Search results for: threats identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3542

Search results for: threats identification

2672 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 380
2671 The Politics of Renewable Energy Generation and Its Challenges: A Case Study of Iran

Authors: Naresh Kumar Verma

Abstract:

Nuclear energy being adapted as a renewable energy source and its production by developing countries has turned into a major strategic concern and politics by the developed world. The West seem to be the sole proprietor of such energy source and any country opting for such energy production either face significant hurdles or geopolitical challenges in developing such energy source. History of West Asia is full of interference by external powers which has been integral in the incessant conflict in the region. Whether it was the creation of Israel, the Gulf war of 1991, or the invasion of Iraq in 2003, and more recently the Iranian nuclear conundrum, the soil of West Asia has always been a witness to the play of extra regional powers game. Iran, being a theocratic state has been facing such threats and challenges, regarding its intentions and its capability in such energy production. The paper will try to assess the following issues: -Politics of Renewable Energy Generation. -Geographical and strategic significance of Iran’s nuclear programme. -Challenges in the path of Iran developing nuclear energy as a RE source. -The interests of the regional and extra-regional actors in challenging Iranian Nuclear Programme.

Keywords: developing countries, geopolitics, Iran, nuclear energy, renewable energy

Procedia PDF Downloads 624
2670 Identification of Genes Regulating Differentiation and Stemness of Human Mesenchymal Stem Cells for Gene Therapy in Regenerative Medicine

Authors: Tong Ming Liu

Abstract:

Human mesenchymal stem cells (MSCs) represent the most used stem cells for clinical application, which have been used in over 1000 clinical trials to treat over 30 diseases due to multilineage differentiation potential, secretome and immunosuppression. Gene therapies of MSCs hold great promise in the treatment of many diseases due to enhanced MSC-based clinical outcomes. To identify genes for gene therapy of MSCs, by comparing gene expression profile before and after MSC differentiation following by functional screening, we have identified ZNF145 that regulated MSC differentiation. Forced expression of ZNF145 resulted in enhanced in vitro chondrogenesis of MSCs as an upstream factor of SOX9 and improved osteochondral repair upon implant into osteochondral defects in rodents. By comparing gene expression profile during differentiation of iPSCs toward MSCs, we also identified gene HOX regulating MSC stemness, which was much downregulated in late-passaged MSCs. Knockdown of this gene greatly compromised MSC stemness including abolished proliferation, decreased CFU-F, promoted senescence and reduced expression of cell surface antigens linked to the MSC phenotype. In addition, multi-linage differentiation was also greatly impaired. Notably, HOX overexpression resulted in improved multi-lineage differentiation. In the mechanism, HOX expression significantly deceased in late passage of MSCs compared with early passage of MSCs, correlating with MSC important genes. ChIP-seq data shown that HOX binds to genes related to MSC self-renewal and differentiation. Most importantly, most HOX binding sites are lost in late passage of MSCs. HOX exerts its effects by directing binding Twist1, one important gene of MSCs. The identification of the genes regulating MSC differentiation and stemness will provide and promising strategies for gene therapy of MSCs in regenerative medicine.

Keywords: mesenchymal stem cell, novel transcription factor, stemness, gene therapy, cartilage repair, signaling pathway

Procedia PDF Downloads 47
2669 Methylation Profiling and Validation of Candidate Tissue-Specific Differentially Methylated Regions for Identification of Human Blood, Saliva, Semen and Vaginal Fluid and Its Application in Forensics

Authors: Meenu Joshi, Natalie Naidoo, Farzeen Kader

Abstract:

Identification of body fluids is an essential step in forensic investigation to aid in crime reconstruction. Tissue-specific differentially methylated regions (tDMRs) of the human genome can be targeted to be used as biomarkers to differentiate between body fluids. The present study was undertaken to establish the methylation status of potential tDMRs in blood, semen, saliva, and vaginal fluid by using methylation-specific PCR (MSP) and bisulfite sequencing (BS). The methylation statuses of 3 potential tDMRS in genes ZNF282, PTPRS, and HPCAL1 were analysed in 10 samples of each body fluid. With MSP analysis, the ZNF282, and PTPRS1 tDMR displayed semen-specific hypomethylation while HPCAL1 tDMR showed saliva-specific hypomethylation. With quantitative analysis by BS, the ZNF282 tDMR showed statistically significant difference in overall methylation between semen and all other body fluids as well as at individual CpG sites (p < 0.05). To evaluate the effect of environmental conditions on the stability of methylation profiles of the ZNF282 tDMR, five samples of each body fluid were subjected to five different forensic simulated conditions (dry at room temperature, wet in an exsiccator, outside on the ground, sprayed with alcohol, and sprayed with bleach) for 50 days. Vaginal fluid showed highest DNA recovery under all conditions while semen had least DNA quantity. Under outside on the ground condition, all body fluids except semen showed a decrease in methylation level; however, a significant decrease in methylation level was observed for saliva. A statistical significant difference was observed for saliva and semen (p < 0.05) for outside on the ground condition. No differences in methylation level were observed for the ZNF282 tDMR under all conditions for vaginal fluid samples. Thus, in the present study ZNF282 tDMR has been identified as a novel and stable semen-specific hypomethylation marker.

Keywords: body fluids, bisulphite sequencing, forensics, tDMRs, MSP

Procedia PDF Downloads 150
2668 Cadaveric Dissection versus Systems-Based Anatomy: Testing Final Year Student Surface Anatomy Knowledge to Compare the Long-Term Effectiveness of Different Course Structures

Authors: L. Sun, T. Hargreaves, Z. Ahmad

Abstract:

Newly-qualified Foundation Year 1 doctors in the United Kingdom are frequently expected to perform practical skills involving the upper limb in clinical practice (for example, venipuncture, cannulation, and blood gas sampling). However, a move towards systems-based undergraduate medical education in the United Kingdom often precludes or limits dedicated time to anatomy teaching with cadavers or prosections, favouring only applied anatomy in the context of pathology. The authors hypothesised that detailed anatomical knowledge may consequently be adversely affected, particularly with respect to long-term retention. A simple picture quiz and accompanying questionnaire testing the identification of 7 upper limb surface landmarks was distributed to a total of 98 final year medical students from two universities - one with a systems-based curriculum, and one with a dedicated longitudinal dissection-based anatomy module in the first year of study. Students with access to dissection and prosection-based anatomy teaching performed more strongly, with a significantly higher rate of correct identification of all but one of the landmarks. Furthermore, it was notable that none of the students who had previously undertaken a systems-based course scored full marks, compared with 20% of those who had participated in the more dedicated anatomy course. This data suggests that a traditional, dissection-based approach to undergraduate anatomy teaching is superior to modern system-based curricula, in terms of aiding long-term retention of anatomical knowledge pertinent to newly-qualified doctors. The authors express concern that this deficit in proficiency could be detrimental to patient care in clinical practice, and propose that, where dissection-led anatomy teaching is not available, further anatomy revision modules are implemented throughout undergraduate education to aid knowledge retention and support clinical excellence.

Keywords: dissection, education, surface anatomy, upper limb

Procedia PDF Downloads 123
2667 A Research for Determining Consumers' Tendency to Prefer Eco-Friendly Products within the Scope of Green Marketing Activities

Authors: Haci Halil Baser, Nurullah Ekmekci, Muammer Zerenler

Abstract:

In the age of environmental concerns increasingly becoming more important, consumer attitudes towards environmentally sensitive products attract attention. Threats to the health and the environment are important factors for consumers to tend to eco-friendly practices and products. In this regard, it is seen positive increases in the tendency to consume organic food and recyclable products. Choosing products, selecting manufacturers and sellers have gained more importance because of increasing consumers' environmental concerns. In this case, it is very important for businesses to act eco-friendly approach in marketing. Green marketing has gained importance and became a concept that manufacturers' agenda by environmental understanding. Although the green marketing activities are common worldwide, studies on consumer perceptions and preferences are unsatisfactory in the literature. In this regard, this study aims to investigate the tendency of consumers to prefer eco-friendly products under the green marketing activities. In the frame of this information and the purpose of the study described above, the survey method has been used in the study. The obtained data have been analyzed through SPSS 20.0 software package, hypothesizes have been tested and suggestions have been made.

Keywords: eco-friendly product, environmental concerns, green consumption, green marketing

Procedia PDF Downloads 289
2666 Computer Based Identification of Possible Molecular Targets for Induction of Drug Resistance Reversion in Multidrug Resistant Mycobacterium Tuberculosis

Authors: Oleg Reva, Ilya Korotetskiy, Marina Lankina, Murat Kulmanov, Aleksandr Ilin

Abstract:

Molecular docking approaches are widely used for design of new antibiotics and modeling of antibacterial activities of numerous ligands which bind specifically to active centers of indispensable enzymes and/or key signaling proteins of pathogens. Widespread drug resistance among pathogenic microorganisms calls for development of new antibiotics specifically targeting important metabolic and information pathways. A generally recognized problem is that almost all molecular targets have been identified already and it is getting more and more difficult to design innovative antibacterial compounds to combat the drug resistance. A promising way to overcome the drug resistance problem is an induction of reversion of drug resistance by supplementary medicines to improve the efficacy of the conventional antibiotics. In contrast to well established computer-based drug design, modeling of drug resistance reversion still is in its infancy. In this work, we proposed an approach to identification of compensatory genetic variants reducing the fitness cost associated with the acquisition of drug resistance by pathogenic bacteria. The approach was based on an analysis of the population genetic of Mycobacterium tuberculosis and on results of experimental modeling of the drug resistance reversion induced by a new anti-tuberculosis drug FS-1. The latter drug is an iodine-containing nanomolecular complex that passed clinical trials and was admitted as a new medicine against MDR-TB in Kazakhstan. Isolates of M. tuberculosis obtained on different stages of the clinical trials and also from laboratory animals infected with MDR-TB strain were characterized by antibiotic resistance, and their genomes were sequenced by the paired-end Illumina HiSeq 2000 technology. A steady increase in sensitivity to conventional anti-tuberculosis antibiotics in series of isolated treated with FS-1 was registered despite the fact that the canonical drug resistance mutations identified in the genomes of these isolates remained intact. It was hypothesized that the drug resistance phenotype in M. tuberculosis requires an adjustment of activities of many genes to compensate the fitness cost of the drug resistance mutations. FS-1 cased an aggravation of the fitness cost and removal of the drug-resistant variants of M. tuberculosis from the population. This process caused a significant increase in genetic heterogeneity of the Mtb population that was not observed in the positive and negative controls (infected laboratory animals left untreated and treated solely with the antibiotics). A large-scale search for linkage disequilibrium associations between the drug resistance mutations and genetic variants in other genomic loci allowed identification of target proteins, which could be influenced by supplementary drugs to increase the fitness cost of the drug resistance and deprive the drug-resistant bacterial variants of their competitiveness in the population. The approach will be used to improve the efficacy of FS-1 and also for computer-based design of new drugs to combat drug-resistant infections.

Keywords: complete genome sequencing, computational modeling, drug resistance reversion, Mycobacterium tuberculosis

Procedia PDF Downloads 257
2665 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 110
2664 South Asia’s Political Landscape: Precipitating Terrorism

Authors: Saroj Kumar Rath

Abstract:

India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.

Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban

Procedia PDF Downloads 608
2663 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 523
2662 Identification and Antibiotic Resistance Rates of Proteus Mirabilis Strains from Various Clinical Specimens in a University Hospital, 2013-2015

Authors: Recep Keşli, Gülşah Aşık, Cengiz Demir, Onur Türkyılmaz

Abstract:

Objective: Proteus mirabilis (P. mirabilis) is one of Gram-negative pathogens in human and it causes urinary tract and nosocomial infections. P. mirabilis is susceptible to β-lactams, aminoglycosides, fluoroquinolones, and trimethoprim/sulfamethoxazole. It was aimed to investigate the resistance status to antimicrobial agents of Proteus mirabilis strains produced from samples sent to Afyon Kocatepe University, ANS Research and Practice Hospital, Microbiology Laboratory from different clinics and polyclinics during the period of 24 months. Methods: Between October 2013 and September 2015, a total of 30 Proteus were isolated from clinical samples of patients were hospitalized in intensive care units and in various departments of Afyon Kocatepe University, ANS Research and Practice Hospital. Identification of the bacteria was determined by conventional methods and VITEK 2 system (bioMérieux, France) was used additionally. Antibacterial susceptibility tests were performed by Kirby Bauer disc (Oxoid, Hempshire, England) diffusion method following the recommendations of CLSI. Results: Of the total 30 Proteus strains isolated from clinical samples, 19 from urine, 7 from wound, 4 from tracheal aspiration materials were isolated. Antimicrobial resistant for these strains were determined to 24,3% for meropenem, 26.2% for imipenem, 20.2% for amikacin 10.5% for cefepim, 33.3% for ciprofloxacin and levofloxacine, 31.6% for ceftazidime, 20% for ceftriaxone, 15.2% for gentamicin and 26.6% for amoxicillin-clavulanate, 26.2% trimethoprim-sulfamethoxale. Conclusion: In the present study, the highest number of clinical isolates of P. mirabilis were isolated from urine (63,3%), followed by the others (36,6%). The distribution of samples P. mirabilis strains to the clinics were as fallows; 16,8% intensive care unit (ICU), 29,9% polyclinics, 53,3% hospital service units The most effective antibiotic on the total of strains were found to be cefepim, the least effective antibiotics on the total of strains were found to be trimethoprim-sulfamethoxale.

Keywords: proteus mirabilis, antibiotic resistance, intensive care unit, Proteus spp.

Procedia PDF Downloads 269
2661 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes

Authors: Jiri Barta

Abstract:

At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.

Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety

Procedia PDF Downloads 327
2660 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 178
2659 Managing Children with Autism Spectrum Disorder in Corona Age

Authors: Raju Singh, Shikha Singh

Abstract:

This article is note for managing Autistic Child during the Corona time line. It becomes very critical for the primary caregiver as corona pandemic poses new challenges and completely variety of threats to line of treatment, growth, socialization, mental health for children with autism spectrum disorder (ASD), and, so for the family of the children. It is a highly distressful situation, where the line of treatment has shrunken, physical contact has reduced and therapies footprints reduced in several parts of the world. As children with ASD already face socialization challenges, isolation rules imposed by individuals (or social groups), government agencies have only made the situation worse for the children with ASD and their family. This note will try to touch the basics on understanding the ASD and related development disorders, challenges, impact, and suggest approaches to deal with such situation. This document also covers data analysis, deep dive into the increasing impact of ASD on children. This document can also act as a baseline for many researchers, psychiatrists, psychologists, therapists to view the problem statement and measure its impact.

Keywords: autism spectrum disorder, mental health, applied behavior therapy, occupational therapy, social anxiety

Procedia PDF Downloads 138
2658 Management and Conservation of Crop Biodiversity in Karnali Mountains of Nepal

Authors: Chhabi Paudel

Abstract:

The food and nutrition security of the people of the mountain of Karnali province of Nepal is dependent on traditional crop biodiversity. The altitude range of the study area is 1800 meters to 2700 meters above sea level. The climate is temperate to alpine. Farmers are adopting subsistent oriented diversified farming systems and selected crop species, cultivars, and local production systems by their own long adaptation mechanism. The major crop species are finger millet, proso millet, foxtail millet, potato, barley, wheat, mountain rice, buckwheat, Amaranths, medicinal plants, and many vegetable species. The genetic and varietal diversity of those underutilized indigenous crops is also very high, which has sustained farming even in uneven climatic events. Biodiversity provides production synergy, inputs, and other agro-ecological services for self-sustainability. But increase in human population and urban accessibility are seen as threats to biodiversity conservation. So integrated conservation measures are suggested, including agro-tourism and other monetary benefits to the farmers who conserve the local biodiversity.

Keywords: crop biodiversity, climate change, in-situ conservation, resilience, sustainability, agrotourism

Procedia PDF Downloads 88
2657 Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations

Authors: Aliaksei Patsekha, Michael Hohenberger, Harald Raupenstrauch

Abstract:

An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations.

Keywords: boundary values, CBRNE threats, decision making process, hazardous effects, vulnerability analysis, risk zones

Procedia PDF Downloads 199
2656 Identification of Bioactive Metabolites from Ficus carica and Their Neuroprotective Effects of Alzheimer's Disease

Authors: Hanan Khojah, RuAngelie Edrada-Ebel

Abstract:

Neurodegenerative disease including Alzheimer’s disease is a major cause of long-term disability. Oxidative stress is frequently implicated as one of the key contributing factors to neurodegenerative diseases. Protection against neuronal damage remains a great challenge for researchers. Ficus carica (commonly known as fig) is a species of great antioxidant nutritional value comprising a protective mechanism against innumerable health disorders related to oxidative stress as well as Alzheimer’s disease. The purpose of this work was to characterize the non-polar active metabolites in Ficus carica endocarp, mesocarp, and exocarp. Crude extracts were prepared using several extraction solvents, which included 1:1 water: ethylacetate, acetone and methanol. The dried extracts were then solvent partitioned between equivalent amounts of water and ethylacetate. Purification and fractionation were accomplished by high-throughput chromatography. The isolated metabolites were tested on their effect on human neuroblastoma cell line by cell viability test and cell cytotoxicity assay with acrolein. Molecular weights of the active metabolites were determined via LC–HRESIMS and GC-EIMS. Metabolomic profiling was performed to identify the active metabolites by using differential expression analysis software (Mzmine) and SIMCA for multivariate analysis. Structural elucidation and identification of the interested active metabolites were studied by 1-D and 2-D NMR. Significant differences in bioactivity against a concentration-dependent assay on acrolein radicals were observed between the three fruit parts. However, metabolites obtained from mesocarp and the endocarp demonstrated bioactivity to scavenge ROS radical. NMR profiling demonstrated that aliphatic compounds such as γ-sitosterol tend to induce neuronal bioactivity and exhibited bioactivity on the cell viability assay. γ-Sitosterol was found in higher concentrations in the mesocarp and was considered as one of the major phytosterol in Ficus carica.

Keywords: alzheimer, Ficus carica, γ-Sitosterol, metabolomics

Procedia PDF Downloads 336
2655 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 67
2654 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 491
2653 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 288
2652 School Curriculum Incorporating Rights to Live in Clean and Healthy Environment: Assessing Its Effectiveness

Authors: Sitaram Dahal

Abstract:

Among many strategic and practical needs in overcoming the threats and challenges being experienced in the global environment, constitutional provision for Rights to live in clean and healthy environment is one and so is the school curriculum incorporating information on such rights. Government of Nepal has also introduced information on rights to live in clean and healthy environment, as provisioned in its interim constitution of 2007, in the secondary level curriculum of formal education. As the predetermined specific objective of such curriculum is to prepare students who are conscious of citizens’ rights and responsibilities and are able to adopt functions, duties and rights of the rights holders and duty bearers; the study was designed to assess the effectiveness of such curriculum. The study was conducted in one private school and a community school to assess the effectiveness of such curriculum. The study shows that such curriculum has been able to make students responsible duty bearers as they were aware of their habits towards environment. Whereas only very few students are aware enough as being rights holders. Students of community schools were aware rights holders as they complain if they are not satisfied with the environment of the school itself. But private school is far behind in this case. It can be said that only curriculum with very few portion of information on such rights might not be capable enough to meet its objective.

Keywords: curriculum, environmental rights, constitution, effectiveness

Procedia PDF Downloads 318
2651 Identification of Suitable Rainwater Harvesting Sites Using Geospatial Techniques with AHP in Chacha Watershed, Jemma Sub-Basin Upper Blue Nile, Ethiopia

Authors: Abrha Ybeyn Gebremedhn, Yitea Seneshaw Getahun, Alebachew Shumye Moges, Fikrey Tesfay

Abstract:

Rainfed agriculture in Ethiopia has failed to produce enough food, to achieve the increasing demand for food. Pinpointing the appropriate site for rainwater harvesting (RWH) have a substantial contribution to increasing the available water and enhancing agricultural productivity. The current study related to the identification of the potential RWH sites was conducted at the Chacha watershed central highlands of Ethiopia which is endowed with rugged topography. The Geographic Information System with Analytical Hierarchy Process was used to generate the different maps for identifying appropriate sites for RWH. In this study, 11 factors that determine the RWH locations including slope, soil texture, runoff depth, land cover type, annual average rainfall, drainage density, lineament intensity, hydrologic soil group, antecedent moisture content, and distance to the roads were considered. The overall analyzed result shows that 10.50%, 71.10%, 17.90%, and 0.50% of the areas were found under highly, moderately, marginally suitable, and unsuitable areas for RWH, respectively. The RWH site selection was found highly dependent on a slope, soil texture, and runoff depth; moderately dependent on drainage density, annual average rainfall, and land use land cover; but less dependent on the other factors. The highly suitable areas for rainwater harvesting expansion are lands having a flat topography with a soil textural class of high-water holding capacity that can produce high runoff depth. The application of this study could be a baseline for planners and decision-makers and support any strategy adoption for appropriate RWH site selection.

Keywords: runoff depth, antecedent moisture condition, AHP, weighted overlay, water resource

Procedia PDF Downloads 41
2650 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 452
2649 Influence of Temperature and Precipitation Changes on Desertification

Authors: Kukuri Tavartkiladze, Nana Bolashvili

Abstract:

The purpose of this paper was separation and study of the part of structure regime, which directly affects the process of desertification. A simple scheme was prepared for the assessment of desertification process; surface air temperature and precipitation for the years of 1936-2009 were analyzed.  The map of distribution of the Desertification Contributing Coefficient in the territory of Georgia was compiled. The simple scheme for identification of the intensity of the desertification contributing process has been developed and the illustrative example of its practical application for the territory of Georgia has been conducted.

Keywords: aridity, climate change, desertification, precipitation

Procedia PDF Downloads 329
2648 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis

Authors: F. Felipe

Abstract:

Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.

Keywords: air defense, effectiveness, system, simulation, decision-support

Procedia PDF Downloads 153
2647 21st Century Provocation: Modern Slavery, the Implications for Individuals on the Autism Spectrum

Authors: Christina Surmei

Abstract:

Autism Spectrum Disorder (ASD) is defined as a diverse range of developmental conditions that affect an individual’s functionality. ASD is not linear, and individuals can present with deficits in social interaction, communication, and demonstrate limited, repetitive patterns of behaviour, interests, or activities. These characteristics may be observed in a variety of ways and range from mild to severe. ASD may include autism disorder, pervasive developmental disorder not otherwise specified, Asperger’s, or other related pervasive developmental disorders. Modern slavery is defined as 'situations of exploitation that a person cannot refuse or leave because of threats, violence, coercion, and abuse of power or deception'. A review of the literature investigated the prevalence of research regarding ASD and modern slavery. Two universal search engines and five online journals were used as the apparatuses of inquiry. The results revealed two editorials, one study, and one act, totaling four publications attesting to ASD and modern slavery as a joint entity. This is representative of a vast absence of research. However, as individual entities research on autism and modern slavery is in a general high occurrence. This paper has identified a significant gap in research on ASD and modern slavery, and initiates the dialogue to unpack a significant global issue in society today.

Keywords: autism spectrum, education, modern slavery, support

Procedia PDF Downloads 161
2646 Physiological Assessment for Straightforward Symptom Identification (PASSify): An Oral Diagnostic Device for Infants

Authors: Kathryn Rooney, Kaitlyn Eddy, Evan Landers, Weihui Li

Abstract:

The international mortality rate for neonates and infants has been declining at a disproportionally low rate when compared to the overall decline in child mortality in recent decades. A significant portion of infant deaths could be prevented with the implementation of low-cost and easy to use physiological monitoring devices, by enabling early identification of symptoms before they progress into life-threatening illnesses. The oral diagnostic device discussed in this paper serves to continuously monitor the key vital signs of body temperature, respiratory rate, heart rate, and oxygen saturation. The device mimics an infant pacifier, designed to be easily tolerated by infants as well as orthodontically inert. The fundamental measurements are gathered via thermistors and a pulse oximeter, each encapsulated in medical-grade silicone and wired internally to a microcontroller chip. The chip then translates the raw measurements into physiological values via an internal algorithm, before outputting the data to a liquid crystal display screen and an Android application. Additionally, a biological sample collection chamber is incorporated into the internal portion of the device. The movement within the oral chamber created by sucking on the pacifier-like device pushes saliva through a small check valve in the distal end, where it is accumulated and stored. The collection chamber can be easily removed, making the sample readily available to be tested for various diseases and analytes. With the vital sign monitoring and sample collection offered by this device, abnormal fluctuations in physiological parameters can be identified and appropriate medical care can be sought. This device enables preventative diagnosis for infants who may otherwise have gone undiagnosed, due to the inaccessibility of healthcare that plagues vast numbers of underprivileged populations.

Keywords: neonate mortality, infant mortality, low-cost diagnostics, vital signs, saliva testing, preventative care

Procedia PDF Downloads 148
2645 Offline Parameter Identification and State-of-Charge Estimation for Healthy and Aged Electric Vehicle Batteries Based on the Combined Model

Authors: Xiaowei Zhang, Min Xu, Saeid Habibi, Fengjun Yan, Ryan Ahmed

Abstract:

Recently, Electric Vehicles (EVs) have received extensive consideration since they offer a more sustainable and greener transportation alternative compared to fossil-fuel propelled vehicles. Lithium-Ion (Li-ion) batteries are increasingly being deployed in EVs because of their high energy density, high cell-level voltage, and low rate of self-discharge. Since Li-ion batteries represent the most expensive component in the EV powertrain, accurate monitoring and control strategies must be executed to ensure their prolonged lifespan. The Battery Management System (BMS) has to accurately estimate parameters such as the battery State-of-Charge (SOC), State-of-Health (SOH), and Remaining Useful Life (RUL). In order for the BMS to estimate these parameters, an accurate and control-oriented battery model has to work collaboratively with a robust state and parameter estimation strategy. Since battery physical parameters, such as the internal resistance and diffusion coefficient change depending on the battery state-of-life (SOL), the BMS has to be adaptive to accommodate for this change. In this paper, an extensive battery aging study has been conducted over 12-months period on 5.4 Ah, 3.7 V Lithium polymer cells. Instead of using fixed charging/discharging aging cycles at fixed C-rate, a set of real-world driving scenarios have been used to age the cells. The test has been interrupted every 5% capacity degradation by a set of reference performance tests to assess the battery degradation and track model parameters. As battery ages, the combined model parameters are optimized and tracked in an offline mode over the entire batteries lifespan. Based on the optimized model, a state and parameter estimation strategy based on the Extended Kalman Filter (EKF) and the relatively new Smooth Variable Structure Filter (SVSF) have been applied to estimate the SOC at various states of life.

Keywords: lithium-ion batteries, genetic algorithm optimization, battery aging test, parameter identification

Procedia PDF Downloads 258
2644 The Role of Community Forestry to Combat Climate Change Impacts in Nepal

Authors: Ravi Kumar Pandit

Abstract:

Climate change is regarded as one of the most fundamental threats to sustainable livelihood and global development. There is growing a global concern in linking community-managed forests as potential climate change mitigation projects. This study was conducted to explore the local people’s perception on climate change and the role of community forestry (CF) to combat climate change impacts. Two active community forest user groups (CFUGs) from Kaski and Syangja Districts in Nepal were selected as study sites, and various participatory tools were applied to collect primary data. Although most of the respondents were unaware about the words “Climate Change” in study sites, they were quite familiar with the irregularities in rainfall season and other weather extremities. 60% of the respondents had the idea that, due to increase in precipitation, there is a frequent occurrence of erosion, floods and landslide. Around 85% of the people agreed that community forests help in stabilizing soil, reducing the natural hazards like erosion, landslide. Biogas as an alternative source of cooking energy, and changes in crops and their varieties are the common adaptation measures that local people start practicing in both CFUGs in Nepal.

Keywords: climate change, community forestry, global warming, adaptation in Nepal

Procedia PDF Downloads 246
2643 Factors Affecting Consumers’ Online Shopping Behavior in Vietnam during the COVID-19 Pandemic: A Case Study of Tiki

Authors: Thi Hai Anh Nguyen, Pantea Aria

Abstract:

Tiki is one of the leading e-commerce companies in Viet Nam. Since the beginning of 2020, COVID-19 has been spreading around the world. Thanks to this pandemic, the Tiki platform has many strengths and has faced many threats. Customer behaviour was forecasted to change during the COVID-19 pandemic. The aim of the investigation is (1) Identifying factors affecting online consumer behaviour of Tiki in Ho Chi Minh City, Vietnam, (2) Measuring the level of impact of these factors, and (3) Recommendations for Tiki to improve its business strategy for the next stage. This research studies eight factors and collected 378 online surveys for analysis. Using SPSS software identified five factors (product, price, reliability, and web design) positively influencing customer behaviour. COVID-19 factor does not impact significantly Tiki’s customer behaviour. This research conducted some qualitative interviews to understand shopping experiences and customers’ expectations. One of these interviews’ main points is that Tiki’s customers have high trust in the Tiki brand and its high-quality products. Based on the results, the Tiki corporation should secure its core value. Tiki’s employees and logistics systems should be well-trained and optimized to improve customer experiences.

Keywords: COVID-19, e-commerce, impact, pandemic, Vietnam

Procedia PDF Downloads 150