Search results for: nitrate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 975

Search results for: nitrate attack

225 Mob Justice in Ghana: Implication for Peace

Authors: Ishaq Alhassan Meriga

Abstract:

This study examined the phenomenon of mob violence and its implication for peace in Ghana. The study used the archival study of media reports and content analysis of other secondary data as well as eyewitness accounts. The study examined trends and patterns of vigilante violence within the Ghanaian context. Results showed a considerable increase in the occurrence of mob violence within the last 10 years. Theft and robbery emerged as the most frequently suspected crimes for which victims were attacked, while the LGBT community is not left out. Cases of mob violence were most frequently reported in urban areas. This study has shown that the patterns, scope, nature, and implication of mob justice in Ghana are fairly and comparatively similar to those found in other parts of Africa and the globe. Mob violence is identified as undermining the rule of law and thereby infringing on the fundamental human rights of the victims. It is confirmed to have a cycle of effects that is an impediment to the peace of the country. The study underscores the implications of mob violence in terms of disdaining human life and dignity, revisiting our justice systems and punishment procedures, resourcing, and empowering law enforcers to fight the menace of vigilantism. First, the archival study had a limitation regarding missing data. The majority of the cases used for the study lack information mostly on perpetrators and the steps taken by public authorities and security agencies after reports of a mob attack have been lodged with them. The study recommends for further research to be undertaken on the perpetrators and survivors of mob actions in order to get a holistic understanding of the phenomenon. This will give a more comprehensive view of the issue of mob violence in Ghana. From the findings, it can be concluded that mob justice is a social canker in Ghanaian communities, which has a great impact on the peace of the country.

Keywords: LGBT, mob justice, peace, vigilantism

Procedia PDF Downloads 51
224 The Effect of Geographical Differentials of Epidemiological Transition on Health-Seeking Behavior in India

Authors: Sumit Kumar Das, Laishram Ladusingh

Abstract:

Aim: The aim of the study is to examine the differential of epidemiological transition across fifteen agro-climatic zones of India and its effect on health-seeking behavior. Data and Methods: Unit level data on consumption expenditure on health of India from three decadal rounds conducted by National Sample Survey Organization are used for the analysis. These three rounds are 52nd (1995-96), 60th (2004-05) and 71st (2014-15). The age-adjusted prevalence rate for communicable diseases and non-communicable diseases are estimated for fifteen agro-climatic zones of India for three time periods. Bivariate analysis is used to find out determinants of health-seeking behavior. Multilevel logistic regression is used to examine factors effecting on household health-seeking behavior. Result: The prevalence of communicable diseases is increasing in most of the zones of India. Every South Indian zones, Gujarat plains, and lower Gangetic plain are facing the severe attack of dual burden of diseases. Demand for medical advice has increased in southern zones, and east zones, reliance on private healthcare facilities are increasing in most of the zone. Demographic characteristics of the household head have a significant impact on health-seeking behavior. Conclusion: Proper program implementation is required considering the disease prevalence and differential in the pattern of health seeking behavior. Along with initiation and strengthening of programs for non-communicable, existing programs for communicable diseases need to monitor and supervised strictly.

Keywords: agro-climatic zone, epidemiological transition, health-seeking behavior, multilevel regression

Procedia PDF Downloads 166
223 Inclusion Complexes of Some Imidazoline Drugs with Cucurbit[N]Uril (N=7,8): Preparation, Characterization and Theoretical Calculations

Authors: Fakhreldin O. Suliman, Alia H. Al-Battashi

Abstract:

This work explored the interaction of three different imidazoline drugs, naphazoline nitrate (NPH), oxymetazoline hydrochloride (OXY) and xylometazoline hydrochloride (XYL) with two different synthesized cucurbit[n]urils CB[n], cucurbit[7]uril (CB[7]) and cucuribit[8]uril (CB[8]). Three binary inclusion complexes have been investigated in solution and in the solid state. The solid complexes were obtained by lyophilization, whereas the physical mixtures of guests and hosts at a stoichiometric ratio of 1:1 were obtained for each drug. 1HNMR, electrospray ionization mass spectrometry (ESI-MS), and matrix-assisted laser desorption-ionization time-of-flight (MALDI-TOF) mass spectrometry was used to study the complexes prepared in aqueous media. The lyophilized solid complexes were characterized by Fourier transform-infrared spectroscopy (FT-IR), powder X-ray diffractometry (PXRD), thermogravimetric analysis (TGA), and differential scanning calorimetry (DSC). MS, FT-IR and PXRD experimental results established in this work reveal that NPH, OXY and XYL molecules form stable inclusion complexes with the two hosts. The TGA and DSC confirmed the enhancement of the thermal stability of each drug and the production of a thermally stable solid complex. The 1HNMR has shown that the protons of the guests faced shifting in ppm and broadening of their peaks upon the formation of inclusion complexes with the selected CB[n]. The aromatic protons of the guest exhibited the highest changes in the chemical shifts and shape of the NMR peaks, suggesting their inclusion into the cavity of the CB[n]. The diffusion coefficients (D), developed from the diffusion-controlled NMR Spectroscopy (DOSY) measurements, for the complexation of the selected imidazoline drugs with CB[7] and CB[8], were decreased in the presence of hosts compared to the free guests indicating the formation of the guest-host adduct. Furthermore, we conducted molecular dynamic simulations and quantum mechanics calculations on these complexes. The results of the theoretical study corroborate the experimental findings and have also shed light on the mechanism of inclusion of the guests into the two hosts. This study generates initial data for potential drug delivery or drug formulation systems for these three selected imidazoline drug compounds based on their inclusion into the CB[n] cavities.

Keywords: cucurbit[n]urils, imidazoline, inclusion complexes, molecular dynamics, DFT calculations, mass spectrometry

Procedia PDF Downloads 48
222 Polypropylene Matrix Enriched With Silver Nanoparticles From Banana Peel Extract For Antimicrobial Control Of E. coli and S. epidermidis To Maintain Fresh Food

Authors: Michail Milas, Aikaterini Dafni Tegiou, Nickolas Rigopoulos, Eustathios Giaouris, Zaharias Loannou

Abstract:

Nanotechnology, a relatively new scientific field, addresses the manipulation of nanoscale materials and devices, which are governed by unique properties, and is applied in a wide range of industries, including food packaging. The incorporation of nanoparticles into polymer matrices used for food packaging is a field that is highly researched today. One such combination is silver nanoparticles with polypropylene. In the present study, the synthesis of the silver nanoparticles was carried out by a natural method. In particular, a ripe banana peel extract was used. This method is superior to others as it stands out for its environmental friendliness, high efficiency and low-cost requirement. In particular, a 1.75 mM AgNO₃ silver nitrate solution was used, as well as a BPE concentration of 1.7% v/v, an incubation period of 48 hours at 70°C and a pH of 4.3 and after its preparation, the polypropylene films were soaked in it. For the PP films, random PP spheres were melted at 170-190°C into molds with 0.8cm diameter. This polymer was chosen as it is suitable for plastic parts and reusable plastic containers of various types that are intended to come into contact with food without compromising its quality and safety. The antimicrobial test against Escherichia coli DFSNB1 and Staphylococcus epidermidis DFSNB4 was performed on the films. It appeared that the films with silver nanoparticles had a reduction, at least 100 times, compared to those without silver nanoparticles, in both strains. The limit of detection is the lower limit of the vertical error lines in the presence of nanoparticles, which is 3.11. The main reasons that led to the adsorption of nanoparticles are the porous nature of polypropylene and the adsorption capacity of nanoparticles on the surface of the films due to hydrophobic-hydrophilic forces. The most significant parameters that contributed to the results of the experiment include the following: the stage of ripening of the banana during the preparation of the plant extract, the temperature and residence time of the nanoparticle solution in the oven, the residence time of the polypropylene films in the nanoparticle solution, the number of nanoparticles inoculated on the films and, finally, the time these stayed in the refrigerator so that they could dry and be ready for antimicrobial treatment.

Keywords: antimicrobial control, banana peel extract, E. coli, natural synthesis, microbe, plant extract, polypropylene films, S.epidermidis, silver nano, random pp

Procedia PDF Downloads 153
221 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 263
220 Anti-Aging Effects of Two Agricultural Plant Extracts and Their Underlying Mechanism

Authors: Shwu-Ling Peng, Chiung-Man Tsai, Chia-Jui Weng

Abstract:

Chronic micro-inflammation is a hallmark of many aging-related neurodegenerative and metabolic syndrome-driven diseases. In high glucose (HG) environment, reactive oxygen species (ROS) is generated and the ROS induced inflammation, cytokines secretion, DNA damage, and cell cycle arrest to lead to cellular senescence. Water chestnut shell (WCS) is a plant hull which containing polyphenolic compounds and showed antioxidant and anticancer activities. Orchid, which containing a natural polysaccharide compound, possesses many physiological activities including anti-inflammatory and neuroprotective effects. These agricultural plants might be able to reduce oxidative stress and inflammation. This study was used HG-induced human normal dermal fibroblasts (HG-HNDFs) as an in vitro model to disclose the effects of water extract of Phalaenopsis orchid flower (WEPF) and ethanol extract of water chestnut shell (EEWCS) on the anti-aging and their underlying molecular mechanisms. The toxicity of extracts on human normal dermal fibroblasts (HNDFs) was determined by MTT method. The senescence of cells was assayed by β-galactosidase (SA-β-gal) kit. ROS and nitrate production was analyzed by Intracellular ROS contents and ELISA, respectively. Western blotting was used to detect the proteins in cells. The results showed that the exposure of HNDFs to HG (30 mM) for 72 h were caused cellular senescence and arrested cells at G0/G1 phase. Indeed, the treatment of HG-HNDFs with WEPF (200 μg/ml) and EEWCS (10 μg/ml) significantly released cell cycle arrest and promoted cell proliferation. The G1/S phase transition regulatory proteins such as protein retinoblastoma (pRb), p53, and p16ᴵᴺᴷ⁴ᵃ depressed by WEPF and EEWCS were also observed. Additionally, the treatment of WEPF and EEWCS increased the activity of HO-1 through upregulating Nrf2 as well as decreased the ROS and NO of HG-HNDFs. Therefore, the senescence marker protein-30 (SMP30) in cells was diminished. In conclusion, the WEPF and EEWCS might inhibit HG-induced aging of HNDFs by reducing oxidative stress and free radicals.

Keywords: agricultural plant extract, anti-aging, high glucose, Phalaenopsis orchid flower, water chestnut shell

Procedia PDF Downloads 133
219 Expounding the Evolution of the Proto-Femme Fatale and Its Correlation with the New Woman: A Close Study of David Mamet's Oleanna

Authors: Silvia Elias

Abstract:

The 'Femme Fatale' figure has become synonymous with a mysterious and seductive woman whose charms captivate her lovers into bonds of irresistible desire, often leading them to compromise or downfall. Originally, a Femme Fatale typically uses her beauty to lead men to their destruction but in modern literature, she represents a direct attack on traditional womanhood and the nuclear family as she refuses to abide by the pillars of mainstream society creating an image of a strong independent woman who defies the control of men and rejects the institution of the family. This research aims at discussing the differences and similarities between the femme fatale and the New Woman and how they are perceived by the audience. There is often confusion between the characteristics that define a New Woman and a Femme Fatale since both women desire independence, challenge typical gender role casting, push against the limits of the patriarchal society and take control of their sexuality. The study of the femme fatale remains appealing in modern times because the fear of gender equality gives life to modern femme fatale versions and post-modern literary works introduce their readers to new versions of the deadly seductress. One that does not fully depend on her looks to destroy men. The idea behind writing this paper was born from reading David Mamet's two-character play Oleanna (1992) and tracing the main female protagonist/antagonist's transformation from a helpless inarticulate girl into a powerful controlling negotiator who knows how to lead a bargain and maintain the upper hand.

Keywords: Circe, David, Eve, evolution, feminist, femme fatale, gender, Mamet, new, Odysseus, Oleanna, power, Salome, schema, seduction, temptress, woman

Procedia PDF Downloads 435
218 Analytical Study and Conservation Processes of Scribe Box from Old Kingdom

Authors: Mohamed Moustafa, Medhat Abdallah, Ramy Magdy, Ahmed Abdrabou, Mohamed Badr

Abstract:

The scribe box under study dates back to the old kingdom. It was excavated by the Italian expedition in Qena (1935-1937). The box consists of 2pieces, the lid and the body. The inner side of the lid is decorated with ancient Egyptian inscriptions written with a black pigment. The box was made using several panels assembled together by wooden dowels and secured with plant ropes. The entire box is covered with a red pigment. This study aims to use analytical techniques in order to identify and have deep understanding for the box components. Moreover, the authors were significantly interested in using infrared reflectance transmission imaging (RTI-IR) to improve the hidden inscriptions on the lid. The identification of wood species included in this study. The visual observation and assessment were done to understand the condition of this box. 3Ddimensions and 2D programs were used to illustrate wood joints techniques. Optical microscopy (OM), X-ray diffraction (XRD), X-ray fluorescence portable (XRF) and Fourier Transform Infrared spectroscopy (FTIR) were used in this study in order to identify wood species, remains of insects bodies, red pigment, fibers plant and previous conservation adhesives, also RTI-IR technique was very effective to improve hidden inscriptions. The analysis results proved that wooden panels and dowels were identified as Acacia nilotica, wooden rail was Salix sp. the insects were identified as Lasioderma serricorne and Gibbium psylloids, the red pigment was Hematite, while the fiber plants were linen, previous adhesive was identified as cellulose nitrates. The historical study for the inscriptions proved that it’s a Hieratic writings of a funerary Text. After its transportation from the Egyptian museum storage to the wood conservation laboratory of the Grand Egyptian museum –conservation center (GEM-CC), conservation techniques were applied with high accuracy in order to restore the object including cleaning , consolidating of friable pigments and writings, removal of previous adhesive and reassembly, finally the conservation process that were applied were extremely effective for this box which became ready for display or storage in the grand Egyptian museum.

Keywords: scribe box, hieratic, 3D program, Acacia nilotica, XRD, cellulose nitrate, conservation

Procedia PDF Downloads 258
217 Preparation of Silver and Silver-Gold, Universal and Repeatable, Surface Enhanced Raman Spectroscopy Platforms from SERSitive

Authors: Pawel Albrycht, Monika Ksiezopolska-Gocalska, Robert Holyst

Abstract:

Surface Enhanced Raman Spectroscopy (SERS) is a technique of growing importance not only in purely scientific research related to analytical chemistry. It finds more and more applications in broadly understood testing - medical, forensic, pharmaceutical, food - and everywhere works perfectly, on one condition that SERS substrates used for testing give adequate enhancement, repeatability, and homogeneity of SERS signal. This is a problem that has existed since the invention of this technique. Some laboratories use as SERS amplifiers colloids with silver or gold nanoparticles, others form rough silver or gold surfaces, but results are generally either weak or unrepeatable. Furthermore, these structures are very often highly specific - they amplify the signal only of a small group of compounds. It means that they work with some kinds of analytes but only with those which were used at a developer’s laboratory. When it comes to research on different compounds, completely new SERS 'substrates' are required. That underlay our decision to develop universal substrates for the SERS spectroscopy. Generally, each compound has different affinity for both silver and gold, which have the best SERS properties, and that's what depends on what signal we get in the SERS spectrum. Our task was to create the platform that gives a characteristic 'fingerprint' of the largest number of compounds with very high repeatability - even at the expense of the intensity of the enhancement factor (EF) (possibility to repeat research results is of the uttermost importance). As specified above SERS substrates are offered by SERSitive company. Applied method is based on cyclic potentiodynamic electrodeposition of silver or silver-gold nanoparticles on the conductive surface of ITO-coated glass at controlled temperature of the reaction solution. Silver nanoparticles are supplied in the form of silver nitrate (AgNO₃, 10 mM), gold nanoparticles are derived from tetrachloroauric acid (10 mM) while sodium sulfite (Na₂O₃, 5 mM) is used as a reductor. To limit and standardize the size of the SERS surface on which nanoparticles are deposited, photolithography is used. We secure the desired ITO-coated glass surface, and then etch the unprotected ITO layer which prevents nanoparticles from settling at these sites. On the prepared surface, we carry out the process described above, obtaining SERS surface with nanoparticles of sizes 50-400 nm. The SERSitive platforms present highly sensitivity (EF = 10⁵-10⁶), homogeneity and repeatability (70-80%).

Keywords: electrodeposition, nanoparticles, Raman spectroscopy, SERS, SERSitive, SERS platforms, SERS substrates

Procedia PDF Downloads 142
216 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis

Authors: Sherehan Hamdalla

Abstract:

Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.

Keywords: love crimes, victim, criminal, social media

Procedia PDF Downloads 56
215 The Effect of Transparent Oil Wood Stain on the Colour Stability of Spruce Wood during Weathering

Authors: Eliska Oberhofnerova, Milos Panek, Stepan Hysek, Martin Lexa

Abstract:

Nowadays the use of wood, both indoors and outdoors, is constantly increasing. However wood is a natural organic material and in the exterior is subjected to a degradation process caused by abiotic factors (solar radiation, rain, moisture, wind, dust etc.). This process affects only surface layers of wood but neglecting some of the basic rules of wood protection leads to increased possibility of biological agents attack and thereby influences a function of the wood element. The process of wood degradation can be decreased by proper surface treatment, especially in the case of less naturally durable wood species, as spruce. Modern coating systems are subjected to many requirements such as colour stability, hydrophobicity, low volatile organic compound (VOC) content, long service life or easy maintenance. The aim of this study is to evaluate the colour stability of spruce wood (Picea abies), as the basic parameter indicating the coating durability, treated with two layers of transparent natural oil wood stain and exposed to outdoor conditions. The test specimens were exposed for 2 years to natural weathering and 2000 hours to artificial weathering in UV-chamber. The colour parameters were measured before and during exposure to weathering by the spectrophotometer according to CIELab colour space. The comparison between untreated and treated wood and both testing procedures was carried out. The results showed a significant effect of coating on the colour stability of wood, as expected. Nevertheless, increasing colour changes of wood observed during the exposure to weathering differed according to applied testing procedure - natural and artificial.

Keywords: colour stability, natural and artificial weathering, spruce wood, transparent coating

Procedia PDF Downloads 206
214 University Under Terror: Explaining the Deviant Activities in the Tribhuvan University

Authors: Tek Nath Subedi

Abstract:

Violent activities used previously to erupt in specific societies owing to unequal, oppressive and unjust social practices have crossed out of their usual place of occurrence and entered the peace-zones such as schools and universities. The recent history of Universities in Nepal is marked with violent activities of students targeting to professors and other university officials. A student in a university is supposed to involve in scholarly activities and cooperate the teacher so as to achieve the academic degree and to enhance knowledge. Besides, the relationship between a teacher and a student is supposed to be the most sacred, which, in other words, is explained as the relationship between deity and devotee in a spiritual ground, carer and the kid in a moral ground, and mutually dependent in a functionalist view. Above all, the interdependence between teacher and student is illustrated as the two sides of the same coin. But the targeted attack on teachers and the degrading relationship between university and students raises serious questions on what makes a student violent and why the academia is terrorized. Therefore, this research aims to find the nexus of deviant activities of students to other social, political, economic and cultural areas of their life. To find possible answer of a few analytical questions, this paper takes an in-depth interview into consideration based on a snowball sampling and inquires some professors and officials how and why they are terrorized. It also reaches to some students who have witnessed or been part of any terror, following the same research method and ask them why violence has become recurring in the university and how university can be converted into a peace-zone. This research has simply hypothesized that the terror-inspired activities carried out by students in the university are the extended version of their deviant activities out of the university premises. But, it was found that the deviant activities of students were connected in particular to their culture and political identity.

Keywords: deviance, relationship, student, teacher, terror, university

Procedia PDF Downloads 44
213 Polymerization of Epsilon-Caprolactone Using Lipase Enzyme for Medical Applications

Authors: Sukanya Devi Ramachandran, Vaishnavi Muralidharan, Kavya Chandrasekaran

Abstract:

Polycaprolactone is polymer belonging to the polyester family that has noticeable characteristics of biodegradability and biocompatibility which is essential for medical applications. Polycaprolactone is produced by the ring opening polymerization of the monomer epsilon-Caprolactone (ε-CL) which is a closed ester, comprising of seven-membered ring. This process is normally catalysed by metallic components such as stannous octoate. It is difficult to remove the catalysts after the reaction, and they are also toxic to the human body. An alternate route of using enzymes as catalysts is being employed to reduce the toxicity. Lipase enzyme is a subclass of esterase that can easily attack the ester bonds of ε-CL. This research paper throws light on the extraction of lipase from germinating sunflower seeds and the activity of the biocatalyst in the polymerization of ε-CL. Germinating Sunflower seeds were crushed with fine sand in phosphate buffer of pH 6.5 into a fine paste which was centrifuged at 5000rpm for 10 minutes. The clear solution of the enzyme was tested for activity at various pH ranging from 5 to 7 and temperature ranging from 40oC to 70oC. The enzyme was active at pH6.0 and at 600C temperature. Polymerization of ε-CL was done using toluene as solvent with the catalysis of lipase enzyme, after which chloroform was added to terminate the reaction and was washed in cold methanol to obtain the polymer. The polymerization was done by varying the time from 72 hours to 6 days and tested for the molecular weight and the conversion of the monomer. The molecular weight obtained at 6 days is comparably higher. This method will be very effective, economical and eco-friendly to produce as the enzyme used can be regenerated as such at the end of the reaction and can be reused. The obtained polymers can be used for drug delivery and other medical applications.

Keywords: lipase, monomer, polycaprolactone, polymerization

Procedia PDF Downloads 278
212 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 90
211 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 300
210 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 138
209 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 147
208 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases

Authors: Xavier Bertrand, Alexandre Cayrel

Abstract:

The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.

Keywords: aerodynamics, lifting line, surrogate model, CFD

Procedia PDF Downloads 330
207 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 73
206 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint

Authors: Oscar Sang, Shadrack David Rotich

Abstract:

Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.

Keywords: Kenya, constitution, judicial restraint, parliamentary privilege

Procedia PDF Downloads 143
205 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation

Authors: Varsha Shinde, Belle Damodara Shenoy

Abstract:

Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.

Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs

Procedia PDF Downloads 207
204 Management of Insect Pests Using Baculovirus Based Biopesticides in India

Authors: Mudasir Gani, Rakesh Kumar Gupta, Kamlesh Bali, Abdul Rouf Wani

Abstract:

The gypsy moth (Lymantria obfuscata) and tent caterpillar (Malacosoma indicum) are serious pests that attack a wide range of fruit and forest trees in Jammu & Kashmir range of North-Western Himalayas in India. Investigations were carried out to isolate and bioprospect naturally occurring nucleopolyhedroviruses (NPVs) as potent biopesticides against these pests. The biological and molecular characterization of NPV isolates from different ecosystems was conducted, and the polh, lef-8 and lef-9 genes were sequenced and subjected to phylogenetic analysis. The L. obfuscata NPV was more closely related to the L. dispar NPV, whereas M. indicum NPV was more closely related to the M. californicum NPV in the NCBI taxonomy database. Among different isolates, Bhaderwah isolates exhibited highest virus activity (LD₅₀ = 250 POBs/larvae) and speed of kill (ST₅₀ = 6.80 days) against L. obfuscata whereas Mahor isolates proved most virulent against M. indicum, with lowest LD₅₀ (257 POBs/larva) and ST₅₀ (6.80 days). The in vivo mass production for highest productivity and quality revealed that the optimum yield was obtained when 3rd instar larvae were inoculated with a viral dose of 1.44 × 105 POBs/larva and allowed to incubate for nine days for L. obfuscata. However, for M. indicum larvae, a viral dose of 2.88 × 10⁶ POBs/larva and incubation period of 10 days were found optimum. It was found that harvesting of moribund larvae yields good quality NPV. The field application of L. obfuscata NPV and M. indicum NPV against the respective host populations on apple and willow with the pre-standardized dosage of 1 × 10¹² POBs/acre reduced the larval population density up to 25-63%.

Keywords: baculoviruses, biopesticides, Lymantria obfuscata, Malacosoma indicum

Procedia PDF Downloads 93
203 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 68
202 Effects of Fatty Acid Salts and Spices on Dermatophagoides farinae

Authors: Yumeho Obata, Mariko Era, Takayoshi Kawahara, Takahide Kanyama, Hiroshi Morita

Abstract:

Dermatophagoides farinae is major mite allergens in indoors. D. farinae is often swarm over powder products (e.g. wheat flour), because it feeds on starch or protein that are included in them. Eating powder products which are mixed D.farinae causes various allergic symptoms. Therefore, the creation of food additive agents with high safety and control of mite effect is required. Fatty acid salts and spices are known that have pesticidal activities. This study describes the effects of fatty acid salts and spices against Dermatophagoides farinae. Materials and Methods: Potassium salts of 9 fatty acids (C4:0, C6:0, C8:0, C10:0, C12:0, C14:0, C18:1, C18:2, C18:3) were prepared by mixing the fatty acid with the appropriate amount of KOH solution to a concentration of 175 mM and pH 10.5. C12Cu and C12Zn were selected as other fatty acid salts. Cayenne pepper, habanero, Japanese pepper, mustard, jalapeno pepper, curry aroma and cinnamon were selected as spices. D. farina, have been cultured in laboratory. To rear the mites, double-soled dishes containing of sterilized food were put on the big plastic container (30.0 × 20.0 × 20.0cm) which had 100% ammonium nitrate solution in the bottom. Plastic container was placed on incubator at 25 °C and 64 % relative humidity (RH) under dark condition. Sterilized food composed of dried bonito flakes and dried yeast (Ebios), 1:1 by weight. The antiproliferative method, sample and medium culture were mixed in double-soled dish and kept at 25 °C and 64 % RH. Decrease rates were determined 1 week and 4 week after treatment under microscope. D. farina was considered to be dead if appendages did not move when prodded with a pin. Results and Conclusions: The results show that the fatty acids potassium showed no antiproliferative effects against D. farinae. On the other hand, Japanese pepper, mustard, curry aroma and cinnamon were effective to decrease propagative rate (over 80 %) after treatment for 1 week against D. farina. Japanese pepper, curry aroma and cinnamon were effective to decrease propagative rate (approximately 100 %) after treatment for 4 weeks against D. farina. Especially, Japanese pepper and cinnamon showed the fasted and the most consecutive antiproliferative effects. These results indicate that Japanese pepper and cinnamon have high antiproliferative effects against D. farina and suggest spices will be used as a food additive agent.

Keywords: fatty acid salts, spices, antiproliferative effects, dermatophagoides farinae

Procedia PDF Downloads 214
201 Biochemical and Cellular Correlates of Essential Oil of Pistacia Integerrima against in vitro and Murine Models of Bronchial Asthma

Authors: R. L. Shirole, N. L. Shirole, R. B. Patil, M. N. Saraf

Abstract:

The present investigation aimed to elucidate the probable mechanism of antiasthmatic action of essential oil of Pistacia integerrima J.L. Stewart ex Brandis galls (EOPI). EOPI was investigated for its potential antiasthmatic action using in vitro antiallergic assays mast cell degranulation and soyabean lipoxidase enzyme activit, and spasmolytic action using isolated guinea pig ileum preparation. In vivo studies included lipopolysaccharide-induced bronchial inflammation in rats and airway hyperresponsiveness in ovalbumin in sensitized guinea pigs using spirometry. Data was analysed by GraphPad Prism 5.01 and results were expressed as means ± SEM. P < 0.05 was considered to be significant. EOPI inhibits 5-lipoxidase enzyme activity, DPPH scavenging activity and erythropoietin- induced angiogenesis. It showed dose dependent anti-allergic activity by inhibiting compound 48/80 induced mast cell degranulation. The finding that essential oil induced inhibition of transient contraction of acetylcholine in calcium free medium, and relaxation of S-(-)-Bay 8644-precontracted isolated guinea pig ileum jointly suggest that suggesting that the L-subtype Cav channel is involved in spasmolytic action of EOPI. Treatment with EOPI dose dependently (7.5, 15 and 30 mg/kg i.p.) inhibited lipopolysaccharide- induced increased in total cell count, neutrophil count, nitrate-nitrite, total protein, albumin levels in bronchoalveolar fluid and myeloperoxidase levels in lung homogenates. Mild diffused lesions involving focal interalveolar septal, intraluminal infiltration of neutrophils were observed in EOPI (7.5 &15 mg/kg) pretreated while no abnormality was detected in EOPI (30 mg/kg) and roflumilast (1mg/kg) pretreated rats. Roflumilast was used as standard. EOPI reduced the respiratory flow due to gasping in ovalbumin sensitized guinea pigs. The study demonstrates the effectiveness of EOPI in bronchial asthma possibly related to its ability to inhibit L-subtype Cav channel, mast cell stabilization, antioxidant, angiostatic and through inhibition of 5-lipoxygenase enzyme.

Keywords: asthma, lipopolysaccharide, spirometry, Pistacia integerrima J.L. Stewart ex Brandis, essential oil

Procedia PDF Downloads 267
200 Affordable Aerodynamic Balance for Instrumentation in a Wind Tunnel Using Arduino

Authors: Pedro Ferreira, Alexandre Frugoli, Pedro Frugoli, Lucio Leonardo, Thais Cavalheri

Abstract:

The teaching of fluid mechanics in engineering courses is, in general, a source of great difficulties for learning. The possibility of the use of experiments with didactic wind tunnels can facilitate the education of future professionals. The objective of this proposal is the development of a low-cost aerodynamic balance to be used in a didactic wind tunnel. The set is comprised of an Arduino microcontroller, programmed by an open source software, linked to load cells built by students from another project. The didactic wind tunnel is 5,0m long and the test area is 90,0 cm x 90,0 cm x 150,0 cm. The Weq® electric motor, model W-22 of 9,2 HP, moves a fan with nine blades, each blade 32,0 cm long. The Weq® frequency inverter, model WEGCFW 08 (Vector Inverter) is responsible for wind speed control and also for the motor inversion of the rotational direction. A flat-convex profile prototype of airfoil was tested by measuring the drag and lift forces for certain attack angles; the air flux conditions remained constant, monitored by a Pitot tube connected to a EXTECH® Instruments digital pressure differential manometer Model HD755. The results indicate a good agreement with the theory. The choice of all of the components of this proposal resulted in a low-cost product providing a high level of specific knowledge of mechanics of fluids, which may be a good alternative to teaching in countries with scarce educational resources. The system also allows the expansion to measure other parameters like fluid velocity, temperature, pressure as well as the possibility of automation of other functions.

Keywords: aerodynamic balance, wind tunnel, strain gauge, load cell, Arduino, low-cost education

Procedia PDF Downloads 419
199 Combining Transcriptomics, Bioinformatics, Biosynthesis Networks and Chromatographic Analyses for Cotton Gossypium hirsutum L. Defense Volatiles Study

Authors: Ronald Villamar-Torres, Michael Staudt, Christopher Viot

Abstract:

Cotton Gossypium hirsutum L. is one of the most important industrial crops, producing the world leading natural textile fiber, but is very prone to arthropod attacks that reduce crop yield and quality. Cotton cultivation, therefore, makes an outstanding use of chemical pesticides. In reaction to herbivorous arthropods, cotton plants nevertheless show natural defense reactions, in particular through volatile organic compounds (VOCs) emissions. These natural defense mechanisms are nowadays underutilized but have a very high potential for cotton cultivation, and elucidating their genetic bases will help to improve their use. Simulating herbivory attacks by mechanical wounding of cotton plants in greenhouse, we studied by qPCR the changes in gene expression for genes of the terpenoids biosynthesis pathway. Differentially expressed genes corresponded to higher levels of the terpenoids biosynthesis pathway and not to enzymes synthesizing particular terpenoids. The genes were mapped on the G. hirsutum L. reference genome; their global relationships inside the general metabolic pathways and the biosynthesis of secondary metabolites were visualized with iPath2. The chromatographic profiles of VOCs emissions indicated first monoterpenes and sesquiterpenes emissions, dominantly four molecules known to be involved in plant reactions to arthropod attacks. As a result, the study permitted to identify potential key genes for the emission of volatile terpenoids by cotton plants in reaction to an arthropod attack, opening possibilities for molecular-assisted cotton breeding in benefit of smallholder cotton growers.

Keywords: biosynthesis pathways, cotton, mechanisms of plant defense, terpenoids, volatile organic compounds

Procedia PDF Downloads 353
198 Obesity and Physical Inactivity: Contributing Factors to Hypertension in Early Adults

Authors: Sadaf Ambreen, Ayesha Bibi, Sara Rafiq

Abstract:

Hypertension is a medical condition in which blood pressure in the arteries is elevated than the normal, having systolic blood pressure more than 120mmHg and diastolic blood pressure more than 80 mmHg. It leads to health complications and increase the risk of diseases such as stroke, heart failure, heart attack, and even death. The aim of the current study was to evaluate nutritional status and activity level among hypertensive early adults in District Mardan Data was collected from the subjects of Public Hospital, Mardan Medical Complex, through questionnaire. A complete information about individual sociodemographic, anthropometry and health status were collected, and physical activity was assessed by using IPAQ questionnaire. A total of 150 individuals were included in the study, in which 90% were females, and 10% were males. Data was analyzed through SPSS Version 22. Majority of the study subjects, 88%, were married, 70% having nuclear living system, 43% were having elementary education, and 43% were working as laborer. Body mass index and waist circumference in female counterpart were found to be positively associated with hypertension and was found statistically significant P=<0.01. Results showed that majority of females were fall in hypertension crisis category with mild activity, and males were having hypertension stage 1 with moderate activity. Our study concluded that non-optimal nutritional status and physical inactivity resulted in elevated blood pressure in females, therefore, lifestyle change such as optimal nutritional status and physical activity may play key role in reducing risk of hypertension.

Keywords: obesity/overwight, body mass index, waist circumference, early adulthood

Procedia PDF Downloads 124
197 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 72
196 Comparative Therapeutic Potential of 'Green Synthesized' Antimicrobials against Scalp Infections

Authors: D. Desai, J.Dixon, N. Jain, M. Datta

Abstract:

Microbial infections of scalp consist of symptomatic appearances associated with seborrhoeic dermatitis, folliculitis, furuncles, carbuncles and ringworm. The main causative organisms in these scalp-based infections are bacteria like S. aureus, P. aeruginosa and a fungus M. Furfur. Allopathic treatment of these infections is available and efficient, but occasionally, topical applications have been found to cause side effects. India is known as the botanical garden of the world and considered as the epicentre for utilization of traditional drugs. Many treatments based on herb extracts are commonly used in India. It has been observed treatment with ethnomedicines requires a higher dosage and greater time period. Additionally, repeated applications are required to obtain the full efficacy of the treatment. An attempt has been made to imbibe the traditional knowledge with nanotechnology to generate a proficient therapeutic against scalp infections. We have imbibed metallic nanoparticles with extracts from traditional medicines and propose to formulate an antimicrobial hair massager. Four commonly used herbs for treatment against scalp disorders like Zingiber officinale (ginger), Allium sativum (garlic), Azadirachta indica (neem) leaves and Citrus limon (lemon) peel was taken. 30 gms of dried homogenized powder was obtained and processed for obtaining the aqueous and ethanolic extract by soxhlet apparatus. The extract was dried and reconstituted to obtain working solution of 1mg/ml. Phytochemical analysis for the obtained extract was done. Synthesis of nanoparticles was mediated by incubating 1mM silver nitrate with extracts of various herbs to obtain silver nanoparticles. The formation of the silver nanoparticles (AgNPs) was monitored using UV-Vis spectroscopy. The AgNPs thus obtained were centrifuged and dried. The AgNPs thus formed were characterized by X Ray Diffraction, scanning electron microscopy and transmission electron microscopy. The size of the AgNPs varied from 10-20 nm and was spherical in shape. P. aeruginosa was plated on nutrient agar and comparative antibacterial activity was tested. Comparative antimicrobial potential was calculated for the extracts and the corresponding nanoconstructs. It was found AgNPs were more efficient than their aqueous and ethanolic counterparts except in the ase of C. limon. Statistical analysis was performed to validate the results obtained.

Keywords: ethnomedicine, nanoconstructs, scalp infections, Zingiber officinale

Procedia PDF Downloads 354