Search results for: cyber attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 867

Search results for: cyber attack

147 Impacts of Ibeju - Lekki New Town on Neighbouring Residents of Ibeju, Lagos Nigeria

Authors: Abolade Olajoke, Adigun Folasade Oyenike, Odunjo Oluronke Omolola Olaleye, Babajide Rotimi

Abstract:

Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%). Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment. Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%) Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment.

Keywords: new town, urbanization, infrastructure boundary

Procedia PDF Downloads 390
146 Multi-Functional Metal Oxides as Gas Sensors, Photo-Catalysts and Bactericides

Authors: Koyar Rane

Abstract:

Nano- to submicron size particles of narrow particle size distribution of semi-conducting TiO₂, ZnO, NiO, CuO, Fe₂O₃ have been synthesized by novel hydrazine method and tested for their gas sensing, photocatalytic and bactericidal activities and the behavior found to be enhanced when the oxides in the thin film forms, that obtained in a specially built spray pyrolysis reactor. Hydrazine method is novel in the sense, say, the UV absorption edge of the white pigment grade wide band gap (~3.2eV) TiO₂ and ZnO shifted to the visible region turning into yellowish particles, indicating modification occurring the band structure. The absorption in the visible region makes these oxides visible light sensitive photocatalysis in degrading pollutants, especially the organic dyes which otherwise increase the chemical oxygen demand of the drinking water, enabling the process feasible not under the harsh energetic UV radiation regime. The electromagnetic radiations on irradiation produce electron-hole pairs Semiconductor + hν → e⁻ + h⁺ The electron-hole pairs thus produced form Reactive Oxygen Species, ROS, on the surface of the semiconductors, O₂(adsorbed)+e⁻ → O₂• - superoxide ion OH-(surface)+h⁺ →•OH - Hydroxyl radical The ROS attack the organic material and micro-organisms. Our antibacterial studies indicate the metal oxides control the Biological Oxygen Demand (BOD) of drinking water which had beyond the safe level normally found in the municipal supply. Metal oxides in the thin film form show overall enhanced properties and the films are reusable. The results of the photodegradation and antibactericidal studies are discussed. Gas sensing studies too have been done to find the versatility of the multifunctional metal oxides.

Keywords: hydrazine method, visible light sensitive, photo-degradation of dyes, water/airborne pollutant

Procedia PDF Downloads 142
145 Using Digital Innovations to Increase Awareness and Intent to Use Depo-Medroxy Progesterone Acetate-Subcutaneous Contraception among Women of Reproductive Age in Nigeria, Uganda, and Malawi

Authors: Oluwaseun Adeleke, Samuel O. Ikani, Fidelis Edet, Anthony Nwala, Mopelola Raji, Simeon Christian Chukwu

Abstract:

Introduction: Digital innovations have been useful in supporting a client’s contraceptive user journey from awareness to method initiation. The concept of contraceptive self-care is being promoted globally as a means for achieving universal access to quality contraceptive care; however, information about this approach is limited. An important determinant of the scale of awareness is the message construct, choice of information channel, and an understanding of the socio-epidemiological dynamics within the target audience. Significant gains have been made recently in expanding the awareness base of DMPA-SC -a relatively new entrant into the family planning method mix. The cornerstone of this success is a multichannel promotion campaign themed Discover your Power (DYP). The DYP campaign combines content marketing across select social media platforms, chatbots, Cyber-IPC, Interactive Voice Response (IVR), and radio campaigns. Methodology: During implementation, the project monitored predefined metrics of awareness and intent, such as the number of persons reached with the messages, the number of impressions, and meaningful engagement (link-clicks). Metrics/indicators are extracted through native insight/analytics tools across the various platforms. The project also enlists community mobilizers (CMs) who go door-to-door and engage WRA to advertise DISC’s online presence and support them to engage with IVR, digital companion (chatbot), Facebook page, and DiscoverYourPower website. Results: The result showed that the digital platforms recorded 242 million impressions and reached 82 million users with key DMPA-SC self-injection messaging in the three countries. As many as 3.4 million persons engaged (liked, clicked, shared, or reposted) digital posts -an indication of intention. Conclusion: Digital solutions and innovations are gradually becoming the archetype for the advancement of the self-care agenda. Digital innovations can also be used to increase awareness and normalize contraceptive self-care behavior amongst women of reproductive age if they are made an integral part of reproductive health programming.

Keywords: digital transformation, health systems, DMPA-SC, family planning, self-care

Procedia PDF Downloads 63
144 Quality and Qualitative Education for All, Panacea for Insecurity and Political Unrest in Nigeria

Authors: Babatunde Joel Todowede

Abstract:

It is a public knowledge that lack of quality and qualitative education breeds problems besetting Nigeria as a nation today. This paper entitled “Quality and Qualitative Education for all, panacea for insecurity and political unrest in Nigeria” seeks to explore how quality and qualitative education for all will tends to put an end to insecurity and political unrest in Nigeria as a Nation. It may be pertinent to note at this juncture that the development of any modern society or nation is primarily hinged on the functionality of its educational system. There is no developed nation in the world today, which does not owe its advancement to quality and qualitative education. In other words, Education is a vital instrument in the nation’s economic competitiveness, in its people, and in its communities. Hence, Education is not luxury to be cut in difficult economic times – it is an essential element of growth. In fact, education is the bedrock of any society that hopes to be numbered among the developed economies in the world. Nigeria, as a nation, has made continual efforts to assume its rightful place in education on the African continent, but has not been quite lucky. Interestingly however, Quality and Qualitative Education for all will come about if all stakeholders in the Education Sector perform their roles with skill and efficiency. Education is a very sensitive area, hence, needs to be passionate about education, and focused on building a future for the sector.” Quality and qualitative education instill significant core values in every student, which shape them into mature, caring and independent individuals. These values include commitment, collaboration, integrity, responsibility and respect. By imbibing these values in every aspect of their life, they are able to contribute their skills and talents while supporting each other in attaining their lifelong goals. This paper identified lack of proper education as the bane of insecurity and political unrest in the Country and urged the government to review the policy in a way that there will be quality and standard to check insurgency in the Country. More so, until the fallen standard of education in Nigeria is fixed to engage out of school children, the incessant attack on innocent Nigerians, particularly in the North East may get worse.

Keywords: quality and qualitative education, panacea, insecurity, political unrest

Procedia PDF Downloads 441
143 CyberSteer: Cyber-Human Approach for Safely Shaping Autonomous Robotic Behavior to Comply with Human Intention

Authors: Vinicius G. Goecks, Gregory M. Gremillion, William D. Nothwang

Abstract:

Modern approaches to train intelligent agents rely on prolonged training sessions, high amounts of input data, and multiple interactions with the environment. This restricts the application of these learning algorithms in robotics and real-world applications, in which there is low tolerance to inadequate actions, interactions are expensive, and real-time processing and action are required. This paper addresses this issue introducing CyberSteer, a novel approach to efficiently design intrinsic reward functions based on human intention to guide deep reinforcement learning agents with no environment-dependent rewards. CyberSteer uses non-expert human operators for initial demonstration of a given task or desired behavior. The trajectories collected are used to train a behavior cloning deep neural network that asynchronously runs in the background and suggests actions to the deep reinforcement learning module. An intrinsic reward is computed based on the similarity between actions suggested and taken by the deep reinforcement learning algorithm commanding the agent. This intrinsic reward can also be reshaped through additional human demonstration or critique. This approach removes the need for environment-dependent or hand-engineered rewards while still being able to safely shape the behavior of autonomous robotic agents, in this case, based on human intention. CyberSteer is tested in a high-fidelity unmanned aerial vehicle simulation environment, the Microsoft AirSim. The simulated aerial robot performs collision avoidance through a clustered forest environment using forward-looking depth sensing and roll, pitch, and yaw references angle commands to the flight controller. This approach shows that the behavior of robotic systems can be shaped in a reduced amount of time when guided by a non-expert human, who is only aware of the high-level goals of the task. Decreasing the amount of training time required and increasing safety during training maneuvers will allow for faster deployment of intelligent robotic agents in dynamic real-world applications.

Keywords: human-robot interaction, intelligent robots, robot learning, semisupervised learning, unmanned aerial vehicles

Procedia PDF Downloads 244
142 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 345
141 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 119
140 Bio–efficacy of Selected Plant extracts and Cypermethrin on Growth and Yield of Cowpea (Vigna unguiculata L.).

Authors: Akanji Kayode Ayanwusi., Akanji Elizabeth Nike, Bidmos Fuad Adetunji, Oladapo Olufemi Stephen

Abstract:

This experiment was conducted in Igboora, southwest Nigeria during the year 2022 planting season to determine the bio-efficacy of plant extracts (Jatropha curcas and Petiveria alliacea) and synthetic (Cypermethrin) insecticides against the insect pest of cowpea (Vigna unguiculata L.) and to determine its effect on the growth and yield of cowpea in the study area. Cowpea is one of the most important food and forage legumes in the semi-arid tropics. It is grown in 45 countries worldwide, including parts of Africa, Asia, Southern Europe, the Southern United States, and Central and South America. Cowpea production is considered too risky an enterprise by many growers because of its numerous pest problems. The treatments for the experiment consisted of two aqueous plant extracts (J.curcas and P. alliacea) at 50 /0 w/v and Cypermethrin 400 EC replicated three times including control in a randomized complete block design. Each plot measured 2.0 m by 2.0 m with 1.0 m inter-spaced per adjacent plot. The results from the study showed that different insect pests attack cowpea at different stages of growth. The insects observed were Bemisa tabaci, Callosobruchus maculatus, Megalurothrips sjostedti, and Maruca vitrata. High yields were obtained from plots treated with P. alliacea and synthetic insecticide (cypermethrin). J. curcas also produced optimum yield but lower than P. alliacea also P. alliacea treated plots had the least damaged pods while the untreated plots had the highest damaged pods, the plants extracts exhibited high insecticidal activities in this study, therefore P. alliacea leaves formulated as an insecticide is recommended for the control of insect pests of cowpea in the study area.

Keywords: plant extracts, yield, cypermethrin., cowpea

Procedia PDF Downloads 50
139 Numerical Investigation of Dynamic Stall over a Wind Turbine Pitching Airfoil by Using OpenFOAM

Authors: Mahbod Seyednia, Shidvash Vakilipour, Mehran Masdari

Abstract:

Computations for two-dimensional flow past a stationary and harmonically pitching wind turbine airfoil at a moderate value of Reynolds number (400000) are carried out by progressively increasing the angle of attack for stationary airfoil and at fixed pitching frequencies for rotary one. The incompressible Navier-Stokes equations in conjunction with Unsteady Reynolds Average Navier-Stokes (URANS) equations for turbulence modeling are solved by OpenFOAM package to investigate the aerodynamic phenomena occurred at stationary and pitching conditions on a NACA 6-series wind turbine airfoil. The aim of this study is to enhance the accuracy of numerical simulation in predicting the aerodynamic behavior of an oscillating airfoil in OpenFOAM. Hence, for turbulence modelling, k-ω-SST with low-Reynolds correction is employed to capture the unsteady phenomena occurred in stationary and oscillating motion of the airfoil. Using aerodynamic and pressure coefficients along with flow patterns, the unsteady aerodynamics at pre-, near-, and post-static stall regions are analyzed in harmonically pitching airfoil, and the results are validated with the corresponding experimental data possessed by the authors. The results indicate that implementing the mentioned turbulence model leads to accurate prediction of the angle of static stall for stationary airfoil and flow separation, dynamic stall phenomenon, and reattachment of the flow on the surface of airfoil for pitching one. Due to the geometry of the studied 6-series airfoil, the vortex on the upper surface of the airfoil during upstrokes is formed at the trailing edge. Therefore, the pattern flow obtained by our numerical simulations represents the formation and change of the trailing-edge vortex at near- and post-stall regions where this process determines the dynamic stall phenomenon.

Keywords: CFD, moderate Reynolds number, OpenFOAM, pitching oscillation, unsteady aerodynamics, wind turbine

Procedia PDF Downloads 182
138 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 88
137 Gendering the Political Crisis in Hong Kong: A Cultural Analysis of Spectatorship on Marvel Superhero Movies in Hong Kong

Authors: Chi S. Lee

Abstract:

Marvel superhero movies have obtained its unprecedented popularity around the globe. It is a dominant narrative in current scholarship on superhero studies that the political trauma of America, such as attack of September 11, and the masculinity represented in superhero genre are symbolically connected in a way of remasculinization, a standardized plot that before becoming a superhero, a man has to overcome its trauma in his life. Through this standardized plot, American audience finds their pleasure in the spectatorship of equating this plot of remasculinization with the situation of America, rewriting their traumatic memory and resolving around the economic, social, political, and psychological instability of precarity in their own context. Shifting the context to Hong Kong, where Marvel superhero movies have been reaching its dominant status in the local film market, this analysis finds its limitation in explaining the connection between text and context. This article aims to retain this connection through investigation of the Hong Kong audience’s spectatorship. It is argued that the masculinity represented in Marvel superhero movies no longer fits into the stereotypical image of superhero, but presents itself in crisis. This crisis is resolved by the technological excess of the superpower, namely, technological remasculinization. The technological remasculinization offers a sense of futurity through which it is felt that this remasculinization can be achieved in the foreseeable future instead of remaining imaginary and fictional. In this way, the political crisis of Hong Kong is gendered as masculinity in crisis which is worth being remasculinized in the future. This gendering process is a historical product as the symbolic equation between politics and masculinity has for long been encoded in the colonial history of Hong Kong. In short, Marvel superhero’s masculinity offers a sense of masculine hope for the Hong Kong audiences to overcome the political crisis they confront in reality through a postponed identification with the superhero’s masculinity. After the discussion of the Hong Kong audience’s spectatorship on Marvel superhero movies with the insights casted by spectatorship theory, above idea is generated.

Keywords: political crisis in Hong Kong, Marvel superhero movies, spectatorship, technological remasculinization

Procedia PDF Downloads 262
136 Advantages of Neural Network Based Air Data Estimation for Unmanned Aerial Vehicles

Authors: Angelo Lerro, Manuela Battipede, Piero Gili, Alberto Brandl

Abstract:

Redundancy requirements for UAV (Unmanned Aerial Vehicle) are hardly faced due to the generally restricted amount of available space and allowable weight for the aircraft systems, limiting their exploitation. Essential equipment as the Air Data, Attitude and Heading Reference Systems (ADAHRS) require several external probes to measure significant data as the Angle of Attack or the Sideslip Angle. Previous research focused on the analysis of a patented technology named Smart-ADAHRS (Smart Air Data, Attitude and Heading Reference System) as an alternative method to obtain reliable and accurate estimates of the aerodynamic angles. This solution is based on an innovative sensor fusion algorithm implementing soft computing techniques and it allows to obtain a simplified inertial and air data system reducing external devices. In fact, only one external source of dynamic and static pressures is needed. This paper focuses on the benefits which would be gained by the implementation of this system in UAV applications. A simplification of the entire ADAHRS architecture will bring to reduce the overall cost together with improved safety performance. Smart-ADAHRS has currently reached Technology Readiness Level (TRL) 6. Real flight tests took place on ultralight aircraft equipped with a suitable Flight Test Instrumentation (FTI). The output of the algorithm using the flight test measurements demonstrates the capability for this fusion algorithm to embed in a single device multiple physical and virtual sensors. Any source of dynamic and static pressure can be integrated with this system gaining a significant improvement in terms of versatility.

Keywords: aerodynamic angles, air data system, flight test, neural network, unmanned aerial vehicle, virtual sensor

Procedia PDF Downloads 197
135 Nationalization of the Social Life in Argentina: Accumulation of Capital, State Intervention, Labor Market, and System of Rights in the Last Decades

Authors: Mauro Cristeche

Abstract:

This work begins with a very simple question: How does the State spend? Argentina is witnessing a process of growing nationalization of social life, so it is necessary to find out the explanations of the phenomenon on the specific dynamic of the capitalist mode of production in Argentina and its transformations in the last decades. Then the new question is: what happened in Argentina that could explain this phenomenon? Since the seventies, the capital growth in Argentina faces deep competitive problems. Until that moment the agrarian wealth had worked as a compensation mechanism, but it began to find its limits. In the meantime, some important demographical and structural changes had happened. The strategy of the capitalist class had to become to seek in the cheapness of the labor force the main source of compensation of its weakness. As a result, a tendency to worsen the living conditions and fragmentation of the working class started to develop, manifested by unemployment, underemployment, and the fall of the purchasing power of the salary as a highlighted fact. As a consequence, it is suggested that the role of the State became stronger and public expenditure increased, as a historical trend, because it has to intervene to face the contradictions and constant growth problems posed by the development of capitalism in Argentina. On the one hand, the State has to guarantee the process of buying the cheapened workforce and at the same time the process of reproduction of the working class. On the other hand, it has to help to reproduce the individual capitals but needs to ‘attack’ them in different ways. This is why the role of the State is said to be the general political representative to the national portion of the total social capital. What will be studied is the dynamic of the intervention of the Argentine State in the context of the particular national process of capital growth, and its dynamics in the last decades. What this paper wants to show are the main general causes that could explain the phenomenon of nationalization of the social life and how it has impacted the life conditions of the working class and the system of rights.

Keywords: Argentina, nationalization, public policies, rights, state

Procedia PDF Downloads 115
134 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society

Authors: Ada Yurman

Abstract:

Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.

Keywords: militarism, political deviance, social construction, social control

Procedia PDF Downloads 97
133 Flow-Control Effectiveness of Convergent Surface Indentations on an Aerofoil at Low Reynolds Numbers

Authors: Neel K. Shah

Abstract:

Passive flow control on aerofoils has largely been achieved through the use of protrusions such as vane-type vortex generators. Consequently, innovative flow-control concepts should be explored in an effort to improve current component performance. Therefore, experimental research has been performed at The University of Manchester to evaluate the flow-control effectiveness of a vortex generator made in the form of a surface indentation. The surface indentation has a trapezoidal planform. A spanwise array of indentations has been applied in a convergent orientation around the maximum-thickness location of the upper surface of a NACA-0015 aerofoil. The aerofoil has been tested in a two-dimensional set-up in a low-speed wind tunnel at an angle of attack (AoA) of 3° and a chord-based Reynolds number (Re) of ~2.7 x 105. The baseline model has been found to suffer from a laminar separation bubble at low AoA. The application of the indentations at 3° AoA has considerably shortened the separation bubble. The indentations achieve this by shedding up-flow pairs of streamwise vortices. Despite the considerable reduction in bubble length, the increase in leading-edge suction due to the shorter bubble is limited by the removal of surface curvature and blockage (increase in surface pressure) caused locally by the convergent indentations. Furthermore, the up-flow region of the vortices, which locally weakens the pressure recovery around the trailing edge of the aerofoil by thickening the boundary layer, also contributes to this limitation. Due to the conflicting effects of the indentations, the changes in the pressure-lift and pressure-drag coefficients, i.e., cl,p and cd,p, are small. Nevertheless, the indentations have improved cl,p and cd,p beyond the uncertainty range, i.e., by ~1.30% and ~0.30%, respectively, at 3° AoA. The wake measurements show that turbulence intensity and Reynolds stresses have considerably increased in the indented case, thus implying that the indentations increase the viscous drag on the model. In summary, the convergent indentations are able to reduce the size of the laminar separation bubble, but conversely, they are not highly effective in reducing cd,p at the tested Reynolds number.

Keywords: aerofoil flow control, laminar separation bubbles, low Reynolds-number flows, surface indentations

Procedia PDF Downloads 212
132 Power Performance Improvement of 500W Vertical Axis Wind Turbine with Salient Design Parameters

Authors: Young-Tae Lee, Hee-Chang Lim

Abstract:

This paper presents the performance characteristics of Darrieus-type vertical axis wind turbine (VAWT) with NACA airfoil blades. The performance of Darrieus-type VAWT can be characterized by torque and power. There are various parameters affecting the performance such as chord length, helical angle, pitch angle and rotor diameter. To estimate the optimum shape of Darrieustype wind turbine in accordance with various design parameters, we examined aerodynamic characteristics and separated flow occurring in the vicinity of blade, interaction between flow and blade, and torque and power characteristics derived from it. For flow analysis, flow variations were investigated based on the unsteady RANS (Reynolds-averaged Navier-Stokes) equation. Sliding mesh algorithm was employed in order to consider rotational effect of blade. To obtain more realistic results we conducted experiment and numerical analysis at the same time for three-dimensional shape. In addition, several parameters (chord length, rotor diameter, pitch angle, and helical angle) were considered to find out optimum shape design and characteristics of interaction with ambient flow. Since the NACA airfoil used in this study showed significant changes in magnitude of lift and drag depending on an angle of attack, the rotor with low drag, long cord length and short diameter shows high power coefficient in low tip speed ratio (TSR) range. On the contrary, in high TSR range, drag becomes high. Hence, the short-chord and long-diameter rotor produces high power coefficient. When a pitch angle at which airfoil directs toward inside equals to -2° and helical angle equals to 0°, Darrieus-type VAWT generates maximum power.

Keywords: darrieus wind turbine, VAWT, NACA airfoil, performance

Procedia PDF Downloads 348
131 Corrosion of Steel in Relation with Hydrogen Activity of Concentrated HClO4 Media: Realisation Sensor and Reference Electrode

Authors: B. Hammouti, H. Oudda, A. Benabdellah, A. Benayada, A. Aouniti

Abstract:

Corrosion behaviour of carbon steel was studied in various concentrated HClO4 solutions. To explain the acid attack in relation of H+ activity, new sensor was realised: two carbon paste electrodes (CPE) were constructed by incorporating ferrocene (Fc) and orthoquinone into the carbon paste matrix and crossed by weak current to stabilize potential difference. The potentiometric method at imposed weak current between these two electrodes permits the in situ determination of both concentration and acidity level of various concentrated HClO4 solutions. The different factors affecting the potential at imposed current as current intensity, temperature and H+ ion concentration are studied. The potentials measured between ferrocene and chloranil electrodes are directly linked to the acid concentration. The acidity Ri(H) function defined represents the determination of the H+ activity and constitutes the extend of pH is concentrated acid solutions. Ri(H) has been determined and compared to Strehlow Ro(H), Janata HGF and Hammett Ho functions. The collected data permit to give a scale of strength of mineral concentrated acids at a given concentration. Ri(H) is numerically equal to the thermodynamic Ro(H), but deviated from Hammett functions based on indicator determination. The CPE electrode with inserted ferrocene in presence of ferricinium (Fc+) ion in concentrated HClO4 at various concentrations is realized without junction potential and may plays the role of a practical reference electrode (FRE) in concentrated acids. Fc+ was easily prepared in biphasic medium HClO4-acid by the quantitative oxidation of ferrocene by the ortho-chloranil (oQ). Potential of FRE is stable with time. The variation of equilibrium potential of the interface Fc/ Fc+ at various concentrations of Fc+ (10-4 - 2 10-2 M) obeyed to the Nernst equation with a slope 0.059 Volt per decade. Corrosion rates obtained by weight loss and electrochemical techniques were then easily linked to acidity level.

Keywords: ferrocene, strehlow, concentrated acid, corrosion, Generalised pH, sensor carbon paste electrode

Procedia PDF Downloads 339
130 Infestation of Aphid on Wheat Triticum aestivum L. (Poaceae) and Its Possible Management with Naturally Existing Beneficial Fauna

Authors: Ghulam Abbas, Ikramul Haq, Ghulam Ghouse

Abstract:

Bread wheat Triticum aestivum L. (Poaceae) is the major source of the staple food for a number of countries of the world including Pakistan. Since it is the staple food of the country, it has been desired, and efforts have been made, that it does not undergo application of pesticides to ensure the food safety. Luckily, wheat does not face a serious threat of insect pests, in ecological conditions of Pakistan, except aphids and armyworm which infest the wheat prior to maturity. It has been observed that almost 5 species of aphid have been reported to attack wheat ie. Ropalosiphum maidi, R. Padi, Schizaphis graminum, Diuraphis noxia, and Sitibion miscanthi but due to natural rise in temperature in terminal season of wheat, the population of aphid gradually decreases and wheat has a safe escape from its infestation. In case, mild temperatures 15ºC to 30ºC prolong, the infestation of aphids also prolongs and it can severely damage wheat in patches, and it has potential to substantially reduce the yield of wheat in infested patch. In years 2013, 2014, and 2015 the studies were undertaken to determine the potential of damage caused by aphid complex in 10 fields in infested patches. The damage caused by aphid complex was calculated on the basis of 1000 grain weight of wheat grains taken from the infested patch and were compared with 1000 grain weight of the healthy plants of the same fields. It was observed that there was 26 to 42% decrease in the weight of grain in infested patches. This patch also escaped from general harvesting by combine harvester and enhanced the loss 13 to 46%. The quality of the wheat straw was also reduced and its acceptance to the animals was also affected up to 50 to 100%. Moreover, the population of naturally existing beneficial fauna was recorded and factors promoting establishment and manipulation of beneficial fauna were studied and analysed.

Keywords: Triticum aestivum, wheat, Pakistan, beneficial fauna, aphid complex

Procedia PDF Downloads 260
129 An Investigation into the Effects of Anxiety Sensitivity in Adolescents on Anxiety Disorder and Childhood Depression

Authors: Ismail Seçer

Abstract:

The purpose of this study is to investigate the effects of anxiety sensitivity in adolescents on anxiety disorder and childhood depression. Mood disorders and anxiety disorders in children and adolescents can be given examples of important research topics in recent years. The participants of the study consist of 670 students in Erzurum and Erzincan city centers. The participants of the study were 670 secondary and high school students studying in city centers of Erzurum and Erzincan. The participants were chosen based on convenience sampling. The participants were between the ages of 13 and 18 (M=15.7, Ss= 1.35) and 355 were male and 315 were female. The data were collected through Anxiety Sensitivity Index and Anxiety and Depression Index for Children and Adolescents. For data analysis, Correlation analysis and Structural Equation Model were used. In this study, correlational descriptive survey was used. This model enables the researcher to make predictions related to different variables based on the information obtained from one or more variables. Therefore, the purpose is to make predictions considering anxiety disorder and childhood depression based on anxiety sensitivity. For this purpose, latent variable and structural equation model was used. Structural equation model is an analysis method which enables the identification of direct and indirect effects by determining the relationship between observable and latent variables and testing their effects on a single model. CFI, RMR, RMSEA and SRMR, which are commonly accepted fit indices in structural equation model, were used. The results revealed that anxiety sensitivity impacts anxiety disorder and childhood depression through direct and indirect effects in a positive way. The results are discussed in line with the relevant literature. This finding can be considered that anxiety sensitivity can be a significant risk source in terms of children's and adolescents’ anxiety disorder experience. This finding is consistent with relevant research highlighting that in case the anxiety sensitivity increases then the obsessive compulsive disorder and panic attack increase too. The adolescents’ experience of anxiety can be attributed to anxiety sensitivity.

Keywords: anxiety sensitivity, anxiety, depression, structural equation

Procedia PDF Downloads 277
128 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics

Authors: Varun K, Pramod B. Balareddy

Abstract:

Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.

Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient

Procedia PDF Downloads 230
127 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 29
126 How Virtualization, Decentralization, and Network-Building Change the Manufacturing Landscape: An Industry 4.0 Perspective

Authors: Malte Brettel, Niklas Friederichsen, Michael Keller, Marius Rosenberg

Abstract:

The German manufacturing industry has to withstand an increasing global competition on product quality and production costs. As labor costs are high, several industries have suffered severely under the relocation of production facilities towards aspiring countries, which have managed to close the productivity and quality gap substantially. Established manufacturing companies have recognized that customers are not willing to pay large price premiums for incremental quality improvements. As a consequence, many companies from the German manufacturing industry adjust their production focusing on customized products and fast time to market. Leveraging the advantages of novel production strategies such as Agile Manufacturing and Mass Customization, manufacturing companies transform into integrated networks, in which companies unite their core competencies. Hereby, virtualization of the process- and supply-chain ensures smooth inter-company operations providing real-time access to relevant product and production information for all participating entities. Boundaries of companies deteriorate, as autonomous systems exchange data, gained by embedded systems throughout the entire value chain. By including Cyber-Physical-Systems, advanced communication between machines is tantamount to their dialogue with humans. The increasing utilization of information and communication technology allows digital engineering of products and production processes alike. Modular simulation and modeling techniques allow decentralized units to flexibly alter products and thereby enable rapid product innovation. The present article describes the developments of Industry 4.0 within the literature and reviews the associated research streams. Hereby, we analyze eight scientific journals with regards to the following research fields: Individualized production, end-to-end engineering in a virtual process chain and production networks. We employ cluster analysis to assign sub-topics into the respective research field. To assess the practical implications, we conducted face-to-face interviews with managers from the industry as well as from the consulting business using a structured interview guideline. The results reveal reasons for the adaption and refusal of Industry 4.0 practices from a managerial point of view. Our findings contribute to the upcoming research stream of Industry 4.0 and support decision-makers to assess their need for transformation towards Industry 4.0 practices.

Keywords: Industry 4.0., mass customization, production networks, virtual process-chain

Procedia PDF Downloads 254
125 Risk Factors Associated with Outbreak of Cerebrospinal Meningitis in Kano State- Nigeria, March-May 2017

Authors: Visa I. Tyakaray, M. Abdulaziz, O. Badmus, N. Karaye, M. Dalhat, A. Shehu, I. Bello, T. Hussaini, S. Akar, G. Effah, P. Nguku

Abstract:

Introduction: Nigeria has recorded outbreaks of meningitis in the past, being in the meningitis belt. A multi-state outbreak of Cerebrospinal Meningitis (CSM) from Neisseria meningitides occurred in 2017 involving 24 states, and Kano State reported its first two confirmed CSM cases on 22nd March, 2017. We conducted the outbreak investigation to characterize the outbreak, determine its associated risk factors and institute appropriate control measures. Method: We conducted an unmatched Case-control study with ratio 1:2. A case was defined as any person with sudden onset of fever (>38.5˚C rectal or 38.0˚C axillary) and one of the following: neck stiffness, altered consciousness or bulging fontanelle in toddlers while a control was defined as any person who resides around the case such as family members, caregivers, neighbors, and healthcare personnel. We reviewed and validated line list and conducted active case search in health facilities and neighboring communities. Descriptive, bivariate, stratified and multivariate analysis were performed. Laboratory confirmation was by Latex agglutination and/or Culture. Results: We recruited 48 cases with median age of 11 years (1 month – 65 years), attack rate was 2.4/100,000 population with case fatality rate of 8%; 34 of 44 local government areas were affected.On stratification, age was found to be a confounder. Independent factors associated with the outbreak were age (Adjusted Odds Ratio, AOR =6.58; 95% Confidence Interval (CI) =2.85-15.180, history of Vaccination (AOR=0.37; 95% CI=0.13-0.99) and history of travel (AOR=10.16; (1.99-51.85). Laboratory results showed 22 positive cases for Neisseria meningitides types C and A/Y. Conclusion: Major risk factors associated with this outbreak were age (>14years), not being vaccinated and history of travel. We sensitized communities and strengthened case management. We recommended immediate reactive vaccination and enhanced surveillance in bordering communities.

Keywords: cerebrospinal, factors, Kano-Nigeria, meningitis, risk

Procedia PDF Downloads 192
124 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 354
123 A Research Study of the Inclusiveness of VR Headsets for Higher Education

Authors: Fredrick Forster, Gareth Ward, Matthew Tubby, Pamela Lithgow, Anne Nortcliffe

Abstract:

This paper presents the results from a research study of random adult participants accessing one of four different commercially available Virtual Reality (VR) Head Mounted Displays (HMDs) and completing a post user experience reflection questionnaire. The research sort to understand how inclusive commercially available VR HMDs are and identify any associated barriers that could impact the widespread adoption of the devices, specifically in Higher Education (HE). In the UK, education providers are legally required under the Equality Act 2010 to ensure all education facilities are inclusive and reasonable adjustments can be applied appropriately. The research specifically aimed to identify the considerations that academics and learning technologists need to make when adopting the use of commercial VR HMDs in HE classrooms, namely cybersickness, user comfort, Interpupillary Distance, inclusiveness, and user perceptions of VR. The research approach was designed to build upon previously published research on user reflections on presence, usability, and overall HMD comfort, using quantitative and qualitative research methods by way of a questionnaire. The quantitative data included the recording of physical characteristics such as the distance between eye pupils, known as Interpupillary Distance (IPD). VR HMDs require each user’s IPD measurement to enable the focusing of the VR HMDs virtual camera output to the right position in front of the eyes of the user. In addition, the questionnaire captured users’ qualitative reflections and evaluations of the broader accessibility characteristics of the VR HMDs. The initial research activity was accomplished by enabling a random sample of visitors, staff, and students at Canterbury Christ Church University, Kent to use a VR HMD for a set period of time and asking them to complete the post user experience questionnaire. The study identified that there is little correlation between users who experience cyber sickness and car sickness. Also, users with a smaller IPD than average (typically associated with females) were able to use the VR HMDs successfully; however, users with a larger than average IPD reported an impeded experience. This indicates that there is reduced inclusiveness for the tested VR HMDs for users with a higher-than-average IPD which is typically associated with males of certain ethnicities. As action education research, these initial findings will be used to refine the research method and conduct further investigations with the aim to provide verification and validation of the accessibility of current commercial VR HMDs. The conference presentation will report on the research results of the initial study and subsequent follow up studies with a larger variety of adult volunteers.

Keywords: virtual reality, education technology, inclusive technology, higher education

Procedia PDF Downloads 42
122 Methylglyoxal Induced Glycoxidation of Human Low Density Lipoprotein: A Biophysical Perspective and Its Role in Diabetes and Periodontitis

Authors: Minhal Abidi, Moinuddin

Abstract:

Diabetes mellitus (DM) induced metabolic abnormalities causes oxidative stress which leads to the pathogenesis of complications associated with diabetes like retinopathy, nephropathy periodontitis etc. Combination of glycation and oxidation 'glycoxidation' occurs when oxidative reactions affect the early state of glycation products. Low density lipoprotein (LDL) is prone to glycoxidative attack by sugars and methylglyoxal (MGO) being a strong glycating agent may have severe impact on its structure and consequent role in diabetes. Pro-inflammatory cytokines like IL1β and TNFα produced by the action of gram negative bacteria in periodontits (PD) can in turn lead to insulin resistance. This work discusses modifications to LDL as a result of glycoxidation. The changes in the protein molecule have been characterized by various physicochemical techniques and the immunogenicity of the modified molecules was also evaluated as they presented neo-epitopes. Binding of antibodies present in diabetes patients to the native and glycated LDL has been evaluated. Role of modified epitopes in the generation of antibodies in diabetes and periodontitis has been discussed. The structural perturbations induced in LDL were analyzed by UV–Vis, fluorescence, circular dichroism and FTIR spectroscopy, molecular docking studies, thermal denaturation studies, Thioflavin T assay, isothermal titration calorimetry, comet assay. MALDI-TOF, ketoamine moieties, carbonyl content and HMF content were also quantitated in native and glycated LDL. IL1β and TNFα levels were also measured in the type 2 DM and PD patients. We report increased carbonyl content, ketoamine moieties and HMF content in glycated LDL as compared to native analogue. The results substantiate that in hyperglycemic state MGO modification of LDL causes structural perturbations making the protein antigenic which could obstruct normal physiological functions and might contribute in the development of secondary complications in diabetic patients like periodontitis.

Keywords: advanced glycation end products, diabetes mellitus, glycation, glycoxidation, low density lipoprotein, periodontitis

Procedia PDF Downloads 172
121 Critical Analysis of International Protections for Children from Sexual Abuse and Examination of Indian Legal Approach

Authors: Ankita Singh

Abstract:

Sex trafficking and child pornography are those kinds of borderless crimes which can not be effectively prevented only through the laws and efforts of one country because it requires a proper and smooth collaboration among countries. Eradication of international human trafficking syndicates, criminalisation of international cyber offenders, and effective ban on child pornography is not possible without applying effective universal laws; hence, continuous collaboration of all countries is much needed to adopt and routinely update these universal laws. Congregation of countries on an international platform is very necessary from time to time, where they can simultaneously adopt international agendas and create powerful universal laws to prevent sex trafficking and child pornography in this modern digital era. In the past, some international steps have been taken through The Convention on the Rights of the Child (CRC) and through The Optional Protocol to the Convention on the Rights of the Child on the Sale of Children, Child Prostitution, and Child Pornography, but in reality, these measures are quite weak and are not capable in effectively protecting children from sexual abuse in this modern & highly advanced digital era. The uncontrolled growth of artificial intelligence (AI) and its misuse, lack of proper legal jurisdiction over foreign child abusers and difficulties in their extradition, improper control over international trade of digital child pornographic content, etc., are some prominent issues which can only be controlled through some new, effective and powerful universal laws. Due to a lack of effective international standards and a lack of improper collaboration among countries, Indian laws are also not capable of taking effective actions against child abusers. This research will be conducted through both doctrinal as well as empirical methods. Various literary sources will be examined, and a questionnaire survey will be conducted to analyse the effectiveness of international standards and Indian laws against child pornography. Participants in this survey will be Indian University students. In this work, the existing international norms made for protecting children from sexual abuse will be critically analysed. It will explore why effective and strong collaboration between countries is required in modern times. It will be analysed whether existing international steps are enough to protect children from getting trafficked or being subjected to pornography, and if these steps are not found to be sufficient enough, then suggestions will be given on how international standards and protections can be made more effective and powerful in this digital era. The approach of India towards the existing international standards, the Indian laws to protect children from being subjected to pornography, and the contributions & capabilities of India in strengthening the international standards will also be analysed.

Keywords: child pornography, prevention of children from sexual offences act, the optional protocol to the convention on the rights of the child on the sale of children, child prostitution and child pornography, the convention on the rights of the child

Procedia PDF Downloads 18
120 Characterization of Defense-Related Genes and Metabolite Profiling in Oil Palm Elaeis guineensis during Interaction with Ganoderma boninense

Authors: Mohammad Nazri Abdul Bahari, Nurshafika Mohd Sakeh, Siti Nor Akmar Abdullah

Abstract:

Basal stem rot (BSR) is the most devastating disease in oil palm. Among the oil palm pathogenic fungi, the most prevalent and virulent species associated with BSR is Ganoderma boninense. Early detection of G. boninense attack in oil palm wherein physical symptoms has not yet appeared can offer opportunities to prevent the spread of the necrotrophic fungus. However, poor understanding of molecular defense responses and roles of antifungal metabolites in oil palm against G. boninense has complicated the resolving measures. Hence, characterization of defense-related molecular responses and production of antifungal compounds during early interaction with G. boninense is of utmost important. Four month-old oil palm (Elaeis guineensis) seedlings were artificially infected with G. boninense-inoculated rubber wood block via sitting technique. RNA of samples were extracted from roots and leaves tissues at 0, 3, 7 and 11 days post inoculation (d.p.i) followed with sequencing using RNA-Seq method. Differentially-expressed genes (DEGs) of oil palm-G. boninense interaction were identified, while changes in metabolite profile will be scrutinized related to the DEGs. The RNA-Seq data generated a total of 113,829,376 and 313,293,229 paired-end clean reads from untreated (0 d.p.i) and treated (3, 7, 11 d.p.i) samples respectively, each with two biological replicates. The paired-end reads were mapped to Elaeis guineensis reference genome to screen out non-oil palm genes and subsequently generated 74,794 coding sequences. DEG analysis of phytohormone biosynthetic genes in oil palm roots revealed that at p-value ≤ 0.01, ethylene and jasmonic acid may act in antagonistic manner with salicylic acid to coordinate defense response at early interaction with G. boninense. Findings on metabolite profiling of G. boninense-infected oil palm roots and leaves are hoped to explain the defense-related compounds elicited by Elaeis guineensis in response to G. boninense colonization. The study aims to shed light on molecular defense response of oil palm at early interaction with G. boninense and promote prevention measures against Ganoderma infection.

Keywords: Ganoderma boninense, metabolites, phytohormones, RNA-Seq

Procedia PDF Downloads 240
119 Negotiating Strangeness: Narratives of Forced Return Migration and the Construction of Identities

Authors: Cheryl-Ann Sarita Boodram

Abstract:

Historically, the movement of people has been the subject of socio-political and economic regulatory policies which congeal to regulate human mobility and establish geopolitical and spatial identities and borderlands. As migratory practices evolved, so too has the problematization associated with movement, migration and citizenship. The emerging trends have led to active development of immigration technology governing human mobility and the naming of migratory practices. One such named phenomenon is ‘deportation’ or the forced removal of individuals from their adopted country. Deportation, has gained much attention within the human mobility landscape in the past twenty years following the September 2001 terrorist attack on the World Trade Centre in New York. In a reactionary move, several metropolitan countries, including Canada and the United Kingdom enacted or reviewed immigration laws which further enabled the removal of foreign born criminals to the land of their birth in the global south. Existing studies fall short of understanding the multiple textures of the forced returned migration experiences and the social injustices resulting from deportation displacement. This study brings together indigenous research methodologies through the use of participatory action research and social work with returned migrants in Trinidad and Tobago to uncover the experiences of displacement of deported nationals. The study explores the experiences of negotiating life as a ‘stranger’ and how return has influenced the construction of identities of returned nationals. Findings from this study reveal that deportation has led to inequalities and facilitated ‘othering’ of this group within their own country of birth. The study further highlighted that deportation leads to circuits of dispossession, and perpetuates inequalities. This study provides original insights into the way returned migrants negotiate, map and embody ‘strangeness’ and manage their return to a soil they consider unfamiliar and alien.

Keywords: stranger, alien geographies, displacement, deportation, negotiating strangeness, identity, otherness, alien landscapes

Procedia PDF Downloads 485
118 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET

Authors: Tyler T. Procko, Steve Collins

Abstract:

New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.

Keywords: API data access, database, JSON, .NET core, SQL server

Procedia PDF Downloads 47