina seedlings could tolerate up to 10% (w/w). Results demonstrated that there was a reduction in plant shoot and root biomass with the increase of crude oil concentration. Plant height, total leaf number and length reduced significantly with increase of crude oil contamination. Investigation revealed that there is a great impact of crude oil contamination on protein content of the roots of the experimental plant. Protein content of roots grown in different concentrations of crude oil were more than those of the control plant. Further, results also showed that protein content was increased with increased concentration of crude oil.

Keywords: Avicennia marina, morphology, oil contamination, protein content

Procedia PDF Downloads 376
882 A Low Insertion Loss Variation 10-35 GHz Phase Shifter

Authors: Soroush Rasti Boroujeni, S. Hassan Mousavi, Javad Ebrahimizadeh, Ardeshir Palizban, Mohammad-Reza Nezhad-Ahmadi, Safieddin Safavi-Naeini

Abstract:

This paper presents a wideband True Time Delay (TTD) phase shifter with low insertion loss variation. The circuit benefits from a controllable resistive load shunt with transmission line segments to optimize return loss variations, addressing the unbalanced capacitive nature of the varactor. The phase shifter reduces the complexity of the calibration process because the dependency of insertion loss on voltage controls is improved up to 3 dB. The TTD phase shifter provides a continuous changing delay time of 6.4 ps with low insertion loss (IL) in the 10-35 GHz frequency range. The proposed circuit benefits from lowloss phase shifters with a small footprint. Fabricated using a 65 nm CMOC process, the TTD phase shifter occupies only 388 × 615 µm 2 of chip area, achieving a 20% improvements compared to conventional TTD phase shifters.

Keywords: millimeter-wave phased-array, true time delay phase shifter, insertion loss variation, compact size

Procedia PDF Downloads 7
881 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 312
880 Optical Vortex in Asymmetric Arcs of Rotating Intensity

Authors: Mona Mihailescu, Rebeca Tudor, Irina A. Paun, Cristian Kusko, Eugen I. Scarlat, Mihai Kusko

Abstract:

Specific intensity distributions in the laser beams are required in many fields: optical communications, material processing, microscopy, optical tweezers. In optical communications, the information embedded in specific beams and the superposition of multiple beams can be used to increase the capacity of the communication channels, employing spatial modulation as an additional degree of freedom, besides already available polarization and wavelength multiplexing. In this regard, optical vortices present interest due to their potential to carry independent data which can be multiplexed at the transmitter and demultiplexed at the receiver. Also, in the literature were studied their combinations: 1) axial or perpendicular superposition of multiple optical vortices or 2) with other laser beam types: Bessel, Airy. Optical vortices, characterized by stationary ring-shape intensity and rotating phase, are achieved using computer generated holograms (CGH) obtained by simulating the interference between a tilted plane wave and a wave passing through a helical phase object. Here, we propose a method to combine information through the reunion of two CGHs. One is obtained using the helical phase distribution, characterized by its topological charge, m. The other is obtained using conical phase distribution, characterized by its radial factor, r0. Each CGH is obtained using plane wave with different tilts: km and kr for CGH generated from helical phase object and from conical phase object, respectively. These reunions of two CGHs are calculated to be phase optical elements, addressed on the liquid crystal display of a spatial light modulator, to optically process the incident beam for investigations of the diffracted intensity pattern in far field. For parallel reunion of two CGHs and high values of the ratio between km and kr, the bright ring from the first diffraction order, specific for optical vortices, is changed in an asymmetric intensity pattern: a number of circle arcs. Both diffraction orders (+1 and -1) are asymmetrical relative to each other. In different planes along the optical axis, it is observed that this asymmetric intensity pattern rotates around its centre: in the +1 diffraction order the rotation is anticlockwise and in the -1 diffraction order, the rotation is clockwise. The relation between m and r0 controls the diameter of the circle arcs and the ratio between km and kr controls the number of arcs. For perpendicular reunion of the two CGHs and low values of the ratio between km and kr, the optical vortices are multiplied and focalized in different planes, depending on the radial parameter. The first diffraction order contains information about both phase objects. It is incident on the phase masks placed at the receiver, computed using the opposite values for topological charge or for the radial parameter and displayed successively. In all, the proposed method is exploited in terms of constructive parameters, for the possibility offered by the combination of different types of beams which can be used in robust optical communications.

Keywords: asymmetrical diffraction orders, computer generated holograms, conical phase distribution, optical vortices, spatial light modulator

Procedia PDF Downloads 310
879 Hydrometallurgical Treatment of Abu Ghalaga Ilmenite Ore

Authors: I. A. Ibrahim, T. A. Elbarbary, N. Abdelaty, A. T. Kandil, H. K. Farhan

Abstract:

The present work aims to study the leaching of Abu Ghalaga ilmenite ore by hydrochloric acid and simultaneous reduction by iron powder method to dissolve its titanium and iron contents. Iron content in the produced liquor is separated by solvent extraction using TBP as a solvent. All parameters affecting the efficiency of the dissolution process were separately studied including the acid concentration, solid/liquid ratio which controls the ilmenite/acid molar ratio, temperature, time and grain size. The optimum conditions at which maximum leaching occur are 30% HCl acid with a solid/liquid ratio of 1/30 at 80 °C for 4 h using ore ground to -350 mesh size. At the same time, all parameters affecting on solvent extraction and stripping of iron content from the produced liquor were studied. Results show that the best extraction is at solvent/solution 1/1 by shaking at 240 RPM for 45 minutes at 30 °C whereas best striping of iron at H₂O/solvent 2/1.

Keywords: ilmenite ore, leaching, titanium solvent extraction, Abu Ghalaga ilmenite ore

Procedia PDF Downloads 290
878 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 47
877 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 319
876 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 76
875 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 328
874 Inhibitory Effects of Ambrosia trifida L. on the Development of Root Hairs and Protein Patterns of Radicles

Authors: Ji-Hyon Kil, Kew-Cheol Shim, Kyoung-Ae Park, Kyoungho Kim

Abstract:

Ambrosia trifida L. is designated as invasive alien species by the Act on the Conservation and Use of Biodiversity by the Ministry of Environment, Korea. The purpose of present paper was to investigate the inhibitory effects of aqueous extracts of A.trifida on the development of root hairs of Triticum aestivum L., and Allium tuberosum Rottler ex Spreng and the electrophoretic protein patterns of their radicles. The development of root hairs was inhibited by increasing of aqueous extract concentrations. Through SDS-PAGE, the electrophoretic protein bands of extracted proteins from their radicles were appeared in controls, but protein bands of specific molecular weight disappeared or weakened in treatments. In conclusion, inhibitory effects of A. trifida made two receptor species changed morphologically, and at the molecular level in early growth stage.

Keywords: Ambrosia trifida L., invasive alien species, inhibitory effect, root hair, electrophoretic protein, radicle

Procedia PDF Downloads 360
873 Functional Mortality of Anopheles stephensi, the Urban Malaria Vector as Induced by the Sublethal Exposure to Deltamethrin

Authors: P. Aarumugam, N. Krishnamoorthy, K. Gunasekaran

Abstract:

The mosquitoes with loss of minimum three legs especially the hind legs have the negative impact on the survival hood of mosquitoes. Three days old unfed adult female laboratory strain was selected in each generation against sublethal dosages (0.004%, 0.005%, 0.007% and 0.01%) of deltamethrin upto 40 generations. Impregnated papers with acetone were used for control. Every fourth generation, survived mosquitoes were observed for functional mortality. Hind legs lost were significantly (P< 0.05) higher in treated than the controls up to generation 24, thereafter no significant lost. In contrary, no significant forelegs lost among exposed mosquitoes. Middle legs lost were also not significant in the exposed mosquitoes except first generation (F1). The field strain (Chennai) did not show any significant loss of legs (fore or mid or hind) compared to the control. The selection pressure on mosquito population influences strong natural selection to develop various adaptive mechanisms.

Keywords: Anopheles stephensi, deltamethrin, functional mortality, synthetic pyrethroids

Procedia PDF Downloads 396
872 Modern Technology-Based Methods in Neurorehabilitation for Social Competence Deficit in Children with Acquired Brain Injury

Authors: M. Saard, A. Kolk, K. Sepp, L. Pertens, L. Reinart, C. Kööp

Abstract:

Introduction: Social competence is often impaired in children with acquired brain injury (ABI), but evidence-based rehabilitation for social skills has remained undeveloped. Modern technology-based methods create effective and safe learning environments for pediatric social skills remediation. The aim of the study was to implement our structured model of neuro rehab for socio-cognitive deficit using multitouch-multiuser tabletop (MMT) computer-based platforms and virtual reality (VR) technology. Methods: 40 children aged 8-13 years (yrs) have participated in the pilot study: 30 with ABI -epilepsy, traumatic brain injury and/or tic disorder- and 10 healthy age-matched controls. From the patients, 12 have completed the training (M = 11.10 yrs, SD = 1.543) and 20 are still in training or in the waiting-list group (M = 10.69 yrs, SD = 1.704). All children performed the first individual and paired assessments. For patients, second evaluations were performed after the intervention period. Two interactive applications were implemented into rehabilitation design: Snowflake software on MMT tabletop and NoProblem on DiamondTouch Table (DTT), which allowed paired training (2 children at once). Also, in individual training sessions, HTC Vive VR device was used with VR metaphors of difficult social situations to treat social anxiety and train social skills. Results: At baseline (B) evaluations, patients had higher deficits in executive functions on the BRIEF parents’ questionnaire (M = 117, SD = 23.594) compared to healthy controls (M = 22, SD = 18.385). The most impaired components of social competence were emotion recognition, Theory of Mind skills (ToM), cooperation, verbal/non-verbal communication, and pragmatics (Friendship Observation Scale scores only 25-50% out of 100% for patients). In Sentence Completion Task and Spence Anxiety Scale, the patients reported a lack of friends, behavioral problems, bullying in school, and social anxiety. Outcome evaluations: Snowflake on MMT improved executive and cooperation skills and DTT developed communication skills, metacognitive skills, and coping. VR, video modelling and role-plays improved social attention, emotional attitude, gestural behaviors, and decreased social anxiety. NEPSY-II showed improvement in Affect Recognition [B = 7, SD = 5.01 vs outcome (O) = 10, SD = 5.85], Verbal ToM (B = 8, SD = 3.06 vs O = 10, SD = 4.08), Contextual ToM (B = 8, SD = 3.15 vs O = 11, SD = 2.87). ToM Stories test showed an improved understanding of Intentional Lying (B = 7, SD = 2.20 vs O = 10, SD = 0.50), and Sarcasm (B=6, SD = 2.20 vs O = 7, SD = 2.50). Conclusion: Neurorehabilitation based on the Structured Model of Neurorehab for Socio-Cognitive Deficit in children with ABI were effective in social skills remediation. The model helps to understand theoretical connections between components of social competence and modern interactive computerized platforms. We encourage therapists to implement these next-generation devices into the rehabilitation process as MMT and VR interfaces are motivating for children, thus ensuring good compliance. Improving children’s social skills is important for their and their families’ quality of life and social capital.

Keywords: acquired brain injury, children, social skills deficit, technology-based neurorehabilitation

Procedia PDF Downloads 120
871 Determinants of Multidrug-Resistant Tuberculosis in Patients Who Underwent First-Line Treatment in Addis Ababa: A Case Control Study

Authors: Selamawit Hirpa, Girmay Medhin, Belaineh Girma, Muluken Melese, Alemayehu Mekonen, Pedro Suarez, Gobena Ameni

Abstract:

Worldwide, there were 650,000 multi-drug resistant tuberculosis (MDR-TB) cases in 2010. Ethiopia is 15th among the 27 MDR-TB high-burden countries. A case control study was conducted at St. Peter Hospital and five health centers in Addis Ababa. Cases were MDR-TB patients who were in treatment at St. Peter Hospital during the study period. Controls were patients who were on first-line anti-TB treatment and were registered as cured or having completed treatment in the period 9 April 2009– 28 February 2010, in five health centers. A structured interview questionnaire was used to assess factors that could potentially be associated with the occurrence of MDR-TB. Factors that were significantly associated with MDR-TB: drug side effects during first-line treatment (adjusted odds ratio (AOR): 4.5, 95% CI; 1.9 - 10.5); treatment not directly observed by a health worker (AOR = 11.7, 95% CI; 4–34.3); and retreatment with the Category II regimen (P = 0.000).

Keywords: adherence to TB treatment, MDR-TB, TB treatment, TB treatment regimens

Procedia PDF Downloads 501
870 Attachment and Emotion Regulation among Adults with versus without Somatic Symptom Disorder

Authors: Natalia Constantinescu

Abstract:

This cross-sectional study aims to explore the differences among adults with somatic symptom disorder (SSD) versus adults without SSD in terms of attachment and emotion regulation strategies. A total sample of 80 participants (40 people with SSD and 40 healthy controls), aged 20-57 years old (M = 31.69, SD = 10.55), were recruited from institutions and online groups. They completed the Romanian version of the Experiences in Close Relationships Scale – Short Form (ECR-S), Regulation of Emotion Systems Survey (RESS), Patient Health Questionnaire-15 (PHQ-15) and Somatic Symptom Disorder – B Criteria Scale (SSD-12). The results indicate significant differences between the two groups in terms of attachment and emotion regulation strategies. Adults with SSD have a higher level of attachment anxiety and avoidance compared to the nonclinical group. Moreover, people with SSD are more prone to use rumination and suppression and less prone to use reevaluation compared to healthy people. Implications for SSD prevention and treatment are discussed.

Keywords: adult attachment, emotion regulation strategies, psychosomatic disorders, somatic symptom disorder

Procedia PDF Downloads 254
869 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 482
868 Impact of Obesity on Female Fertility

Authors: A. Chennai, M. Yahia, H. Boussenan

Abstract:

Our study was designed to highlight changes in certain biochemical parameters such as (CH, TG, HDL, TGO, TGP, LDL, and CRP), hormones (FSH, LH, PRL, TSH, and leptin), in women who suffer from over weight and fertile controls as well as the research for potential pathophysiological link between obesity and infertility in this population of women. This practical work has been focused on a population of 24 over weight infertile women, compared to control subjects without any pathology causing disturbance parameters to be studied to determine the contribution of obesity in the etiology of infertility. The assay results revealed a highly significant difference between the two groups in the serum levels of CH, TG, HDL, and TGO TGP (P <0.0001) as well as the rate of LDL (p=0.0017) and CRP (p=0.02). Hormonal profile also shows a significant difference between the two groups (P<0.0001) for LH and leptin but no difference was found for serum TSH. A significant correlation between leptin and FSH, LH, and FSH, age and LH, PRL and age and between HDL and CRP. The present study suggests that obesity is associated with infertility, but no direct pathophysiological link between obesity and infertility has been determined. More in-depth studies are needed to determine the exact mechanism by which overweight leads to female infertility.

Keywords: fertility, obesity, hormones, biochemical, pathophysiological

Procedia PDF Downloads 412
867 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 437
866 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 268
865 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims

Authors: F. Zamani Ashni, P. Gerber

Abstract:

In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.

Keywords: Australia, discrimination, Islamophobia, Muslim

Procedia PDF Downloads 133