Search results for: attacks and controls
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1586

Search results for: attacks and controls

566 Application of Federated Learning in the Health Care Sector for Malware Detection and Mitigation Using Software-Defined Networking Approach

Authors: A. Dinelka Panagoda, Bathiya Bandara, Chamod Wijetunga, Chathura Malinda, Lakmal Rupasinghe, Chethana Liyanapathirana

Abstract:

This research takes us forward with the concepts of Federated Learning and Software-Defined Networking (SDN) to introduce an efficient malware detection technique and provide a mitigation mechanism to give birth to a resilient and automated healthcare sector network system by also adding the feature of extended privacy preservation. Due to the daily transformation of new malware attacks on hospital Integrated Clinical Environment (ICEs), the healthcare industry is at an undefinable peak of never knowing its continuity direction. The state of blindness by the array of indispensable opportunities that new medical device inventions and their connected coordination offer daily, a factor that should be focused driven is not yet entirely understood by most healthcare operators and patients. This solution has the involvement of four clients in the form of hospital networks to build up the federated learning experimentation architectural structure with different geographical participation to reach the most reasonable accuracy rate with privacy preservation. While the logistic regression with cross-entropy conveys the detection, SDN comes in handy in the second half of the research to stack up the initial development phases of the system with malware mitigation based on policy implementation. The overall evaluation sums up with a system that proves the accuracy with the added privacy. It is no longer needed to continue with traditional centralized systems that offer almost everything but not privacy.

Keywords: software-defined network, federated learning, privacy, integrated clinical environment, decentralized learning, malware detection, malware mitigation

Procedia PDF Downloads 187
565 The Different Essence of Death in the Elegies of Shelley's Adonais and Lord Tennyson's In Memoriam

Authors: Sulistyaningtyas

Abstract:

The topic about death and dying is interesting to discuss since it is strongly related to every individual life. As represented in its title, Adonais: An Elegy on the Death of John Keats is a mournful poem written in 1821 by Percy Bysshe Shelley to mourn the loss of young poet John Keats. To compare, In Memoriam A.H.H. is an elegy written in 1850 about the death of Lord Tennyson’s dearest friend, Arthur Henry Hallam. Although both elegies were written to grieve the authors’ loved ones, their grief affects differently to the psychological being of the narrators. Thus, this research aims to examine the essence of death in affecting the narrators psychologically. By using psychoanalytic criticism, this research reveals the different essence of death in the two elegies as the result of the analysis. Moreover, these two elegies also portray the concept of the afterlife, immortality, and the figure of God. In Adonais, the grief of the narrator to Keats leads him to question the very purpose of life. The loss of his favorite poet which makes him feel sorrowful and mad along his 55 stanzas brings him to a higher psychological level to understand himself. He even sees himself as a Christ-like figure, which shows the idea that God is imaginable. Different from Adonais, the narrator of In Memoriam finds something more spiritual by doing his passionate mourning to Hallam. Through some contemplation in his 133 cantos, in the end, he is convinced that the dear one now dwells with a great Spirit who controls the world. He believes that all of the creation in the universe has to follow one law which is set by God. Hence, it can be concluded that death might bring different consequence to the psyche of every living creature.

Keywords: elegy, comparative study, psychoanalytic criticism, the essence of death

Procedia PDF Downloads 423
564 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia

Authors: Kakha Nadiardze, Nana Phirosmanashvili

Abstract:

The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.

Keywords: food safety, GMO, LMO, E. coli, quality

Procedia PDF Downloads 514
563 Critically Analyzing the Application of Big Data for Smart Transportation: A Case Study of Mumbai

Authors: Tanuj Joshi

Abstract:

Smart transportation is fast emerging as a solution to modern cities’ approach mobility issues, delayed emergency response rate and high congestion on streets. Present day scenario with Google Maps, Waze, Yelp etc. demonstrates how information and communications technologies controls the intelligent transportation system. This intangible and invisible infrastructure is largely guided by the big data analytics. On the other side, the exponential increase in Indian urban population has intensified the demand for better services and infrastructure to satisfy the transportation needs of its citizens. No doubt, India’s huge internet usage is looked as an important resource to guide to achieve this. However, with a projected number of over 40 billion objects connected to the Internet by 2025, the need for systems to handle massive volume of data (big data) also arises. This research paper attempts to identify the ways of exploiting the big data variables which will aid commuters on Indian tracks. This study explores real life inputs by conducting survey and interviews to identify which gaps need to be targeted to better satisfy the customers. Several experts at Mumbai Metropolitan Region Development Authority (MMRDA), Mumbai Metro and Brihanmumbai Electric Supply and Transport (BEST) were interviewed regarding the Information Technology (IT) systems currently in use. The interviews give relevant insights and requirements into the workings of public transportation systems whereas the survey investigates the macro situation.

Keywords: smart transportation, mobility issue, Mumbai transportation, big data, data analysis

Procedia PDF Downloads 178
562 Development of a Plug-In Hybrid Powertrain System with Double Continuously Variable Transmissions

Authors: Cheng-Chi Yu, Chi-Shiun Chiou

Abstract:

This study developed a plug-in hybrid powertrain system which consisted of two continuous variable transmissions. By matching between the engine, motor, generator, and dual continuous variable transmissions, this integrated power system can take advantages of the components. The hybrid vehicle can be driven by the internal combustion engine, or electric motor alone, or by these two power sources together when the vehicle is driven in hard acceleration or high load. The energy management of this integrated hybrid system controls the power systems based on rule-based control strategy to achieve better fuel economy. When the vehicle driving power demand is low, the internal combustion engine is operating in the low efficiency region, so the internal combustion engine is shut down, and the vehicle is driven by motor only. When the vehicle driving power demand is high, internal combustion engine would operate in the high efficiency region; then the vehicle could be driven by internal combustion engine. This strategy would operate internal combustion engine only in optimal efficiency region to improve the fuel economy. In this research, the vehicle simulation model was built in MATLAB/ Simulink environment. The analysis results showed that the power coupled efficiency of the hybrid powertrain system with dual continuous variable transmissions was better than that of the Honda hybrid system on the market.

Keywords: plug-in hybrid power system, fuel economy, performance, continuously variable transmission

Procedia PDF Downloads 289
561 Socio-Demographic Characteristics and Psychosocial Consequences of Sickle Cell Disease: The Case of Patients in a Public Hospital in Ghana

Authors: Vincent A. Adzika, Franklin N. Glozah, Collins S. K. Ahorlu

Abstract:

Background: Sickle Cell Disease (SCD) is of major public-health concern globally, with majority of patients living in Africa. Despite its relevance, there is a dearth of research to determine the socio-demographic distribution and psychosocial impact of SCD in Africa. The objective of this study therefore was to examine the socio-demographic distribution and psychosocial consequences of SCD among patients in Ghana and to assess their quality of life and coping mechanisms. Methods: A cross-sectional research design was used, involving the completion of questionnaires on socio-demographic characteristics, quality of life of individuals, anxiety and depression. Participants were 387 male and female patients attending a sickle cell clinic in a public hospital. Results: Results showed no gender and marital status differences in anxiety and depression. However, there were age and level of education variances in depression but not in anxiety. In terms of quality of life, patients were more satisfied by the presence of love, friends, relatives as well as home, community and neighbourhood environment. While pains of varied nature and severity were the major reasons for attending hospital in SCD condition, going to the hospital as well as having Faith in God was the frequently reported mechanisms for coping with an unbearable SCD attacks. Multiple regression analysis showed that some socio-demographic and quality of life indicators had strong associations with anxiety and/or depression. Conclusion: It is recommended that a multi-dimensional intervention strategy incorporating psychosocial dimensions should be considered in the treatment and management of SCD.

Keywords: anxiety, depression, sickle cell disease, socio-demographic quality of life, characteristics, Ghana

Procedia PDF Downloads 476
560 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 92
559 Characterization of Bacteriophage for Biocontrol of Pseudomonas syringae, Causative Agent of Canker in Prunus spp.

Authors: Mojgan Rabiey, Shyamali Roy, Billy Quilty, Ryan Creeth, George Sundin, Robert W. Jackson

Abstract:

Bacterial canker is a major disease of Prunus species such as cherry (Prunus avium). It is caused by Pseudomonas syringae species including P. syringae pv. syringae (Pss) and P. syringae pv. morsprunorum race 1 (Psm1) and race 2 (Psm2). Concerns over the environmental impact of, and developing resistance to, copper controls call for alternative approaches to disease management. One method of control could be achieved using naturally occurring bacteriophage (phage) infective to the bacterial pathogens. Phages were isolated from soil, leaf, and bark of cherry trees in five locations in the South East of England. The phages were assessed for their host range against strains of Pss, Psm1, and Psm2. The phages exhibited a differential ability to infect and lyse different Pss and Psm isolates as well as some other P. syringae pathovars. However, the phages were unable to infect beneficial bacteria such as Pseudomonas fluorescens. A subset of 18 of these phages were further characterised genetically (Random Amplification of Polymorphic DNA-PCR fingerprinting and sequencing) and using electron microscopy. The phages are tentatively identified as belonging to the order Caudovirales and the families Myoviridae, Podoviridae, and Siphoviridae, with genetic material being dsDNA. Future research will fully sequence the phage genomes. The efficacy of the phage, both individually and in cocktails, to reduce disease progression in vivo will be investigated to understand the potential for practical use of these phages as biocontrol agents.

Keywords: bacteriophage, pseudomonas, bacterial cancker, biological control

Procedia PDF Downloads 151
558 The Relationship between Hot and Cool Executive Function and Theory of Mind in School-Aged Children with Autism Spectrum Disorder

Authors: Evangelia-Chrysanthi Kouklari, Stella Tsermentseli, Claire P. Monks

Abstract:

Executive function (EF) refers to a set of future-oriented and goal-directed cognitive skills that are crucial for problem solving and social behaviour, as well as the ability to organise oneself. It has been suggested that EF could be conceptualised as two distinct but interrelated constructs, one emotional (hot) and one cognitive (cool), as it facilitates both affective and cognitive regulation. Cool EF has been found to be strongly related to Theory of Mind (ToM) that is the ability to infer mental states, but research has not taken into account the association between hot EF and ToM in Autism Spectrum Disorder (ASD) to date. The present study investigates the associations between both hot and cool EF and ToM in school-aged children with ASD. This cross-sectional study assesses 79 school-aged children with ASD (7-15 years) and 91 controls matched for age and IQ, on tasks tapping cool EF (working memory, inhibition, planning), hot EF (effective decision making, delay discounting), and ToM (emotional understanding and false/no false belief). Significant group differences in each EF measure support a global executive dysfunction in ASD. Strong associations between hot EF and ToM in ASD are reported for the first time (i.e. ToM emotional understanding and delay discounting). These findings highlight that hot EF also makes a unique contribution to the developmental profile of ASD. Considering the role of both hot and cool EF in association with ToM in individuals with ASD may aid in gaining a greater understanding not just of how these complex multifaceted cognitive abilities relate to one another, but their joint role in the distinct developmental pathway followed in ASD.

Keywords: ASD, executive function, school age, theory of mind

Procedia PDF Downloads 291
557 Cognitive Functioning and Cortisol Suppression in Major Depression in a Long-Term Perspective

Authors: Pia Berner Hansson, Robert Murison Anders Lund, Hammar Åsa

Abstract:

Major Depressive Disorder (MDD) is often associated with high levels of stress and disturbances in the Hypothalamic Pituitary Adrenal (HPA) system, yielding high levels of cortisol, in addition to cognitive dysfunction. Previous studies in this patient group have shown a relationship between cortisol profile and cognitive functioning in the acute phase of MDD and that the patients had significantly less suppression after dexamethasone administration. However, few studies have investigated this relationship over time and in phases of symptom reduction. The aim of the present study was to examine the relationships between cortisol levels after the Dexamethasone Suppression Test (DST) and cognitive function in a long term perspective in MDD patients. Patients meeting the DSM-IV criteria for a MDD were included in the study and tested in symptom reduction. A control group was included. Cortisol was measured in saliva collected with Salivette sampling devices. Saliva samples were collected 4 times during a 24 hours period over two consecutive days: at awakening, after 45 minutes, after 7 hours and at 11 pm. Dexamethasone (1.0 mg) was given on Day 1 at 11 pm. The neuropsychological test battery consisted of standardized tests measuring memory and Executive Functioning (EF). Cortisol levels did not differ significantly between patients and controls on Day 1 or Day 2. Both groups showed significant suppression after Dexamethasone. There were no correlations between cortisol levels or suppression after Dexamethasone and cognitive measures. The results indicate that the HPA-axis functioning normalizes in phases of symptom reduction in MDD patients and that there no relation between cortisol profile and cognitive functioning in memory or EF.

Keywords: depression, MDD, cortisol, suppression, cognitive functioning

Procedia PDF Downloads 333
556 Response of Newzealand Rabbits to Drinking Water Treated with PolyDADMAC

Authors: Amna Beshir Medani Ahmed, Samia Mohammed Ali El Badwi, Ahmed El Amin Mohammed

Abstract:

This work has been managed to yield toxicity information on water treatment agents in the Sudan namely polyDADMAC, using New Zealand rabbits at multiple daily oral doses for a period of 10 weeks. Thirty-three heads of New Zealand rabbits were divided into 11 groups, each of three. Group 1 animals were the undosed controls. Test groups of either species were given polyDADMAC at similar dose rates of 0.5, 2.5, 4.5, 10, 15, 20, 25, 50, 100 and 150 mg/kg body weight respectively for groups 2,3,4,5,6,7,8,9,10 and 11. Clinical signs were closely observed with postmortem and histopathological examinations. Chemical investigations included enzymatic concentrations of ALP, GOT, CK, GPT and LDH together with hematological changes in Hb, PCV, RBCs and WBCs. Mortalities occurred to variable degrees irrespective of the dose level. On polyDADMAC challenge, the test species showed clinical signs of dullness, loss of weight, anorexia, diarrhea, difficulty in respiration, hind limb paralysis and recumbency. Notably oral dosing with polyDADMAC caused lung emphysema, hepatic and renal dysfunctions, irregularity in enzymatic activities and serum metabolites, sloughing of intestinal epithelium, decreased electrolytes in serum, and splenic haemosiderosis. On evaluation of the above results, polyDADMAC was considered toxic to New Zealand rabbits at all dose rates tried. Practical implications of the results were highlighted and suggestions for future work were put forward.

Keywords: polydiallyldiethylaluminiumchloride (polyDADMAC), nubian goats, toxicity of drinking water, treatment of drinking water using chemicals

Procedia PDF Downloads 373
555 Enhancing Quality Management Systems through Automated Controls and Neural Networks

Authors: Shara Toibayeva, Irbulat Utepbergenov, Lyazzat Issabekova, Aidana Bodesova

Abstract:

The article discusses the importance of quality assessment as a strategic tool in business and emphasizes the significance of the effectiveness of quality management systems (QMS) for enterprises. The evaluation of these systems takes into account the specificity of quality indicators, the multilevel nature of the system, and the need for optimal selection of the number of indicators and evaluation of the system state, which is critical for making rational management decisions. Methods and models of automated enterprise quality management are proposed, including an intelligent automated quality management system integrated with the Management Information and Control System. These systems make it possible to automate the implementation and support of QMS, increasing the validity, efficiency, and effectiveness of management decisions by automating the functions performed by decision makers and personnel. The paper also emphasizes the use of recurrent neural networks to improve automated quality management. Recurrent neural networks (RNNs) are used to analyze and process sequences of data, which is particularly useful in the context of document quality assessment and non-conformance detection in quality management systems. These networks are able to account for temporal dependencies and complex relationships between different data elements, which improves the accuracy and efficiency of automated decisions. The project was supported by a grant from the Ministry of Education and Science of the Republic of Kazakhstan under the Zhas Galym project No. AR 13268939, dedicated to research and development of digital technologies to ensure consistency of QMS regulatory documents.

Keywords: automated control system, quality management, document structure, formal language

Procedia PDF Downloads 39
554 Design of SAE J2716 Single Edge Nibble Transmission Digital Sensor Interface for Automotive Applications

Authors: Jongbae Lee, Seongsoo Lee

Abstract:

Modern sensors often embed small-size digital controller for sensor control, value calibration, and signal processing. These sensors require digital data communication with host microprocessors, but conventional digital communication protocols are too heavy for price reduction. SAE J2716 SENT (single edge nibble transmission) protocol transmits direct digital waveforms instead of complicated analog modulated signals. In this paper, a SENT interface is designed in Verilog HDL (hardware description language) and implemented in FPGA (field-programmable gate array) evaluation board. The designed SENT interface consists of frame encoder/decoder, configuration register, tick period generator, CRC (cyclic redundancy code) generator/checker, and TX/RX (transmission/reception) buffer. Frame encoder/decoder is implemented as a finite state machine, and it controls whole SENT interface. Configuration register contains various parameters such as operation mode, tick length, CRC option, pause pulse option, and number of nibble data. Tick period generator generates tick signals from input clock. CRC generator/checker generates or checks CRC in the SENT data frame. TX/RX buffer stores transmission/received data. The designed SENT interface can send or receives digital data in 25~65 kbps at 3 us tick. Synthesized in 0.18 um fabrication technologies, it is implemented about 2,500 gates.

Keywords: digital sensor interface, SAE J2716, SENT, verilog HDL

Procedia PDF Downloads 301
553 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 120
552 Association of Single Nucleotide Polymorphisms in Leptin and Leptin Receptors with Oral Cancer

Authors: Chiung-Man Tsai, Chia-Jui Weng

Abstract:

Leptin (LEP) and leptin receptor (LEPR) both play a crucial role in the mediation of physiological reactions and carcinogenesis and may serve as a candidate biomarker of oral cancer. The present case-control study aimed to examine the effects of single nucleotide polymorphisms (SNPs) of LEP -2548 G/A (rs7799039), LEPR K109R (rs1137100), and LEPR Q223R (rs1137101) with or without interacting to environmental carcinogens on the risk for oral squamous cell carcinoma (OSCC). The SNPs of three genetic allele, from 567 patients with oral cancer and 560 healthy controls in Taiwan were analyzed. All of The three genetic polymorphisms exhibited insignificant (P > .05) effects on the risk to have oral cancer. However, the patients with polymorphic allele of LEP -2548 have a significant low risk for the development of clinical stage (A/G, AOR = 0.670, 95% CI = 0.454–0.988, P < .05; A/G+G/G, AOR = 0.676, 95% CI = 0.467–0.978, P < .05) compared to patients with ancestral homozygous A/A genotype. Additionally, an interesting result was found that the impact of LEP -2548 G/A SNP on oral carcinogenesis in subjects without tobacco consumption (A/G, AOR=2.078, 95% CI: 1.161-3.720, p=0.014; A/G+G/G, AOR=2.002, 95% CI: 1.143-3.505, p=0.015) is higher than subjects with tobacco consumption. These results suggest that the genetic polymorphism of LEP -2548 G/A (rs7799039), LEPR K109R (rs1137100), and LEPR Q223R (rs1137101) were not associated with the susceptibility of oral cancer; SNP in LEP -2548 G/A showed a poor clinicopathological development of oral cancer; Population without tobacco consumption and with polymorphic LEP -2548 G/A gene may significantly increase the risk to have oral cancer.

Keywords: carcinogen, leptin, leptin receptor, oral squamous cell carcinoma, single nucleotide polymorphism

Procedia PDF Downloads 185
551 Study of Circulatory MiR-122 and MiR-130a Expression among Chronic Hepatitis C Egyptian Patients

Authors: Hend K. Moosa, Eman A. Rashwan, Ezzat M. Hassan, Amany A. Ghazy, Amel G. Sheredy

Abstract:

The stability of microRNA (miR) in the circulation can show a great progress toward the discovery of non-invasive diagnostic and prognostic biomarkers in many diseases. In the present study, circulatory miR-122 and miR-130a were analysed in chronic hepatitis C Egyptian patients in predicting the clinical outcome of interferon treatment. In addition, their expression levels were correlated to viral RNA levels, necro-inflammatory markers (AST, ALT) and to each other. This study was conducted on 51 subjects where 36 were chronic HCV patients in which they were divided into naive and interferon treated HCV patients (responders and non-responders) and 15 matched healthy controls. Serum quantification of miR-122 and miR-130a were performed by quantitative Real-time Polymerase Chain Reaction (qRT-PCR). The results showed a significant upregulation of miR-122 in non-responder patients (P=0.049). By receiver operating characteristic analysis curve, miR-122 revealed 65% sensitivity and 92.3% specificity in predicting non-responsiveness of patients to IFN treatment, while miR-130a showed a sensitivity of 100% and specificity of 53.85%. Remarkably, there was a significant positive correlation between miR-122 and miR-130a in naive HCV patients (r=0.714, p=0.003). However, there was no significant correlation between serum miR-122, miR-130a expression levels and necro-inflammatory markers (AST, ALT). To conclude, miR-122 and miR-130a have a significant association with viral RNA levels and accordingly, they may have a synergistic power in promoting viral replication. Interestingly, miR-122 and miR-130a have a predictive power in predicting clinical outcome of IFN treatment which can be further studied in currently used drugs in order to reduce the socio-economic burden of potentially non-responders.

Keywords: hepatitis C, microRNA, miR-122, miR-130a

Procedia PDF Downloads 170
550 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 261
549 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 140
548 Nanoparticle Based Green Inhibitor for Corrosion Protection of Zinc in Acidic Medium

Authors: Neha Parekh, Divya Ladha, Poonam Wadhwani, Nisha Shah

Abstract:

Nano scaled materials have attracted tremendous interest as corrosion inhibitor due to their high surface area on the metal surfaces. It is well known that the zinc oxide nanoparticles have higher reactivity towards aqueous acidic solution. This work presents a new method to incorporate zinc oxide nanoparticles with white sesame seeds extract (nano-green inhibitor) for corrosion protection of zinc in acidic medium. The morphology of the zinc oxide nanoparticles was investigated by TEM and DLS. The corrosion inhibition efficiency of the green inhibitor and nano-green inhibitor was determined by Gravimetric and electrochemical impedance spectroscopy (EIS) methods. Gravimetric measurements suggested that nano-green inhibitor is more effective than green inhibitor. Furthermore, with the increasing temperature, inhibition efficiency increases for both the inhibitors. In addition, it was established the Temkin adsorption isotherm fits well with the experimental data for both the inhibitors. The effect of temperature and Temkin adsorption isotherm revealed Chemisorption mechanism occurring in the system. The activation energy (Ea) and other thermodynamic parameters for inhibition process were calculated. The data of EIS showed that the charge transfer controls the corrosion process. The surface morphology of zinc metal (specimen) in absence and presence of green inhibitor and nano-green inhibitor were performed using Scanning Electron Microscopy (SEM) and Atomic Force Microscopy (AFM) techniques. The outcomes indicated a formation of a protective layer over zinc metal (specimen).

Keywords: corrosion, green inhibitor, nanoparticles, zinc

Procedia PDF Downloads 454
547 A Randomized Controlled Intervention Study of the Effect of Music Training on Mathematical and Working Memory Performances

Authors: Ingo Roden, Stefana Lupu, Mara Krone, Jasmin Chantah, Gunter Kreutz, Stephan Bongard, Dietmar Grube

Abstract:

The present experimental study examined the effects of music and math training on mathematical skills and visuospatial working memory capacity in kindergarten children. For this purpose, N = 54 children (mean age: 5.46 years; SD = .29) were randomly assigned to three groups. Children in the music group (n = 18) received weekly sessions of 60 min music training over a period of eight weeks, whereas children in the math group (n = 18) received the same amount of training focusing on mathematical basic skills, such as numeracy skills, quantity comparison, and counting objectives. The third group of children (n = 18) served as waiting controls. The groups were matched for sex, age, IQ and previous music experiences at baseline. Pre-Post intervention measurements revealed a significant interaction effect of group x time, showing that children in both music and math groups significantly improved their early numeracy skills, whereas children in the control group did not. No significant differences between groups were observed for the visuospatial working memory performances. These results confirm and extend previous findings on transfer effects of music training on mathematical abilities and visuospatial working memory capacity. They show that music and math interventions are similarly effective to enhance children’s mathematical skills. More research is necessary to establish, whether cognitive transfer effects arising from music interventions might facilitate children’s transition from kindergarten to first-grade.

Keywords: music training, mathematical skills, working memory, transfer

Procedia PDF Downloads 272
546 Method to Find a ε-Optimal Control of Stochastic Differential Equation Driven by a Brownian Motion

Authors: Francys Souza, Alberto Ohashi, Dorival Leao

Abstract:

We present a general solution for finding the ε-optimal controls for non-Markovian stochastic systems as stochastic differential equations driven by Brownian motion, which is a problem recognized as a difficult solution. The contribution appears in the development of mathematical tools to deal with modeling and control of non-Markovian systems, whose applicability in different areas is well known. The methodology used consists to discretize the problem through a random discretization. In this way, we transform an infinite dimensional problem in a finite dimensional, thereafter we use measurable selection arguments, to find a control on an explicit form for the discretized problem. Then, we prove the control found for the discretized problem is a ε-optimal control for the original problem. Our theory provides a concrete description of a rather general class, among the principals, we can highlight financial problems such as portfolio control, hedging, super-hedging, pairs-trading and others. Therefore, our main contribution is the development of a tool to explicitly the ε-optimal control for non-Markovian stochastic systems. The pathwise analysis was made through a random discretization jointly with measurable selection arguments, has provided us with a structure to transform an infinite dimensional problem into a finite dimensional. The theory is applied to stochastic control problems based on path-dependent stochastic differential equations, where both drift and diffusion components are controlled. We are able to explicitly show optimal control with our method.

Keywords: dynamic programming equation, optimal control, stochastic control, stochastic differential equation

Procedia PDF Downloads 188
545 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target

Authors: Lawan Ja’afar Tahir

Abstract:

This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.

Keywords: border, insecurity, weapons, management

Procedia PDF Downloads 68
544 The Effect of Fetal Movement Counting on Maternal Antenatal Attachment

Authors: Esra Güney, Tuba Uçar

Abstract:

Aim: This study has been conducted for the purpose of determining the effects of fetal movement counting on antenatal maternal attachment. Material and Method: This research was conducted on the basis of the real test model with the pre-test /post-test control groups. The study population consists of pregnant women registered in the six different Family Health Centers located in the central Malatya districts of Yeşilyurt and Battalgazi. When power analysis is done, the sample size was calculated for each group of at least 55 pregnant women (55 tests, 55 controls). The data were collected by using Personal Information Form and MAAS (Maternal Antenatal Attachment Scale) between July 2015-June 2016. Fetal movement counting training was given to pregnant women by researchers in the experimental group after the pre-test data collection. No intervention was applied to the control group. Post-test data for both groups were collected after four weeks. Data were evaluated with percentage, chi-square arithmetic average, chi-square test and as for the dependent and independent group’s t test. Result: In the MAAS, the pre-test average of total scores in the experimental group is 70.78±6.78, control group is also 71.58±7.54 and so there was no significant difference in mean scores between the two groups (p>0.05). MAAS post-test average of total scores in the experimental group is 78.41±6.65, control group is also is 72.25±7.16 and so the mean scores between groups were found to have statistically significant difference (p<0.05). Conclusion: It was determined that fetal movement counting increases the maternal antenatal attachments.

Keywords: antenatal maternal attachment, fetal movement counting, pregnancy, midwifery

Procedia PDF Downloads 272
543 Near-Infrared Optogenetic Manipulation of a Channelrhodopsin via Upconverting Nanoparticles

Authors: Kanchan Yadav, Ai-Chuan Chou, Rajesh Kumar Ulaganathan, Hua-De Gao, Hsien-Ming Lee, Chien-Yuan Pan, Yit-Tsong Chen

Abstract:

Optogenetics is an innovative technology now widely adopted by researchers in different fields of the biological sciences. However, due to the weak tissue penetration capability of the short wavelengths used to activate light-sensitive proteins, an invasive light guide has been used in animal studies for photoexcitation of target tissues. Upconverting nanoparticles (UCNPs), which transform near-infrared (NIR) light to short-wavelength emissions, can help address this issue. To improve optogenetic performance, we enhance the target selectivity for optogenetic controls by specifically conjugating the UCNPs with light-sensitive proteins at a molecular level, which shortens the distance as well as enhances the efficiency of energy transfer. We tagged V5 and Lumio epitopes to the extracellular N-terminal of channelrhodopsin-2 with an mCherry conjugated at the intracellular C-terminal (VL-ChR2m) and then bound NeutrAvidin-functionalized UCNPs (NAv-UCNPs) to the VL-ChR2m via a biotinylated antibody against V5 (bV5-Ab). We observed an apparent energy transfer from the excited UCNP (donor) to the bound VL-ChR2m (receptor) by measuring emission-intensity changes at the donor-receptor complex. The successful patch-clamp electrophysiological test and an intracellular Ca2+ elevation observed in the designed UCNP-ChR2 system under optogenetic manipulation confirmed the practical employment of UCNP-assisted NIR-optogenetic functionality. This work represents a significant step toward improving therapeutic optogenetics.

Keywords: Channelrhodopsin-2, near infrared, optogenetics, upconverting nanoparticles

Procedia PDF Downloads 276
542 Effect of Dual Wavelength Light Exposure on Regeneration of Dugesia dorotocephala

Authors: Zayedali Shaikh

Abstract:

Increasingly now more than ever, UV damage brings with it a litany of minor deformities that can range from mild lesions and discoloring to cataracts and blindness. Pluripotent stem cells in planaria and human skin can be used to treat wounds and skin damage, with the primary limitations being inadequate growth factors. Photobiomodulation therapy in the form of low-intensity red light therapy has been proven to provide helpful benefits in the healing of skin that displays some of the symptoms of UV damage, such as burns and lesions, along with stimulating the proliferation of stem cells in recellularizing tissue. This paper puts forth an alternate means by which to treat the effects of UV damage using the freshwater planarian model system, Dugesia dorotocephala, known for its regenerative abilities and abundance of pluripotent stem cells, which allow for the rapid growth and repair of missing or damaged structures. Our work consisted of exposing planaria to different types of light: red light, blue light, white light, darkness, red and blue light together, UV light, and finally, red and UV light together. The primary focus of this research was on the red and UV lights, with six controls acting as metrics to compare our findings. Through computer-assisted morphological analysis, the results show that there is no significant difference in the rates of regeneration of planaria treated with simultaneous exposure to red and UV light versus planaria in darkness (p > .05), a representation of their preferred natural habitat. Our research suggests the viability of red-light therapy in actively combating UV damage and expediting the growth of epidermal stem cells by acting as another growth factor.

Keywords: regenerative medicine, stem cells, planaria, photobiomodulation

Procedia PDF Downloads 77
541 Quorum-Sensing Driven Inhibitors for Mitigating Microbial Influenced Corrosion

Authors: Asma Lamin, Anna H. Kaksonen, Ivan Cole, Paul White, Xiao-Bo Chen

Abstract:

Microbiologically influenced corrosion (MIC) is a process in which microorganisms initiate, facilitate, or accelerate the electrochemical corrosion reactions of metallic components. Several reports documented that MIC accounts for about 20 to 40 % of the total cost of corrosion. Biofilm formation due to the presence of microorganisms on the surface of metal components is known to play a vital role in MIC, which can lead to severe consequences in various environmental and industrial settings. Quorum sensing (QS) system plays a major role in regulating biofilm formation and control the expression of some microbial enzymes. QS is a communication mechanism between microorganisms that involves the regulation of gene expression as a response to the microbial cell density within an environment. This process is employed by both Gram-positive and Gram-negative bacteria to regulate different physiological functions. QS involves production, detection, and responses to signalling chemicals, known as auto-inducers. QS controls specific processes important for the microbial community, such as biofilm formation, virulence factor expression, production of secondary metabolites and stress adaptation mechanisms. The use of QS inhibitors (QSIs) has been proposed as a possible solution to biofilm related challenges in many different applications. Although QSIs have demonstrated some strength in tackling biofouling, QSI-based strategies to control microbially influenced corrosion have not been thoroughly investigated. As such, our research aims to target the QS mechanisms as a strategy for mitigating MIC on metal surfaces in engineered systems.

Keywords: quorum sensing, quorum quenching, biofilm, biocorrosion

Procedia PDF Downloads 90
540 ACTN3 Genotype Association with Motoric Performance of Roma Children

Authors: J. Bernasovska, I. Boronova, J. Poracova, M. Mydlarova Blascakova, V. Szabadosova, P. Ruzbarsky, E. Petrejcikova, I. Bernasovsky

Abstract:

The paper presents the results of the molecular genetics analysis in sports research, with special emphasis to use genetic information in diagnosing of motoric predispositions in Roma boys from East Slovakia. The ability and move are the basic characteristics of all living organisms. The phenotypes are influenced by a combination of genetic and environmental factors. Genetic tests differ in principle from the traditional motoric tests, because the DNA of an individual does not change during life. The aim of the presented study was to examine motion abilities and to determine the frequency of ACTN3 (R577X) gene in Roma children. Genotype data were obtained from 138 Roma and 155 Slovak boys from 7 to 15 years old. Children were investigated on physical performance level in association with their genotype. Biological material for genetic analyses comprised samples of buccal swabs. Genotypes were determined using Real Time High resolution melting PCR method (Rotor-Gene 6000 Corbett and Light Cycler 480 Roche). The software allows creating reports of any analysis, where information of the specific analysis, normalized and differential graphs and many information of the samples are shown. Roma children of analyzed group legged to non-Romany children at the same age in all the compared tests. The % distribution of R and X alleles in Roma children was different from controls. The frequency of XX genotype was 9.26%, RX 46.33% and RR was 44.41%. The frequency of XX genotype was 9.26% which is comparable to a frequency of an Indian population. Data were analyzed with the ANOVA test.

Keywords: ACTN3 gene, R577X polymorphism, Roma children, sport performance, Slovakia

Procedia PDF Downloads 334
539 Effect of Leptin Gene Methylation on Colorectal Cancer Chemoresistance

Authors: Wissem Abdaoui, Nizar M. Mhaidat, Ilhem Mokhtari, Adel Gouri

Abstract:

Colorectal cancer (CRC) is one of the most common tumors all over the world. Obesity, considered a risk factor of CRC, is characterized by a high level of secreted cytokines from adipose tissue. Among these inflammatory molecules, leptin is considered the key mediator for CRC cancer development and progression by activation of mitogenic and anti apoptotic signaling pathways. Gene expression can be significantly modulated by alterations in DNA methylation patterns. The aim of this study is to investigate the impact of leptin gene methylation on CRC prognosis and sensitivity to chemotherapy. The study involved 70 CRC tissue samples collected from King Abdullah University Hospital (KAUH) from which only 53 was analyzed because of bisulfate fragmentation and low yield of DNA extracted from FFPE tissues. A total of 22 blood samples were collected from healthy volunteers and enrolled as a control group. Leptin promoter methylation was analyzed by methylation specific PCR after bisulfate conversion. Results revealed that the incidence of leptin gene methylation was significantly higher in CRC patients in comparison to that of controls (P < 0.05). The correlation between patient’s demographics and leptin gene methylation was not significant (P < 0.05). However, a significant correlation between leptin gene methylation status and early cancer stages (I, II and III) was found in male but not in female (p < 0.05). Moreover, a significant correlation was found between leptin promoter methylation and early tumor localization T1-2 (p < 0.05). The correlation between epigenetic regulation of leptin and chemosensitivity was not significant. Taken together, these results suggest the possibility to use leptin gene methylation as a biomarker for the evaluation of CRC prognosis and metastasis.

Keywords: colorectal cancer, obesity, leptin, DNA methylation, disease prognosis, bisulfate conversion, chemoresistance

Procedia PDF Downloads 376
538 Floristic Diversity, Composition and Environmental Correlates on the Arid, Coralline Islands of the Farasan Archipelago, Red SEA, Saudi Arabia

Authors: Khalid Al Mutairi, Mashhor Mansor, Magdy El-Bana, Asyraf Mansor, Saud AL-Rowaily

Abstract:

Urban expansion and the associated increase in anthropogenic pressures have led to a great loss of the Red Sea’s biodiversity. Floristic composition, diversity, and environmental controls were investigated for 210 relive's on twenty coral islands of Farasan in the Red Sea, Saudi Arabia. Multivariate statistical analyses for classification (Cluster Analysis), ordination (Detrended Correspondence Analysis (DCA), and Redundancy Analysis (RDA) were employed to identify vegetation types and their relevance to the underlying environmental gradients. A total of 191 flowering plants belonging to 53 families and 129 genera were recorded. Geophytes and chamaephytes were the main life forms in the saline habitats, whereas therophytes and hemicryptophytes dominated the sandy formations and coral rocks. The cluster analysis and DCA ordination identified twelve vegetation groups that linked to five main habitats with definite floristic composition and environmental characteristics. The constrained RDA with Monte Carlo permutation tests revealed that elevation and soil salinity were the main environmental factors explaining the vegetation distributions. These results indicate that the flora of the study archipelago represents a phytogeographical linkage between Africa and Saharo-Arabian landscape functional elements. These findings should guide conservation and management efforts to maintain species diversity, which is threatened by anthropogenic activities and invasion by the exotic invasive tree Prosopis juliflora (Sw.) DC.

Keywords: biodiversity, classification, conservation, ordination, Red Sea

Procedia PDF Downloads 343
537 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 125