Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3030

Search results for: malware infection propagating malicious code

2280 The Design of Multiple Detection Parallel Combined Spread Spectrum Communication System

Authors: Lixin Tian, Wei Xue

Abstract:

Many jobs in society go underground, such as mine mining, tunnel construction and subways, which are vital to the development of society. Once accidents occur in these places, the interruption of traditional wired communication is not conducive to the development of rescue work. In order to realize the positioning, early warning and command functions of underground personnel and improve rescue efficiency, it is necessary to develop and design an emergency ground communication system. It is easy to be subjected to narrowband interference when performing conventional underground communication. Spreading communication can be used for this problem. However, general spread spectrum methods such as direct spread communication are inefficient, so it is proposed to use parallel combined spread spectrum (PCSS) communication to improve efficiency. The PCSS communication not only has the anti-interference ability and the good concealment of the traditional spread spectrum system, but also has a relatively high frequency band utilization rate and a strong information transmission capability. So, this technology has been widely used in practice. This paper presents a PCSS communication model-multiple detection parallel combined spread spectrum (MDPCSS) communication system. In this paper, the principle of MDPCSS communication system is described, that is, the sequence at the transmitting end is processed in blocks and cyclically shifted to facilitate multiple detection at the receiving end. The block diagrams of the transmitter and receiver of the MDPCSS communication system are introduced. At the same time, the calculation formula of the system bit error rate (BER) is introduced, and the simulation and analysis of the BER of the system are completed. By comparing with the common parallel PCSS communication, we can draw a conclusion that it is indeed possible to reduce the BER and improve the system performance. Furthermore, the influence of different pseudo-code lengths selected on the system BER is simulated and analyzed, and the conclusion is that the larger the pseudo-code length is, the smaller the system error rate is.

Keywords: cyclic shift, multiple detection, parallel combined spread spectrum, PN code

Procedia PDF Downloads 135
2279 Proportionally Damped Finite Element State-Space Model of Composite Laminated Plate with Localized Interface Degeneration

Authors: Shi Qi Koo, Ahmad Beng Hong Kueh

Abstract:

In the present work, the finite element formulation for the investigation of the effects of a localized interfacial degeneration on the dynamic behavior of the [90˚/0˚] laminated composite plate employing the state-space technique is performed. The stiffness of the laminate is determined by assembling the stiffnesses of sub-elements. This includes an introduction of an interface layer adopting the virtually zero-thickness formulation to model the interfacial degeneration. Also, the kinematically consistent mass matrix and proportional damping have been formulated to complete the free vibration governing expression. To simulate the interfacial degeneration of the laminate, the degenerated areas are defined from the center propagating outwards in a localized manner. It is found that the natural frequency, damped frequency and damping ratio of the plate decreases as the degenerated area of the interface increases. On the contrary, the loss factor increases correspondingly.

Keywords: dynamic finite element, localized interface degeneration, proportional damping, state-space modeling

Procedia PDF Downloads 289
2278 Case Study: The Impact of Creative Play on Children's Bilingualism

Authors: Mingxi Xiao

Abstract:

This case study focused on a bilingual child named Emma and her play. Emma was a four-year-old girl born in Australia while her parents were both Chinese. Emma could speak fluent English, while her Mandarin was not as good as her spoken English. With the research question to figure out whether creative play had an impact on children’s bilingualism, this case study mainly used the anecdotes method to observe Emma’s play and this report presented five observations of Emma, describing detailed information about her play and recording her language use. Based on Emma’s interests and daily activities, this case study chose her creative play for observation, which incorporates a whole range of activities from dancing to drawing, as well as playing instruments. From the five observations, it could be seen that Emma often mixed languages to help her express her meaning. It could be seen that Emma made an effort to use her bilingualism in her creative play. In other words, play encouraged Emma to use the two languages. In conclusion, the observations with Emma showed that although her Mandarin was not good enough, she displayed confidence in speaking both languages and had gradually shifted from mixing languages to code-switching. Recommendations were provided to support Emma’s bilingual abilities for further development in the end.

Keywords: bilingual, case study, code-switching, creative play, early childhood

Procedia PDF Downloads 138
2277 Skin Manifestations in Children With Inborn Errors of Immunity in a Tertiary Care Hospital in Iran

Authors: Zahra Salehi Shahrbabaki, Zahra Chavoshzadeh, Fahimeh Abdollahimajd, Samin Sharafian, Tolue Mahdavi, Mahnaz Jamee

Abstract:

Background: Inborn errors of immunity (IEIs) are monogenic diseases of the immune the system with broad clinical manifestations. Despite the increasing genetic advancements, the diagnosis of IEIs still leans on clinical diagnosis. Dermatologic manifestations are observed in a large number of IEI patients and can lead to proper approach, prompt intervention and improved prognosis. Methods: This cross-sectional study was carried out between 2018 and 2020 on IEIs at a Children's tertiary care center in Tehran, Iran. Demographic details (including age, sex, and parental consanguinity), age at onset of symptoms and family history of IEI with were recorded. Results :212 patients were included. Cutaneous findings were reported in (95 ,44.8%) patients. and 61 of 95 (64.2%) reported skin lesions as the first clinical presentation. Skin infection (69, 72.6%) was the most frequent cutaneous manifestation, followed by an eczematous rash (24, 25 %). Conclusions: Skin manifestations are common feature in IEI patients and can be readily recognizable by healthcare providers. This study tried to provide information on prognostic consequences.

Keywords: primary immuno deficiency, inborn errror of metabolism, skin manifestation, skin infection

Procedia PDF Downloads 92
2276 A Comparison of the Microbiology Profile for Periprosthetic Joint Infection (PJI) of Knee Arthroplasty and Lower Limb Endoprostheses in Tumour Surgery

Authors: Amirul Adlan, Robert A McCulloch, Neil Jenkins, MIchael Parry, Jonathan Stevenson, Lee Jeys

Abstract:

Background and Objectives: The current antibiotic prophylaxis for oncological patients is based upon evidence from primary arthroplasty despite significant differences in both patient group and procedure. The aim of this study was to compare the microbiology organisms responsible for PJI in patients who underwent two-stage revision for infected primary knee replacement with those of infected oncological endoprostheses of the lower limb in a single institution. This will subsequently guide decision making regarding antibiotic prophylaxis at primary implantation for oncological procedures and empirical antibiotics for infected revision procedures (where the infecting organism(s) are unknown). Patient and Methods: 118 patients were treated with two-stage revision surgery for infected knee arthroplasty and lower limb endoprostheses between 1999 and 2019. 74 patients had two-stage revision for PJI of knee arthroplasty, and 44 had two-stage revision of lower limb endoprostheses. There were 68 males and 50 females. The mean age for the knee arthroplasty cohort and lower limb endoprostheses cohort were 70.2 years (50-89) and 36.1 years (12-78), respectively (p<0.01). Patient host and extremity criteria were categorised according to the MSIS Host and Extremity Staging System. Patient microbiological culture, the incidence of polymicrobial infection and multi-drug resistance (MDR) were analysed and recorded. Results: Polymicrobial infection was reported in 16% (12 patients) from knee arthroplasty PJI and 14.5% (8 patients) in endoprostheses PJI (p=0.783). There was a significantly higher incidence of MDR in endoprostheses PJI, isolated in 36.4% of cultures, compared to knee arthroplasty PJI (17.2%) (p=0.01). Gram-positive organisms were isolated in more than 80% of cultures from both cohorts. Coagulase-negative Staphylococcus (CoNS) was the commonest gram-positive organism, and Escherichia coli was the commonest Gram-negative organism in both groups. According to the MSIS staging system, the host and extremity grade of knee arthroplasty PJI cohort were significantly better than endoprostheses PJI(p<0.05). Conclusion: Empirical antibiotic management of PJI in orthopaedic oncology is based upon PJI in arthroplasty despite differences in both host and microbiology. Our results show a significant increase in MDR pathogens within the oncological group despite CoNS being the most common infective organism in both groups. Endoprosthetic patients presented with poorer host and extremity criteria. These factors should be considered when managing this complex patient group, emphasising the importance of broad-spectrum antibiotic prophylaxis and preoperative sampling to ensure appropriate perioperative antibiotic cover.

Keywords: microbiology, periprosthetic Joint infection, knee arthroplasty, endoprostheses

Procedia PDF Downloads 113
2275 The Applications of Wire Print in Composite Material Research and Fabrication Process

Authors: Hsu Yi-Chia, Hoy June-Hao

Abstract:

FDM (Fused Deposition Modeling) is a rapid proofing method without mold, however, high material and time costs have always been a major disadvantage. Wire-printing is the next generation technology that can more flexible, and also easier to apply on a 3D printer and robotic arms printing. It can create its own construction methods. The research is mainly divided into three parts. The first is about the method of parameterizing the generated paths and the conversion of g-code to the wire-printing. The second is about material attempts and the application of effects. Third, is about the improvement of the operation of mechanical equipment and the design of robotic tool-head. The purpose of this study is to develop a new wire-print method that can efficiently generate line segments and paths in three- dimensions space. The parametric modeling software transforms the digital model into a 3D printer or robotic arms g-code, this article uses thermoplastics/ clay/composites materials for testing. The combination of materials and wire-print process makes architects and designers have the ability to research and develop works and construction in the future.

Keywords: parametric software, wire print, robotic arms fabrication, composite filament additive manufacturing

Procedia PDF Downloads 127
2274 High-Speed LIF-OH Imaging of H2-Air Turbulent Premixed Flames

Authors: Ahmed A. Al-Harbi

Abstract:

This paper presents a comparative study of effects of the repeated solid obstacles on the propagation of H2-Air premixed flames. Pressure, speed of the flame front as well as structure of reaction zones are studied for hydrogen. Two equivalence ratios are examined for different configurations of three baffle plates and two obstacles with a square cross-section having blockage ratios of either 0.24 or 0.5. Hydrogen fuel mixtures with two equivalence ratios of 0.7 and 0.8 are studied and this is limited by the excessive overpressures. The results show that the peak pressure and its rate of change can be increased by increasing the blockage ratio or by decreasing the space between successive baffles. As illustrated by the high speed images of LIF-OH, the degree of wrinkling and contortion in the flame front increase as the blockages increase. The images also show how the flame front relaminarises with increasing distances between obstacles, which accounts for the pressure decrease with increasing separation. It is also found that more than one obstacle is needed to achieve a turbulent flame structure with intense corrugations.

Keywords: premixed propagating flames, flame-obstacle interaction, turbulent premixed flames, overpressure, transient flames

Procedia PDF Downloads 375
2273 Reliability Assessment Using Full Probabilistic Modelling for Carbonation and Chloride Exposures, Including Initiation and Propagation Periods

Authors: Frank Papworth, Inam Khan

Abstract:

Fib’s model code 2020 has four approaches for design life verification. Historically ‘deemed to satisfy provisions have been the principal approach, but this has limited options for materials and covers. The use of an equation in fib’s model code for service life design to predict time to corrosion initiation has become increasingly popular to justify further options, but in some cases, the analysis approaches are incorrect. Even when the equations are computed using full probabilistic analysis, there are common mistakes. This paper reviews the work of recent fib commissions on implementing the service life model to assess the reliability of durability designs, including initiation and propagation periods. The paper goes on to consider the assessment of deemed to satisfy requirements in national codes and considers the influence of various options, including different steel types, various cement systems, quality of concrete and cover, on reliability achieved. As modelling is based on achieving agreed target reliability, consideration is given to how a project might determine appropriate target reliability.

Keywords: chlorides, marine, exposure, design life, reliability, modelling

Procedia PDF Downloads 232
2272 COVID in Pregnancy: Evaluating Maternal and Neonatal Complications

Authors: Alexa L. Walsh, Christine Hartl, Juliette Ferdschneider, Lezode Kipoliongo, Eleonora Feketeova

Abstract:

The investigation of COVID-19 and its effects has been at the forefront of clinical research since its emergence in the United States in 2020. Although the possibility of severe infection in immunocompromised individuals has been documented, within the general population of pregnant individuals, there remains to be vaccine hesitancy and uncertainty regarding how the virus may affect the individual and fetus. To combat this hesitancy, this study aims to evaluate the effects of COVID-19 infection on maternal and neonatal complication rates. This retrospective study was conducted by manual chart review of women who were diagnosed with COVID-19 during pregnancy (n = 78) and women who were not diagnosed with COVID-19 during pregnancy (n = 1,124) that gave birth at Garnet Health Medical Centers between 1/1/2019-1/1/2021. Both the COVID+ and COVID- groups exhibited similar median ages, BMI, and parity. The rates of complications were compared between the groups and statistical significance was determined using Chi-squared analysis. Results demonstrated a statistically higher rate of PROM, polyhydramnios, oligohydramnios, GDM, DVT/PE, preterm birth, and the overall incidence of any birth complication in the population that was infected with COVID-19 during their pregnancy. With this information, obstetrical providers can be better prepared for the management of COVID-19+ pregnancies and continue to educate their patients on the benefits of vaccination.

Keywords: complications, COVID-19, Gynecology, Obstetrics

Procedia PDF Downloads 75
2271 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 448
2270 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 149
2269 In vitro and in vivo Potential Effect of the N-Acylsulfonamide Bis-oxazolidin-2-ones on Toxoplasma gondii

Authors: Benlaifa Meriem, Berredjem Hajira, Bouasla Radia, Berredjem Malika, Djebar Med Reda

Abstract:

Toxoplasmosis is a cosmopolitan infection due to Toxoplasma gondii (T.gondii). It is a significant cause of congenital disease and an important opportunistic pathogen which has become a worldwide increasing problem due to the AIDS epidemic. Current available drugs do not give satisfactory results and often have only a static and several adverse side effects as it is the case of pyrimethamine. So, the need to develop and evaluate new drugs is critical. The purpose of this study is to investigate the in vitro and in vivo effects of the new chiral N-acylsulfonamide bis-oxazolidin-2-ones on T.gondii. In this study, anti-T.gondii RH strain activities, of two new chiral N-acylsulfonamide bis-oxazolidin-2-ones were evaluated in vitro, using a MRC-5 fibroblast tissue cultures to determine the concentration that inhibit parasite multiplication by 50% (IC50) of each drug and in vivo, by PCR detection of the tachyzoites in mice ascites after new molecules treatment, using the 35-fold repetitive B1 gene of T.gondii. The in vitro results demonstrated that the treatment with the tested molecules decreased the amount of tachyzoites in cell culture in a dose-dependent manner. The inhibition was complete for concentrations over 4 mg/ml. The IC50 of Mol 1 and Mol 2 were 1.5 and 3 mg/ml, respectively, and were quite similar to the control one (2 mg/ml). The Mol 1 was highly active against T.gondii in cell cultures than Mol 2; these results were similar to those of sulfadiazine-treated group (p < 0.05). Toxoplasma-specific DNA was demonstrated in all ascites samples from infected mice of the different tested groups. Mol 1 showed better effect than Mol 2, but it did not completely inhibit the parasite proliferation. The intensity of amplification products increased when the treatment started late after infection. These findings suggest continuous parasite replication despite the treatment. In conclusion, our results showed a promising treatment effect of the tested molecules and suggest that in vitro, the Mol 1, and Mol 2 have a dose-dependent effect and a high cytotoxicity on the studied cells. The present study revealed that concentration and duration of tested molecules treatment are major factors that influence the course of Toxoplasma infection in infected mice.

Keywords: cytotoxicity, PCR, sulfonamide, Toxoplasma gondii

Procedia PDF Downloads 496
2268 Appearance-Based Discrimination in a Workplace: An Emerging Problem for Labor Law Relationships

Authors: Irmina Miernicka

Abstract:

Nowadays, dress codes and widely understood appearance are becoming more important in the workplace. They are often used in the workplace to standardize image of an employer, to communicate a corporate image and ensure that customers can easily identify it. It is also a way to build professionalism of employer. Additionally, in many cases, an employer will introduce a dress code for health and safety reasons. Employers more often oblige employees to follow certain rules concerning their clothing, grooming, make-up, body art or even weight. An important research problem is to find the limits of the employer's interference with the external appearance of employees. They are primarily determined by the two main obligations of the employer, i. e. the obligation to respect the employee's personal rights and the principle of equal treatment and non-discrimination in employment. It should also be remembered that the limits of the employer's interference will be different when certain rules concerning the employee's appearance result directly from the provisions of laws and other acts of universally binding law (workwear, official clothing, and uniform). The analysis of this issue was based on literature and jurisprudence, both domestic and foreign, including the U.S. and European case law, and led the author to put forward a thesis that there are four main principles, which will protect the employer from the allegation of discrimination. First, it is the principle of adequacy - the means requirements regarding dress code must be appropriate to the position and type of work performed by the employee. Secondly, in accordance with the purpose limitation principle, an employer may introduce certain requirements regarding the appearance of employees if there is a legitimate, objective justification for this (such as work safety or type of work performed), not dictated by the employer's subjective feelings and preferences. Thirdly, these requirements must not place an excessive burden on workers and be disproportionate in relation to the employer's objective (principle of proportionality). Fourthly, the employer should also ensure that the requirements imposed in the workplace are equally burdensome and enforceable from all groups of employees. Otherwise, it may expose itself to grounds of discrimination based on sex or age. At the same time, it is also possible to differentiate the situation of some employees if these differences are small and reflect established habits and traditions and if employees are obliged to maintain the same level of professionalism in their positions. Although this subject may seem to be insignificant, frequent application of dress codes and increasing awareness of both employees and employers indicate that its legal aspects need to be thoroughly analyzed. Many legal cases brought before U.S. and European courts show that employees look for legal protection when they consider that their rights are violated by dress code introduced in a workplace.

Keywords: labor law, the appearance of an employee, discrimination in the workplace, dress code in a workplace

Procedia PDF Downloads 122
2267 Assessment of Golestan Dam Break Using Finite Volume Method

Authors: Ebrahim Alamatian, Seyed Mehdi Afzalnia

Abstract:

One of the most vital hydraulic structures is the dam. Regarding the unrecoverable damages which may occur after a dam break phenomenon, analyzing dams’ break is absolutely essential. GOLESTAN dam is located in the western South of Mashhad city in Iran. GOLESTAN dam break might lead to severe problems due to adjacent tourist and entertainment areas. In this paper, a numerical code based on the finite volume method was applied for assessing the risk of GOLESTAN dam break. As to this issue, first, a canal with a triangular barrier was modeled so as to verify the capability of the concerned code. Comparing analytical, experimental and numerical results showed that water level in the model results is in a good agreement with the similar water level in the analytical solutions and experimental data. The results of dam break modeling are revealed that two of the bridges, that are PARTOIE and NAMAYESHGAH, located downstream in the flow direction, are at risk following the potential GOLESTAN dam break. Therefore, the required times to conduct the precautionary measures at bridges were calculated at about 12 and 21 minutes, respectively. Thus, it is crucial to announce people about the possible risks of the dam break in order to decrease likely losses.

Keywords: numerical model, shallow water equations, GOLESTAN dam break, dry and wet beds modeling

Procedia PDF Downloads 142
2266 Oncolytic H-1 Parvovirus Entry in Cancer Cells through Clathrin-Mediated Endocytosis

Authors: T. Ferreira, A. Kulkarni, C. Bretscher, K. Richter, M. Ehrlich, A. Marchini

Abstract:

H-1 protoparvovirus (H-1PV) is a virus with inherent oncolytic and oncosuppressive activities while remaining non-pathogenic in humans. H-1PV was the first oncolytic parvovirus to undergo clinical testing. Results from trials in patients with glioblastoma or pancreatic carcinoma showed an excellent safety profile and first signs of efficacy. H-1PV infection is vastly dependent on cellular factors, from cell attachment and entry to viral replication and egress. Hence, we believe that the characterisation of the parvovirus life cycle would ultimately help further improve H-1PV clinical outcome. In the present study, we explored the entry pathway of H-1PV in cervical HeLa and glioma NCH125 cancer cell lines. Electron and confocal microscopy showed viral particles associated with clathrin-coated pits and vesicles, providing the first evidence that H-1PV cell entry occurs through clathrin-mediated endocytosis. Accordingly, we observed that by blocking clathrin-mediated endocytosis with hypertonic sucrose, chlorpromazine, or pitstop 2, H-1PV transduction was markedly decreased. Accordingly, siRNA-mediated knockdown of AP2M1, which retains a crucial role in clathrin-mediated endocytosis, verified the reliance of H-1PV on this route to enter HeLa and NCH125 cancer cells. By contrast, we found no evidence of viral entry through caveolae-mediated endocytosis. Indeed, pre-treatment of cells with nystatin or methyl-β-cyclodextrin, both inhibitors of caveolae-mediated endocytosis, did not affect viral transduction levels. Unexpectedly, siRNA-mediated knockdown of caveolin-1, the main driver of caveolae-mediated endocytosis, increased H-1PV transduction, suggesting caveolin-1 is a negative modulator of H-1PV infection. We also show that H-1PV entry is dependent on dynamin, a protein responsible for mediating the scission of vesicle neck and promoting further internalisation. Furthermore, since dynamin inhibition almost completely abolished H-1PV infection, makes it unlikely that H-1PV uses macropinocytosis as an alternative pathway to enter cells. After viral internalisation, H-1PV passes through early to late endosomes as observed by confocal microscopy. Inside these endocytic compartments, the acidic environment proved to be crucial for a productive infection. Inhibition of acidification of pH dramatically reduced H-1PV transduction. Besides, a fraction of H-1PV particles was observed inside LAMP1-positive lysosomes, most likely following a non-infectious route. To the author's best knowledge, this is the first study to characterise the cell entry pathways of H-1PV. Along these lines, this work will further contribute to understand H-1PV oncolytic properties as well as to improve its clinical potential in cancer virotherapy.

Keywords: clathrin-mediated endocytosis, H-1 parvovirus, oncolytic virus, virus entry

Procedia PDF Downloads 150
2265 Investigation of Building Loads Effect on the Stability of Slope

Authors: Hadj Brahim Mounia, Belhamel Farid, Souici Messoud

Abstract:

In big cities, construction on sloping land (landslide) is becoming increasingly prevalent due to the unavailability of flat lands. This has created a major challenge for structural engineers with regard to structure design, due to the difficulties encountered during the implementation of projects, both for the structure and the soil. This paper analyses the effect of the number of floors of a building, founded on isolated footing on the stability of the slope using the computer code finite element PLAXIS 2D v. 8.2. The isolated footings of a building in this case were anchored in soil so that the levels of successive isolated footing realize a maximum slope of base of three for two heights, which connects the edges of the nearest footings, according to the Algerian building code DTR-BC 2.331: Shallow foundations. The results show that the embedment of the foundation into the soil reduces the value of the safety factor due to the change of the stress state of the soil by these foundations. The number of floors a building has also influences the safety factor. It has been noticed from this case of study that there is no risk of collapse of slopes for an inclination between 5° and 8°. In the case of slope inclination greater than 10° it has been noticed that the urbanization is prohibited.

Keywords: isolated footings, multi-storeys building, PLAXIS 2D, slope

Procedia PDF Downloads 246
2264 Dual-functional Peptide With Defective Interfering Genes Protecting Mice From Avian and Seasonal Influenza Virus Infection

Authors: Hanjun Zhao

Abstract:

Limited efficacy of current antivirals and antiviral-resistant mutations impair anti-influenza treatment. Here, we evaluated the in vitro and in vivo antiviral effect of three defective interfering genes (DIG-3) of influenza virus. Virus replication was significantly reduced in 293T and A549 cells transfected with DIG-3. Mice transfected with DIG-3 encoded by jetPEI-vector, as prophylaxis and therapeutics against A(H7N7) virus respectively, had significantly better survivals (80% and 50%) than control mice (0%). We further developed a dual-functional peptide TAT-P1, which delivers DIG-3 with high transfection efficiency and concomitantly exerts antiviral activity by preventing endosomal acidification. TAT-P1/DIG-3 was more effective than jetPEI/DIG-3 in treating A(H7N7) or A(H1N1)pdm09-infected mice and showed potent prophylactic protection on A(H7N7) or A(H1N1)pdm09-infected mice. The addition of P1 peptide, preventing endosomal acidification, could enhance the protection of TAT-P1/DIG-3 on A(H1N1)pdm09-infected mice. Dual-functional TAT-P1 with DIG-3 can effectively protect or treat mice infected by avian and seasonal influenza virus infection.

Keywords: antiviral peptide, dual-functional peptide, defective interfering genes, influenza virus

Procedia PDF Downloads 118
2263 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 293
2262 Assessment of the Masticatory Muscle Function in Young Adults Following SARS-CoV-2 Infection

Authors: Mimoza Canga, Edit Xhajanka, Irene Malagnino

Abstract:

The COVID-19 pandemic has had a significant influence on the lives of millions of people and is a threat to public health. SARS-CoV-2 infection has been associated with a number of health problems, including damage to the lungs and central nervous system damage. Additionally, it can also cause oral health problems, such as pain and weakening of the chewing muscles. The purpose of the study is the assessment of the masticatory muscle function in young adults between 18 and 29 years old following SARS-CoV-2 infection. Materials and methods: This study is quantitative cross-sectional research conducted in Albania between March 2023 and September 2023. Our research involved a total of 104 students who participated in our research, of which 64 were female (61.5%) and 40 were male (38.5%). They were divided into four age groups: 18-20, 21-23, 24-26, and 27-29 years old. In this study, the students willingly consented to take part in this study and were guaranteed that their participation would remain anonymous. The study recorded no dropouts, and it was carried out in compliance with the Declaration of Helsinki. Statistical analysis was conducted using IBM SPSS Statistics Version 23.0 on Microsoft Windows Linux, Chicago, IL, USA. Data were evaluated utilizing analysis of variance (ANOVA), with a significance level set at P ≤ 0.05. Results: 80 (76.9%) of the participants who had passed COVID-19 reported chronic masticatory muscle pain (P < 0.0001) and masticatory muscle spasms (P = 0.002). According to data analysis, 70 (67.3%) of the participants had a sore throat (P=0.007). 74% of the students reported experiencing weakness in their chewing muscles (P=0.003). The participants reported having undergone the following treatments: azithromycin (500 mg daily), prednisolone sodium phosphate (15 mg/5 mL daily), Augmentin tablets (625 mg), vitamin C (1000 mg), magnesium sulfate (4 g/100 mL), oral vitamin D3 supplementation of 5000 IU daily, ibuprofen (400 mg every 6 hours), and tizanidine (2 mg every 6 hours). Conclusion: This study, conducted in Albania, has limitations, but it can be concluded that COVID-19 directly affects the functioning of the masticatory muscles.

Keywords: Albania, chronic pain, COVID-19, cross-sectional study, masticatory muscles, spasm

Procedia PDF Downloads 18
2261 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 279
2260 A Retrospective Study: Correlation between Enterococcus Infections and Bone Carcinoma Incidence

Authors: Sonia A. Stoica, Lexi Frankel, Amalia Ardeljan, Selena Rashid, Ali Yasback, Omar Rashid

Abstract:

Introduction Enterococcus is a vast genus of lactic acid bacteria, gram-positivecocci species. They are common commensal organisms in the intestines of humans: E. faecalis (90–95%) and E. faecium (5–10%). Rare groups of infections can occur with other species, including E. casseliflavus, E. gallinarum, and E. raffinosus. The most common infections caused by Enterococcus include urinary tract infections, biliary tract infections, subacute endocarditis, diverticulitis, meningitis, septicemia, and spontaneous bacterial peritonitis. The treatment for sensitive strains of these bacteria includes ampicillin, penicillin, cephalosporins, or vancomycin, while the treatment for resistant strains includes daptomycin, linezolid, tygecycline, or streptogramine. Enterococcus faecalis CECT7121 is an encouraging nominee for being considered as a probiotic strain. E. faecalis CECT7121 enhances and skews the profile of cytokines to the Th1 phenotype in situations such as vaccination, anti-tumoral immunity, and allergic reactions. It also enhances the secretion of high levels of IL-12, IL-6, TNF alpha, and IL-10. Cytokines have been previously associated with the development of cancer. The intention of this study was to therefore evaluate the correlation between Enterococcus infections and incidence of bone carcinoma. Methods A retrospective cohort study (2010-2019) was conducted through a Health Insurance Portability and Accountability Act (HIPAA) compliant national database and conducted using International Classification of Disease (ICD) 9th and 10th codes for bone carcinoma diagnosis in a previously Enterococcus infected population. Patients were matched for age range and Charlson Comorbidity Index (CCI). Access to the database was granted by Holy Cross Health for academic research. Chi-squared test was used to assess statistical significance. Results A total number of 17,056 patients was obtained in Enterococcus infected group as well as in the control population (matched by Age range and CCI score). Subsequent bone carcinoma development was seen at a rate of 1.07% (184) in the Enterococcal infectious group and 3.42% (584) in the control group, respectively. The difference was statistically significant by p= 2.2x10-¹⁶, Odds Ratio = 0.355 (95% CI 0.311 - 0.404) Treatment for enterococcus infection was analyzed and controlled for in both enterococcus infected and noninfected populations. 78 out of 6,624 (1.17%) patients with a prior enterococcus infection and treated with antibiotics were compared to 202 out of 6,624 (3.04%) patients with no history of enterococcus infection (control) and received antibiotic treatment. Both populations subsequently developed bone carcinoma. Results remained statistically significant (p<2.2x10-), Odds Ratio=0.456 (95% CI 0.396-0.525). Conclusion This study shows a statistically significant correlation between Enterococcus infection and a decreased incidence of bone carcinoma. The immunologic response of the organism to Enterococcus infection may exert a protecting mechanism from developing bone carcinoma. Further exploration is needed to identify the potential mechanism of Enterococcus in reducing bone carcinoma incidence.

Keywords: anti-tumoral immunity, bone carcinoma, enterococcus, immunologic response

Procedia PDF Downloads 175
2259 Preparation of Zno/Ag Nanocomposite and Coating on Polymers for Anti-Infection Biomaterial Application

Authors: Babak Sadeghi, Parisa Ghayomipour

Abstract:

ZnO/Ag nanocomposites coated with polyvinyl chloride (PVC) were prepared by chemical reduction method, for anti-infection biomaterial application. There is a growing interest in attempts in using biomolecular as the templates to grow inorganic nanocomposites in controlled morphology and structure. By optimizing the experiment conditions, we successfully fabricated high yield of ZnO/Ag nanocomposite with full coverage of high-density polyvinyl chloride (PVC) coating. More importantly, ZnO/Ag nanocomposites were shown to significantly inhibit the growth of S. aureus in solution. It was further shown that ZnO/Ag nanocomposites induced thiol depletion that caused death of S. aureus. The coatings were fully characterized using techniques such as scanning electron microscopy (SEM), transmission electron microscopy (TEM) and X-ray diffraction (XRD). Most importantly, compared to uncoated metals, the coatings on PVC promoted healthy antibacterial activity. Importantly, compared to ZnO-Ag -uncoated PVC, the ZnO/Ag nanocomposites coated was approximately triplet more effective in preventing bacteria attachment. The result of Thermal Gravimetric Analysis (TGA) indicates that, the ZnO/Ag nanocomposites are chemically stable in the temperature range from 50 to 900 ºC. This result, for the first time, demonstrates the potential of using ZnO/Ag nanocomposites as a coating material for numerous anti-bacterial applications.

Keywords: nanocomposites, antibacterial activity, scanning electron microscopy (SEM), x-ray diffraction (XRD)

Procedia PDF Downloads 465
2258 Fatigue Life Estimation Using N-Code for Drive Shaft of Passenger Vehicle

Authors: Tae An Kim, Hyo Lim Kang, Hye Won Han, Seung Ho Han

Abstract:

The drive shaft of passenger vehicle has its own function such as transmitting the engine torque from the gearbox and differential gears to the wheels. It must also compensate for all variations in angle or length resulting from manoeuvring and deflection for perfect synchronization between joints. Torsional fatigue failures occur frequently at the connection parts of the spline joints in the end of the drive shaft. In this study, the fatigue life of a drive shaft of passenger vehicle was estimated by using the finite element analysis. A commercial software of n-Code was applied under twisting load conditions, i.e. 0~134kgf•m and 0~188kgf•m, in which the shear strain range-fatigue life relationship considering Signed Shear method, Smith-Watson-Topper equation, Neuber-Hoffman Seeger method, size sensitivity factor and surface roughness effect was taken into account. The estimated fatigue life was verified by a twisting load test of the real drive shaft in a test rig. (Human Resource Training Project for Industry Matched R & D, KIAT, N036200004).

Keywords: drive shaft, fatigue life estimation, passenger vehicle, shear strain range-fatigue life relationship, torsional fatigue failure

Procedia PDF Downloads 272
2257 Copper Related Toxicity of 1-Hydroxy-2-Thiopyridines

Authors: Elena G. Salina, Vadim A. Makarov

Abstract:

With the emergence of primary resistance to the current drugs and wide distribution of latent tuberculosis infection, a need for new compounds with a novel mode of action is growing steadily. Copper-mediated innate immunity and antibacterial toxicity propose novel strategies in TB drug discovery and development. Transcriptome of M. tuberculosis was obtained by RNA-seq, intracellular copper content was measured by ISP MS and complexes of 1-hydroxy-2-thiopyridines with copper were detected by HPLC.1-hydroxy-2-thiopyridine derivatives were found to be highly active in vitro against both actively growing and dormant non-culturable M. tuberculosis. Transcriptome response to 1-hydroxy-2-thiopyridines revealed signs of copper toxicity in M. tuberculosis bacilli. Indeed, Cu was found to accumulate inside cells treated with 1-hydroxy-2-thiopyridines. These compounds were found to form stable charged lipophylic complexes with Cu²⁺ ions which transport into mycobacterial cell. Subsequent metabolic destruction of the complex led to transformation of 1-hydroxy-2-thiopyridines into 2-methylmercapto-2-ethoxycarbonylpyridines, which did not possess antitubercular activity and releasing of free Cu²⁺ in the cytoplasm. 1-hydroxy-2-thiopyridines are a potent class of Cu-dependent inhibitors of M. tuberculosis which may control M. tuberculosis infection by impairment of copper homeostasis. Acknowledgment: This work was financially supported by the Ministry of Education and Science of the RussianFederation (Agreement No 14.616.21.0065; unique identifier RFMEFI61616X0065).

Keywords: copper toxicity, drug discovery, M. tuberculosis inhibitors, 2-thiopyridines

Procedia PDF Downloads 165
2256 A Study of Mode Choice Model Improvement Considering Age Grouping

Authors: Young-Hyun Seo, Hyunwoo Park, Dong-Kyu Kim, Seung-Young Kho

Abstract:

The purpose of this study is providing an improved mode choice model considering parameters including age grouping of prime-aged and old age. In this study, 2010 Household Travel Survey data were used and improper samples were removed through the analysis. Chosen alternative, date of birth, mode, origin code, destination code, departure time, and arrival time are considered from Household Travel Survey. By preprocessing data, travel time, travel cost, mode, and ratio of people aged 45 to 55 years, 55 to 65 years and over 65 years were calculated. After the manipulation, the mode choice model was constructed using LIMDEP by maximum likelihood estimation. A significance test was conducted for nine parameters, three age groups for three modes. Then the test was conducted again for the mode choice model with significant parameters, travel cost variable and travel time variable. As a result of the model estimation, as the age increases, the preference for the car decreases and the preference for the bus increases. This study is meaningful in that the individual and households characteristics are applied to the aggregate model.

Keywords: age grouping, aging, mode choice model, multinomial logit model

Procedia PDF Downloads 319
2255 Sero-Prevalence of Hepatitis B Surface Antigen and Associated Factors among Pregnant Mothers Attending Antenatal Care Service, Mekelle, Ethiopia: Evidence from Institutional Based Quantitative Cross-Sectional Study

Authors: Semaw A., Awet H., Yohannes M.

Abstract:

Background: Hepatitis B Virus (HBV) is a major global public health problem. Individuals living in Sub-Sahara Africa have 60% lifetime risk of acquiring HBV infection. Evidences showed that 80-90% of those born from infected mothers developed chronic HBV. Perinatal HBV transmission is a major determinant of HBV carrier status, its chronic squeal and maintains HBV transmission across generations. Method: Institution based cross-sectional study was conducted among 406 pregnant mothers attending Antenatal clinics at Mekelle and Ayder referral hospital from January 30 to April 1/2014. Epidata version 3.1 was used for data entry and SPSS version 21 statistical software was used for data cleaning, management and finally determine associated factors of hepatitis B surface antigen adjusting important confounders using multivariable logistic regression analysis at 5% level of significance. Result: The overall prevalence of hepatitis B surface antigen among pregnant women was 33 (8.1%). The socio-demographic characteristic of the study population showed that there is high positivity among secondary school 189 (46.6%). In the multivariable logistic regression analysis, history of a contact with individuals who had history of hepatitis B infection or jaundice and lifetime number of multiple sexual partners were found to be significantly associated with HBsAg positivity at AOR = 3.73 95%C.I (1.373-10.182) and AOR = 2.57 95%C.I (1.173-5.654), respectively. Moreover, Human Immunodeficiency Virus (HIV) and HBV confection rate was found 3.6%. Conclusion: This study has shown that HBV prevalence in pregnant women is highly prevalent (8.1%) in the study area. Contact with individuals who had a history of hepatitis or have jaundice and report of multiple lifetime sexual partnership were associated with hepatitis B infection. Education about HBV transmission and prevention as well as screening all pregnant mothers shall be sought to reduce the serious public health crisis of HBV.

Keywords: HBsAg, hepatitis B, pregnant women, prevalence

Procedia PDF Downloads 337
2254 Prevention of Heart Failure Progression in Patients with Post-Infarction Cardiosclerosis After Coronavirus Infection

Authors: Sujayeva V. A., Karpova I. S., Koslataya O. V., Kolyadko M. G., Russkikh I. I., Vankovich E. A.

Abstract:

Objective: The goal of this study is to develop a method for the prevention of the progression of heart failure (HF) in patients with post-infarction cardiosclerosis who have suffered coronavirus infection. Methods: 135 patients with post-infarction cardiosclerosis were divided into 2 groups: Group I - patients who had suffered COVID-19 - 85 people, and Group II - patients who had not suffered COVID-19 - 50 people. Patients of group I, depending on the level of N-terminal fragment of natriuretic peptide (NTproBNP), were divided into 2 subgroups - subgroup A - with HF - 40 people, subgroup B - without HF - 45 people. All patients underwent a clinical examination, echocardiography, electrocardiotopography in 60 leads, computed angiography of the coronary arteries, heart magnetic resonance imaging, NTproBNP. Results: In the post-Covid period, in patients with post-infarction cardiosclerosis, remodeling of the left ventricle and right parts of the heart, deterioration of the systolic-diastolic function of both ventricles, increased pressure in the pulmonary artery, progression of coronary artery atherosclerosis, and an increase in the size of myocardial fibrosis were revealed. The consequence of these changes was the progression of heart failure. The developed method of medical prevention made it possible to improve the clinical course of coronary artery disease and prevent the progression of chronic heart failure in patients with post-infarction cardiosclerosis. Conclusions: In patients with post-infarction cardiosclerosis who initially had HF, after 1 year, according to laboratory and instrumental data, a slight decrease in its severity was revealed. In patients with post-infarction cardiosclerosis who did not have HF before COVID-19, HF developed 1 year after the coronavirus disease, which may be due to the identified process of myocardial fibrosis, which dictates the need to prevent the development of HF in patients with post-infarction cardiosclerosis, even those who did not initially have HF. The proposed method of medical prevention made it possible to improve the clinical course of coronary artery disease in patients with post-infarction cardiosclerosis after COVID-19, both in persons with and without HF, when included in the study. A method of medical prevention in people with post-infarction cardiosclerosis after COVID-19 infection, including spironolactone, loop diuretics, empagliflozin, sacubitril/valsartan, helped prevent the progression of HF.

Keywords: elderly, myocardial infarction, COVID-19, prevention

Procedia PDF Downloads 15
2253 A Novel Approach towards Test Case Prioritization Technique

Authors: Kamna Solanki, Yudhvir Singh, Sandeep Dalal

Abstract:

Software testing is a time and cost intensive process. A scrutiny of the code and rigorous testing is required to identify and rectify the putative bugs. The process of bug identification and its consequent correction is continuous in nature and often some of the bugs are removed after the software has been launched in the market. This process of code validation of the altered software during the maintenance phase is termed as Regression testing. Regression testing ubiquitously considers resource constraints; therefore, the deduction of an appropriate set of test cases, from the ensemble of the entire gamut of test cases, is a critical issue for regression test planning. This paper presents a novel method for designing a suitable prioritization process to optimize fault detection rate and performance of regression test on predefined constraints. The proposed method for test case prioritization m-ACO alters the food source selection criteria of natural ants and is basically a modified version of Ant Colony Optimization (ACO). The proposed m-ACO approach has been coded in 'Perl' language and results are validated using three examples by computation of Average Percentage of Faults Detected (APFD) metric.

Keywords: regression testing, software testing, test case prioritization, test suite optimization

Procedia PDF Downloads 333
2252 Radio Frequency Identification System and Its Effect on Retailing Sector

Authors: Ayşe Çoban, Orhan Çoban, Murat Birekul

Abstract:

In this study, the effects of radio frequency identification system on the retailing sector were theoretically analysed. The technology of Radio Frequency Identification (RFID) is a method enabling to identify the objects individually and automatically, using radio frequency. RFID generally consists of a tag and reader. RFID tags can be programmed to receive, store, and send the information of object such as Electronic Product Code (EPC). Having read the tags placed on product by the reader, the information associated with the management of supply chain can be automatically recorded and replaced. Recently, RFID technology used in many areas has particularly important effects on the businesses that are active in the retailing sector. The most important disadvantage of this technology is that the cost of installation and operation is higher compared to its alternatives. However, it provides important advantages to the business enterprises in the application process. At present, it is especially adopted by the large sized enterprises and with chain stores in the international areas. The application results point out that RFID technology provides business enterprises with the important competitive advantage.

Keywords: RFID, retailing sector, RFID technologies, electronic product code

Procedia PDF Downloads 378
2251 Modeling of the Flow through an Earth Dam and Geotechnical Slope Analyzes

Authors: Ahmed Ferhati, Arezki Adjrad, Ratiba Mitiche-Kettab, Hakim Djafer Khodja

Abstract:

The porous media are omnipresent around us that they are natural as sand, clay, rocks, or manufactured like concretes, cement, and ceramics. The variety of porous environment indicates a wide material range which can be very different from each other. Their common point is to be made up of a solid matrix and a porous space. In our case of study, we made the modeling of the flows in porous environments through the massives as in the case of an earth dam. The computer code used (PLAXIS) offer the possibility of modeling of various structures, in particular, the works in lands because that it deals with the pore water pressure due to the underground flow and the calculation of the plastic deformations. To confirm results obtained by PLAXIS, GeoStudio SEEP/W code was used. This work treats modeling of flows and mechanical and hydraulic behavior of earth dam. A general framework which can fit the calculation of this kind of structures and the coupling of the soil consolidation and free surface flows was defined. In this study; we have confronted a real case modeling of an earth dam. It was shown, in particular, that it is possible to entirely lead the calculation of real dam and to get encouraging results from the hydraulic and mechanical point of view.

Keywords: analyzes, dam, flow, modeling, PLAXIS, seep/w, slope

Procedia PDF Downloads 301