Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24209

Search results for: Development of a security group

23429 Developing and Managing an Institutional Repository in a Nigerian University Library: The Futa Experience

Authors: Belau Olatunde Gbadamosi, Oluchi Okere

Abstract:

Spurred by the ease of access to and the cost-effectiveness of open-source software such as DSpace, EPrints, and Greenstone Digital Libraries for hosting digital content, many libraries have added institutional repositories (IRs) to their repertoire of digital assets. This paper adopts a qualitative approach based on focus group discussions and the system development life cycle model (SDLC) to describe the experience of Albert Ilemobade Library (the Federal University of Technology Akure, Nigeria (FUTA) in the development of their IR - FUTASpace. Peculiar challenges experienced in the course of the development and solutions adopted are also reported. This study will serve as a reference point to other institutions, particularly those operating in developing countries, which may be poorly funded.

Keywords: institutional repository, digital libraries, university libraries, DSpace

Procedia PDF Downloads 164
23428 Comparison of Visual Field Tests in Glaucoma Patients with a Central Visual Field Defect

Authors: Hye-Young Shin, Hae-Young Lopilly Park, Chan Kee Park

Abstract:

We compared the 24-2 and 10-2 visual fields (VFs) and investigate the degree of discrepancy between the two tests in glaucomatous eyes with central VF defects. In all, 99 eyes of 99 glaucoma patients who underwent both the 24-2 VF and 10-2 VF tests within 6 months were enrolled retrospectively. Glaucomatous eyes involving a central VF defect were divided into three groups based on the average total deviation (TD) of 12 central points in the 24-2 VF test (N = 33, in each group): group 1 (tercile with the highest TD), group 2 (intermediate TD), and group 3 (lowest TD). The TD difference was calculated by subtracting the average TD of the 10-2 VF test from the average TD of 12 central points in the 24-2 VF test. The absolute central TD difference in each quadrant was defined as the absolute value of the TD value obtained by subtracting the average TD of four central points in the 10-2 VF test from the innermost TD in the 24-2 VF test in each quadrant. The TD differences differed significantly between group 3 and groups 1 and 2 (P < 0.001). In the superonasal quadrant, the absolute central TD difference was significantly greater in group 2 than in group 1 (P < 0.05). In the superotemporal quadrant, the absolute central TD difference was significantly greater in group 3 than in groups 1 and 2 (P < 0.001). Our results indicate that the results of VF tests for different VFs can be inconsistent, depending on the degree of central defects and the VF quadrant.

Keywords: central visual field defect, glaucoma, 10-2 visual field, 24-2 visual field

Procedia PDF Downloads 164
23427 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 370
23426 Effects of Knowledge on Fruit Diets by Integrating Posters and Actual-Sized Fruit Models in Health Education for Elderly Patients with Type 2 Diabetes Mellitus

Authors: Suchada Wongsawat

Abstract:

The objectives of this quasi-experiment were: 1) to compare pretest and posttest scores of the experimental group who were given health education on the “Fruit Diets for Elderly Patients with Type 2 Diabetes Mellitus”; and 2) to compare the posttest scores between experimental group and controlled group. The samples of this study were elderly patients with type 2 Diabetes Mellitus at Tambon Kanai Health Promoting Hospital, Thailand. The samples were randomly assigned to experimental and controlled groups, with 30 patients in each group. Statistics used in the data analysis included frequency, percentage, average, standard deviation, paired t-test and independent t-test. The study revealed that the patients in the experimental group had significantly higher posttest scores than the pretest scores in the health education at the .05 statistical level. The posttest scores of the experimental group in the health education were significantly higher than the controlled group at the .05 statistical level.

Keywords: fruit, health education, elderly, diabetes

Procedia PDF Downloads 269
23425 Biosynthesized Selenium Nanoparticles to Rescue Coccidiosis-mediated Oxidative Stress, Apoptosis and Inflammation in the Jejunum Of Mice

Authors: Esam Mohammed Al-shaebi

Abstract:

One of the most crucial approaches for treating human diseases, particularly parasite infections, is nanomedicine. One of the most significant protozoan diseases that impact farm and domestic animals is coccidiosis. While, amprolium is one of the traditional anticoccidial medication, the advent of drug-resistant strains of Eimeria necessitates the development of novel treatments. The goal of the current investigation was to determine whether biosynthesized selenium nanoparticles (Bio-SeNPs) using Azadirachta indica leaves extract might treat mice with Eimeria papillata infection in the jejunal tissue. Five groups of seven mice each were used, as follows: Group 1: Non-infected-non-treated (negative control). Group 2: Non-infected treated group with Bio-SeNPs (0.5 mg/kg of body weight). Groups 3-5 were orally inoculated with 1×103 sporulated oocysts of E. papillata. Group 3: Infected-non-treated (positive control). Group 4: Infected and treated group with Bio-SeNPs (0.5 mg/kg). Group 5: Infected and treated group with the Amprolium. Groups 4 and 5 daily received oral administration (for 5 days) of Bio-SeNPs and anticoccidial medication, respectively, after infection. Bio-SeNPs caused a considerable reduction in oocyst output in mice feces (97.21%). This was also accompanied by a significant reduction in the number of developmental parasitic stages in the jejunal tissues. Glutathione reduced (GSH), glutathione peroxidase (GPx), and superoxide dismutase (SOD) levels were dramatically reduced by the Eimeria parasite, whereas, nitric oxide (NO) and malonaldehyde (MDA) levels were markedly elevated. The amount of goblet cells and MUC2 gene expression were used as apoptotic indicators, and both were considerably downregulated by infection. However, infection markedly increased the expression of inflammatory cytokines (IL-6 and TNF-α) and the apoptotic genes (Caspase-3 and BCL2). Bio-SeNPs were administrated to mice to drastically lower body weight, oxidative stress, and inflammatory and apoptotic indicators in the jejunal tissue. Our research thus showed the involvement of Bio-SeNPs in protecting mice with E. papillata infections against jejunal damage.

Keywords: coccidiosis, nanoparticles, azadirachta indica, oxidative stress

Procedia PDF Downloads 81
23424 Effect of Science Learning Module in Filipino on Content Mastery and Conceptual Understanding of Grade 9 Students

Authors: Roly B. Bayo-Ang

Abstract:

This research investigated the effect of science intervention modules in Filipino and in English on mastery of content (MOC) and conceptual understanding of Grade 9 students in Chemistry. Analysis of content mastery scores revealed a significant difference in the mean scores of the control and experimental group, t (46) = -2.14, p < 0.05. The experimental group achieved an MPS of > 75% in three of the five lessons while none in the control group. Analysis of the pretest and posttest scores of the control group in the test for conceptual understanding (TCU) showed no significant difference, t (18), =1.44, p > 0.05, while pretest and posttest scores of experimental group revealed significant difference, t (29) = -5.08, p < 0.05. Comparison of posttest scores of control and experimental group revealed no significant difference t (42) =1.67, p > 0.05. Performance in TCU and MOC of the control group are not significantly correlated, r (17) =.307, p > 0.05; but significantly correlated, r (27) =.571, p < 0.05, for the experimental group. The intervention module in Filipino promotes conceptual understanding and mastery of content than the module in English.

Keywords: action research, conceptual understanding, mastery of content, Filipino module

Procedia PDF Downloads 325
23423 An Experimental Study on the Variability of Nonnative and Native Inference of Word Meanings in Timed and Untimed Conditions

Authors: Swathi M. Vanniarajan

Abstract:

Reading research suggests that online contextual vocabulary comprehension while reading is an interactive and integrative process. One’s success in it depends on a variety of factors including the amount and the nature of available linguistic and nonlinguistic cues, his/her analytical and integrative skills, schema memory (content familiarity), and processing speed characterized along the continuum of controlled to automatic processing. The experiment reported here, conducted with 30 native speakers as one group and 30 nonnative speakers as another group (all graduate students), hypothesized that while working on (24) tasks which required them to comprehend an unfamiliar word in real time without backtracking, due to the differences in the nature of their respective reading processes, the nonnative subjects would be less able to construct the meanings of the unknown words by integrating the multiple but sufficient contextual cues provided in the text but the native subjects would be able to. The results indicated that there were significant inter-group as well as intra-group differences in terms of the quality of definitions given. However, when given additional time, while the nonnative speakers could significantly improve the quality of their definitions, the native speakers in general would not, suggesting that all things being equal, time is a significant factor for success in nonnative vocabulary and reading comprehension processes and that accuracy precedes automaticity in the development of nonnative reading processes also.

Keywords: reading, second language processing, vocabulary comprehension

Procedia PDF Downloads 155
23422 A Randomized Controlled Trial Study on the Effect of Adding Dexmedetomidine to Bupivacaine in Supraclavicular Block Using Ultrasound Guidance

Authors: Nazia Nazir

Abstract:

Background: The benefits of regional anesthetic techniques are well established. Use of additives to local anesthetics can prolong these benefits. The aim of this study was to observe the effect of adding dexmedetomidine to bupivacaine for the supraclavicular block. Methods (Design): In this randomized, double-blind study, seventy ASA I & II patients of either sex undergoing elective surgeries on the upper limb were given supraclavicular block under ultrasound guidance. Group C (n=35), received 38 mL 0.25% bupivacaine + 2mL normal saline and group D received 38 mL 0.25% bupivacaine + 1 µg/kg dexmedetomidine (2mL). Patients were observed for onset, duration of motor and sensory block, duration of analgesia, sedation score, hemodynamic changes and any adverse events. Results: In group D the onset was faster (P < 0.001), duration of sensory and motor block, as well as duration of analgesia, was prolonged as compared to group C (P < 0.0001). There was significant drop in heart rate (HR) from the baseline in group D (P < 0.05) at 30, 60, 90 and 120 min, however, none of the patients dropped HR below 50/min. Mean arterial Pressure (MAP) remained unaffected. The patients in group D were effectively sedated than those in group C (P < 0.05). No adverse event was reported in either group. Conclusion: Dexmedetomidine as adjuvant to bupivacaine in supraclavicular block resulted in faster action, prolonged motor and sensory block, prolonged analgesia with hemodynamic stability and adequate sedation.

Keywords: Analgesia, bupivacaine, dexmedetomidine, supraclavicular block

Procedia PDF Downloads 176
23421 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 418
23420 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 394
23419 Determine the Effectiveness of Group Therapy with Reality Therapy Approach to Reduce Symptoms of Anxiety, Increase Self-esteem, and Internal Control in Infertile Women

Authors: Fatemeh Alsadat Borhani, Hassan Heydari, Mansour Abdi

Abstract:

The purpose of this study to determine the effectiveness of group therapy with approach reality therapy in reducing symptoms of anxiety and increased self- esteem and internal control of infertile women. The population of this study is all infertile women in Qom city in 2012 that with the use of purposeful sampling, 32 individuals were selected as sample. 16 individuals of infertile women in the control group and 16 infertile women in the experimental group is replaced. The research design was of type quasi-experimental with design pretest-posttest with control group. Thus, infertile women were randomly appointed in the experimental and control groups. Also, in this study data through normalized questionnaires, the Beck Anxiety scale, Rotter's Locus of control inventory, Cooper Smith self-esteem inventory was collected. For analysis of data, descriptive statistics, mean, standard deviation and inferential statistics, one way analysis of covariance model with SPSS version 20 software was used. The findings indicated that intervention of the group therapy with approach reality therapy in experimental group reduced symptoms of anxiety and mutually increased self-esteem and internal control in infertile women of experimental group.

Keywords: reality therapy, infertile women, anxiety, self esteem, internal control

Procedia PDF Downloads 563
23418 Co-Culture of Neonate Mouse Spermatogonial Stem Cells with Sertoli Cells: Inductive Role of Melatonin following Transplantation: Adult Azoospermia Mouse Model

Authors: Mehdi Abbasi, Shadan Navid, Mohammad Pourahmadi, M. Majidi Zolbin

Abstract:

We have recently reported that melatonin as antioxidant enhances the efficacy of colonization of spermatogonial stem cells (SSCs). Melatonin as an antioxidant plays a vital role in the development of SSCs in vitro. This study aimed to investigate evaluation of sertoli cells and melatonin simultaneously on SSC proliferation following transplantation to testis of adult mouse busulfan-treated azoospermia model. SSCs and sertoli cells were isolated from the testes of three to six-day old male mice.To determine the purity, Flow cytometry technique using PLZF antibody were evaluated. Isolated testicular cells were cultured in αMEM medium in the absence (control group) or presence (experimental group) of sertoli cells and melatonin extract for 2 weeks. We then transplanted SSCs by injection into the azoospermia mice model. Higher viability, proliferation, and Id4, Plzf, expression were observed in the presence of simultaneous sertoli cells and melatonin in vitro. Moreover, immunocytochemistry results showed higher Oct4 expression in this group. Eight weeks after transplantation, injected cells were localized at the base of seminiferous tubules in the recipient testes. The number of spermatogonia and the weight of testis were higher in the experimental group relative to control group. The results of our study suggest that this new protocol can increase the transplantation of these cells can be useful in the treatment of male infertility.

Keywords: colonization, melatonin, spermatogonial stem cell, transplantation

Procedia PDF Downloads 161
23417 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 320
23416 Art and Culture in the Development Period to Modernization in the Reign of King Rama VI

Authors: Weena Eiamprapai

Abstract:

The growth of Thai society in western style in the middle of Rattanakosin period can be defined as modernization /civilization. These terms had an influence on the development of the country in the reign of King Rama V owing to the governance reform, and cultures influenced by the West. Those were passed on until the reign of King Rama VI. The preference was not only for the renovation of architecture and arts based on Thai customs reflecting the prosperity and beauty of handicrafts but also for the acceptance of westernization. The remain of this acceptance includes the concept of such value as gentlemanly behavior like that in Victorian Era of the United Kingdom, and the support of women’s status. Moreover, the wide spread of modernization leads to the movement to change the country’s governance system from absolute monarchy to democracy by a group of people called Rattanakosin Era (R.E.) 130 party.

Keywords: art, culture, development period, modernization, King Rama VI

Procedia PDF Downloads 278
23415 Evaluation of Compressive Mechanical Properties of the Radial Bone Defect Treated with Selected Bone Graft Substitute Materials in Rabbit

Authors: Omid Gholipoor Bashiri, Ghafur Mosavi, Aliasghar Behnamghader, Seyed Mahmood Rabiee

Abstract:

Objective: To determine the effect of selected bone graft on the compression properties of radial bone in rabbit. Design-Experimental in vivo study. Animals: A total of 45 adult male New Zealand white rabbits. Procedures: The rabbits were anesthetized and a one-cm-full thickness piece of radial bone was removed using oscillating saw in the all rabbit. The rabbits were divided into 5 groups on the basis of the material used to fill the bone defect: group 1: the paste of bone cement calcium phosphate; group II: the paste of calcium phosphate mixture with type I collagen; group III: tricalcium phosphate mixed with hydroxyapatite (TCP & HP) with 5% porosity; group IV: the same scaffold as group III with 10% porosity; and group V: the same scaffold as group III and IV with 20% porosity, with 9 rabbits in each group. Subsequently subdivided into 3 subgroups of 3 rabbits each. Results: There was a significant increase in compression properties of radial bone in the group II and V in 2nd and 3rd months as compared with groups I, III and IV. The mean endurable crack-strength in group II and V were slightly higher than that of normal radius (P<0.05). Conclusion and clinical relevance: Application of calcium phosphate paste with type I collagen and scaffold of tricalcium phosphate with hydroxyapatite having 20% porosity indicated to have positive effect in integral formation of qualitative callus at the site of fracture and early re-organization of callus to regain mechanical strength too.

Keywords: calcium phosphate, tricalcium phosphate, hydroxyapatite, radial bone, compressive properties, porosity, type i collagen, rabbit

Procedia PDF Downloads 441
23414 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development

Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz

Abstract:

The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.

Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune

Procedia PDF Downloads 590
23413 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 63
23412 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 140
23411 An Assessment of Tai Chi Exercise on Cognitive Performance in Vietnamese Older Adults

Authors: Hung Manh Nguyen, Duong Dai Nguyen

Abstract:

Objective: To evaluate the effects of Tai Chi exercise on cognitive performance of community-dwelling elderly in Vinh city, Vietnam. Design: A randomized controlled trial. Participants: One hundred and two subjected were recruited. Intervention: Subjects were divided randomly into two groups. Tai Chi group was assigned 6-months Tai Chi training. Control group was instructed to maintain their routine daily activities. Outcome measures: Trail Making Test (TMT) is primary outcome measure. Results: Participants in Tai Chi group reported significant improvement in TMT (part A) F(1, 71) = 78.37, p < .001, and in TMT (part B) F(1, 71)= 175.00, p < .001 in comparison with Control group. Conclusion: Tai Chi is beneficial to improve cognitive performance of the elderly.

Keywords: cognitive, elderly, Vietnam, Tai Chi

Procedia PDF Downloads 515
23410 Development and Usability Assessment of a Connected Resistance Exercise Band Application for Strength-Monitoring

Authors: J. A. Batsis, G. G. Boateng, L. M. Seo, C. L. Petersen, K. L. Fortuna, E. V. Wechsler, R. J. Peterson, S. B. Cook, D. Pidgeon, R. S. Dokko, R. J. Halter, D. F. Kotz

Abstract:

Resistance exercise bands are a core component of any physical activity strengthening program. Strength training can mitigate the development of sarcopenia, the loss of muscle mass or strength and function with aging. Yet, the adherence of such behavioral exercise strategies in a home-based setting are fraught with issues of monitoring and compliance. Our group developed a Bluetooth-enabled resistance exercise band capable of transmitting data to an open-source platform. In this work, we developed an application to capture this information in real-time, and conducted three usability studies in two mixed-aged groups of participants (n=6 each) and a group of older adults with obesity participating in a weight-loss intervention (n=20). The system was favorable, acceptable and provided iterative information that could assist in future deployment on ubiquitous platforms. Our formative work provides the foundation to deliver home-based monitoring interventions in a high-risk, older adult population.

Keywords: application, mHealth, older adult, resistance exercise band, sarcopenia

Procedia PDF Downloads 162
23409 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 315
23408 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 74
23407 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 353
23406 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 379
23405 The Incidence of Prostate Cancer in Previous Infected E. Coli Population

Authors: Andreea Molnar, Amalia Ardeljan, Lexi Frankel, Marissa Dallara, Brittany Nagel, Omar Rashid

Abstract:

Background: Escherichia coli is a gram-negative, facultative anaerobic bacteria that belongs to the family Enterobacteriaceae and resides in the intestinal tracts of individuals. E.Coli has numerous strains grouped into serogroups and serotypes based on differences in antigens in their cell walls (somatic, or “O” antigens) and flagella (“H” antigens). More than 700 serotypes of E. coli have been identified. Although most strains of E. coli are harmless, a few strains, such as E. coli O157:H7 which produces Shiga toxin, can cause intestinal infection with symptoms of severe abdominal cramps, bloody diarrhea, and vomiting. Infection with E. Coli can lead to the development of systemic inflammation as the toxin exerts its effects. Chronic inflammation is now known to contribute to cancer development in several organs, including the prostate. The purpose of this study was to evaluate the correlation between E. Coli and the incidence of prostate cancer. Methods: Data collected in this cohort study was provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database to evaluate patients infected with E.Coli infection and prostate cancer using the International Classification of Disease (ICD-10 and ICD-9 codes). Permission to use the database was granted by Holy Cross Health, Fort Lauderdale for the purpose of academic research. Data analysis was conducted through the use of standard statistical methods. Results: Between January 2010 and December 2019, the query was analyzed and resulted in 81, 037 patients after matching in both infected and control groups, respectively. The two groups were matched by Age Range and CCI score. The incidence of prostate cancer was 2.07% and 1,680 patients in the E. Coli group compared to 5.19% and 4,206 patients in the control group. The difference was statistically significant by a p-value p<2.2x10-16 with an Odds Ratio of 0.53 and a 95% CI. Based on the specific treatment for E.Coli, the infected group vs control group were matched again with a result of 31,696 patients in each group. 827 out of 31,696 (2.60%) patients with a prior E.coli infection and treated with antibiotics were compared to 1634 out of 31,696 (5.15%) patients with no history of E.coli infection (control) and received antibiotic treatment. Both populations subsequently developed prostate carcinoma. Results remained statistically significant (p<2.2x10-16), Odds Ratio=0.55 (95% CI 0.51-0.59). Conclusion: This retrospective study shows a statistically significant correlation between E.Coli infection and a decreased incidence of prostate cancer. Further evaluation is needed in order to identify the impact of E.Coli infection and prostate cancer development.

Keywords: E. Coli, prostate cancer, protective, microbiology

Procedia PDF Downloads 202
23404 The Development of Packaging to Create Additional Value for Organic Rice Products of Uttaradit Province, Thailand

Authors: Juntima Pokkrong

Abstract:

The objectives of the study were to develop packaging made from rice straws left after the harvest in order to create additional value for organic rice products of Uttaradit Province and to demonstrate the technology of producing straw packaging to the community. The population was promoters of organic rice distributors, governmental organizations, consumers, and three groups of organic rice producers which are the Agriculturist Group of Khorrum Sub-district, Pichai District, Uttaradit Province; the Agriculturist Group of Wangdin Sub-district, Muang District, Uttaradit Province; and the Agriculturist Group of Wangkapi Sub-district, Muang District, Uttaradit Province. The data were collected via group discussions, and two types of questionnaires. The data acquired were then analyzed using descriptive statistic for percentage, mean, standard deviation, and content analysis. It has been found that primary packaging for one kilogram of rice requires vacuumed plastic bags made from thermoplastic or resin because they are able to preserve the quality of rice for a long time, and they are also very cheap. For secondary packaging, the making of straw paper was studied and applied. Straw paper can be used for various purposes, and in this study, it was used to create the secondary packaging models in compliance with packaging preferences acquired from the questionnaires. The models were surveyed among the population for their opinion using satisfaction questionnaires, and the result was overall highly satisfactory.

Keywords: environmentally friendly, organic rice, packaging, straw paper

Procedia PDF Downloads 235
23403 A Randomized Comparative Evaluation of Efficacy of Ultrasound Guided Costoclavicular and Supraclavicular Approaches of Brachial Plexus Block for Upper Limb Surgeries

Authors: Anshul, Rajni Kalia, Sachin Kumar

Abstract:

Introduction: The costoclavicular approach, a modification to the infraclavicular approach, has been described for anesthesia for upper limb surgeries. Material And Methods: In this randomized and single-blind study, fourty patients undergoing emergency/elective upper limb surgery were allocated to two groups. Group C and S received ultrasound-guided Costoclavicular block and Supraclavicular block, respectively, with 20 ml 0.5 % ropivacaine with 8 mg dexamethasone under strict asepsis. The primary outcome assessed was the total duration of sensory and motor block in the postoperative period. Secondary outcomes were to compare the time taken to perform the procedure, block characteristics in terms of onset of motor and sensory blockade, the efficacy of analgesia with respect to the time of administration of the first rescue analgesic dose with both the blocks and note the side effects pertaining to either of the blocks. Results: The mean total duration of sensory and motor blockade was longer in group C vs. group S (p=0.002 and 0.024, respectively). The mean duration to perform a block in group S was more than in group C (p=0.012). The mean onset of sensory and motor Blockade Time in group S was more than in group C (p<0.001 and <0.001, respectively). The mean duration to perform a block in group S was more than in group C (p=0.012). Conclusion: The costoclavicular approach is better than supraclavicular in terms of rapid execution, faster onset of sensory-motor blockade, prolonged postoperative analgesia and similar PONV and safety profile.

Keywords: costoclavicular, supraclavicular, ropivacaine, dexamethasone

Procedia PDF Downloads 56
23402 Contingency Screening Using Risk Factor Considering Transmission Line Outage

Authors: M. Marsadek, A. Mohamed

Abstract:

Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed.  In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time.  To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor.  The proposed technique is implemented on IEEE 24-bus system.

Keywords: line overload, low voltage, probability, risk factor, severity

Procedia PDF Downloads 537
23401 Debris' Effect on Bearing Capacity of Defective Piles in Sand

Authors: A. M. Nasr, W. R. Azzam, K. E. Ebeed

Abstract:

For bored piles, careful cleaning must be used to reduce the amount of material trapped in the drilled hole; otherwise, the debris' presence might cause the soft toe effect, which would affect the axial resistance. There isn't much comprehensive research on bored piles with debris. In order to investigate the behavior of a single pile, a pile composite foundation, a two pile group, a three pile group and a four pile group investigation conducts, forty-eight numerical tests in which the debris is simulated using foam rubber.1m pile diameter and 10m length with spacing 3D and depth of foundation 1m used in this study. It is found that the existence of debris causes a reduction of bearing capacity by 64.58% and 33.23% for single pile and pile composite foundation, respectively, 23.27% and 24.24% for the number of defective piles / total number of pile =1/2 and 1 respectively for two group pile, 10.23%, 19.42% and 28.47% for the number of defective piles / total number of pile =1/3,2/3 and 1 respectively for three group pile and, this reduction increase with the increase in a number of defective piles / a total number of piles and 7.1%, 13.32%,19.02% and 26.36 for the number of defective piles / total number of pile =1/4,2/4,3/4 and 1 respectively for four group pile and decreases with an increase of number of pile duo to interaction effect.

Keywords: debris, Foundation, defective, interaction, board pile

Procedia PDF Downloads 80
23400 Evaluation of Vitamin D Levels in Obese and Morbid Obese Children

Authors: Orkide Donma, Mustafa M. Donma

Abstract:

Obesity may lead to growing serious health problems throughout the world. Vitamin D appears to play a role in cardiovascular and metabolic health. Vitamin D deficiency may add to derangements in human metabolic systems, particularly those of children. Childhood obesity is associated with an increased risk of chronic and sophisticated diseases. The aim of this study is to investigate associations as well as possible differences related to parameters affected by obesity and their relations with vitamin D status in obese (OB) and morbid obese (MO) children. This study included a total of 78 children. Of them, 41 and 37 were OB and MO, respectively. WHO BMI-for age percentiles were used for the classification of obesity. The values above 99 percentile were defined as MO. Those between 95 and 99 percentiles were included into OB group. Anthropometric measurements were recorded. Basal metabolic rates (BMRs) were measured. Vitamin D status is determined by the measurement of 25-hydroxy cholecalciferol [25- hydroxyvitamin D3, 25(OH)D] using high-performance liquid chromatography. Vitamin D status was evaluated as deficient, insufficient and sufficient. Values < 20.0 ng/ml, values between 20-30 ng/ml and values > 30.0 ng/ml were defined as vitamin D deficient, insufficient and sufficient, respectively. Optimal 25(OH)D level was defined as ≥ 30 ng/ml. SPSSx statistical package program was used for the evaluation of the data. The statistical significance degree was accepted as p < 0.05. Mean ages did not differ between the groups. Significantly increased body mass index (BMI), waist circumference (C) and neck C as well as significantly decreased fasting blood glucose (FBG) and vitamin D values were observed in MO group (p < 0.05). In OB group, 37.5% of the children were vitamin D deficient, and in MO group the corresponding value was 53.6%. No difference between the groups in terms of lipid profile, systolic blood pressure (SBP), diastolic blood pressure (DBP) and insulin values was noted. There was a severe statistical significance between FBG values of the groups (p < 0.001). Important correlations between BMI, waist C, hip C, neck C and both SBP as well as DBP were found in OB group. In MO group, correlations only with SBP were obtained. In a similar manner, in OB group, correlations were detected between SBP-BMR and DBP-BMR. However, in MO children, BMR correlated only with SBP. The associations of vitamin D with anthropometric indices as well as some lipid parameters were defined. In OB group BMI, waist C, hip C and triglycerides (TRG) were negatively correlated with vitamin D concentrations whereas none of them were detected in MO group. Vitamin D deficiency may contribute to the complications associated with childhood obesity. Loss of correlations between obesity indices-DBP, vitamin D-TRG, as well as relatively lower FBG values, observed in MO group point out that the emergence of MetS components starts during obesity state just before the transition to morbid obesity. Aside from its deficiency state, associations of vitamin D with anthropometric measurements, blood pressures and TRG should also be evaluated before the development of morbid obesity.

Keywords: children, morbid obesity, obesity, vitamin D

Procedia PDF Downloads 128