Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1278

Search results for: socially engineered attacks

498 Consumer Value and Purchase Behaviour: The Mediating Role of Consumers' Expectations of Corporate Social Responsibility in Durban, South Africa

Authors: Abosede Ijabadeniyi, Jeevarathnam P. Govender

Abstract:

Prevailing strategic Corporate Social Responsibility (CSR) research is predominantly centred around the predictive implications of the construct on behavioural outcomes. This phenomenon limits the depth of our understanding of the trajectory of strategic CSR. The purpose of this paper is to investigate the mediating effects of CSR expectations on the relationship between consumer value and purchase behaviour by identifying the implications of the multidimensionality of CSR (economic, legal, ethical and philanthropic) on the latter. Drawing from the stakeholder theory and its interplay with the prevalence of Ubuntu values; the underlying force which governs the values of South African camaraderie, we hypothesise that the multidimensionality of CSR expectations has positive mediating effects in the relationship between consumer value and purchase behaviour. Partial Least Square (PLS) path modelling was employed, using six measures of the average path coefficient (APC) to test the relationship between the constructs. Results from a sample of mall shoppers of (n=411), based on a survey conducted across five major malls in Durban, South Africa, indicate that only the legal dimension of CSR serves as a mediating factor in the relationship among the constructs. South Africa’s unique history of segregation, leading to the proliferation of spontaneous organisational approach to CSR and higher expectations of organisational legitimacy are identified as antecedents of consumers’ reliance on the law (legal CSR) to redress the ills of the past, sustainable development, and socially responsible behaviour. The paper also highlights theoretical and managerial implications for future research.

Keywords: consumer value, corporate marketing, corporate social responsibility, purchase behaviour, Ubuntu

Procedia PDF Downloads 351
497 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 105
496 Digital Interventions for Older People Experiencing Homelessness (OPEH): A Systematic Scoping Review

Authors: Emily Adams, Eddie Donaghy, David Henderson, Lauren Ng, Caroline Sanders, Rowena Stewart, Maria Wolters, Stewart Mercer

Abstract:

Ongoing review abstract: Older People Experiencing Homelessness (OPEH) can have mental and physical indicators of aging 10–20 years earlier than the general population and experience premature mortality due to age-related chronic conditions. Emerging literature suggests digital interventions could positively impact PEH’s well-being. However, the increased reliance on digital delivery may also perpetuate digital inequalities for socially excluded groups, including PEH. The potential triple disadvantage of being older, homeless, and digitally excluded creates a uniquely problematic situation that warrants further research. This scoping review aims to investigate and synthesise the range and type of digital interventions available to OPEH and the organisations that support OPEH. The following databases were searched on 28th July 2023: Medline, Scopus, International Bibliography of the Social Sciences (IBSS)‎, Applied Social Sciences Index & Abstracts (ASSIA)‎, Association for Computing Machinery Digital Library (ACMDL) and Policy commons. A search strategy was developed in collaboration with an academic librarian. The presentation will include: An introduction to OPEH and digital exclusion Overview of the results of this review: OPEH usage of digital platforms Current digital interventions available The role of support organisations Current gaps in the evidence, future research and recommendations for policy and practice

Keywords: homeless, digital exclusion, aging, technology

Procedia PDF Downloads 60
495 Patriarchy in Caste Society and Control over Women’s Sexuality in India

Authors: Renu Singh

Abstract:

The caste system in Indian society plays an important role in subjugation of women. It creates divides and controls over women’s sexuality in various ways. This paper attempts to look into various modes in which the institution of caste makes some forms of sexuality as socially “acceptable” norms, while deems others as obscene, immoral and against social ethos. Based on a review of existing literature in this area this paper attempts to understand the notion of sexuality in Indian context. It tries to understand how the emergence of norms and values of sexual behaviour has been entwined with the evolution of caste system and the subjugation of many sections of Indian society. It also attempts to trace the internalisation of patriarchal values in Indian society, and the role played by the colonial rulers in creating and maintaining stringent division of space into public and private ones. It is argued here that brahmanical patriarchy, which is a unique phenomenon of the Indian Subcontinent, plays a crucial role in subjugating and controlling women in general and their sexuality in particular. It also creates a divide among women of different castes. Furthermore, the process of colonisation played an important role in shaping the discourse of sexuality in its present form. There were contradictions as well as consensus between the colonial rulers over the questions of regulation of the private domain, as in introducing reform legislation in the nineteenth century informed the debate on sexuality in postcolonial India. The process of emergence of the dichotomous notions of ‘good’ and ‘bad’ sexuality, and the resistance to any ‘deviation’ from the ‘normal’ sexuality is located, not merely in the ‘passive’ evolution of society, but in the actual politics of it.

Keywords: caste, control, sexuality, regulation, brahmanical patriarchy, India

Procedia PDF Downloads 318
494 A Psychosocial Approach to Community Development, Lessons from the Transition Town Movement in Italy

Authors: Anna Zoli

Abstract:

In recent years, we have been witnessing a surge of locally-sustained communities committed to promoting new ethical economies while fostering the full participation of socially excluded groups and individuals into the labor market. This article explores the practices of a particular community development model, Transition Towns, as implemented in Monteveglio, Italy. Data were gathered throughout two years long ethnography, using multiple qualitative techniques, namely participant observation, document analysis, and semi-structured interviews. Data were analyzed triangulating from multiple sources of evidence and using hybrid thematic analysis. Major findings show that Transition Town movement works on two main axes, vertical and horizontal. Vertical transition involves interactions with an overreaching political, economic, and social structure which is not transitioning, and therefore poses structural resistances to the transformative social change fostered by the TT. Conversely, horizontal transition involves intragroup dynamics within the communal relational and geographical spaces and therefore poses process resistances between 'self and others' to the interpersonal communication between TT members. The study concludes that a psychosocial approach to community development is essential in order to conflate macro-social dynamics and psychological processes that may obstacle grassroots social movements to thrive. Skills from psychosocial disciplines are a unique set that could facilitate communication and relational processes for community development, and ultimately enabling social change.

Keywords: community development, grassroots social movements, psychosocial approaches, Transition Towns

Procedia PDF Downloads 109
493 Intensified Electrochemical H₂O₂ Synthesis and Highly Efficient Pollutant Removal Enabled by Nickel Oxides with Surface Engineered Facets and Vacancies

Authors: Wenjun Zhang, Thao Thi Le, Dongyup Shin, Jong Min Kim

Abstract:

Electrochemical hydrogen peroxide (H₂O₂) synthesis holds significant promise for decentralized environmental remediation through the electro-Fenton process. However, challenges persist, such as the absence of robust electrocatalysts for the selective two-electron oxygen reduction reaction (2e⁻ ORR) and the high cost and sluggish kinetics of conventional electro-Fenton systems in treating highly concentrated wastewater. This study introduces an efficient water treatment system for removing substantial quantities of organic pollutants using an advanced electro-Fenton system coupled with a high-valent NiO catalyst. By employing a precipitation method involving crystal facet and cation vacancy engineering, a trivalent Ni (Ni³⁺)-rich NiO catalyst with a (111)-domain-exposed crystal facet, named {111}-NivO, was synthesized. This catalyst exhibited a remarkable 96% selectivity and a high mass activity of 59 A g⁻¹ for H₂O₂ production, outperforming all previously reported Ni-based catalysts. Furthermore, an advanced electro-Fenton system, integrated with a flow cell for electrochemical H₂O₂ production, was utilized to achieve 100% removal of 50 ppm bisphenol A (BPA) in 200 mL of wastewater under heavy-duty conditions, reaching a superior rapid degradation rate (4 min, k = 1.125 min⁻¹), approximately 102 times faster than the conventional electro-Fenton system. The hyper-efficiency is attributed to the continuous and appropriate supply of H₂O₂, the provision of O₂, and the timely recycling of the electrolyte under high current density operation. This catalyst also demonstrated a 93% removal of total organic carbon after 2 hours of operation and can be applied for efficient removal of highly concentrated phenol pollutants from aqueous systems, which opens new avenues for wastewater treatment.

Keywords: hydrogen peroxide production, nickel oxides, crystal facet and cation vacancy engineering, wastewater treatment, flow cell, electro-Fenton

Procedia PDF Downloads 35
492 An Integrated Approach to Solid Waste Management of Karachi, Pakistan (Waste-to-Energy Options)

Authors: Engineer Dilnawaz Shah

Abstract:

Solid Waste Management (SWM) is perhaps one of the most important elements constituting the environmental health and sanitation of the urban developing sector. The management system has several components that are integrated as well as interdependent; thus, the efficiency and effectiveness of the entire system are affected when any of its functional components fails or does not perform up to the level mark of operation. Sindh Solid Waste Management Board (SSWMB) is responsible for the management of solid waste in the entire city. There is a need to adopt the engineered approach in the redesigning of the existing system. In most towns, street sweeping operations have been mechanized and done by machinery operated by vehicles. Construction of Garbage Transfer Stations (GTS) at a number of locations within the city will cut the cost of transportation of waste to disposal sites. Material processing, recovery of recyclables, compaction, volume reduction, and increase in density will enable transportation of waste to disposal sites/landfills via long vehicles (bulk transport), minimizing transport/traffic and environmental pollution-related issues. Development of disposal sites into proper sanitary landfill sites is mandatory. The transportation mechanism is through garbage vehicles using either hauled or fixed container systems employing crew for mechanical or manual loading. The number of garbage vehicles is inadequate, and due to comparatively long haulage to disposal sites, there are certain problems of frequent vehicular maintenance and high fuel costs. Foreign investors have shown interest in enterprising improvement schemes and proposed operating a solid waste management system in Karachi. The waste to Energy option is being considered to provide a practical answer to be adopted to generate power and reduce waste load – a two-pronged solution for the increasing environmental problem. The paper presents results and analysis of a recent study into waste generation and characterization probing into waste-to-energy options for Karachi City.

Keywords: waste to energy option, integrated approach, solid waste management, physical and chemical composition of waste in Karachi

Procedia PDF Downloads 17
491 Opinion Mining to Extract Community Emotions on Covid-19 Immunization Possible Side Effects

Authors: Yahya Almurtadha, Mukhtar Ghaleb, Ahmed M. Shamsan Saleh

Abstract:

The world witnessed a fierce attack from the Covid-19 virus, which affected public life socially, economically, healthily and psychologically. The world's governments tried to confront the pandemic by imposing a number of precautionary measures such as general closure, curfews and social distancing. Scientists have also made strenuous efforts to develop an effective vaccine to train the immune system to develop antibodies to combat the virus, thus reducing its symptoms and limiting its spread. Artificial intelligence, along with researchers and medical authorities, has accelerated the vaccine development process through big data processing and simulation. On the other hand, one of the most important negatives of the impact of Covid 19 was the state of anxiety and fear due to the blowout of rumors through social media, which prompted governments to try to reassure the public with the available means. This study aims to proposed using Sentiment Analysis (AKA Opinion Mining) and deep learning as efficient artificial intelligence techniques to work on retrieving the tweets of the public from Twitter and then analyze it automatically to extract their opinions, expression and feelings, negatively or positively, about the symptoms they may feel after vaccination. Sentiment analysis is characterized by its ability to access what the public post in social media within a record time and at a lower cost than traditional means such as questionnaires and interviews, not to mention the accuracy of the information as it comes from what the public expresses voluntarily.

Keywords: deep learning, opinion mining, natural language processing, sentiment analysis

Procedia PDF Downloads 153
490 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 45
489 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 353
488 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 146
487 How Envisioning Process Is Constructed: An Exploratory Research Comparing Three International Public Televisions

Authors: Alexandre Bedard, Johane Brunet, Wendellyn Reid

Abstract:

Public Television is constantly trying to maintain and develop its audience. And to achieve those goals, it needs a strong and clear vision. Vision or envision is a multidimensional process; it is simultaneously a conduit that orients and fixes the future, an idea that comes before the strategy and a mean by which action is accomplished, from a business perspective. Also, vision is often studied from a prescriptive and instrumental manner. Based on our understanding of the literature, we were able to explain how envisioning, as a process, is a creative one; it takes place in the mind and uses wisdom and intelligence through a process of evaluation, analysis and creation. Through an aggregation of the literature, we build a model of the envisioning process, based on past experiences, perceptions and knowledge and influenced by the context, being the individual, the organization and the environment. With exploratory research in which vision was deciphered through the discourse, through a qualitative and abductive approach and a grounded theory perspective, we explored three extreme cases, with eighteen interviews with experts, leaders, politicians, actors of the industry, etc. and more than twenty hours of interviews in three different countries. We compared the strategy, the business model, and the political and legal forces. We also looked at the history of each industry from an inertial point of view. Our analysis of the data revealed that a legitimacy effect due to the audience, the innovation and the creativity of the institutions was at the cornerstone of what would influence the envisioning process. This allowed us to identify how different the process was for Canadian, French and UK public broadcasters, although we concluded that the three of them had a socially constructed vision for their future, based on stakeholder management and an emerging role for the managers: ideas brokers.

Keywords: envisioning process, international comparison, television, vision

Procedia PDF Downloads 115
486 An Anthropological Insight into Cultural Beliefs, Perceptions and Taboos Associated with Reproductive Tract Infections among Women of Village Junga Village, Himachal Pradesh, India

Authors: A. Ratika Thakur, B. A. K. Sinha , C. R. K. Pathak

Abstract:

Reproductive Tract Infections are recognized as a serious global health problem with direct impact on women. In the developing countries, prevalence of RTI is much higher relative to other health problems. Women of the reproductive age group are socially, mentally and physically more vulnerable to infections. Also, it is a well established fact that RTI has prolonged complications in women rather than men. It causes ectopic pregnancy, pelvic inflammatory diseases, miscarriage and infertility in the long course. Women perspective about infections is less studied. In this view the study was carried out with an aim to determine knowledge, perception and belief of married women towards reproductive tract infection. The study was conducted in Junga village, District Shimla, Himachal Pradesh, India. 48 women were interviewed regarding awareness, beliefs and taboos related to reproductive tract infection. Other aspects like fertility history were also taken into account. The data were collected using interviews with the help of interview schedule and interview guide. Data were recorded in the form of narratives and case studies. The analysis was done using quantitative and qualitative analysis. It was found that a majority of women were not aware about the reasons of infection. Moreover cultural beliefs, perceptions and taboos made them more vulnerable and exposed to RTI. Economic dependency upon men, lack of control in barrier methods were some of the factors that contributed to delayed treatment of women. It was found that a majority of women suffering from RTIs were silently bearing the burden and underwent treatment when the case would not rest in their hands.

Keywords: belief, infection, perception, taboo, women

Procedia PDF Downloads 367
485 Back to Nature: Addressing the German Nudist Movement’s Colonial Past and Its Repercussions

Authors: Saskia Köbschall

Abstract:

The idea of ‘being close to nature’ and the ways of achieving this proximity are socially and historically constructed, as are notions of nakedness and nudity. During the colonial period, nudity and clothedness functioned as instruments of racial domination. Nakedness became central to the colonialists’ thinking, to their binary of the ‘civilized’ and those ‘close to nature’, therefore turning the level of perceived unclothedness into a measurement of ‘civilization'. While being ‘one with nature’ continued to be a criterion of backwardness in the colonies, it emerged as a futuristic and avant-garde endeavor in the metropole: In Germany, at the height of its colonial expansion, the Life Reform Movement (Lebensreformbewegung) called for the liberation of the white body from the ‘constraints of civilization’, for its ‘return to nature’ via practices like nudism. Despite this simultaneity, the scholarship of the life reform and the nudist movement in particular does not address the colonial past of the movement or its repercussions in the present. Taking the biography of prominent life reformist Hans Paasche (1881 - 1920) as a starting point, this paper explores the work of imperial legacies in the history and present of the German nudist movement. Paasche started his career as a German colonial officer, participating in the brutal obliteration of the Maji-Maji uprising (1905/06) that claimed the lives of nearly 200.000 people. Once a passionate game hunter, he later became a known nature conservationist; once a self-proclaimed explorer of Africa, he later became one of the most prominent advocates of nudism and vegetarianism. The paper joins conceptual and historical research in order to address the German nudist movement’s colonial past and understand its repercussions in the present.

Keywords: Germany, life reform, colonialism, archives, nudity, nature

Procedia PDF Downloads 70
484 A Corporate Social Responsibility View on Bribery Control in Business Relationships

Authors: Irfan Ameer

Abstract:

Bribery control in developing countries is the biggest challenge for multinational enterprises (MNEs). Bribery practices are socially embedded and institutionalized, and therefore may achieve collective legitimacy in the society. MNEs often have better and strict norms, codes and standards about such corrupt practices. Bribery in B2B sales relationships has been researched but studies focusing on the role of firm in controlling bribery are scarce. The main objective of this paper is to explore MNEs strategies to control bribery in an environment where bribery is institutionalized. This qualitative study uses narrative approach and focuses on key events, actors and their role in controlling bribery in B2B sales relationships. The context of this study is pharmaceutical industry of Pakistan and data is collected through 23 episodic interviews supported by secondary data. The Corporate social responsibility (CSR) literature e.g. CSR three domain model and CSR pyramid is used to make sense of MNEs strategies to control bribery in developing countries. Results show that MNEs’ bribery control strategies are rather emerging based on the role of some key stakeholders and events which shape bribery strategies. Five key bribery control strategies were found through which MNEs can control both demand and supply side of bribery: bribery related codes development; bribery related codes implementation; focusing on competitive advantage; find mutually beneficial ethical solution; and collaboration with ethical stakeholders. The results also highlight the problems associated with each strategy. Study is unique in a sense that it focuses on stakeholders having unethical interests and provides guidelines to MNEs in controlling bribery practices in B2B sales relationships.

Keywords: bribery, developing countries, CSR, narrative research, B2B sales, MNEs

Procedia PDF Downloads 358
483 Developing Customizable Scaffolds With Antimicrobial Properties for Vascular Tissue Regeneration Using Low Temperature Plasma

Authors: Komal Vig, Syamala Soumyakrishnan, Yadav Baral

Abstract:

Bypass surgery, using the autologous vein has been one of the most effective treatments for cardiovascular diseases (CVD). More recently tissue engineering including engineered vascular grafts to synthesize blood vessels is gaining usage. Dacron and ePTFE has been employed for vascular grafts, however, these does not work well for small diameter grafts (<6 mm) due to intimal hyperplasia and thrombosis. In the present study PTFE was treated with LTP to improve the endothelialization of intimal surface of graft. Scaffolds were also modified with polyvinylpyrrolidone coated silver nanoparticles (Ag-PVP) and the antimicrobial peptides, p753 and p359. Human umbilical vein endothelial cells (HUVEC) were plated on the developed scaffolds and cell proliferation was determined by the MTT assay. Cells attachment on scaffolds was visualized by microscopy. mRNA expressions levels of different cell markers were investigated using quantitative real-time PCR (qPCR). X ray photoelectron spectroscopic confirmed the introduction of oxygenated functionalities from LTP air plasma. Microscopic and MTT assays indicated increase in cell viability in LTP treated scaffolds. Gene expression studies shows enhanced expression of cell adhesion marker Integrin- α 5 gene after LTP treatment. The KB test displayed a zone of inhibition for Ag-PVP, p753 and p359 of 19mm, 14mm, and 12mm respectively. To determine toxicity of antimicrobial agents to cells, MTT Assay was performed using HEK293 cells. MTT Assay exhibited that Ag-PVP and the peptides were non-toxic to cells at 100μg/mL and 50μg/mL, respectively. Live/dead analysis and plate count of treated bacteria exhibited bacterial inhibition on develop scaffold compared to non-treated scaffold. SEM was performed to analyze the structural changes of bacteria after treatment with antimicrobial agents. Gene expression studies were conducted on RNA from bacteria treated with Ag-PVP and peptides using qRT-PCR. Based on our initial results, more scaffolds alternatives will be developed and investigated for cell growth and vascularization studies.

Keywords: low temperature plasma, vascular graft, HUVEC cells, antimicrobial

Procedia PDF Downloads 225
482 Gadolinium-Based Polymer Nanostructures as Magnetic Resonance Imaging Contrast Agents

Authors: Franca De Sarno, Alfonso Maria Ponsiglione, Enza Torino

Abstract:

Recent advances in diagnostic imaging technology have significantly contributed to a better understanding of specific changes associated with diseases progression. Among different imaging modalities, Magnetic Resonance Imaging (MRI) represents a noninvasive medical diagnostic technique, which shows low sensitivity and long acquisition time and it can discriminate between healthy and diseased tissues by providing 3D data. In order to improve the enhancement of MRI signals, some imaging exams require intravenous administration of contrast agents (CAs). Recently, emerging research reports a progressive deposition of these drugs, in particular, gadolinium-based contrast agents (GBCAs), in the body many years after multiple MRI scans. These discoveries confirm the need to have a biocompatible system able to boost a clinical relevant Gd-chelate. To this aim, several approaches based on engineered nanostructures have been proposed to overcome the common limitations of conventional CAs, such as the insufficient signal-to-noise ratios due to relaxivity and poor safety profile. In particular, nanocarriers, labeling or loading with CAs, capable of carrying high payloads of CAs have been developed. Currently, there’s no a comprehensive understanding of the thermodynamic contributions enable of boosting the efficacy of conventional CAs by using biopolymers matrix. Thus, considering the importance of MRI in diagnosing diseases, here it is reported a successful example of the next generation of these drugs where the commercial gadolinium chelate is incorporate into a biopolymer nanostructure, formed by cross-linked hyaluronic acid (HA), with improved relaxation properties. In addition, they are highlighted the basic principles ruling biopolymer-CA interactions in the perspective of their influence on the relaxometric properties of the CA by adopting a multidisciplinary experimental approach. On the basis of these discoveries, it is clear that the main point consists in increasing the rigidification of readily-available Gd-CAs within the biopolymer matrix by controlling the water dynamics, the physicochemical interactions, and the polymer conformations. In the end, the acquired knowledge about polymer-CA systems has been applied to develop of Gd-based HA nanoparticles with enhanced relaxometric properties.

Keywords: biopolymers, MRI, nanoparticles, contrast agent

Procedia PDF Downloads 139
481 A Study of Gender Awareness among College Students in Delhi

Authors: Shailly Kumar

Abstract:

Gender is a social construction resulting in defining roles and responsibilities to carried out according to masculine and feminine traits. The main aim of the study was to explore gender awareness among college going students of Delhi. The objectives of studies were to find out (i) the understanding of term gender and roles and responsibilities associated with male and female as masculine and feminine traits in our society. (ii)Gender images representing the attributes and characteristics attached to particular gender. (iii) Gender discrimination prevailing among girls and boys in our society. (iv)Gender stereotypes resulting in gendering with respect to religion, culture, family and media. The sample of study consisted of 100 undergraduate college girl students. The findings of study stated that the students had this understanding that sex is a natural phenomenon and gender is socially constructed. Gender defines the roles and responsibilities among two sexes. On a gender image students concluded that males are represented as a powerful members of society showing physical strength and violence, force and society gave the power to men oppress and subjugate women in society that's why women are treated inferior and given secondary position in society. On gender discrimination, girl students stated that they faced discrimination at all level such as family, media ,education, workplace etc .There is strong prevailing gender stereotypes among girls and boys with respect to religious practices, choice of career ,preference of child etc. This study concluded that students were aware of gendered practices in various domains of life. The study helped to interpret the notions and perceptions of students towards gendering of social spaces and in their lives.

Keywords: gender, gender awareness, gender role, masculinity and feminity

Procedia PDF Downloads 412
480 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 132
479 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 33
478 Language Development and Learning about Violence

Authors: Karen V. Lee

Abstract:

The background and significance of this study involves research about a music teacher discovering how language development and learning can help her overcome harmful and lasting consequences from sexual violence. Education about intervention resources from language development that helps her cope with consequences influencing her career as teacher. Basic methodology involves the qualitative method of research as theoretical framework where the author is drawn into a deep storied reflection about political issues surrounding teachers who need to overcome social, psychological, and health risk behaviors from violence. Sub-themes involve available education from learning resources to ensure teachers receive social, emotional, physical, spiritual, and intervention resources that evoke visceral, emotional responses from the audience. Major findings share how language development and learning provide helpful resources to victims of violence. It is hoped the research dramatizes an episodic yet incomplete story that highlights the circumstances surrounding the protagonist’s life. In conclusion, the research has a reflexive storied framework that embraces harmful and lasting consequences from sexual violence. The reflexive story of the sensory experience critically seeks verisimilitude by evoking lifelike and believable feelings from others. Thus, the scholarly importance of using language development and learning for intervention resources can provide transformative aspects that contribute to social change. Overall, the circumstance surrounding the story about sexual violence is not uncommon in society. Language development and learning supports the moral mission to help teachers overcome sexual violence that socially impacts their professional lives as victims.

Keywords: intervention, language development and learning, sexual violence, story

Procedia PDF Downloads 322
477 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 83
476 The Impact of the Enron Scandal on the Reputation of Corporate Social Responsibility Rating Agencies

Authors: Jaballah Jamil

Abstract:

KLD (Peter Kinder, Steve Lydenberg and Amy Domini) research & analytics is an independent intermediary of social performance information that adopts an investor-pay model. KLD rating agency does not have an explicit monitoring on the rated firm which suggests that KLD ratings may not include private informations. Moreover, the incapacity of KLD to predict accurately the extra-financial rating of Enron casts doubt on the reliability of KLD ratings. Therefore, we first investigate whether KLD ratings affect investors' perception by studying the effect of KLD rating changes on firms' financial performances. Second, we study the impact of the Enron scandal on investors' perception of KLD rating changes by comparing the effect of KLD rating changes on firms' financial performances before and after the failure of Enron. We propose an empirical study that relates a number of equally-weighted portfolios returns, excess stock returns and book-to-market ratio to different dimensions of KLD social responsibility ratings. We first find that over the last two decades KLD rating changes influence significantly and negatively stock returns and book-to-market ratio of rated firms. This finding suggests that a raise in corporate social responsibility rating lowers the firm's risk. Second, to assess the Enron scandal's effect on the perception of KLD ratings, we compare the effect of KLD rating changes before and after the Enron scandal. We find that after the Enron scandal this significant effect disappears. This finding supports the view that the Enron scandal annihilates the KLD's effect on Socially Responsible Investors. Therefore, our findings may question results of recent studies that use KLD ratings as a proxy for Corporate Social Responsibility behavior.

Keywords: KLD social rating agency, investors' perception, investment decision, financial performance

Procedia PDF Downloads 424
475 Primary and Secondary Psychopathic Traits: Assessing Differences in Interpersonal Relationships through Friendship, Emotional Contagion, and Social Rewards

Authors: Silene Ten Seldam, Kiara Margarita Lu, Melina Nicole Kyranides

Abstract:

Psychopathic traits are marked by a lack of empathy and an inability to maintain meaningful relationships. Yet little research has investigated differences in interpersonal relationships between primary and secondary psychopathic traits. Emotional contagion, the tendency to automatically mimic others’ facial expressions and movements, is a type of empathy contributing to relationship quality. Additionally, the motivating and pleasurable aspects of social interaction, social reward is integral to understanding relationships. Therefore, the current research investigated interpersonal relationships through relationship status, the quality of friendships, the susceptibility to positive (happiness, love) and negative (sadness, fear, anger) emotional contagion, and social reward. Recruited online, 389 participants between 18 and 76 years old (M = 33.61; of which 241 were female) completed self-report questionnaires assessing primary and secondary psychopathic traits, friendship, emotional contagion, and social rewards. Hierarchical multiple regression showed relationship status as a protective factor and that individuals with secondary psychopathic traits are less likely to be in a relationship. This study is the first to investigate emotional contagion with primary and secondary psychopathic traits. Emotional contagion for sadness predicted secondary psychopathic traits. Negative social potency (enjoying being cruel and antagonistic to others) predicted both primary and secondary traits. However, admiration and prosocial interactions only predicted primary psychopathic traits. Findings infer differences in maintaining relationships, regulating emotions, empathising with others through emotional contagion, and motivation to socially engage, perhaps due to each dimensions’distinct origins and manifestations.

Keywords: primary psychopathic traits, secondary psychopathic traits, interpersonal relationships, friendship, emotional contagion, social reward

Procedia PDF Downloads 106
474 Hydrogel Hybridizing Temperature-Cured Dissolvable Gelatin Microspheres as Non-Anchorage Dependent Cell Carriers for Tissue Engineering Applications

Authors: Dong-An Wang

Abstract:

All kinds of microspheres have been extensively employed as carriers for drug, gene and therapeutic cell delivery. Most therapeutic cell delivery microspheres rely on a two-step methodology: fabrication of microspheres and subsequent seeding of cells onto them. In this study, we have developed a novel one-step cell encapsulation technique using a convenient and instant water-in-oil single emulsion approach to form cell-encapsulated gelatin microspheres. This technology is adopted for hyaline cartilage tissue engineering, in which autologous chondrocytes are used as therapeutic cells. Cell viability was maintained throughout and after the microsphere formation (75-100 µm diameters) process that avoids involvement of any covalent bonding reactions or exposure to any further chemicals. Further encapsulation of cell-laden microspheres in alginate gels were performed under 4°C via a prompt process. Upon the formation of alginate constructs, they were immediately relocated into CO2 incubator where the temperature was maintained at 37°C; under this temperature, the cell-laden gelatin microspheres dissolved within hours to yield similarly sized cavities and the chondrocytes were therefore suspended within the cavities inside the alginate gel bulk. Hence, the gelatin cell-laden microspheres served two roles: as cell delivery vehicles which can be removable through temperature curing, and as porogens within an alginate hydrogel construct to provide living space for cell growth and tissue development as well as better permeability for mutual diffusions. These cell-laden microspheres, namely “temperature-cured dissolvable gelatin microsphere based cell carriers” (tDGMCs), were further encapsulated in a chondrocyte-laden alginate scaffold system and analyzed by WST-1, gene expression analyses, biochemical assays, histology and immunochemistry stains. The positive results consistently demonstrated the promise of tDGMC technology in delivering these non-anchorage dependent cells (chondrocytes). It can be further conveniently translated into delivery of other non-anchorage dependent cell species, including stem cells, progenitors or iPS cells, for regeneration of tissues in internal organs, such as engineered hepatogenesis or pancreatic regeneration.

Keywords: biomaterials, tissue engineering, microsphere, hydrogel, porogen, anchorage dependence

Procedia PDF Downloads 374
473 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 162
472 Improved Intracellular Protein Degradation System for Rapid Screening and Quantitative Study of Essential Fungal Proteins in Biopharmaceutical Development

Authors: Patarasuda Chaisupa, R. Clay Wright

Abstract:

The selection of appropriate biomolecular targets is a crucial aspect of biopharmaceutical development. The Auxin-Inducible Degron Degradation (AID) technology has demonstrated remarkable potential in efficiently and rapidly degrading target proteins, thereby enabling the identification and acquisition of drug targets. The AID system also offers a viable method to deplete specific proteins, particularly in cases where the degradation pathway has not been exploited or when the adaptation of proteins, including the cell environment, occurs to compensate for the mutation or gene knockout. In this study, we have engineered an improved AID system tailored to deplete proteins of interest. This AID construct combines the auxin-responsive E3 ubiquitin ligase binding domain, AFB2, and the substrate degron, IAA17, fused to the target genes. Essential genes of fungi with the lowest percent amino acid similarity to human and plant orthologs, according to the Basic Local Alignment Search Tool (BLAST), were cloned into the AID construct in S. cerevisiae (AID-tagged strains) using a modular yeast cloning toolkit for multipart assembly and direct genetic modification. Each E3 ubiquitin ligase and IAA17 degron was fused to a fluorescence protein, allowing for real-time monitoring of protein levels in response to different auxin doses via cytometry. Our AID system exhibited high sensitivity, with an EC50 value of 0.040 µM (SE = 0.016) for AFB2, enabling the specific promotion of IAA17::target protein degradation. Furthermore, we demonstrate how this improved AID system enhances quantitative functional studies of various proteins in fungi. The advancements made in auxin-inducible protein degradation in this study offer a powerful approach to investigating critical target protein viability in fungi, screening protein targets for drugs, and regulating intracellular protein abundance, thus revolutionizing the study of protein function underlying a diverse range of biological processes.

Keywords: synthetic biology, bioengineering, molecular biology, biotechnology

Procedia PDF Downloads 72
471 Challenges to Reaching Higher Education in Developing Countries

Authors: Suhail Shersad

Abstract:

Introduction In developing countries, the access to higher education for the lower socioeconomic strata is very poor at less than 0.05%. The challenges faced by prospective students in these circumstances to pursue higher education have been explored through direct interaction with them and their families in urban slums of New Delhi. This study included evaluation of the demographics, social indices, expectations and perceptions of selected communities. Results The results show that the poor life expectancy, low exposure to technology, lack of social infrastructure and poor sanitary conditions have reduced their drive for academic achievements. This is despite a good level of intelligence and critical thinking skills among these students. The perception of the community including parents shows that despite their desire to excel, there are too may roadblocks to achieving a fruitful professional life for the next generation. Discussion The prerequisites of higher education may have to be revisited to be more inclusive of socially handicapped students. The knowledge, skills and attributes required for higher education system should form the baseline for creating a roadmap for higher secondary education suited for local needs. Conventional parameters like marks and grading have to be re-looked so that life skills and vocational training form part of the core curriculum. Essential skills should be incorporated at an earlier age, providing an alternative pathway for such students to join higher education. Conclusion: There is a need to bridge the disconnect that exists between higher education planning, the needs of the concerned cohorts and the existing higher secondary education. The variables that contribute to making such a decision have to be examined further. Keywords: prerequisites of higher education, social mobility, society expectations, access to higher education

Keywords: access to higher education, prerequisites of higher education, society expectations, social mobility

Procedia PDF Downloads 362
470 Challenging Perceptions of Disability: Exploring the Link between Ableism, Social Stigma, Vision Impairment, and Autism Spectrum Disorder

Authors: Aikaterini Tavoulari

Abstract:

This research aims to address the types of repetitive behaviours (RBs) observed by adults in children with vision impairment (VI) or autism spectrum disorder (ASD), the explanations the adults employ to interpret these behaviours, and the impact RBs have on the child, the caregiver, the professional and society. The underlying reason for this is an attempt to discover any potential differences between two different disabilities in a comparative fashion. The study is based on the interpretivism paradigm and follows a qualitative approach. A comparative case study design based on the ecological systems theory (EST) is adopted. Thirty-five caregivers and accredited professionals were recruited (17 for the VI group, out of whom 8 were caregivers and 9 were professionals, and 18 for the ASD group, out of whom 9 were caregivers and 9 were professionals). Following the completion of a pilot study, all participants were interviewed regarding one specific child – their own child/student – via semi-structured interviews. During the interviews, the researcher used a research diary as a methodological tool and video elicitation as a facilitation tool. A cross-case analysis was conducted, and data were analysed according to the method of thematic analysis. A link has been indicated between VI and ASD, which concerns perceptions about the socially constructed manner in which an RB is perceived. ASD is perceived by the participants as a disability with challenging characteristics, such as an RB. The ASD group perceived RB as linked to ableism, social stigmatisation, and taboo, in contrast to VI, where the existence of RB seems to be a consequence of sensory loss. Bi-directionality of EST seems to have been lost completely, and the macrosystem seems to drive the interactions between the ecological systems.

Keywords: ableism, social stigma, disability, repetitive behaviour, vision impairment, autism spectrum disorder, perceptions

Procedia PDF Downloads 71
469 Soft Computing Approach for Diagnosis of Lassa Fever

Authors: Roseline Oghogho Osaseri, Osaseri E. I.

Abstract:

Lassa fever is an epidemic hemorrhagic fever caused by the Lassa virus, an extremely virulent arena virus. This highly fatal disorder kills 10% to 50% of its victims, but those who survive its early stages usually recover and acquire immunity to secondary attacks. One of the major challenges in giving proper treatment is lack of fast and accurate diagnosis of the disease due to multiplicity of symptoms associated with the disease which could be similar to other clinical conditions and makes it difficult to diagnose early. This paper proposed an Adaptive Neuro Fuzzy Inference System (ANFIS) for the prediction of Lass Fever. In the design of the diagnostic system, four main attributes were considered as the input parameters and one output parameter for the system. The input parameters are Temperature on admission (TA), White Blood Count (WBC), Proteinuria (P) and Abdominal Pain (AP). Sixty-one percent of the datasets were used in training the system while fifty-nine used in testing. Experimental results from this study gave a reliable and accurate prediction of Lassa fever when compared with clinically confirmed cases. In this study, we have proposed Lassa fever diagnostic system to aid surgeons and medical healthcare practictionals in health care facilities who do not have ready access to Polymerase Chain Reaction (PCR) diagnosis to predict possible Lassa fever infection.

Keywords: anfis, lassa fever, medical diagnosis, soft computing

Procedia PDF Downloads 245