Search results for: human factor in security
13929 Transdisciplinary Attitude in the Classroom: Producing Quality of Being
Authors: Marie-Laure Mimoun-Sorel
Abstract:
Scholars concerned with the destiny of human species point out that our future will not only depend on progress made in technology and sciences but above all it will depend on human progress understood as quality of being. Teachers are significant force in developing a knowledgeable, creative, productive and democratic society. The values that underpin their profession are integrity, respect and responsibility. Therefore, being a teacher in the context of the 21st century requires embracing a Transdisciplinary Attitude which is about venturing within, between, across and beyond disciplines in order to bring forth quality of being in every learning process. In this article, the Transdisciplinary Attitude is defined and its benefits are shown through examples of Transdisciplinary inquiries in an Australian school. Finally, the conclusion invites to reflect on quality of teaching in regard to the development of individual autonomy, community participation and awareness of belonging to the human species.Keywords: human progress, quality of being, quality of teaching, transdisciplinary attitude in education
Procedia PDF Downloads 37013928 Organizational Management and Leadership
Authors: Osman Yildiz
Abstract:
As it is predicted 2559 years before there is nothing permanent except change. In our turbulent World, Organizations will always be faced with the challenge of determining the path that will always keep them on balance en route that will bring success. That means from top to bottom, every organisation is exposed to fight to stay afloat and compete while they face the continuous prospect of change in an increasingly competitive and globalized World. Otherwise, they would fail to realize their goals and targets, and ultimately would disappear. But the organizations that will celebrate success five or ten years from now will be the winners of the fight by having recognizing that planning the change was only the first step in the journey and put sufficient efforts into the task of leading change. Increasingly unpredictable and competitive organizational environments have put pressure on leaders across all industries to better manage the change. The key of establishing effective change and transformation in organisations lies on the steps taken before the change happens depending to the quality of the human sources; readiness for change, acknowledgement by management, prepared leaders, motivated employees, overcoming the resistance to change and ultimately adapting change into the organization. Due to these factors, leaders managing the organisational development can ensure organizations and employees to meet new performance targets, motivation and skills rapidly and effectively. Finally, this article will provide some tools for leaders, and discuss how to catch organisational development and manage the innovations in effective ways.Keywords: managing the change, organizational change, human factor, leaders, globalization, organisational development
Procedia PDF Downloads 27513927 State’s Responsibility of Space Debris
Authors: Athari Farhani
Abstract:
Abstract The existence of space debris is a direct implication of human activities in outer space. The amount of orbital debris resulting from human exploration and use of outer space has been steadily increasing in the history of human exploration and use of outer space, so that space debris in the responsibility of the launching state. Space debris not only hs a direct impact on environmentalpollution but can also harm and endanger the safety of human life. Despite the legal provisions governing the exploration and use of outer space, both international space law and liability convention, however, these legal provisions are only basic prinsiples, so that further thought or effort are needed, such as new international legal instruments to regulate the existence of space debris. The method used in this research is normative juridical with an approach to written legal regulation, especially international agreements related to space law.Keywords: state’s responsibility, space debris, outerspace, international law
Procedia PDF Downloads 10513926 Nutrient in River Ecosystems Follows Human Activities More Than Climate Warming
Authors: Mohammed Abdulridha Hamdan
Abstract:
To face the water crisis, understanding the role of human activities on nutrient concentrations in aquatic ecosystems needs more investigations to compare to extensively studies which have been carried out to understand these impacts on the water quality of different aquatic ecosystems. We hypothesized human activates on the catchments of Tigris river may change nutrient concentrations in water along the river. The results showed that phosphate concentration differed significantly among the studied sites due to distributed human activities, while nitrate concentration did not. Phosphate and nitrate concentrations were not affected by water temperature. We concluded that human activities on the surrounding landscapes could be more essential sources for nutrients of aquatic ecosystems than role of ongoing climate warming. Despite the role of warming in driving nutrients availability in aquatic ecosystems, our findings suggest to take the different activities on the surrounding catchments into account in the studies caring about the trophic status classification of aquatic ecosystems.Keywords: nitrate, phosphate, anthropogenic, warming
Procedia PDF Downloads 8113925 Human Factors Interventions for Risk and Reliability Management of Defence Systems
Authors: Chitra Rajagopal, Indra Deo Kumar, Ila Chauhan, Ruchi Joshi, Binoy Bhargavan
Abstract:
Reliability and safety are essential for the success of mission-critical and safety-critical defense systems. Humans are part of the entire life cycle of defense systems development and deployment. The majority of industrial accidents or disasters are attributed to human errors. Therefore, considerations of human performance and human reliability are critical in all complex systems, including defense systems. Defense systems are operating from the ground, naval and aerial platforms in diverse conditions impose unique physical and psychological challenges to the human operators. Some of the safety and mission-critical defense systems with human-machine interactions are fighter planes, submarines, warships, combat vehicles, aerial and naval platforms based missiles, etc. Human roles and responsibilities are also going through a transition due to the infusion of artificial intelligence and cyber technologies. Human operators, not accustomed to such challenges, are more likely to commit errors, which may lead to accidents or loss events. In such a scenario, it is imperative to understand the human factors in defense systems for better systems performance, safety, and cost-effectiveness. A case study using Task Analysis (TA) based methodology for assessment and reduction of human errors in the Air and Missile Defense System in the context of emerging technologies were presented. Action-oriented task analysis techniques such as Hierarchical Task Analysis (HTA) and Operator Action Event Tree (OAET) along with Critical Action and Decision Event Tree (CADET) for cognitive task analysis was used. Human factors assessment based on the task analysis helps in realizing safe and reliable defense systems. These techniques helped in the identification of human errors during different phases of Air and Missile Defence operations, leading to meet the requirement of a safe, reliable and cost-effective mission.Keywords: defence systems, reliability, risk, safety
Procedia PDF Downloads 13513924 Psychopathic Disorders and Judges Sentencing: Can Neurosciences Change this Aggravating Factor in a Mitigating Factor?
Authors: Kevin Moustapha
Abstract:
Psychopathy is perceived today as being «the most important concept in the criminal justice system» and as «the most important legal notion of the early 21 th century». The explosion of research related to psychopathy seems to perfectly illustrate this trend. Traditionally, many studies tend to focus on links between insanity defense and psychopathy. That is why our purpose in this article is to analyze psychopathic disorders in the scope of judges sentencing in Canada. Indeed, in every Canadian case related to dangerous offenders, judges must balance between fairness and protection of the individuals rights of the accused and protection of society from dangerous predators who may commit future acts of physical or sexual violence. Increasingly, psychopathic disorders are taking an important part in judge sentencing, especially in Canada. This phenomenon can be illustrated by the high proportion of psychopath offenders incarcerated in North American prisons. Many decisions in Canadians courtrooms seem to point out that psychopathy is often used as a strong argument by the judges to preserve public safety. The fact that psychopathy is often associated with violence, recklessness and recidivism, it could explain why many judges consider psychopathic disorders as an aggravating factor. Generally, the judge reasoning is based on article 753 of Canadian Criminal Code related to dangerous offenders, which is used for individuals who show a pattern of repetitive and persistent aggressive behaviour. However, with cognitive neurosciences, the psychopath’s situation in courtrooms would probably change. Cerebral imaging and news data provided by the neurosciences show that emotional and volitional functions in psychopath’s brains are impaired. Understanding these new issues could enable some judges to recognize psychopathic disorders as a mitigating factor. Two important questions ought to be raised in this article: can exploring psychopaths ‘brains really change the judge sentencing in Canadian courtrooms? If yes, can judges consider psychopathy more as a mitigating factor than an aggravating factor?Keywords: criminal law, judges sentencing, neurosciences, psychopathy
Procedia PDF Downloads 92513923 Prevalence of Seropositivity for Cytomegalovirus in Patients with Hereditary Bleeding Diseases in West Azerbaijan of Iran
Authors: Zakieh Rostamzadeh, Zahra Shirmohammadi
Abstract:
Human cytomegalovirus is a species of the cytomegalovirus family of viruses, which in turn is a member of the viral family known as herpesviridae or herpesviruses. Although they may be found throughout the body, HCMV infections are frequently associated with the salivary glands. HCMV infection is typically unnoticed in healthy people, but can be life-threatening for the immunocompromised such as HIV-infected persons, organ transplant recipients, or newborn infants. After infection, HCMV has an ability to remain latent within the body over long periods. Cytomegalovirus (CMV) causes infection in immunocompromised, hemophilia patients and those who received blood transfusion frequently. This study aimed at determining the prevalence of cytomegalovirus (CMV) antibodies in hemophilia patients. Materials and Methods: A retrospective observational study was carried out in Urmia, North West of Iran. The study population comprised a sample of 50 hemophilic patients born after 1985 and have received blood factors in West Azerbaijan. The exclusion criteria include: drug abusing, high risk sexual contacts, vertical transmission of mother to fetus and suspicious needling. All samples were evaluated with the method of ELISA, with a certain kind of kit and by a certain laboratory. Results: Fifty hemophiliacs from 250 patients registered with Urmia Hemophilia Society were enrolled in the study including 43 (86%) male, and 7 (14%) female. The mean age of patients was 10.3 years, range 3 to 25 years. None of patients had risk factors mentioned above. Among our studied population, 34(68%) had hemophilia A, 1 (2%) hemophilia B, 8 (16%) VWF, 3(6%) factor VII deficiency, 1 (2%) factor V deficiency, 1 (2%) factor X deficiency, 1 (2%). Sera of 50 Hemodialysis patients were investigated for CMV-specific immunoglobulin G (IgG) and IgM. % 91.89 patients were anti-CMV IgG positive and %40.54 was seropositive for anti-CMV IgM. 37.8% patient had serological evidence of reactivation and 2.7% of patients had the primary infection. Discussion: There was no relationship between the antibody titer and: drug abusing, high risk sexual contacts, vertical transmission of mother to fetus and suspicious needling.Keywords: bioinformatics, biomedicine, cytomegalovirus, immunocompromise
Procedia PDF Downloads 35713922 Meteorological Risk Assessment for Ships with Fuzzy Logic Designer
Authors: Ismail Karaca, Ridvan Saracoglu, Omer Soner
Abstract:
Fuzzy Logic, an advanced method to support decision-making, is used by various scientists in many disciplines. Fuzzy programming is a product of fuzzy logic, fuzzy rules, and implication. In marine science, fuzzy programming for ships is dramatically increasing together with autonomous ship studies. In this paper, a program to support the decision-making process for ship navigation has been designed. The program is produced in fuzzy logic and rules, by taking the marine accidents and expert opinions into account. After the program was designed, the program was tested by 46 ship accidents reported by the Transportation Safety Investigation Center of Turkey. Wind speed, sea condition, visibility, day/night ratio have been used as input data. They have been converted into a risk factor within the Fuzzy Logic Designer application and fuzzy rules set by marine experts. Finally, the expert's meteorological risk factor for each accident is compared with the program's risk factor, and the error rate was calculated. The main objective of this study is to improve the navigational safety of ships, by using the advance decision support model. According to the study result, fuzzy programming is a robust model that supports safe navigation.Keywords: calculation of risk factor, fuzzy logic, fuzzy programming for ship, safety navigation of ships
Procedia PDF Downloads 18913921 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 51813920 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 17213919 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 6213918 English Language Teachers' Personal Motivation Influences Their Professional Motivation
Authors: Gulderen Saglam
Abstract:
This study explores the elements of personal motivation which influence professional motivation of in-service English language teachers in Bursa in Turkey. Fifty English language teachers participated in a seminar held on ‘teachers’ motivation’ for the length of six hours in two days, which were organized by the local Ministry of Education. During the seminar, teachers firstly aimed to share cornerstones of their professional motivation. Later, those teachers stated the significance of their personal motivation. Two months’ later, those teachers were given the questionnaire including both closed and open-ended questions involving those two types of motivational acts of teachers. Questionnaire items were tested by Crombah’s Alfa Reliability Statistics. Responses to the questionnaire were analyzed by factor analysis and test of normality. The results were also tested by non-parametric and parametric tests. As a result, it was found that language teachers who were personally motivated reported higher professional motivation of theirs in teaching profession in-service.Keywords: influencing factor, in-service-teachers, personal motivation, professional motivation, in-service-teachers, influencing factor
Procedia PDF Downloads 28813917 Environmental Impacts on the British Era Structures of Faisalabad-a Detailed Study of the Clock Tower of Faisalabad
Authors: Bazla Manzoor, Aqsa Yasin
Abstract:
Pakistan is the country which is progressing by leaps and bounds through agricultural and industrial growth. The main area, which presents the largest income rate through industrial activities, is Faisalabad from the Province of Punjab. Faisalabad’s main occupations include agriculture and industry. As these sectors i.e. agriculture and industry is developing day by day, they are earning much income for the country and generating thousands of job vacancies. On one hand the city, i.e. Faisalabad is on the way of development through industrial growth, while on the other hand this industrial growth is producing a bad impact on the environment. In return, that damaged environment is affecting badly on the people and built environment. This research is chiefly based on one of the above-mentioned factors i.e. adverse environmental impacts on the built structures. Faisalabad is an old city, therefore; it is having many old structures especially from British Era. Many of those structures are still surviving and are functioning as the government, private and public buildings. However, these structures are getting in a poor condition with the passage of time due to bad maintenance and adverse environmental impacts. Bad maintenance is a factor, which can be controlled by financial assistance and management. The factor needs to be seriously considered is the other one i.e. adverse environmental impacts on British Era structures of the city because this factor requires controlled and refined human activities and actions. For this reason, a research was required to conserve the British Era structures of Faisalabad so that these structures can function well. The other reason to conserve them is that these structures are historically important and are the heritage of the city. For doing this research, literature has been reviewed which was present in the libraries of the city. Department of Environment, Town Municipal Administration, Faisalabad Development Authority and Lyallpur Heritage Foundation were visited to collect the existing data available. Various British Era structures were also visited to note down the environmental impacts on them. From all the structures “Clock Tower,” was deeply studied as it is one of the oldest and most important heritage structures of the city because the earlier settlements of the city were planned based on its location by The British Government. The architectural and environmental analyses were done for The Clock Tower. This research study found the deterioration factors of the tower according to which suggestions have been made.Keywords: lyallpur, heritage, architecture, environment
Procedia PDF Downloads 30213916 Glorification Trap in Combating Human Trafficking in Indonesia: An Application of Three-Dimensional Model of Anti-Trafficking Policy
Authors: M. Kosandi, V. Susanti, N. I. Subono, E. Kartini
Abstract:
This paper discusses the risk of glorification trap in combating human trafficking, as it is shown in the case of Indonesia. Based on a research on Indonesian combat against trafficking in 2017-2018, this paper shows the tendency of misinterpretation and misapplication of the Indonesian anti-trafficking law into misusing the law for glorification, to create an image of certain extent of achievement in combating human trafficking. The objective of this paper is to explain the persistent occurrence of human trafficking crimes despite the significant progress of anti-trafficking efforts of Indonesian government. The research was conducted in 2017-2018 by qualitative approach through observation, depth interviews, discourse analysis, and document study, applying the three-dimensional model for analyzing human trafficking in the source country. This paper argues that the drive for glorification of achievement in the combat against trafficking has trapped Indonesian government in the loop of misinterpretation, misapplication, and misuse of the anti-trafficking law. In return, the so-called crime against humanity remains high and tends to increase in Indonesia.Keywords: human trafficking, anti-trafficking policy, transnational crime, source country, glorification trap
Procedia PDF Downloads 16713915 Research on Spatial Pattern and Spatial Structure of Human Settlement from the View of Spatial Anthropology – A Case Study of the Settlement in Sizhai Village, City of Zhuji, Zhejiang Province, China
Authors: Ni Zhenyu
Abstract:
A human settlement is defined as the social activities, social relationships and lifestyles generated within a certain territory, which is also relatively independent territorial living space and domain composed of common people. Along with the advancement of technology and the development of society, the idea, presented in traditional research, that human settlements are deemed as substantial organic integrity with strong autonomy, are more often challenged nowadays. Spatial form of human settlements is one of the most outstanding external expressions with its subjectivity and autonomy, nevertheless, the projections of social, economic activities on certain territories are even more significant. What exactly is the relationship between human beings and the spatial form of the settlements where they live in? a question worth thinking over has been raised, that if a new view, a spatial anthropological one , can be constructed to review and respond to spatial form of human settlements based on research theories and methods of cultural anthropology within the profession of architecture. This article interprets how the typical spatial form of human settlements in the basin area of Bac Giang Province is formed under the collective impacts of local social order, land use condition, topographic features, and social contracts. A particular case of the settlement in Sizhai Village, City of Zhuji, Zhejiang Province is chosen to study for research purpose. Spatial form of human settlements are interpreted as a modeled integrity affected corporately by dominant economy, social patterns, key symbol marks and core values, etc.. Spatial form of human settlements, being a structured existence, is a materialized, behavioral, and social space; it can be considered as a place where human beings realize their behaviors and a path on which the continuity of their behaviors are kept, also for social practice a territory where currant social structure and social relationships are maintained, strengthened and rebuilt. This article aims to break the boundary of understanding that spatial form of human settlements is pure physical space, furthermore, endeavors to highlight the autonomy status of human beings, focusing on their relationships with certain territories, their interpersonal relationships, man-earth relationships and the state of existence of human beings, elaborating the deeper connotation behind spatial form of human settlements.Keywords: spatial anthropology, human settlement, spatial pattern, spatial structure
Procedia PDF Downloads 41113914 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13413913 Biflavonoids from Selaginellaceae as Epidermal Growth Factor Receptor Inhibitors and Their Anticancer Properties
Authors: Adebisi Adunola Demehin, Wanlaya Thamnarak, Jaruwan Chatwichien, Chatchakorn Eurtivong, Kiattawee Choowongkomon, Somsak Ruchirawat, Nopporn Thasana
Abstract:
The epidermal growth factor receptor (EGFR) is a transmembrane glycoprotein involved in cellular signalling processes and, its aberrant activity is crucial in the development of many cancers such as lung cancer. Selaginellaceae are fern allies that have long been used in Chinese traditional medicine to treat various cancer types, especially lung cancer. Biflavonoids, the major secondary metabolites in Selaginellaceae, have numerous pharmacological activities, including anti-cancer and anti-inflammatory. For instance, amentoflavone induces a cytotoxic effect in the human NSCLC cell line via the inhibition of PARP-1. However, to the best of our knowledge, there are no studies on biflavonoids as EGFR inhibitors. Thus, this study aims to investigate the EGFR inhibitory activities of biflavonoids isolated from Selaginella siamensis and Selaginella bryopteris. Amentoflavone, tetrahydroamentoflavone, sciadopitysin, robustaflavone, robustaflavone-4-methylether, delicaflavone, and chrysocauloflavone were isolated from the ethyl-acetate extract of the whole plants. The structures were determined using NMR spectroscopy and mass spectrometry. In vitro study was conducted to evaluate their cytotoxicity against A549, HEPG2, and T47D human cancer cell lines using the MTT assay. In addition, a target-based assay was performed to investigate their EGFR inhibitory activity using the kinase inhibition assay. Finally, a molecular docking study was conducted to predict the binding modes of the compounds. Robustaflavone-4-methylether and delicaflavone showed the best cytotoxic activity on all the cell lines with IC50 (µM) values of 18.9 ± 2.1 and 22.7 ± 3.3 on A549, respectively. Of these biflavonoids, delicaflavone showed the most potent EGFR inhibitory activity with an 84% relative inhibition at 0.02 nM using erlotinib as a positive control. Robustaflavone-4-methylether showed a 78% inhibition at 0.15 nM. The docking scores obtained from the molecular docking study correlated with the kinase inhibition assay. Robustaflavone-4-methylether and delicaflavone had a docking score of 72.0 and 86.5, respectively. The inhibitory activity of delicaflavone seemed to be linked with the C2”=C3” and 3-O-4”’ linkage pattern. Thus, this study suggests that the structural features of these compounds could serve as a basis for developing new EGFR-TK inhibitors.Keywords: anticancer, biflavonoids, EGFR, molecular docking, Selaginellaceae
Procedia PDF Downloads 19813912 Informal Governance as Response to Institutional Paralysis
Authors: Stefanie Kasparek
Abstract:
The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.Keywords: agenda-setting, decision-making, international governance, UNSC
Procedia PDF Downloads 19913911 Influence of Nitrogen Fertilization on the Yields and Grain Quality of Winter Wheat under Different Environmental Conditions
Authors: Alicja Sułek, Grażyna Cacak-Pietrzak, Marta Wyzińska, Anna Nieróbca
Abstract:
In 2013/2014 and 2014/2015, a field experiment was conducted in two locations: Osiny and Wielichowo (Poland). The two-factor experiment was based on the method of randomized subblocks, in three replications. The first factor (A) was dose of nitrogen fertilization (two levels). The second factor (B) was nine winter wheat cultivars. It was found that winter wheat cultivars exhibited different reactions to higher nitrogen fertilization depending on the years and localities. Only KWS Dacanto cultivar under all growing conditions showed a significant increase in grain yield after the application of a higher level of nitrogen fertilization. The increase in nitrogen fertilization influenced the increase in gluten proteins content in wheat grain, but these changes were statistically significant only in the first year of the study. The quality of gluten does not depend on nitrogen fertilization. The quality of wheat grain depends on cultivars.Keywords: fertilization, grain quality, winter wheat, yield
Procedia PDF Downloads 20413910 The Relationship between Impared Fasting Glucose and Serum Fibroblast Growth Factor 21 Level
Authors: Nanhee Cho, Eugene Han, Hanbyul Kim, Hochan Cho
Abstract:
Pre-diabetes includes impaired fasting glucose (IFG) and impaired glucose tolerance (IGT) and there is a strong probability that pre-diabetes will lead to diabetes mellitus (DM). Serum fibroblast growth factor 21 (FGF-21) is known to be increased as a compensatory response to metabolic imbalance under conditions such as obesity, metabolic syndrome, and DM. This study aims to identify the relationship of serum FGF-21 with pre-diabetes, and with biomarkers of related metabolic diseases. Fifty five Korea adult patients participated in a cohort study from June 2012 to December 2015. The analysis revealed that BMI, FBS levels, and serum FGF-21 levels were significantly higher in the IFG group compared to those in the normal group. A multiple regression analysis was conduted on the correlations of serum FGF-21 levels with BMI, and FBS levels, and the result did not show statistical significance. In conclusion, our results revealed that serum FGF-21 level serve as a marker to predict IFG.Keywords: cytokine, fibroblast growth factor 21, impaired fasting glucose, prediabetes
Procedia PDF Downloads 32513909 Spiritual Health in View of Islamic Mysticism
Authors: Maryam Bakhtyar-Pegah Akrami
Abstract:
The relationship between spiritual health and spirituality is one of the important is that in recent years, the research about it is expanding and due to the rich heritage of the in this field of study and research in this important field more than before and we will come to spiritual life and healthier than before. In this research, we provide the following and the basics of Islamic Mysticism in the realm of spiritual health thoughts. This research is based on a descriptive method and comparison with analytical-method to data collected. The findings show that human beings due to this pivotal topic of full Islamic slab, and mental and physical education with the sought to reach the human place are complete, we can provide the basics along with new discussions of spiritual health help human beings to spiritual education along with our faiths in the reconstruction of the spiritual foundations of spiritual health are extremely helpfulKeywords: spirituality, health, Islam, mysticism, perfect human
Procedia PDF Downloads 16113908 The Distribution and Environmental Behavior of Heavy Metals in Jajarm Bauxite Mine, Northeast Iran
Authors: Hossein Hassani, Ali Rezaei
Abstract:
Heavy metals are naturally occurring elements that have a high atomic weight and a density at least five times greater than that of water. Their multiple industrial, domestic, agricultural, medical, and technological applications have led to their wide distribution in the environment, raising concerns over their potential effects on human health and the environment. Environmental protection against various pollutants, such as heavy metals formed by industries, mines and modern technologies, is a concern for researchers and industry. In order to assess the contamination of soils the distribution and environmental behavior have been investigated. Jajarm bauxite mine, the most important deposits have been discovered in Iran, which is about 22 million tons of reserve, and is the main mineral of the Diaspora. With a view to estimate the heavy metals ratio of the Jajarm bauxite mine area and to evaluate the pollution level, 50 samples have been collected and have been analyzed for the heavy metals of As, Cd, Cu, Hg, Ni and Pb with the help of Inductively Coupled Plasma-Mass Spectrometer (ICP- MS). In this study, we have dealt with determining evaluation criteria including contamination factor (CF), average concentration (AV), enrichment factor (EF) and geoaccumulation index (GI) to assess the risk of pollution from heavy metals(As, Cd, Cu, Hg, Ni and Pb) in Jajarm bauxite mine. In the samples of the studied, the average of recorded concentration of elements for Arsenic, Cadmium, Copper, Mercury, Nickel and Lead are 18, 0.11, 12, 0.07, 58 and 51 (mg/kg) respectively. The comparison of the heavy metals concentration average and the toxic potential in the samples has shown that an average with respect to the world average of the uncontaminated soil amounts. The average of Pb and As elements shows a higher quantity with respect to the world average quantity. The pollution factor for the study elements has been calculated on the basis of the soil background concentration and has been categorized on the basis of the uncontaminated world soil average with respect to the Hakanson classification. The calculation of the corrected pollutant degree shows the degree of the bulk intermediate pollutant (1.55-2.0) for the average soil sampling of the study area which is on the basis of the background quantity and the world average quantity of the uncontaminated soils. The provided conclusion from calculation of the concentrated factor, for some of the samples show that the average of the lead and arsenic elements stations are more than the background values and the unnatural metal concentration are covered under the study area, That's because the process of mining and mineral extraction. Given conclusion from the calculation of Geoaccumulation index of the soil sampling can explain that the copper, nickel, cadmium, arsenic, lead and mercury elements are Uncontamination. In general, the results indicate that the Jajarm bauxite mine of heavy metal pollution is uncontaminated area and extract the mineral from the mine, not create environmental hazards in the region.Keywords: enrichment factor, geoaccumulation index, heavy metals, Jajarm bauxite mine, pollution
Procedia PDF Downloads 29113907 A Computational Study of Very High Turbulent Flow and Heat Transfer Characteristics in Circular Duct with Hemispherical Inline Baffles
Authors: Dipak Sen, Rajdeep Ghosh
Abstract:
This paper presents a computational study of steady state three dimensional very high turbulent flow and heat transfer characteristics in a constant temperature-surfaced circular duct fitted with 900 hemispherical inline baffles. The computations are based on realizable k-ɛ model with standard wall function considering the finite volume method, and the SIMPLE algorithm has been implemented. Computational Study are carried out for Reynolds number, Re ranging from 80000 to 120000, Prandtl Number, Pr of 0.73, Pitch Ratios, PR of 1,2,3,4,5 based on the hydraulic diameter of the channel, hydrodynamic entry length, thermal entry length and the test section. Ansys Fluent 15.0 software has been used to solve the flow field. Study reveals that circular pipe having baffles has a higher Nusselt number and friction factor compared to the smooth circular pipe without baffles. Maximum Nusselt number and friction factor are obtained for the PR=5 and PR=1 respectively. Nusselt number increases while pitch ratio increases in the range of study; however, friction factor also decreases up to PR 3 and after which it becomes almost constant up to PR 5. Thermal enhancement factor increases with increasing pitch ratio but with slightly decreasing Reynolds number in the range of study and becomes almost constant at higher Reynolds number. The computational results reveal that optimum thermal enhancement factor of 900 inline hemispherical baffle is about 1.23 for pitch ratio 5 at Reynolds number 120000.It also shows that the optimum pitch ratio for which the baffles can be installed in such very high turbulent flows should be 5. Results show that pitch ratio and Reynolds number play an important role on both fluid flow and heat transfer characteristics.Keywords: friction factor, heat transfer, turbulent flow, circular duct, baffle, pitch ratio
Procedia PDF Downloads 37213906 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 13713905 The Effects of Local Factors on the Concentrations and Flora of Viable Fungi in School Buildings
Authors: H. Salonen, E. Castagnoli, C. Vornanen-Winqvist, R. Mikkola, C. Duchaine, L. Morawska, J. Kurnitski
Abstract:
A wide range of health effects among occupants are associated with the exposure to bioaerosols from fungal sources. Although the accurate role of these aerosols in causing the symptoms and diseases is poorly understood, the important effect of bioaerosol exposure on human health is well recognized. Thus, there is a need to determine all of the contributing factors related to the concentration of fungi in indoor air. In this study, we reviewed and summarized the different factors affecting the concentrations of viable fungi in school buildings. The literature research was conducted using Pubmed and Google Scholar. In addition, we searched the lists of references of selected articles. According to the literature, the main factors influencing the concentration of viable fungi in the school buildings are moisture damage in building structures, the season (temperature and humidity conditions), the type and rate of ventilation, the number and activities of occupants and diurnal variations. This study offers valuable information that can be used in the interpretation of the fungal analysis and to decrease microbial exposure by reducing known sources and/or contributing factors. However, more studies of different local factors contributing to the human microbial exposure in school buildings—as well as other type of buildings and different indoor environments—are needed.Keywords: fungi, concentration, indoor, school, contributing factor
Procedia PDF Downloads 26213904 Delusive versus Genuine Needs: Examining Human Needs within the Islamic Framework of Orbit of Needs
Authors: Abdolmoghset Banikamal
Abstract:
This study looks at the issue of human needs from Islamic perspectives. The key objective of the study is to contribute in regulating the persuasion of needs. It argues that all needs are not necessarily genuine, rather a significant part of them are delusive. To distinguish genuine needs from delusive ones, the study suggests looking at the purpose of the persuasion of that particular need as a key criterion. In doing so, the paper comes with a model namely Orbit of Needs. The orbit has four circles. The central one is a necessity, followed by comfort, beautification, and exhibition. According to the model, all those needs that fall into one of the first three circles in terms of purpose are genuine, while any need which falls into the fourth circle is delusive.Keywords: desire, human need, Islam, orbit of needs
Procedia PDF Downloads 28413903 Automatic Motion Trajectory Analysis for Dual Human Interaction Using Video Sequences
Authors: Yuan-Hsiang Chang, Pin-Chi Lin, Li-Der Jeng
Abstract:
Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.).Keywords: motion detection, motion tracking, trajectory analysis, video surveillance
Procedia PDF Downloads 54813902 Intelligent Human Pose Recognition Based on EMG Signal Analysis and Machine 3D Model
Authors: Si Chen, Quanhong Jiang
Abstract:
In the increasingly mature posture recognition technology, human movement information is widely used in sports rehabilitation, human-computer interaction, medical health, human posture assessment, and other fields today; this project uses the most original ideas; it is proposed to use the collection equipment for the collection of myoelectric data, reflect the muscle posture change on a degree of freedom through data processing, carry out data-muscle three-dimensional model joint adjustment, and realize basic pose recognition. Based on this, bionic aids or medical rehabilitation equipment can be further developed with the help of robotic arms and cutting-edge technology, which has a bright future and unlimited development space.Keywords: pose recognition, 3D animation, electromyography, machine learning, bionics
Procedia PDF Downloads 7913901 Cloning, Expression and N-Terminal Pegylation of Human Interferon Alpha-2b Analogs and Their Cytotoxic Evaluation against Cancer Cell Lines
Authors: Syeda Kiran Shahzadi, Nasir Mahmood, Muhammad Abdul Qadir
Abstract:
In the current research, three recombinant human interferon alpha-2b proteins (two modified and one normal form) were produced and Pegylated with an aim to produce more effective drugs against viral infections and cancers. The modified recombinant human interferon alpha-2b proteins were produced by site-directed modifications of interferon alpha 2b gene, targeting the amino acids at positions ‘R23’ and ‘H34’. The resulting chemically modified and unmodified forms of human interferon alpha 2b were conjugated with methoxy-polyethylene glycol propanealdehyde (400 KDa) and methoxy-polyethylene glycol succinimidyl succinate (400 KDa). Pegylation of normal and modified forms of Interferon alpha-2b prolong their release time and enhance their efficacy. The conjugation of PEG with modified and unmodified human interferon alpha 2b protein drugs was also characterized with 1H-NMR, HPLC, and SDS-PAGE. Antiproliferative assays of modified and unmodified forms of drugs were performed in cell based bioassays using MDBK cell lines. The results indicated that experimentally produced recombinant human interferon alpha-2b proteins were biologically active and resulted in significant inhibition of cell growth.Keywords: protein refolding, antiproliferative activities, biomedical applications, human interferon alpha-2b, pegylation, mPEG-propionaldehyde, site directed mutagenesis, E. coli expression
Procedia PDF Downloads 17713900 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria
Authors: Temple Probyne Abali
Abstract:
Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).Keywords: climate change, food security, fadama, world bank, agriculture, sdgs
Procedia PDF Downloads 93