Search results for: Development of a security group
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24498

Search results for: Development of a security group

23448 Long-Term Health and Quality of Life Outcomes Following War-Related Traumatic Lower-Limb Amputation; A Study on Community Re-Integrated Army Veterans in Sri Lanka

Authors: Ashan Wijekoon, Abi Beane, Subashini Jayawardana

Abstract:

Background: Civil war in Sri Lanka ended a decade ago, leaving thousands of army veterans permanently disabled following lower-limb amputations. Quantifying long-term functional health and psychological wellbeing will inform the development of tailored home-based rehabilitation intervention. Objectives: To assess the long-term health and quality of life of Sri Lankan soldiers with traumatic lower-limb amputation.Methods and Materials: A comparative cross-sectional study was conducted in five districts of Sri Lanka. Using stratified random sample technique, two groups of 85 participants were selected; group 1, community re-integrated male army veterans with unilateral lower-limb amputation, and group 2, age and sex matched normal healthy individuals. Long-term health and quality of life (QoL) outcomes were assessed and compared between the two groups using self-administered Short-Form Health Survey-36 questionnaire (SF-36) previously validated for use in Sri Lanka. Results: Group 1 were active prosthetic users who had undergone amputation > ten years ago (Mean±SD: 21.7±5.9). The most prevalent comorbidities for group 1 and 2 were hypertension and diabetes (22.4% and 30.6% and 9.4% and 9.8%, respectively). In group 1, injury-associated long-term health outcomes included knee osteoarthritis (18.8%), knee pain (20.0%), and back pain (69.4%). Scores of physical health and psychological wellbeing were 53.1 (IQR 64.4- 43.8) and 63.5 (IQR 73.3- 51.4) for each group, respectively. Scores revealed the highest QoL related to social functioning (75 (IQR 87.5- 62.5)) and the poorest aspects of QoL related to general health (40 (IQR 50- 35)). Prevalence of comorbidities was significantly higher, and QoL outcomes were significantly lower among soldiers compared to normal healthy individuals (p<0.05).Conclusion: Higher prevalence of comorbidities, poor physical health, and lower QoL outcomes were more prevalent in soldiers with lower-limb amputation when compared to healthy counterparts.

Keywords: community-based, disability, health outcomes, quality of life, soldiers

Procedia PDF Downloads 125
23447 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 135
23446 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 503
23445 Development of a Small-Group Teaching Method for Enhancing the Learning of Basic Acupuncture Manipulation Optimized with the Theory of Motor Learning

Authors: Wen-Chao Tang, Tang-Yi Liu, Ming Gao, Gang Xu, Hua-Yuan Yang

Abstract:

This study developed a method for teaching acupuncture manipulation in small groups optimized with the theory of motor learning. Sixty acupuncture students and their teacher participated in our research. Motion videos were recorded of their manipulations using the lifting-thrusting method. These videos were analyzed using Simi Motion software to acquire the movement parameters of the thumb tip. The parameter velocity curves along Y axis was used to generate small teaching groups clustered by a self-organized map (SOM) and K-means. Ten groups were generated. All the targeted instruction based on the comparative results groups as well as the videos of teacher and student was provided to the members of each group respectively. According to the theory and research of motor learning, the factors or technologies such as video instruction, observational learning, external focus and summary feedback were integrated into this teaching method. Such efforts were desired to improve and enhance the effectiveness of current acupuncture teaching methods in limited classroom teaching time and extracurricular training.

Keywords: acupuncture, group teaching, video instruction, observational learning, external focus, summary feedback

Procedia PDF Downloads 174
23444 A Comparative Study of the Effectiveness of Narrative Therapy in Individual and Group Counseling on Promoting Hope in With Breast Cancer’s Women

Authors: Sajadian Akram, Tavasoli F.

Abstract:

Breast cancer is the second most common cancer in the world and certainly the most frequent cancer mostly among women. This study was aimed to compare the effectiveness of individual counseling and group narrative therapy on female patients' life expectancy afflicted by breast cancer. The present study is a pre-test-post-test clinical trial. Fifty-five patients with breast cancer were randomly selected in the follow-up period and after their active medical treatment completion. Then, they were randomly divided into two groups: individual counseling and group counseling. Herth hope index (HHI) was used to measure the patients' hope level. Data were analyzed using t-test and SPSS software. hope rate was statistically significant in both groups receiving individual and group narrative therapy in the post-test compared to the pre-test (P <00000). Moreover, the comparative evaluation of hope in both groups (individual & group counseling) in the post-test showed that group narrative counseling is more effective than individual narrative counseling (P <00000). Conclusion: Narrative therapy promotes hope in breast cancer patients effectively. Due to the nature of breast cancer and its psychological effects in the post-treatment period, providing narrative group therapy can improve life quality. Patients' life quality changes in tandem with changes in hope.

Keywords: hope, narrative therapy, counseling, breast cancer

Procedia PDF Downloads 120
23443 Effects of Waist-to-Hip Ratio and Visceral Fat Measurements Improvement on Offshore Petrochemical Company Shift Employees' Work Efficiency

Authors: Essam Amerian

Abstract:

The aim of this study was to investigate the effects of improving waist-to-hip ratio (WHR) and visceral fat components on the health of shift workers in an offshore petrochemical company. A total of 100 male shift workers participated in the study, with an average age of 40.5 years and an average BMI of 28.2 kg/m². The study employed a randomized controlled trial design, with participants assigned to either an intervention group or a control group. The intervention group received a 12-week program that included dietary counseling, physical activity recommendations, and stress management techniques. The control group received no intervention. The outcomes measured were changes in WHR, visceral fat components, blood pressure, and lipid profile. The results showed that the intervention group had a statistically significant improvement in WHR (p<0.001) and visceral fat components (p<0.001) compared to the control group. Furthermore, there were statistically significant improvements in systolic blood pressure (p=0.015) and total cholesterol (p=0.034) in the intervention group compared to the control group. These findings suggest that implementing a 12-week program that includes dietary counseling, physical activity recommendations, and stress management techniques can effectively improve WHR, visceral fat components, and cardiovascular health among shift workers in an offshore petrochemical company.

Keywords: body composition, waist-hip-ratio, visceral fat, shift worker, work efficiency

Procedia PDF Downloads 77
23442 Performance Analysis of Scalable Secure Multicasting in Social Networking

Authors: R. Venkatesan, A. Sabari

Abstract:

Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.

Keywords: multicasting, scalability, security, social network

Procedia PDF Downloads 289
23441 Metformin and Its Combination with Sodium Hydrosulfide Influences Plasma Galectin-3 and CSE/H₂S System in Diabetic Rat's Heart

Authors: I. V. Palamarchuk, N. V. Zaichko

Abstract:

Background and Aims: Galectin-3 is a marker of subclinical cardiac injury and is elevated in individuals with type 2 diabetes mellitus; while hydrogen sulfide (H₂S), metabolite of sulfur-containing amino acids, is considered having antifibrogenic effects. This study was designed to investigate whether metformin and its combination with NaHS can influence plasma galectin-3 and cystathionine-γ-lyase/hydrogen sulfide (CSE/H₂S) system in diabetic rat’s heart. Methods: 32 healthy male rats (180-250 g) were divided into 4 groups. To induct diabetes, rats (group 2-4) were injected with streptozotocin (STZ, 40 mg/kg/i.p., 0.1 M citrate buffer (pH 4.5). Rats from 3d (STZ+Metf) and 4th (STZ+Metf+NaHS) groups were given metformin (500 mg/kg/day) orally, and rats from 4th (STZ+Metf+NaHS) group were injected sodium hydrosulfide (NaHS, 3 mg/kg/i.p.) once per day starting from 3 to 28 day after streptozotocin injection. Rats of first group (control) were administered the equivalent volumes of 0.9% NaCl. Plasma galectin-3 was measured by ELISA. Rats’ hearts were sampled for determination of H2S by reaction with N,N-Dimethyl-p-phenylenediamine. Determination of CSE gene expression was performed in real time using PCR in the presence of SYBR Green I, using DT-Light detecting amplifier ('DNA-technology', Russia). Results: Induction of streptozotocin diabetes (STZ-diabetes, group 2) was followed by low myocardial H2S concentration and CSE expression (by 35%, p < 0.05 and 60.5%, p < 0.001 respectively, than that in controls), while plasma galectin-3 in this group was significantly higher than in controls (by 3.8 times, p < 0.05). Administration of metformin (group 3) resulted in significantly higher H₂S concentration (by 28.5%, p < 0.05), whereas CSE expression was only by 6% more than that in STZ-diabetes, as well as plasma galectin-3 was only by 14.8% lower in comparison with untreated diabetic rats. The inhibition of H₂S generation and CSE activity by diabetes was greatly attenuated in STZ+Metf+NaHS group. The combination of metformin with NaHS significantly stimulated H₂S production (by 48%, p < 0.05 and 15%, p < 0.05 more than STZ-diabetes and STZ+Metf respectively) and CSE gene expression (by 64.8%, p < 0.05 compared to STZ-diabetes and by 55.4%,p < 0.05 compared to STZ+Metf). Besides, plasma galectin-3 in rats receiving metformin and NaHS was significantly lower by 42%, p < 0.05 and 32.5%, p < 0.05 compared to STZ-diabetes and STZ+Metf groups respectively. Conclusions: To summarize, dysfunction of CSE/H2S system and galectin-3 stimulation was found in streptozotocin-induced diabetic rats. Metformin and its combination with exogenous H2S effectively prevented the development of metabolic changes induced by diabetes. These findings suggest that CSE/H₂S system can be integrated into pathogenesis of diabetic complications through modulation of pro-inflammatory and pro-fibrogenic mediator galectin-3.

Keywords: cystathionine-γ-lyase, diabetic heart, galectin-3, hydrogen sulfide, metformin, sodium hydrosulfide

Procedia PDF Downloads 222
23440 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 179
23439 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 215
23438 The Effectiveness of Group Counseling of Mindfulness-Based Cognitive Therapy on Cognitive Emotion Regulation in High School Students

Authors: Hossein Ilanloo, Sedigheh Ahmadi, Kianoosh Zahrakar

Abstract:

The present study aims at investigating the effectiveness of group counseling of mindfulness-based cognitive therapy on cognitive emotion regulation in high school students. The research design was quasi-experimental and pre-test-post-test type and a two-month follow-up with a control group. The statistical population of the study consisted of all-male high school students in Takestan city in the Academic Year 2020-2021. The sample comprised 30 high school male students selected through the convenience sampling method and randomly assigned to experimental (n=15) and control (n=15) groups. The experimental group then received ten sessions of 90-minute group counseling of mindfulness-based cognitive therapy, and the control group did not receive any intervention. In order to collect data, the author used the Cognitive Emotion Regulation Questionnaire (CERQ). The researcher also used multivariate analysis of covariance, repeated measures, LSD post hoc test, and SPSS-26 software for data analysis.

Keywords: mindfulness-based cognitive therapy, cognitive emotion regulation, students, high schools

Procedia PDF Downloads 119
23437 Hierarchy and Weight of Influence Factors on Labor Productivity in the Construction Industry of the Nepal

Authors: Shraddha Palikhe, Sunkuk Kim

Abstract:

The construction industry is the most labor intensive in Nepal. It is obvious that construction is a major sector and any productivity enhancement activity in this sector will have a positive impact in the overall improvement of the national economy. Previous studies have stated that Nepal has poor labor productivity among other south Asian countries. Though considerable research has been done on productivity factors in other countries, no study has addressed labor productivity issues in Nepal. Therefore, the main objective of this study is to identify and hierarchy the influence factors for poor labor productivity. In this study, a questionnaire approach is chosen as a method of the survey from thirty experts involved in the construction industry, such as Architects, Civil Engineers, Project Engineers and Site Engineers. A survey was conducted in Nepal, to identify the major factors impacting construction labor productivity. Analytic Hierarchy Process (AHP) analysis method was used to understand the underlying relationships among the factors, categorized into five groups, namely (1) Labor-management group; (2) Material management group; (3) Human labor group; (4) Technological group and (5) External group and was divided into 33 subfactors. AHP was used to establish the relative importance of the criteria. The AHP makes pairwise comparisons of relative importance between hierarchy elements grouped by labor productivity decision criteria. Respondents were asked to answer based on their experience of construction works. On the basis of the respondent’s response, weight of all the factors were calculated and ranked it. The AHP results were tabulated based on weight and ranking of influence factors. AHP model consists of five main criteria and 33 sub-criteria. Among five main criteria, the scenario assigns a weight of highest influential factor i.e. 26.15% to human labor group followed by 23.01% to technological group, 22.97% to labor management group, 17.61% material management group and 10.25% to external group. While in 33 sub-criteria, the most influential factor for poor productivity in Nepal are lack of monetary incentive (20.53%) for human labor group, unsafe working condition (17.55%) for technological group, lack of leadership (18.43%) for labor management group, unavailability of tools at site (25.03%) for material management group and strikes (35.01%) for external group. The results show that AHP model associated criteria are helpful to predict the current situation of labor productivity. It is essential to consider these influence factors to improve the labor productivity in the construction industry of Nepal.

Keywords: construction, hierarchical analysis, influence factors, labor productivity

Procedia PDF Downloads 399
23436 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 274
23435 Platelet Transfusion Thresholds for Pediatrics; A Retrospective Study

Authors: Hessah Alsulami, Majedah Aldosari

Abstract:

Introduction: Platelet threshold of 10x109 /L is recommended for clinically stable thrombocytopenic pediatric patients. Transfusions at a higher level (given the absence of research evidence, as determined by clinical circumstances, generally at threshold of 40x109 /L) may be required for patients with signs of bleeding, high fever, hyper-leukocytosis, rapid fall in platelet count, concomitant coagulation abnormality, critically ill patients, and those with impaired platelet function (including drug induced). Transfusions at a higher level may be also required for patients undergoing invasive procedures. Method: This study is a retrospective observational analysis of platelet transfusion thresholds in a single secondary pediatric hospital in Riyadh. From the blood bank database, the list of the patients who received platelet transfusions in the second half of 2018 was retrieved. Patients were divided into two groups; group A, those belong to the category of high platelet level for transfusion (such as those with bleeding, high fever, rapid fall in platelet count, impaired platelet function or undergoing invasive procedures) and group B, those who were not. Then we looked at the pre and post transfusion platelet levels for each group. The data was analyzed using GraphPad software and the data expressed as Mean ± SD. Result: A total of 112 of transfusion episodes in 61 patients (38% female) were analyzed. The age ranged from 24 days to 8 years. The distribution of platelet transfusion episodes was 64% (n=72) for group A and 36% (n= 40) for group B. The mean pre-transfusion platelet count was 46x103 ± (11x 103) for group A and 28x103 ± (6x103) for group B. the post-transfusion mean platelet count was 61 x 103 ± (14 x 103) and 60 x103 ± (24 x 103) for group A and B respectively. Among the groups the rise in the mean platelet count after transfusion was significant among stable patients (group B) compared to unstable patients (group A) (P < 0.001). Conclusion: The platelet count threshold for transfusion varied with the clinical condition and is higher among unstable patients’ group which is expected. For stable patients the threshold was higher than what it should be which means that the clinicians don’t follow the guidelines in this regard. The rise of platelet count after transfusion was higher among stable patients.

Keywords: platelet, transfusion, threshold, pediatric

Procedia PDF Downloads 65
23434 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 166
23433 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 238
23432 Comparison of Depth of Cure and Degree of Conversion between Opus Bulk Fill and X-Tra Fill Bulk Fill Composites

Authors: Yasaman Samani, Ali Golmohammadi

Abstract:

Introduction: The degree of conversion and depth of cure affects the clinical success of resin composite restorations directly. One of the main challenges in achieving a successful composite restoration is the achievement of sufficient depth of cure. The insufficient polymerization may lead to a decrease in the physical/mechanical and biological properties of resin composites and, as a result of that, unsuccessful composite restoration. Thus, because of the importance of studying and evaluating the depth of cure and degree of conversion in bulk-fill composites, we decided to evaluate and compare the degree of conversion and depth of cure in two bulk-fill composites; x-tra fill (Voco, Germany) and Opus Bulk fill APS (FGM, Brazil). Materials and Methods: Composite resin specimens (n=10) per group were prepared as cylinder blocks (4×8 mm) with bulk-fill composites, x-tra fil (Voco, Germany) designated as Group A, and Opus Bulk fill APS (FGM, Brazil) designated as Group B. Depth of cure was determined according to “ISO 4049; Depth of Cure” method, In which each specimen were cured (iLED, Woodpecker, China) 40 seconds and FTIR spectroscopy method was used to estimate the degree of conversion of both the bulk-fill composites. The degree of conversion of monomer to polymer was estimated individually in the coronal half (Group A1 and B1) and pulpal half (Group A2 and Group B2) by dividing each specimen into two halves. The data were analyzed using a Student’s t-test and one-way ANOVA at a 5% level of significance. Results: The mean depth of cure in x-tra fil (Voco, Germany) was 3.99 (±0.16), and for Opus Bulk fill, APS (FGM, Brazil) was 2.14 (±0.3). The degree of conversion percentage in Group A1 was 82.7 (±6.1), in group A2 was 73.4 (±5.2), in group B1 was 63.3 (±4.7) and in Group B2 was 56.5 (±7.7). Statistical analysis revealed a significant difference in the depth of cure between the two bulk-fill composites with x-tra fil (Voco, Germany) higher than Opus Bulk fill APS (FGM, Brazil) (P<0.001). The degree of conversion percentage also showed a significant difference, Group A1 being higher than A2 (P=0.0085), B1, and B2 (P<0.001). Group A2 was also higher than B1 (P=0.003) and B2 (P<0.001). There was no significant difference between B1 and B2 (P=0.072). Conclusion: The results indicate that x-tra fill has more depth of cure and a higher percentage of the degree of conversion than Opus Bulk fill APS. The coronal half of x-tra fil had the highest depth of cure percentage (82.66%), and the pulpal half of Opus Bulk fill APS had the lowest percentage (56.45%). Even though both bulk-fill composite materials had an acceptable degree of conversion (55% and higher), x-tra fill has shown better results.

Keywords: depth of cure, degree of conversion, bulk-fill composite, FTIR

Procedia PDF Downloads 99
23431 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 359
23430 Impact of Revenue Reform on Vulnerable Communities

Authors: Pauliasi Tony Fakahau

Abstract:

This paper provides an overview of the impact of the revenue reform programme on vulnerable communities in the Kingdom of Tonga. Economic turmoil and mismanagement during the late 1990s forced the government to seek technical and financial assistance from the Asian Development Bank to undertake a comprehensive Economic and Public Sector Reform (EPSR) programme. The EPSR is a Western model recommended by donor agencies as the solution to Tonga’s economic challenges. The EPSR programme included public sector reform, private sector growth, and revenue generation. Tax reform was the main tool for revenue generation, which set out to strengthen tax compliance and administration as well as implement a value-added consumption tax. The EPSR is based on Western values and ideology but failed to recognise that Tongan cultural values are important to the local community. Two participant groups were interviewed. Participant group one consisted of 51 people representing vulnerable communities. Participant group two consisted of six people from the government and business sector who were from the elite of Tongan society. The Kakala Research Methodology provided the framework for the research, and the Talanoa Research Method was used to conduct semi-structured interviews in the homes of the first group and in the workplaces of the second group. The research found a heavy burden of the consumption tax on the purchasing power of participant group one (vulnerable participants), having an impact on nearly every financial transaction they made. Participant group ones’ main financial priorities were kavenga fakalotu (obligations to the church), kavenga fakafāmili (obligations to the family) and kavenga fakafonua (obligations to cultural events for the village, nobility, and royalty). The findings identified inequalities of the revenue reform, especially from consumption tax, for vulnerable people and communities compared to the elite of society. The research concluded that government and donor agencies need ameliorating policies to reduce the burden of tax on vulnerable groups more susceptible to the impact of revenue reform.

Keywords: tax reform, tonga vulnerable community revenue, revenue reform, public sector reform

Procedia PDF Downloads 120
23429 Efficacy Of Tranexamic Acid On Blood Loss After Primary Total Hip Replacement : A Case-control Study In 154 Patients

Authors: Fedili Benamar, Belloulou Mohamed Lamine, Ouahes Hassane, Ghattas Samir

Abstract:

Introduction: Perioperative blood loss is a frequent cause of complications in total hip replacement (THR). The present prospective study assessed the efficacy of tranexamic acid (Exacyl(®)) in reducing blood loss in primary THR. Hypothesis: Tranexamic acid reduces blood loss in THR. Material and method: -This is a prospective randomized study on the effectiveness of Exacyl (tranexamic acid) in total hip replacement surgery performed on a standardized technique between 2019 and September 2022. -It involved 154 patients, of which 84 received a single injection of Exacyl (group 1) at a dosage of 10 mg/kg over 20 minutes during the perioperative period. -All patients received postoperative thromboprophylaxis with enoxaparin 0.4 ml subcutaneously. -All patients were admitted to the post-interventional intensive care unit for a duration of 24 hours for monitoring and pain management as per the service protocol. Results: 154 patients, of which 84 received a single injection of Exacyl (group 1) and 70 patients patients who did not receive Exacyl perioperatively : (Group 2 ) The average age is 57 +/- 15 years The distribution by gender was nearly equal with 56% male and 44% female; "The distribution according to the ASA score was as follows: 20.2% ASA1, 82.3% ASA2, and 17.5% ASA3. "There was a significant difference in the average volume of intraoperative and postoperative bleeding during the 48 hours." The average bleeding volume for group 1 (received Exacyl) was 614 ml +/- 228, while the average bleeding volume for group 2 was 729 +/- 300, with a chi-square test of 6.35 and a p-value < 0.01, which is highly significant. The ANOVA test showed an F-statistic of 7.11 and a p-value of 0.008. A Bartlett test revealed a chi-square of 6.35 and a p-value < 0.01." "In Group 1 (patients who received Exacyl), 73% had bleeding less than 750 ml (Group A), and 26% had bleeding exceeding 750 ml (Group B). In Group 2 (patients who did not receive Exacyl perioperatively), 52% had bleeding less than 750 ml (Group A), and 47% had bleeding exceeding 750 ml (Group B). "Thus, the use of Exacyl reduced perioperative bleeding and specifically decreased the risk of severe bleeding exceeding 750 ml by 43% with a relative risk (RR) of 1.37 and a p-value < 0.01. The transfusion rate was 1.19% in the population of Group 1 (Exacyl), whereas it was 10% in the population of Group 2 (no Exacyl). It can be stated that the use of Exacyl resulted in a reduction in perioperative blood transfusion with an RR of 0.1 and a p-value of 0.02. Conclusions: The use of Exacyl significantly reduced perioperative bleeding in this type of surgery.

Keywords: acid tranexamic, blood loss, anesthesia, total hip replacement, surgery

Procedia PDF Downloads 74
23428 Characterization of Number of Subgroups of Finite Groups

Authors: Khyati Sharma, A. Satyanarayana Reddy

Abstract:

The topic of how many subgroups exist within a certain finite group naturally arises in the study of finite groups. Over the years, different researchers have investigated this issue from a variety of angles. The significant contributions of the key mathematicians over the time have been summarized in this article. To this end, we classify finite groups into three categories viz. (a) Groups for which the number of subgroups is less than |G|, (b) equals to |G|, and finally, (c) greater than |G|. Because every element of a finite group generates a cyclic subgroup, counting cyclic subgroups is the most important task in this endeavor. A brief survey on the number of cyclic subgroups of finite groups is also conducted by us. Furthermore, we also covered certain arithmetic relations between the order of a finite group |G| and the number of its distinct cyclic subgroups |C(G)|. In order to provide pertinent context and possibly reveal new novel areas of potential research within the field of research on finite groups, we finally pose and solicit a few open questions.

Keywords: abstract algebra, cyclic subgroup, finite group, subgroup

Procedia PDF Downloads 115
23427 Carotid Intima-Media Thickness and Ankle-Brachial Index as Predictors of the Severity of Coronary Artery Disease

Authors: Ali Kassem, Yaser Kamal, Mohamed Abdel Wahab, Mohamed Hussen

Abstract:

Introduction: Atherosclerosis is one of the leading causes of death all over the world. Recently, there is an increasing interest in Carotid Intima-Medial Thickness (CIMT) and Ankle Brachial Index (ABI) as non-invasive tools for identifying subclinical atherosclerosis. We aim to examine the role of CIMT and ABI as predictors of the severity of angiographically documented coronary artery disease (CAD). Methods: A cross-sectional study conducted on 60 patients who were investigated by coronary angiography at Sohag University Hospital, Egypt. CIMT: After the carotid arteries were located by transverse scans, the probe was rotated 90 ° to obtain and record longitudinal images of bilateral carotid arteries ABI: Each patient was evaluated in the supine position after resting for 5 min. ABI was measured in each leg using a Doppler Ultrasound while the patient remained in the same position. The lowest ABI obtained for either leg was taken as the ABI measurement for the patient. Results: Patients with carotid mean IMT ≥ 0.9 mm had significantly more severe coronary artery disease than patients without thickening (mean IMT > 0.9 mm). Similarly, patients with low ABI (< 0.9) had significantly more severe coronary artery disease than patients with ABI ≥ 0.9. When the patients were divided into 4 groups (group A, n = 15, mean IMT < 0.9 mm, ABI ≥ 0.9; group B, n = 25, mean IMT < 0.9 mm, low ABI; group C, n = 5, mean IMT ≥ 0.9 mm, ABI ≥ 0.9; group D, n = 19, mean IMT ≤ 0.9 mm, low ABI), the presence of significant coronary stenosis (> 50%) of the groups were significantly different (group A, n = 5: (33.3%); group B, n = 11: (52.4%); group C, n = 4: (60%); group D, n=15, (78.9%), P = 0.001). Conclusion: CIMT and ABI provide useful information on the severity of CAD. Early and aggressive intervention should be considered in patients with CAD and abnormalities in one or both of these non-invasive modalities.

Keywords: ankle brachial index, carotid intima media thickness, coronary artery disease, predictors of severity

Procedia PDF Downloads 228
23426 Community-Based Destination Sustainable Development: Case of Cicada Walking Street, Hua Hin, Thailand

Authors: Kingkan Pongsiri

Abstract:

This paper aims to study the role and activities of the participants and the impact of activities created in the local area in order to sustainably develop the local areas. This study applied both qualitative and quantitative approaches presented in descriptive style; the data was collected via survey, observation and in-depth interviews with samples. The results illustrated five sorts of roles of participants of the Cicada Walking-street and four types of creative activities; recreation based, art based, cultural based, and live events. Integration of local characteristics, arts and cultures were presented creatively and interestingly. Participants are various. The roles of the participants found in the Cicada Market are group of the property and area management, entrepreneurs, leisure (entertaining persons), local people, and tourists. The good impacts on local communities are those in terms of economy, environmental friendly and local arts and cultures promoting. On the other hand, the traffic congestion, waste and the increasing of energy consumption are negative impacts from area development.

Keywords: creative tourism activity, destination development, sustainable development, walking street

Procedia PDF Downloads 241
23425 Establishing Community-Based Pro-Biodiversity Enterprise in the Philippines: A Climate Change Adaptation Strategy towards Agro-Biodiversity Conservation and Local Green Economic Development

Authors: Dina Magnaye

Abstract:

In the Philippines, the performance of the agricultural sector is gauged through crop productivity and returns from farm production rather than the biodiversity in the agricultural ecosystem. Agricultural development hinges on the overall goal of increasing productivity through intensive agriculture, monoculture system, utilization of high yielding varieties in plants, and genetic upgrading in animals. This merits an analysis of the role of agro-biodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. These enterprises conserve biodiversity while equitably sharing production income in the utilization of biological resources. The study aims to determine how community-based pro-biodiversity enterprises become instrumental in local climate change adaptation and agro-biodiversity conservation as input to local green economic development planning. It also involves an assessment of the role of agrobiodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. The perceptions of the local community members both in urban and upland rural areas on community-based pro-biodiversity enterprises were evaluated. These served as a basis in developing a planning modality that can be mainstreamed in the management of local green economic enterprises to benefit the environment, provide local income opportunities, conserve species diversity, and sustain environment-friendly farming systems and practices. The interviews conducted with organic farmer-owners, entrepreneur-organic farmers, and organic farm workers revealed that pro-biodiversity enterprise such as organic farming involved the cyclic use of natural resources within the carrying capacity of a farm; recognition of the value of tradition and culture especially in the upland rural area; enhancement of socio-economic capacity; conservation of ecosystems in harmony with nature; and climate change mitigation. The suggested planning modality for community-based pro-biodiversity enterprises for a green economy encompasses four (4) phases to include community resource or capital asset profiling; stakeholder vision development; strategy formulation for sustained enterprises; and monitoring and evaluation.

Keywords: agro-biodiversity, agro-biodiversity conservation, local green economy, organic farming, pro-biodiversity enterprise

Procedia PDF Downloads 359
23424 The Effect of Computer-Based Formative Assessment on Learning Outcome

Authors: Van Thien NGO

Abstract:

The purpose of the study is to examine the effect of student response systems in computer-based formative assessment on learning outcomes. The backward design course is a tool to be applied for collecting necessary assessment evidence. The quasi-experimental research design involves collecting pre and posttest data on students assigned to the control group and the experimental group. The sample group consists of 150 college students randomly selected from two of the eight classes of electrical and electronics students at Cao Thang Technical College in Ho Chi Minh City, Vietnam. Findings from this research revealed that the experimental group, in which student response systems were applied, got better results than the controlled group, who did not apply them. Results show that using student response systems for technology-based formative assessment is vital and meaningful not only for teachers but also for students in the teaching and learning process.

Keywords: student response system, computer-based formative assessment, learning outcome, backward design course

Procedia PDF Downloads 129
23423 Instructional Design Strategy Based on Stories with Interactive Resources for Learning English in Preschool

Authors: Vicario Marina, Ruiz Elena, Peredo Ruben, Bustos Eduardo

Abstract:

the development group of Educational Computing of the National Polytechnic (IPN) in Mexico has been developing interactive resources at preschool level in an effort to improve learning in the Child Development Centers (CENDI). This work describes both a didactic architecture and a strategy for teaching English with digital stories using interactive resources available through a Web repository designed to be used in mobile platforms. It will be accessible initially to 500 children and worldwide by the end of 2015.

Keywords: instructional design, interactive resources, digital educational resources, story based English teaching, preschool education

Procedia PDF Downloads 469
23422 A Comparison of Implant Stability between Implant Placed without Bone Graft versus with Bone Graft Using Guided Bone Regeneration (GBR) Technique: A Resonance Frequency Analysis

Authors: R. Janyaphadungpong, A. Pimkhaokham

Abstract:

This prospective clinical study determined the insertion torque (IT) value and monitored the changes in implant stability quotient (ISQ) values during the 12 weeks healing period from implant placement without bone graft (control group) and with bone graft using the guided bone regeneration (GBR) technique (study group). The relationship between the IT and ISQ values of the implants was also assessed. The control and study groups each consisted of 6 patients with 8 implants per group. The ASTRA TECH Implant System™ EV 4.2 mm in diameter was placed in the posterior mandibular region. In the control group, implants were placed in bone without bone graft, whereas in the study group implants were placed simultaneously with the GBR technique at favorable bone defect. IT (Ncm) of each implant was recorded when fully inserted. ISQ values were obtained from the Osstell® ISQ at the time of implant placement, and at 2, 4, 8, and 12 weeks. No difference in IT was found between groups (P = 0.320). The ISQ values in the control group were significantly higher than in the study group at the time of implant placement and at 4 weeks. There was no significant association between IT and ISQ values either at baseline or after the 12 weeks. At 12 weeks of healing, the control and study groups displayed different trends. Mean ISQ values for the control group decreased over the first 2 weeks and then started to increase. ISQ value increases were statistically significant at 8 weeks and later, whereas mean ISQ values in the study group decreased over the first 4 weeks and then started to increase, with statistical significance after 12 weeks. At 12 weeks, all implants achieved osseointegration with mean ISQ values over the threshold value (ISQ>70). These results indicated that implants, in which guided bone regeneration technique was performed during implant placement for treating favorable bone defects, were as predictable as implants placed without bone graft. However, loading in implants placed with the GBR technique for correcting favorable bone defects should be performed after 12 weeks of healing to ensure implant stability and osseointegration.

Keywords: dental implant, favorable bone defect, guided bone regeneration technique, implant stability

Procedia PDF Downloads 291
23421 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 147
23420 International-Migration and Land Use Change in Ghana: Assessment of the Multidimensional Effects on National Development

Authors: Baffoe Kingsley

Abstract:

The consequence of the migration of young people from rural farming communities in the global south to the global north is a well-known phenomenon. While climate change and its accompanying socio-economic structures continue to be the driver, what is not really known is how left behinds are compelled to convert lands meant for the production of traditional staples such as cereals, vegetables, and tubers to the production of export-driven cashew plantations due to youth migration. The consequence of such migration on the development of Ghana and its food security is multidimensional. Using an ethnographic research design, the study revealed that the majority of farmers in the area are now aged, and farm labor has become scarce, which has impeded the cultivation of traditional staples for the population. It has also been established that in the absence of farm labor, most farmers have reduced farm sizes for the production of staples and increased the production of cashews. The practice has, in tend, resulted in a scarcity of land for the cultivation of staples. The study recommends further inquiry into how the effects of migration and cashew production as diversification in agriculture influence national development in Ghana.

Keywords: staple food crops, cashew plantations, climate change, migration

Procedia PDF Downloads 49
23419 Wheat Production and Market in Afghanistan

Authors: Fayiz Saifurahman, Noori Fida Mohammad

Abstract:

Afghanistan produces the highest rate of wheat, it is the first source of food, and food security in Afghanistan is dependent on the availability of wheat. Although Afghanistan is the main producer of wheat, on the other hand, Afghanistan is the largest importers of flour. The objective of this study is to assess the structure and dynamics of the wheat market in Afghanistan, can compute with foreign markets, and increase the level of production. To complete this, a broad series of secondary data was complied with, group discussions and interviews with farmers, agricultural and market experts. The research findings propose that; the government should adopt different policies to support the local market. The government should distribute the seed, support financially and technically to increase wheat production.

Keywords: Afghanistan, wheat, production , import

Procedia PDF Downloads 158