Search results for: attacks and controls
684 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 216683 The Trauma Suffered by Left behind Children and Its Impact on Their Emotional Development: A Pilot Study with Brazilian Immigrants in the United States
Authors: Liliane Clark
Abstract:
Immigrating to a different country may imply having to handle many difficult exertions. There is a particular issue that has to be endured by some immigrants: the children they had to leave behind. It is a phenomenon that occurs with certain frequency. Surprisingly, despite the fact that immigration in the United States is such a large proceeding, there is not much research about the topic in America exploring the trauma of the abandonment caused by this separation and its consequences on the mental health of those children. The term “left behind children” is usually applied to children who were left behind by their parents in their original nation under the care of a noteworthy relative, frequently the grandparents, when they moved to another country. This preliminary research, which is a partial study projected for a doctoral thesis, investigated whether the trauma of abandonment experienced by ten left behind children had affected their emotional development. The Strengths and Difficulties Questionnaire (SDQ) and a brief interview were utilized to assess the information. The SDQ explored scales such as emotional symptoms, conduct problems, hyperactivity, peer problems and prosocial behavior. In this pilot study, the results indicated that all these issues had some sort of significant correlation between them. During the interviews, the participants or their parents identified a range of symptoms: anxiety disorder, eating disorders, panic attacks, psychotic-like experiences, drug use and depression. Hence, it seems that there is a connection between the trauma of abandonment suffered due to the separation and the children’s consequent symptomatic behavior. Further studies are indeed necessary to validate the initial results of this investigation.Keywords: abandonment, parent migration, psychological problems, trauma
Procedia PDF Downloads 187682 Oxidative Stress Markers in Sports Related to Training
Authors: V. Antevska, B. Dejanova, L. Todorovska, J. Pluncevic, E. Sivevska, S. Petrovska, S. Mancevska, I. Karagjozova
Abstract:
Introduction: The aim of this study was to optimise the laboratory oxidative stress (OS) markers in soccer players. Material and methods: In a number of 37 soccer players (21±3 years old) and 25 control subjects (sedenters), plasma samples were taken for d-ROMs (reactive oxygen metabolites) and NO (nitric oxide) determination. The d-ROMs test was performed by measurement of hydroperoxide levels (Diacron, Italy). For NO determination the method of nitrate enzyme reduction with the Greiss reagent was used (OXIS, USA). The parameters were taken after the training of the soccer players and were compared with the control group. Training was considered as maximal exercise treadmill test. The criteria of maximum loading for each subject was established as >95% maximal heart rate. Results: The level of d-ROMs was found to be increased in the soccer players vs. control group but no significant difference was noticed. After the training d-ROMs in soccer players showed increased value of 299±44 UCarr (p<0.05). NO showed increased level in all soccer players vs. controls but significant difference was found after the training 102±29 μmol (p<0.05). Conclusion: Due to these results we may suggest that the measuring these OS markers in sport medicine may be useful for better estimation and evaluation of the training program. More oxidative stress should be used to clarify optimization of the training intensity program.Keywords: oxidative stress markers, soccer players, training, sport
Procedia PDF Downloads 447681 The Pro-Reparative Effect of Vasoactive Intestinal Peptide in Chronic Inflammatory Osteolytic Periapical Lesions
Authors: Michelle C. S. Azevedo, Priscila M. Colavite, Carolina F. Francisconi, Ana P. Trombone, Gustavo P. Garlet
Abstract:
VIP (vasoactive intestinal peptide) know as a potential protective factor in the view of its marked immunosuppressive properties. In this work, we investigated a possible association of VIP with the clinical status of experimental periapical granulomas and the association with expression markers in the lesions potentially associated with periapical lesions pathogenesis. C57BL/6WT mice were treated or not with recombinant VIP. Animals with active/progressive (N=40), inactive/stable (N=70) periapical granulomas and controls (N=50) were anesthetized and the right mandibular first molar was surgically opened, allowing exposure of dental pulp. Endodontic pathogenic bacterial strains were inoculated: Porphyromonas gingivalis, Prevotella nigrescens, Actinomyces viscosus, and Fusobacterium nucleatum subsp. polymorphum. The cavity was not sealed after bacterial inoculation. During lesion development, animals were treated or not with recombinant VIP 3 days post infection. Animals were killed after 3, 7, 14, and 21 days of infection and the jaws were dissected. The extraction of total RNA from periodontal tissues was performed and the integrity of samples was checked. qPCR reaction using TaqMan chemistry with inventoried primers were performed in ViiA7 equipment. The results, depicted as the relative levels of gene expression, were calculated in reference to GAPDH and β-actin expression. Periodontal tissues from upper molars were vested and incubated supplemented RPMI, followed by processing with 0.05% DNase. Cell viability and couting were determined by Neubauer chamber analysis. For flow cytometry analysis, after cell counting the cells were stained with the optimal dilution of each antibody; (PE)-conjugated and (FITC)-conjugated antibodies against CD4, CD25, FOXP3, IL-4, IL-17 and IFN-γ antibodies, as well their respective isotype controls. Cells were analyzed by FACScan and CellQuest software. Results are presented as the number of cells in the periodontal tissues or the number of positive cells for each marker in the CD4+FOXp3+, CD4+IL-4+, CD4+IFNg+ and CD4+IL-17+ subpopulations. The levels mRNA were measured by qPCR. The VIP expression was predominated in inactive lesions, as well part of the clusters of cytokine/Th markers identified as protective factors and a negative correlation between VIP expression and lesion evolution was observed. A quantitative analysis of IL1β, IL17, TNF, IFN, MMP2, RANKL, OPG, IL10, TGFβ, CTLA4, COL5A1, CTGF, CXCL11, FGF7, ITGA4, ITGA5, SERP1 and VTN expression was measured in experimental periapical lesions treated with VIP 7 and 14 days after lesion induction and healthy animals. After 7 days, all targets presented a significate increase in comparison to untreated animals. About migration kinetics, profile of chemokine receptors expression of TCD4+ subsets and phenotypic analysis of Tregs, Th1, Th2 and Th17 cells during the course of experimental periodontal disease evaluated by flow cytometry and depicted as the number of positive cells for each marker. CD4+IFNg+ and CD4+FOXp3+ cells migration were significate increased 7 days post VIP treatment. CD4+IL17+ cells migration were significate increased 7 and 14 days post VIP treatment, CD4+IL4+ cells migration were significate increased 14 and 21 days post VIP treatment compared to the control group. In conclusion, our experimental data support VIP involvement in determining the inactivity of periapical lesions. Financial support: FAPESP #2015/25618-2.Keywords: chronic inflammation, cytokines, osteolytic lesions, VIP (Vasoactive Intestinal Peptide)
Procedia PDF Downloads 193680 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 218679 Influence of HbA1c on Nitric Oxide Level in Patients with Type 2 Diabetes Mellitus
Authors: Dara Kutsyk, Olga Bondarenko, Mariya Sorochka
Abstract:
In 21-century type 2 diabetes (T2D) has become a global health and social problem in the whole world. The goal of treatment for patients with T2D is to prevent complications of diabetes - macrovascular diseases (heart disease, stroke, and peripheral vascular disease) and microvascular diseases (retinopathy, neuropathy and nephropathy). Nitric oxide (NO) plays an important role in maintaining vascular homeostasis. Loss of NO function is one of the earliest indicators of disease and its progression especially in patients with T2D. Aim: To compare NO level between patients with well and bad controlled glycemia in T2D. Methods: The study included 32 patients with T2D. The diagnosis of T2D was confirmed due to International Diabetes Federation (IDF) criteria 2015. Patients were divided into two groups: with well controlled glycaemia (HbA1c < 7%) and bad controlled glycaemia (HbA1c > 7%). The control group consists of 15 healthy subjects. Results: NO level in patients with T2D is significantly higher (27,2 ±3,1 µmol), compared to controls (18,86±0,9 µmol; p < 0,001). A significant difference in NO level was found between patients with bad controlled glycaemia (25,9±2,2 µmol) and well controlled glycaemia (28,7 ± 3,0 µmol; p<0,01). The study showed a moderate negative correlation between NO level and HbA1c (-0,399; р< 0,05). Conclusions: Production of NO is impaired in patients with T2D, especially with badly controlled glycaemia. With the increase in HbAc serum NO decreases. This can be the main target for prevention vascular complication in T2D.Keywords: type 2 diabetes, glycated hemoglobin, nitric oxide, Diabetes mellitus
Procedia PDF Downloads 266678 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks
Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram
Abstract:
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.Keywords: backoff, contention window, CWMIDB, MANET
Procedia PDF Downloads 277677 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides
Authors: Maria Elisabete Costa Ferreira
Abstract:
Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force
Procedia PDF Downloads 65676 Social Semiotics in the Selected Films of Chito S. Roño
Authors: Hannah Jennica P. Ello, Regina Via G. Garcia
Abstract:
Films are famous expressions of art in the country. As an expression of art, it serves as a medium in which a culture is reflected. This paper studied how films reflected the Filipino culture. In this study, social semiotics was used to analyze the semiotic resources identified in the film. The films studied were 'Feng Shui', 'Sukob', and 'The Healing', which were three of the highest grossing horror films of Chito S. Roño. The objectives of the paper were (1) to identify the semiotic resources in the film, (2) to extract their meanings, and (3) to determine how these resources were perceived in the Filipino culture. The semiotic resources identified in each film are organized into three categories: color, practices and supernatural occurrences. Each semiotic resource is analyzed through the four dimensions of social semiotics, genre, style, modality, and discourse. For color, some of the semiotic resources identified are red, white and blue; for practices, Hagiolatry, and Mariolatry, faith healing and the belief in superstitions; and for supernatural occurrences, haunting ghosts, doppelganger attacks and returning from the dead were identified. The practices that are prominent in the films are Hagiolatry and Mariolatry, belief in feng shui and belief in faith healers and albularyos. The belief of these practices shows that Filipinos have a dual faith; belief in religion and a belief in superstitions. In short, Filipinos highly practice folk Catholicism and because of this, a mixture of different cultures can be seen, as having molded the Filipino culture to what it is today.Keywords: culture, film, semiotics, social semiotics
Procedia PDF Downloads 338675 Iontophoretic Drug Transport of Some Anti-Diabetic Agents
Authors: Ashish Jain, Satish Nayak
Abstract:
Transdermal iontophoretic drug delivery system is viable drug delivery platform technology and has a strong market worldwide. Transdermal drug delivery system is particularly desirable for therapeutic agents that need prolonged administration at controlled plasma level. This makes appropriateness to antihypertensive and anti-diabetic agents for their transdermal development. Controlled zero order absorption, easily termination of drug delivery and easy to administration also support for popularity of transdermal delivery. In this current research iontophoretic delivery of various anti diabetic agents like glipizide, glibenclamide and glimepiride were carried out. The experiments were carried out at different drug concentrations and different current densities using cathodal iontophoresis. Diffusion cell for iontophoretic permeation study was modified according to Glikfield Design. Pig skin was used for in vitro permeation study and for the in-vivo study New Zealand rabbits were used. At all concentration level iontophoresis showed enhanced permeation rate compared to passive controls. Iontophoretic transports of selected drugs were found to be increased with the current densities. Results showed that target permeation rate for selected drugs could be achieved with the aid of iontophoresis by increasing the area in an appreciable range.Keywords: transdermal, iontophoresis, pig skin, rabbits, glipizide, glibeclamide
Procedia PDF Downloads 384674 In vivo Evidence of Protective Effect of Hyparrhenia Hirta against Nitrate-Induced Genotoxicity
Authors: H. Bouaziz-Ketata, G. Ben Salah, Z. Aidi, C. Kallel, H. Kammoun, F. Fakhfakh, N. Zeghal
Abstract:
The present study was performed to evaluate the potential protective effect of Hyparrhenia hirta methanolic extract in NaNO3-induced genotoxic and hematotoxic effects. Male Wistar rats were randomly divided into three groups: a control group and two treated groups during 50 days with NaNO3 administered at a dose of 400 mg kg-1 bw either alone in drinking water or co-administered with Hyparrhenia hirta at a dose of 200 mg kg-1 bw. NaNO3 treatment showed a significant increase in the frequencies of total chromosomal aberrations, aberrant metaphases and micronucleus in bone-marrow cells. In parallel, the NaNO3-treated group showed a significant decrease in red blood cell count, hemoglobin and hematocrit and a significant increase in total white blood cell, in neutrophil and eosinophil counts. Platelet count, mean corpuscular volume, mean corpuscular hemoglobin, and mean corpuscular hemoglobin concentration remained unchanged in treated groups compared to those of controls. Hyparrhenia hirta methanolic extract appeared to be effective against genotoxic and hematotoxic changes induced by nitrate, as evidenced by the improvement of the markers cited above.Keywords: Hyparrhenia hirta, sodium nitrate, erythrocytes, genotoxicity
Procedia PDF Downloads 258673 Next-Gen Solutions: How Generative AI Will Reshape Businesses
Authors: Aishwarya Rai
Abstract:
This study explores the transformative influence of generative AI on startups, businesses, and industries. We will explore how large businesses can benefit in the area of customer operations, where AI-powered chatbots can improve self-service and agent effectiveness, greatly increasing efficiency. In marketing and sales, generative AI could transform businesses by automating content development, data utilization, and personalization, resulting in a substantial increase in marketing and sales productivity. In software engineering-focused startups, generative AI can streamline activities, significantly impacting coding processes and work experiences. It can be extremely useful in product R&D for market analysis, virtual design, simulations, and test preparation, altering old workflows and increasing efficiency. Zooming into the retail and CPG industry, industry findings suggest a 1-2% increase in annual revenues, equating to $400 billion to $660 billion. By automating customer service, marketing, sales, and supply chain management, generative AI can streamline operations, optimizing personalized offerings and presenting itself as a disruptive force. While celebrating economic potential, we acknowledge challenges like external inference and adversarial attacks. Human involvement remains crucial for quality control and security in the era of generative AI-driven transformative innovation. This talk provides a comprehensive exploration of generative AI's pivotal role in reshaping businesses, recognizing its strategic impact on customer interactions, productivity, and operational efficiency.Keywords: generative AI, digital transformation, LLM, artificial intelligence, startups, businesses
Procedia PDF Downloads 76672 In vivo Antiplatelet Activity Test of Wet Extract of Mimusops elengi L.'s Leaves on DDY Strain Mice as an Effort to Treat Atherosclerosis
Authors: Dewi Tristantini, Jason Jonathan
Abstract:
Coronary Artery Disease (CAD) is one of the deathliest diseases which is caused by atherosclerosis. Atherosclerosis is a disease that plaque builds up inside the arteries. Plaque is made up of fat, cholesterol, calcium, platelet, and other substances found in blood. The current treatment of atherosclerosis is to provide antiplatelet therapy treatment, but such treatments often cause gastrointestinal irritation, muscle pain and hormonal imbalance. Mimusops elengi L.’s leaves can be utilized as a natural and cheap antiplatelet’s source because it contains flavonoids such as quertecin. Antiplatelet aggregation effect of Mimusops elengi L.’s leaves’ wet extract was measured by bleeding time on DDY strain mice with the test substances were given orally during the period of 8 days. The bleeding time was measured on first day and 9th day. Empirically, the dose which is used for humans is 8.5 g of leaves in 600 ml of water. This dose is equivalent to 2.1 g of leaves in 350 ml of water for mice. The extract was divided into 3 doses for mice: 0.05 ml/day; 0.1 ml/day; 0.2 ml/day. After getting the percentage of the increase in bleeding time, data were analyzed by analysis of variance test (Anova), followed by individual comparison within the groups by LSD test. The test substances above respectively increased bleeding time 21%, 62%, and 128%. As the conclusion, the 0.02 ml/day dose of Mimusops elengi L.’s leaves’ wet extract could increase bleeding time better than clopidogrel as positive controls with 110% increase in bleeding time.Keywords: antiplatelets, atheroschlerosis, bleeding time, Mimusops elengi
Procedia PDF Downloads 264671 An Immersive Serious Game for Firefighting and Evacuation Training in Healthcare Facilities
Authors: Anass Rahouti, Guillaume Salze, Ruggiero Lovreglio, Sélim Datoussaïd
Abstract:
In healthcare facilities, training the staff for firefighting and evacuation in real buildings is very challenging due to the presence of a vulnerable population in such an environment. In a standard environment, traditional approaches, such as fire drills, are often used to train the occupants and provide them with information about fire safety procedures. However, those traditional approaches may be inappropriate for a vulnerable population and can be inefficient from an educational viewpoint as it is impossible to expose the occupants to scenarios similar to a real emergency. Immersive serious games could be used as an alternative to traditional approaches to overcome their limitations. Serious games are already being used in different safety domains such as fires, earthquakes and terror attacks for several building types (e.g., office buildings, train stations, tunnels, etc.). In this study, we developed an immersive serious game to improve the fire safety skills of staff in healthcare facilities. An accurate representation of the healthcare environment was built in Unity3D by including visual and audio stimuli inspired from those employed in commercial action games. The serious game is organised in three levels. In each of them, the trainee is presented with a specific fire emergency and s/he can perform protective actions (e.g., firefighting, helping non-ambulant occupants, etc.) or s/he can ignore the opportunity for action and continue the evacuation. In this paper, we describe all the steps required to develop such a prototype, as well as the key questions that need to be answered, to develop a serious game for firefighting and evacuation in healthcare facilities.Keywords: fire safety, healthcare, serious game, training
Procedia PDF Downloads 452670 Examination of Media and Electoral Violence in Kogi State, Nigeria
Authors: Chris Ogwu Attah, Okpanachi Linus Odiji
Abstract:
An election is no doubt a universally accepted means of resolving societal problems, particularly those with political connotations. While the process has often been conducted in advanced democracies without attacks on opponents and the populace, that ambiance of political tranquillity has hardly been enjoyed in many African states. While the violent nature of polls on this part of the globe have for long been linked among other things to monetization and the zero-sum character of politics, emerging trends show how the increasing rate of electoral violence may not be unconnected to the broadcasts of violent acts in the media. Anchored on the age-long complaints about the possible deleterious effects of mass media and Plato’s concern about the effects of plays on the youth, this study aims to interrogate the relationship between media and electoral violence in Nigeria using Kogi State as a case study. While the Social Cognitive Theory is adopted to guide the study to fruition, data was elicited primarily from a multi-stage sampling arrangement in which respondents from three purposively selected locations (Anyigba, Lokoja, and Okene) were randomly selected. Using chi-square to test the assumption that media violence catalyzes electoral violence in Kogi State, it was discovered among other revelations that electoral violence increases numerically with the depiction of violence in the media. As a recommendation, therefore, this paper advocate that Civil Society Organisations, as well as relevant governmental agencies, should carry out mass political education which aims at instilling political morals on the populace, especially the youths.Keywords: electoral violence, media, media violence, violence
Procedia PDF Downloads 153669 Altered Lower Extremity Biomechanical Risk Factor Related to Anterior Cruciate Ligament Injury in Athlete with Functional Ankle Instability
Authors: Mohammad Karimizadehardakani, Hooman Minoonejad, Reza Rajabi, Ali Sharifnejad
Abstract:
Background: Ankle sprain is one of the most important risk factor of anterior cruciate ligament (ACL) injury. Also, functional ankle instability (FAI) population has alterations in lower extremity sagittal plane biomechanics during landing task. We want to examine whether biomechanical alterations demonstrated by FAI patients are associated with the mechanism of ACL injury during high risk and sport related tasks. Methods: Sixteen basketball player with FAI and 16 non-injured control performed a single-leg cross drop landing. Knee sagittal and frontal (ATSF) was calculated. Independent t-tests, multiple linear regression, and Pearson correlation were used for analysis data. Result: Subject with FAI showed more peak ATFS, posterior ground reaction force (GRF) and less knee flexion, compared to the controls (P= 0.001, P= 0.004, P= 0.011). Knee flexion (r= −0.824, P = 0.011) and posterior GRF (r= 0.901, P = .001) were correlated with ATSF; Posterior GRF was factor that most explained the variance in ATSF (R2= 0.645; P = .001) in the FAI group. Conclusions: Result of our study showed there is a potential biomechanical relationship between the presence of FAI and risk factors associated with ACL injury mechanism.Keywords: functional ankle instability, anterior cruciate ligament, biomechanics, risk factor
Procedia PDF Downloads 222668 Identification of Tissue-Specific Transcription Factors in C. roseus with Emphasis to the TIA Biosynthetic Pathway
Authors: F. M. El-Domyati, A. Atef, S. Edris, N. O. Gadalla, M. A. Al-Kordy, A. M. Ramadan, Y. M. Saad, H. S. Al-Zahrani, A. Bahieldin
Abstract:
Transcriptome retrieved from SRA database of different tissues and treatments of C. roseus was assembled in order to detect tissue-specific transcription factors (TFs) and TFs possibly related to terpenoid indole alkaloids (TIA) pathway. A number of 290 TF-like transcripts along with 12 transcripts related to TIA biosynthetic pathway were divided in terms of co-expression in the different tissues, treatments and genotypes. Three transcripts encoding peroxidases 1 and 12 were downregulated in hairy root, while upregulated in mature leaf. Eight different transcripts of the TIA pathway co-expressed with TFs either functioning downstream tryptophan biosynthesis, e.g., tdc, str1 and sgd, or upstream vindoline biosynthesis, e.g., t16h, omt, nmt, d4h and dat. The results showed no differential expression of TF transcripts in hairy roots knocked down for tdc gene (TDCi) as compared to their wild type controls. There were several evidences of tissue-specific expression of TF transcripts in flower, mature leaf, root/hairy root, stem, seedling, hairy root and immature/mature leaves. Regulation included transcription factor families, e.g., bHLH, MYB and WRKY mostly induced by ABA and/or JA (or MeJA) and regulated during abiotic or biotic stress. The information of tissue-specific regulation and co-expression of TFs and genes in the TIA pathway can be utilized in manipulating alkaloid biosynthesis in C. roseus.Keywords: SRA database, bHLH, MYB, WRKY, co-expression
Procedia PDF Downloads 420667 Risk of Cardiovascular Diseases: Evaluation of Serum Lipid Profiles in Urban and Rural Population of Sindh
Authors: Mohsin Ali Baloch, Saira Baloch
Abstract:
Objective: The aim of this study was to evaluate the levels of serum lipid profiles in Urban and Rural Population of Sindh, to indicate the existing risk of cardiovascular diseases. Material and Methods: Study was conducted at Liaquat University of Medical & Health Sciences, in the cities of Jamshoro and Hyderabad of Sindh. Blood samples from 300 healthy individuals were collected in fasting condition, out them 100 were from rural population, 100 were urban while 100 were used as control group. The biochemistry of these samples was obtained by the analysis of total Cholesterol, high density lipoprotein Cholesterol (HDL), low-density lipoprotein Cholesterol (LDL) and Triglycerides using kit method on Analyzer Clinical Chemistry. Results and Conclusion: Serum levels of total cholesterol, Triglycerides, and LDL cholesterol were significantly raised in the rural and urban males, whereas HDL cholesterol was decreased as compared to the Healthy controls that indicated significant risk of CVD. Urban population was with more risk of CVD and male gender in both groups was at more risk. The worst lipid profile in gender wise distribution was observed in male gender of urban population with highest Total Cholesterol/HDL Ratio while female gender also shown moderate risk of CVD with highest LDL/HDL Ratio.Keywords: cardiovascular diseases, lipid profiles, urban and rural population, LDL/HDL Ratio
Procedia PDF Downloads 408666 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use
Authors: Mayank Mundhra, Chester Rebeiro
Abstract:
Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.Keywords: Ripple, Kelips, unique node list, consensus, information propagation
Procedia PDF Downloads 145665 Prevalence of Selected Cardiovascular Risk Factors Obesity among University of Venda Staff
Authors: Avhasei Dorothy Rasifudi, Josephine Mandizha
Abstract:
Cardiovascular risk factors continue to be the leading cause of death in the majority of developed and developing countries. In 2011, the World Health Organization reported that every year an estimated 17 million people globally die of CVD, representing 30% of all global deaths, particularly caused by heart attacks and strokes. The purpose of the study was to determine and describe the prevalence of selected cardiovascular risk factors among university of Venda staff. A cross-sectional study was conducted among 100 staff aged 20-65 years. The anthropometric measurements were conducted in accordance to and with standardized procedures advocated by the International Society for the Advanced Kinanthropometry. Weight, Height, waist circumference and hip circumference were measured for calculation of body mass index and waist-hip ratio. Blood pressure was measured using a Heine cuff and sphygmomanometer. Questionnaire was administered to gather demographic details and cardiovascular risk factors of hypertension and obesity. Data were analyzed using mean and standard deviation. The parameter t-test was applied to test significance level at p ≤ 0.05 between sexes. The statistical significance was set at p ≤ 0.05. The prevalence of hypertension was 23% with the highest prevalence amongst those aged 40 years and above. Factors found to be to be significantly associated with hypertension were gender, age, physical inactivity and family history. Prevalence of obesity was 43%, with the highest prevalence among those aged 40 years. The factors associated with obesity were diet, age and physical activity. The prevalence of hypertension and obesity in the study were high.Keywords: cardiovascular, prevalence, risk factors, staff
Procedia PDF Downloads 295664 An Empirical Analysis of the Effects of Corporate Derivatives Use on the Underlying Stock Price Exposure: South African Evidence
Authors: Edson Vengesai
Abstract:
Derivative products have become essential instruments in portfolio diversification, price discovery, and, most importantly, risk hedging. Derivatives are complex instruments; their valuation, volatility implications, and real impact on the underlying assets' behaviour are not well understood. Little is documented empirically, with conflicting conclusions on how these instruments affect firm risk exposures. Given the growing interest in using derivatives in risk management and portfolio engineering, this study examines the practical impact of derivative usage on the underlying stock price exposure and systematic risk. The paper uses data from South African listed firms. The study employs GARCH models to understand the effect of derivative uses on conditional stock volatility. The GMM models are used to estimate the effect of derivatives use on stocks' systematic risk as measured by Beta and on the total risk of stocks as measured by the standard deviation of returns. The results provide evidence on whether derivatives use is instrumental in reducing stock returns' systematic and total risk. The results are subjected to numerous controls for robustness, including financial leverage, firm size, growth opportunities, and macroeconomic effects.Keywords: derivatives use, hedging, volatility, stock price exposure
Procedia PDF Downloads 108663 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 97662 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities
Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan
Abstract:
The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility
Procedia PDF Downloads 76661 Path Planning for Unmanned Aerial Vehicles in Constrained Environments for Locust Elimination
Authors: Aadiv Shah, Hari Nair, Vedant Mittal, Alice Cheeran
Abstract:
Present-day agricultural practices such as blanket spraying not only lead to excessive usage of pesticides but also harm the overall crop yield. This paper introduces an algorithm to optimize the traversal of an unmanned aerial vehicle (UAV) in constrained environments. The proposed system focuses on the agricultural application of targeted spraying for locust elimination. Given a satellite image of a farm, target zones that are prone to locust swarm formation are detected through the calculation of the normalized difference vegetation index (NDVI). This is followed by determining the optimal path for traversal of a UAV through these target zones using the proposed algorithm in order to perform pesticide spraying in the most efficient manner possible. Unlike the classic travelling salesman problem involving point-to-point optimization, the proposed algorithm determines an optimal path for multiple regions, independent of its geometry. Finally, the paper explores the idea of implementing reinforcement learning to model complex environmental behaviour and make the path planning mechanism for UAVs agnostic to external environment changes. This system not only presents a solution to the enormous losses incurred due to locust attacks but also an efficient way to automate agricultural practices across the globe in order to improve farmer ergonomics.Keywords: locust, NDVI, optimization, path planning, reinforcement learning, UAV
Procedia PDF Downloads 249660 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques
Authors: Tomas Trainys, Algimantas Venckauskas
Abstract:
Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.
Procedia PDF Downloads 150659 The impact of Breast Cancer Polymorphism on Breast Cancer
Authors: Roudabeh Vakil Monfared, Farhad Mashayekhi
Abstract:
Breast cancer is the most common malignancy type among women with about 1 million new cases each year. The immune system plays an important role in the breast cancer development. OX40L (also known as TNFSF4), a membrane protein, which is a member of the tumor necrosis factor super family binds to its receptor OX40 and this co-stimulation has a crucial role in T-cell proliferation, survival and cytokine release. Due to the importance of the T-cells in anti-tumor activities of OX40L we studied the association of rs3850641 (T→C) polymorphism of OX40L gene with breast cancer. The study included 123 women with breast cancer and 126 healthy volunteers with no signs of cancer. Genomic DNA was extracted from blood leucocytes. Genotype and allele frequencies were determined in patients and control cases with the method of polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) and the analysis was performed by Med Calc. The prevalence of genotype frequencies of TT, CT and CC were 60.9%, 30.08% and 8.9 % in patients with breast cancer and 74.6 %, 18.25 % and 7.14 % in healthy volunteers while the T and C allelic frequency was 76.01% and 23.98 % in patients and 83.73% and 16.26% in healthy controls. Respectively Statistical analysis has shown no significant difference from the comparison of either genotype (P=0.06). According to these results, the rs3850641 SNP has no association with the susceptibility of breast cancer in a population in northern Iran. However, further studies in larger populations including other genetic and environmental factors are required to achieve conclusion.Keywords: OX40L, gene, polymorphism, breast cancer
Procedia PDF Downloads 535658 Optimization Based Extreme Learning Machine for Watermarking of an Image in DWT Domain
Authors: RAM PAL SINGH, VIKASH CHAUDHARY, MONIKA VERMA
Abstract:
In this paper, we proposed the implementation of optimization based Extreme Learning Machine (ELM) for watermarking of B-channel of color image in discrete wavelet transform (DWT) domain. ELM, a regularization algorithm, works based on generalized single-hidden-layer feed-forward neural networks (SLFNs). However, hidden layer parameters, generally called feature mapping in context of ELM need not to be tuned every time. This paper shows the embedding and extraction processes of watermark with the help of ELM and results are compared with already used machine learning models for watermarking.Here, a cover image is divide into suitable numbers of non-overlapping blocks of required size and DWT is applied to each block to be transformed in low frequency sub-band domain. Basically, ELM gives a unified leaning platform with a feature mapping, that is, mapping between hidden layer and output layer of SLFNs, is tried for watermark embedding and extraction purpose in a cover image. Although ELM has widespread application right from binary classification, multiclass classification to regression and function estimation etc. Unlike SVM based algorithm which achieve suboptimal solution with high computational complexity, ELM can provide better generalization performance results with very small complexity. Efficacy of optimization method based ELM algorithm is measured by using quantitative and qualitative parameters on a watermarked image even though image is subjected to different types of geometrical and conventional attacks.Keywords: BER, DWT, extreme leaning machine (ELM), PSNR
Procedia PDF Downloads 311657 Sustainability Management Control Adoption and Sustainable Performance of Healthcare Supply Chains in Times of Crisis
Authors: Edward Nartey
Abstract:
Although sustainability management control (SMC) systems provide information that enhances corporate sustainability decisions, reviews on the SMC implications for sustainable supply chains (SCs) demonstrate a wide research gap, particularly the sustainability performance of healthcare SCs in unusual times. This study provides preliminary empirical evidence on the level of SMC adoption and the decision-making implications for the Tripple Bottom Line (TBL) principles of SC sustainability of Ghanaian public healthcare institutions (PHIs). Using a sample of 226 public health managers, the results show that sustainable formal control has a positive and significant impact on economic sustainability but an insignificant effect on social and environmental sustainability. In addition, a positive relationship was established between informal controls and economic and environmental sustainability but an insignificant relationship with social sustainability. Although the findings highlight the prevalence of the SMC system being prioritized over regular MCS in crisis situations, the MCSs are inadequate in promoting PHIs' sustainable behaviours in SCs. It also provides little empirical evidence on the effective enhancement of the TBL principle of SC sustainability perhaps because the SMC is in misalignment with the TBL principle in crisis situations. Thus, in crisis situations, PHIs need to redesign their MCSs to support the integration of sustainability issues in SCs.Keywords: sustainability management control, informal control, formal control, sustainable supply chain performance
Procedia PDF Downloads 61656 Energy Efficient Lighting in Educational Buildings through the Example of a High School in Istanbul
Authors: Nihan Gurel Ulusan
Abstract:
It is obvious that electrical energy, which is an inseparable part of modern day’s human and also the most important power source of our age, should be generated on a level that will suffice the nation’s requirements. The electrical energy used for a sustainable architectural design should be reduced as much as possible. Designing the buildings as energy efficient systems which aim at reducing the artificial illumination loads has been a current subject of our times as a result of concepts gaining importance like conscious consumption of energy sources, environment-friendly designs and sustainability. Reducing the consumption of electrical energy regarding the artificial lighting carries great significance, especially in the volumes which are used all day long like the educational buildings. Starting out with such an aim in this paper, the educational buildings are explored in terms of energy efficient lighting. Firstly, illumination techniques, illumination systems, light sources, luminaries, illumination controls and 'efficient energy' usage in lighting are mentioned. In addition, natural and artificial lighting systems used in educational buildings and also the spaces building up these kind buildings are examined in terms of energy efficient lighting. Lastly, the illumination properties of the school sample chosen for this study, Kağıthane Anadolu Lisesi, a typical high school in Istanbul, is observed. Suggestions are made in order to improve the system by evaluating the illumination properties of the classes with the survey carried out with the users.Keywords: educational buildings, energy efficient, illumination techniques, lighting
Procedia PDF Downloads 281655 3D Liver Segmentation from CT Images Using a Level Set Method Based on a Shape and Intensity Distribution Prior
Authors: Nuseiba M. Altarawneh, Suhuai Luo, Brian Regan, Guijin Tang
Abstract:
Liver segmentation from medical images poses more challenges than analogous segmentations of other organs. This contribution introduces a liver segmentation method from a series of computer tomography images. Overall, we present a novel method for segmenting liver by coupling density matching with shape priors. Density matching signifies a tracking method which operates via maximizing the Bhattacharyya similarity measure between the photometric distribution from an estimated image region and a model photometric distribution. Density matching controls the direction of the evolution process and slows down the evolving contour in regions with weak edges. The shape prior improves the robustness of density matching and discourages the evolving contour from exceeding liver’s boundaries at regions with weak boundaries. The model is implemented using a modified distance regularized level set (DRLS) model. The experimental results show that the method achieves a satisfactory result. By comparing with the original DRLS model, it is evident that the proposed model herein is more effective in addressing the over segmentation problem. Finally, we gauge our performance of our model against matrices comprising of accuracy, sensitivity and specificity.Keywords: Bhattacharyya distance, distance regularized level set (DRLS) model, liver segmentation, level set method
Procedia PDF Downloads 313