Search results for: defense mechanism maturity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3739

Search results for: defense mechanism maturity

2419 Evaluation of Hydrogen Particle Volume on Surfaces of Selected Nanocarbons

Authors: M. Ziółkowska, J. T. Duda, J. Milewska-Duda

Abstract:

This paper describes an approach to the adsorption phenomena modeling aimed at specifying the adsorption mechanisms on localized or nonlocalized adsorbent sites, when applied to the nanocarbons. The concept comes from the fundamental thermodynamic description of adsorption equilibrium and is based on numerical calculations of the hydrogen adsorbed particles volume on the surface of selected nanocarbons: single-walled nanotube and nanocone. This approach enables to obtain information on adsorption mechanism and then as a consequence to take appropriate mathematical adsorption model, thus allowing for a more reliable identification of the material porous structure. Theoretical basis of the approach is discussed and newly derived results of the numerical calculations are presented for the selected nanocarbons.

Keywords: adsorption, mathematical modeling, nanocarbons, numerical analysis

Procedia PDF Downloads 250
2418 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 179
2417 Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence

Authors: Lilian Noronha Nassif

Abstract:

Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.

Keywords: digital evidence, digital forensics process and procedures, mobile forensics, cloud forensics

Procedia PDF Downloads 390
2416 Variation in Adaptation Strategies of Commelina Communis L. Biotypes under Drought Stress Condition

Authors: Muhammad Haroon, LI Xiangju

Abstract:

C. communis L. is an important weed of many crop, but very little information about the adaptation strategies of C. communis L. biotypes under drought stress. We investigated five biotypes of C. communis L under drought stress to identify the adaptation mechanism. The expression of drought stress related genes (DRS1, EREB and HRB1) was up-regulated in biotypes, while in some biotypes their expression was down regulated. All five biotypes can thus regulate water balance to consume less water to maintain their status under drought stress condition. This result concluded that C. communis L. biotypes can survive longer under drought stress condition. Weed scientist should seek more effective management strategies to deal with C. communis L.

Keywords: C. communis, biotypes, drought stress, gene expression

Procedia PDF Downloads 134
2415 Control of Doxorubicin Release Rate from Magnetic PLGA Nanoparticles Using a Non-Permanent Magnetic Field

Authors: Inês N. Peça , A. Bicho, Rui Gardner, M. Margarida Cardoso

Abstract:

Inorganic/organic nanocomplexes offer tremendous scope for future biomedical applications, including imaging, disease diagnosis and drug delivery. The combination of Fe3O4 with biocompatible polymers to produce smart drug delivery systems for use in pharmaceutical formulation present a powerful tool to target anti-cancer drugs to specific tumor sites through the application of an external magnetic field. In the present study, we focused on the evaluation of the effect of the magnetic field application time on the rate of drug release from iron oxide polymeric nanoparticles. Doxorubicin, an anticancer drug, was selected as the model drug loaded into the nanoparticles. Nanoparticles composed of poly(d-lactide-co-glycolide (PLGA), a biocompatible polymer already approved by FDA, containing iron oxide nanoparticles (MNP) for magnetic targeting and doxorubicin (DOX) were synthesized by the o/w solvent extraction/evaporation method and characterized by scanning electron microscopy (SEM), by dynamic light scattering (DLS), by inductively coupled plasma-atomic emission spectrometry and by Fourier transformed infrared spectroscopy. The produced particles yielded smooth surfaces and spherical shapes exhibiting a size between 400 and 600 nm. The effect of the magnetic doxorubicin loaded PLGA nanoparticles produced on cell viability was investigated in mammalian CHO cell cultures. The results showed that unloaded magnetic PLGA nanoparticles were nontoxic while the magnetic particles without polymeric coating show a high level of toxicity. Concerning the therapeutic activity doxorubicin loaded magnetic particles cause a remarkable enhancement of the cell inhibition rates compared to their non-magnetic counterpart. In vitro drug release studies performed under a non-permanent magnetic field show that the application time and the on/off cycle duration have a great influence with respect to the final amount and to the rate of drug release. In order to determine the mechanism of drug release, the data obtained from the release curves were fitted to the semi-empirical equation of the the Korsmeyer-Peppas model that may be used to describe the Fickian and non-Fickian release behaviour. Doxorubicin release mechanism has shown to be governed mainly by Fickian diffusion. The results obtained show that the rate of drug release from the produced magnetic nanoparticles can be modulated through the magnetic field time application.

Keywords: drug delivery, magnetic nanoparticles, PLGA nanoparticles, controlled release rate

Procedia PDF Downloads 247
2414 Environmental Problems (with Examples from Georgia)

Authors: Ana Asratashvili

Abstract:

One of the main issues of state’s economic policy is the environmental problems. The development of society is implementing by the connection with nature. A human being needs different material resources which must be got by the influence on the nature. This relationship between nature and society is complicated and controversial and it was changing from time to time according to human’s evolution. The imprudent and unreasonable usage of natural resources, scientific-technological revolution and the hard pollution of nature related to it caused the disruption of environmental balance between nature and society which has been made for ages and destructively acted on society and environment. Environmental protection is one of the major issues of the European Union all over the world. The aim of EU environmental policy is to improve ecological conditions. Besides, it aims encouraging of careful and rational usage of natural resources. At the same time, the union tries to raise problems related to environmental protection at the international level. After that when scientists concluded anthropogenic impact of human on the nature causes climate changes, the special attention was paid to the environmental protection by developed countries. Global warming will cause floods, storms, draughts and desertification and to solve these results presumably will cost 20% of World GDP by 2050 for developed countries, if, of course, it does not make strict environmental policy. EU member countries have pretty strict environmental standards. Their defense is observed by different state institutions. According to impacts on nature throughout the world the most polluted fumes are made by electricity facilities (44%), transport (20%), industry (18%), domestic and service sector (17%). The special concern to the issues related to the importance of environment by environmentalists is caused by low self-esteem of population about the problems of environment. According to their mind, population is engaged with daily difficulties so that they don’t react much on environmental problems. Correspondingly, the main task for environmental organizations is to inform population and raise self-esteem about environmental issues.

Keywords: economic policy, environment, technological revolution, pollution, environmental, standards, self-esteem

Procedia PDF Downloads 280
2413 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 123
2412 Determination of Genotypic Relationship among 12 Sugarcane (Saccharum officinarum) Varieties

Authors: Faith Eweluegim Enahoro-Ofagbe, Alika Eke Joseph

Abstract:

Information on genetic variation within a population is crucial for utilizing heterozygosity for breeding programs that aim to improve crop species. The study was conducted to ascertain the genotypic similarities among twelve sugarcane (Saccharum officinarum) varieties to group them for purposes of hybridizations for cane yield improvement. The experiment was conducted at the University of Benin, Faculty of Agriculture Teaching and Research Farm, Benin City. Twelve sugarcane varieties obtained from National Cereals Research Institute, Badeggi, Niger State, Nigeria, were planted in three replications in a randomized complete block design. Each variety was planted on a five-row plot of 5.0 m in length. Data were collected on 12 agronomic traits, including; the number of millable cane, cane girth, internode length, number of male and female flowers (fuss), days to flag leaf, days to flowering, brix%, cane yield, and others. There were significant differences, according to the findings among the twelve genotypes for the number of days to flag leaf, number of male and female flowers (fuss), and cane yield. The relationship between the twelve sugarcane varieties was expressed using hierarchical cluster analysis. The twelve genotypes were grouped into three major clusters based on hierarchical classification. Cluster I had five genotypes, cluster II had four, and cluster III had three. Cluster III was dominated by varieties characterized by higher cane yield, number of leaves, internode length, brix%, number of millable stalks, stalk/stool, cane girth, and cane length. Cluster II contained genotypes with early maturity characteristics, such as early flowering, early flag leaf development, growth rate, and the number of female and male flowers (fuss). The maximum inter-cluster distance between clusters III and I indicated higher genetic diversity between the two groups. Hybridization between the two groups could result in transgressive recombinants for agronomically important traits.

Keywords: sugarcane, Saccharum officinarum, genotype, cluster analysis, principal components analysis

Procedia PDF Downloads 65
2411 Implications of Oxidative Stress for Monoterpenoid Oxindole Alkaloid Production in Uncaria tomentosa Cultures

Authors: Ana C. Ramos Valdivia, Ileana Vera-Reyes, Ariana A. Huerta-Heredia

Abstract:

The conditions of biotic and abiotic stress in plants can lead to the generation of high amounts of reactive oxygen species (ROS), which leads through a signaling cascade and second messengers to different antioxidant defense responses including the production of secondary metabolites. A limited number of species of plants like Uncaria tomentosa (cat claw) typical of the Amazon region produce monoterpenoid oxindole alkaloids (MOA) such as isopteropodine, mitraphylline, rhynchophylline and its isomers. Moreover, in cultivated roots, the glucoindole alkaloid 3α-dihydrocadambine (DHC) is also accumulated. Several studies have demonstrated that MAO has antioxidant properties and possess important pharmacological activities such as antitumor and immunostimulant while DHC, has hypotensive and hypolipidemic effects. In order the study the regulatory concerns operating in MAO production, the links between oxidative stress and antioxidant alkaloid production in U. tomentosa root cultures were examined. Different amount of hydrogen peroxide between 0.2 -1.0 mM was added to 12 days old roots cultures showing that, this substance had a differential effect on the production of DHC and MOA whereas the viability remained in 80% after six days. Addition of 0.2 mM hydrogen peroxide increased approximately 65% MAO and DHC production (0,540 ± 0.018 and 0.618 ± 0.029 mg per g dry weight, respectively) relative to the control. On contrast, after the addition of 0.6 mM and 1 mM hydrogen peroxide, DHC accumulation into the roots gradually decreased to 53% and 93% respectively, without changes in MAO concentration, which was in relation to a twice increase of the intracellular hydrogen peroxide content. On the other hand, concentrations of DHC (0.1, 0.5 and 1.0 mM in methanol) demonstrated free-radical scavenging activity against 1,1-diphenyl-2-picrylhydrazyl (DPPH) radical. The calculated IC50 for all tested concentrations was 0.180 mg per ml (0.33 mM) while the calculated TE50 was 276 minutes. Our results suggest that U. tomentosa root cultures both MAO and DHC have antioxidant capacities and respond to oxidative stress with a stimulation of their production; however, in presence of a higher concentration of ROS into the roots, DHC could be oxidized.

Keywords: monoterpenoid indole alkaloid, oxidative stress, root cultures, uncaria tomentosa

Procedia PDF Downloads 165
2410 Psychopathic Disorders and Judges Sentencing: Can Neurosciences Change this Aggravating Factor in a Mitigating Factor?

Authors: Kevin Moustapha

Abstract:

Psychopathy is perceived today as being «the most important concept in the criminal justice system» and as «the most important legal notion of the early 21 th century». The explosion of research related to psychopathy seems to perfectly illustrate this trend. Traditionally, many studies tend to focus on links between insanity defense and psychopathy. That is why our purpose in this article is to analyze psychopathic disorders in the scope of judges sentencing in Canada. Indeed, in every Canadian case related to dangerous offenders, judges must balance between fairness and protection of the individuals rights of the accused and protection of society from dangerous predators who may commit future acts of physical or sexual violence. Increasingly, psychopathic disorders are taking an important part in judge sentencing, especially in Canada. This phenomenon can be illustrated by the high proportion of psychopath offenders incarcerated in North American prisons. Many decisions in Canadians courtrooms seem to point out that psychopathy is often used as a strong argument by the judges to preserve public safety. The fact that psychopathy is often associated with violence, recklessness and recidivism, it could explain why many judges consider psychopathic disorders as an aggravating factor. Generally, the judge reasoning is based on article 753 of Canadian Criminal Code related to dangerous offenders, which is used for individuals who show a pattern of repetitive and persistent aggressive behaviour. However, with cognitive neurosciences, the psychopath’s situation in courtrooms would probably change. Cerebral imaging and news data provided by the neurosciences show that emotional and volitional functions in psychopath’s brains are impaired. Understanding these new issues could enable some judges to recognize psychopathic disorders as a mitigating factor. Two important questions ought to be raised in this article: can exploring psychopaths ‘brains really change the judge sentencing in Canadian courtrooms? If yes, can judges consider psychopathy more as a mitigating factor than an aggravating factor?

Keywords: criminal law, judges sentencing, neurosciences, psychopathy

Procedia PDF Downloads 911
2409 Electricity Market Categorization for Smart Grid Market Testing

Authors: Rebeca Ramirez Acosta, Sebastian Lenhoff

Abstract:

Decision makers worldwide need to determine if the implementation of a new market mechanism will contribute to the sustainability and resilience of the power system. Due to smart grid technologies, new products in the distribution and transmission system can be traded; however, the impact of changing a market rule will differ between several regions. To test systematically those impacts, a market categorization has been compiled and organized in a smart grid market testing toolbox. This toolbox maps all actual energy products and sets the basis for running a co-simulation test with the new rule to be implemented. It will help to measure the impact of the new rule, based on the sustainable and resilience indicators.

Keywords: co-simulation, electricity market, smart grid market, market testing

Procedia PDF Downloads 166
2408 The Effectiveness of Foreign Aid in Different Political Regimes of Pakistan

Authors: Umar Hayat, Shahid Ali, Lala Rukh

Abstract:

Foreign aid is one of the critical variables that promote economic growth. This paper is an attempt to examine the long-run relationship between foreign aid and economic growth for Pakistan over the period of 1972 to 2021. This study uses Johnson's co-integration technique to investigate the long-run relationship among the variables in the model. For short-run dynamics, we utilized the Error Correction Mechanism (ECM). The results strongly support the conventional view about aid-led growth. The analysis of the impact of aid on growth both at the micro and the macro levels generally gives different results. The result shows that in the short run inference of foreign aid under the nondemocratic form of government is significant negatively, while foreign aid does not affect economic growth in the case of democratic government.

Keywords: foreign aid, economic growth, political regimes, developing economy

Procedia PDF Downloads 18
2407 TNF-Alpha and MDA Levels in Hearts of Cholesterol-Fed Rats Supplemented with Extra Virgin Olive Oil or Sunflower Oil, in Either Commercial or Modified Forms

Authors: Ageliki I. Katsarou, Andriana C. Kaliora, Antonia Chiou, Apostolos Papalois, Nick Kalogeropoulos, Nikolaos K. Andrikopoulos

Abstract:

Oxidative stress is a major mechanism underlying CVDs while inflammation, an intertwined process with oxidative stress, is also linked to CVDs. Extra virgin olive oil (EVOO) is widely known to play a pivotal role in CVD prevention and CVD reduction. However, in most studies, olive oil constituents are evaluated individually and not as part of the native food, hence potential synergistic effects as drivers of EVOO beneficial properties may be underestimated. In this study, EVOO lipidic and polar phenolics fractions were evaluated for their effect on inflammatory (TNF-alpha) and oxidation (malondialdehyde/MDA) markers, in cholesterol-fed rats. Thereat, oils with discernible lipidic profile and polar phenolic content were used. Wistar rats were fed on either a high-cholesterol diet (HCD) or a HCD supplemented with oils, either commercially available, i.e. EVOO, sunflower oil (SO), or modified as to their polar phenol content, i.e. phenolics deprived-EVOO (EVOOd), SO enriched with the EVOO phenolics (SOe). After 9 weeks of dietary intervention, heart and blood samples were collected. HCD induced dylipidemia shown by increase in serum total cholesterol, low-density lipoprotein cholesterol (LDL-c) and triacylglycerols. Heart tissue has been affected by dyslipidemia; oxidation was indicated by increase in MDA in cholesterol-fed rats and inflammation by increase in TNF-alpha. In both cases, this augmentation was attenuated in EVOO and SOe diets. With respect to oxidation, SO enrichment with the EVOO phenolics brought its lipid peroxidation levels as low as in EVOO-fed rats. This suggests that phenolic compounds may act as antioxidant agents in rat heart. A possible mechanism underlying this activity may be the protective effect of phenolics in mitochondrial membrane against oxidative damage. This was further supported by EVOO/EVOOd comparison with the former presenting lower heart MDA content. As for heart inflammation, phenolics naturally present in EVOO as well as phenolics chemically added in SO, exhibited quenching abilities in heart TNF-alpha levels of cholesterol-fed rats. TNF-alpha may have played a causative role in oxidative stress induction while the opposite may have also happened, hence setting up a vicious cycle. Overall, diet supplementation with EVOO or SOe attenuated hypercholesterolemia-induced increase in MDA and TNF-alpha in Wistar rat hearts. This is attributed to phenolic compounds either naturally existing in olive oil or as fortificants in seed oil.

Keywords: extra virgin olive oil, hypercholesterolemic rats, MDA, polar phenolics, TNF-alpha

Procedia PDF Downloads 485
2406 Analyzing Data Protection in the Era of Big Data Under the Framework of Virtual Property Layer Theory

Authors: Xiaochen Mu

Abstract:

Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional ‘one object, one right’ theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the ‘bundle of right’ theory, this paper establishes specific three-level data rights.

Keywords: data protection, property right, intellectual property, Big dada

Procedia PDF Downloads 0
2405 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 154
2404 Habitat-Specific Divergences in the Gene Repertoire among the Reference Prevotella Genomes of the Human Microbiome

Authors: Vinod Kumar Gupta, Narendrakumar M. Chaudhari, Suchismitha Iskepalli, Chitra Dutta

Abstract:

Background-The community composition of the human microbiome is known to vary at distinct anatomical niches. But little is known about the nature of variations if any, at the genome/sub-genome levels of a specific microbial community across different niches. The present report aims to explore, as a case study, the variations in gene repertoire of 28 Prevotella reference draft genomes derived from different body-sites of human, as reported earlier by the Human Microbiome Consortium. Results-The analysis reveals the exclusive presence of 11798, 3673, 3348 and 934 gene families and exclusive absence of 17, 221, 115 and 645 gene families in Prevotella genomes derived from the human oral cavity, gastro-intestinal tracts (GIT), urogenital tract (UGT) and skin, respectively. The pan-genome for Prevotella remains “open”. Distribution of various functional COG categories differs appreciably among the habitat-specific genes, within Prevotella pan-genome and between the GIT-derived Bacteroides and Prevotella. The skin and GIT isolates of Prevotella are enriched in singletons involved in Signal transduction mechanisms, while the UGT and oral isolates show higher representation of the Defense mechanisms category. No niche-specific variations could be observed in the distribution of KEGG pathways. Conclusion-Prevotella may have developed distinct genetic strategies for adaptation to different anatomical habitats through selective, niche-specific acquisition and elimination of suitable gene-families. In addition, individual microorganisms tend to develop their own distinctive adaptive stratagems through large repertoires of singletons. Such in situ, habitat-driven refurbishment of the genetic makeup can impart substantial intra-lineage genome diversity within the microbes without perturbing their general taxonomic heritage.

Keywords: body niche adaptation, human microbiome, pangenome, Prevotella

Procedia PDF Downloads 237
2403 Case Report: Ocular Helminth - In Unusual Site (Lens)

Authors: Chandra Shekhar Majumder, Md. Shamsul Haque, Khondaker Anower Hossain, Md. Rafiqul Islam

Abstract:

Introduction: Ocular helminths are parasites that infect the eye or its adnexa. They can be either motile worms or sessile worms that form cysts. These parasites require two hosts for their life cycle, a definite host (usually a human) and an intermediate host (usually an insect). While there have been reports of ocular helminths infecting various structures of the eye, including the anterior chamber and subconjunctival space, there is no previous record of such a case involving the lens. Research Aim: The aim of this case report is to present a rare case of ocular helminth infection in the lens and to contribute to the understanding of this unusual site of infection. Methodology: This study is a case report, presenting the details and findings of an 80-year-old retired policeman who presented with severe pain, redness, and vision loss in the left eye. The patient had a history of diabetes mellitus and hypertension. The examination revealed the presence of a thread-like helminth in the lens. The patient underwent treatment and follow-up, and the helminth specimen was sent for identification to the department of Parasitology. Case report: An 80-year-old retired policeman attended the OPD, Faridpur Medical College Hospital with the complaints of severe pain, redness and gross dimness of vision of the left eye for 5 days. He had a history of diabetes mellitus and hypertension for 3 years. On examination, L/E visual acuity was PL only, moderate ciliary congestion, KP 2+, cells 2+ and posterior synechia from 5 to 7 O’clock position was found. Lens was opaque. A thread like helminth was found under the anterior of the lens. The worm was moving and changing its position during examination. On examination of R/E, visual acuity was 6/36 unaided, 6/18 with pinhole. There was lental opacity. Slit-lamp and fundus examination were within normal limit. Patient was admitted in Faridpur Medical College Hospital. Diabetes mellitus was controlled with insulin. ICCE with PI was done on the same day of admission under depomedrol coverage. The helminth was recovered from the lens. It was thread like, about 5 to 6 mm in length, 1 mm in width and pinkish in colour. The patient followed up after 7 days, VA was HM, mild ciliary congestion, few KPs and cells were present. Media was hazy due to vitreous opacity. The worm was sent to the department of Parasitology, NIPSOM, Dhaka for identification. Findings: The findings of this case report highlight the presence of a helminth in the lens, which has not been previously reported. The helminth was successfully removed from the lens, but the patient experienced complications such as anterior uveitis and vitreous opacity. The exact mechanism by which the helminth enters the lens remains unclear. Theoretical Importance: This case report contributes to the existing literature on ocular helminth infections by reporting a unique case involving the lens. It highlights the need for further research to understand the pathogenesis and mechanism of entry of helminths in the lens. Data Collection and Analysis Procedures: The data for this case report were collected through clinical examination and medical records of the patient. The findings were described and presented in a descriptive manner. No statistical analysis was conducted. Question Addressed: This case report addresses the question of whether ocular helminth infections can occur in the lens, which has not been previously reported. Conclusion: To the best of our knowledge, this is the first reported case of ocular helminth infection in the lens. The presence of the helminth in the lens raises interesting questions regarding its pathogenesis and entry mechanism. Further study and research are needed to explore these aspects. Ophthalmologists and parasitologists should be aware of the possibility of ocular helminth infections in unusual sites like the lens.

Keywords: ocular, helminth, unsual site, lens

Procedia PDF Downloads 48
2402 Teaching Translation in Brazilian Universities: A Study about the Possible Impacts of Translators’ Comments on the Cyberspace about Translator Education

Authors: Erica Lima

Abstract:

The objective of this paper is to discuss relevant points about teaching translation in Brazilian universities and the possible impacts of blogs and social networks to translator education today. It is intended to analyze the curricula of Brazilian translation courses, contrasting them to information obtained from two social networking groups of great visibility in the area concerning essential characteristics to become a successful profession. Therefore, research has, as its main corpus, a few undergraduate translation programs’ syllabuses, as well as a few postings on social networks groups that specifically share professional opinions regarding the necessity for a translator to obtain a degree in translation to practice the profession. To a certain extent, such comments and their corresponding responses lead to the propagation of discourses which influence the ideas that aspiring translators and recent graduates end up having towards themselves and their undergraduate courses. The postings also show that many professionals do not have a clear position regarding the translator education; while refuting it, they also encourage “free” courses. It is thus observed that cyberspace constitutes, on the one hand, a place of mobilization of people in defense of similar ideas. However, on the other hand, it embodies a place of tension and conflict, in view of the fact that there are many participants and, as in any other situation of interlocution, disagreements may arise. From the postings, aspects related to professionalism were analyzed (including discussions about regulation), as well as questions about the classic dichotomies: theory/practice; art/technique; self-education/academic training. As partial result, the common interest regarding the valorization of the profession could be mentioned, although there is no consensus on the essential characteristics to be a good translator. It was also possible to observe that the set of socially constructed representations in the group reflects characteristics of the world situation of the translation courses (especially in some European countries and in the United States), which, in the first instance, does not accurately reflect the Brazilian idiosyncrasies of the area.

Keywords: cyberspace, teaching translation, translator education, university

Procedia PDF Downloads 367
2401 The Effect of the Variety and Harvesting Date on Polyphenol Composition of Haskap (Lonicera caerulea L.) and Anti-diabetic Properties of Haskap Polyphenols

Authors: Aruma Baduge Kithma De Silva

Abstract:

Haskap (Lonicera caerulea L.), also known as blue honeysuckle, is a newly commercialized berry crop in Canada. Haskap berries are rich in polyphenols, including, anthocyanins, which are known for potential health-promoting properties. Cyanidin-3-O-glucoside (C3G) is the most abundant anthocyanin of haskap berries. The compound C3G has the ability to reduce the risk of type 2 diabetes (T2D), which has become an increasingly common health issue around the world. The T2D is characterized as a metabolic disorder of hyperglycemia and insulin resistance. It has been demonstrated that C3G has anti-diabetic effects through several ways, including inhibition of dipeptidyl peptidase-4 (DPP-4), reduction of gluconeogenesis, improvement in insulin sensitivity, and inhibition of activities of carbohydrate hydrolyzing enzymes, including α-amylase and α-glucosidase. The goal of this study was to investigate the influence of variety and harvests maturity of haskap on C3G, other fruit quality characteristics and anti-diabetic activities of haskap berries using in vitro studies. The polyphenols present in four commercially grown haskap cultivars, Aurora, Rebecca, Larissa, and Evie harvested at five harvesting dates (H1-H5) apart from 2-3 days, were extracted separately. High-performance liquid chromatography electrospray ionization mass spectrometry (HPLC-ESI-MS) analyzes of polyphenols revealed that haskap berries contain predominantly anthocyanins, flavonols, flavan-3-ols, and phenolic acids. The compound C3G was the most prominent anthocyanin, which is available in approximately 79% of total anthocyanin in four cultivars. The Larissa at H5 contained the highest C3G content. The antioxidant capacity of Evie at H5 was greater than other cultivars. Furthermore, Larissa H5 showed the greatest inhibition of carbohydrate hydrolyzing enzymes including alpha-glucosidase and alpha-amylase. In conclusion, the haskap variety and harvesting date influenced the polyphenol composition and biological properties. The variety Larissa, at H5 harvesting date, contained the highest polyphenol content and the ability of inhibition of the carbohydrate hydrolyzing enzyme as well as DPP4 enzyme in order to reduce type 2 diabetes.

Keywords: anthocyanin, Haskap, type 2 diabetes, polyphenol

Procedia PDF Downloads 127
2400 Streamlining Coastal Defense: Investigating the Impact of Seawall Geometry on Wave Loads

Authors: Ahmadreza Ebadati, Asaad Y. Shamseldin, Amin Ghadirian

Abstract:

Seawall geometry plays a crucial role in mitigating wave impacts, though detailed exploration of its manipulation is limited. This study delves into the effects of varying cross-shore seawall geometry on the dynamics of wave impacts, with a particular focus on vertical seawalls. Inspired by foundational insights linking seawall shape to hydraulic efficiency, this investigation centres on how alterations in seawall geometry can influence wave energy dissipation and subsequent wave impacts. The study investigates the 2D interaction of regular waves with a period of 2.1s with a vertical seawall and berm featuring small-scale cross-shore protrusions and recesses. Utilising OpenFOAM® simulations and a k-ω SST turbulence model, this investigation compares results to a base case simulation, which is partially calibrated with experimental data from a flume study. The analysis evaluates various geometric modifications, specifically interchanged protrusions and recesses at different heights and orientations along the seawall. Findings suggest that specific configurations, such as interchanged protrusions and recesses, can mitigate initial impact forces, while certain arrangements may intensify subsequent impacts. Key insights include the identification of geometry configurations that can effectively reduce the force impulse of slamming waves on coastal structures and potentially decrease the frequency and cost of seawall maintenance. This research contributes to the field by advancing the understanding of how seawall geometry influences wave forces and by providing actionable insights for the design of more resilient seawall structures. Further exploration of seawall geometry variation is recommended, advocating additional case studies to optimise designs tailored to specific coastal environments.

Keywords: seawall geometry, wave impact loads, numerical simulation, coastal engineering, wave-structure interaction

Procedia PDF Downloads 26
2399 Magnetic Field Generation in Inhomogeneous Plasma via Ponderomotive Force

Authors: Fatemeh Shahi, Mehdi Sharifian, Laia Shahrassai, Elham Eskandari A.

Abstract:

A new mechanism is reported here for magnetic field generation in laser-plasma interaction by means of nonlinear ponderomotive force. The plasma considered here is unmagnetized inhomogeneous plasma with an exponentially decreasing profile. A damped periodic magnetic field with a relatively lower frequency is obtained using the ponderomotive force exerted on plasma electrons. Finally, with an electric field and by using Faraday’s law, the magnetic field profile in the plasma has been obtained. Because of the negative exponential density profile, the generated magnetic field is relatively slowly oscillating and damped through the plasma.

Keywords: magnetic field generation, laser-plasma interaction, ponderomotive force, inhomogeneous plasma

Procedia PDF Downloads 265
2398 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 628
2397 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques

Procedia PDF Downloads 366
2396 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 67
2395 Ingratiation as a Moderator of the Impact of the Perception of Organizational Politics on Job Satisfaction

Authors: Triana Fitriastuti, Pipiet Larasatie, Alex Vanderstraten

Abstract:

Many scholars have demonstrated the negative impacts of the perception of organizational politics on organizational outcomes. The model proposed in this study analyzes the impact of the perception of organizational politics on job satisfaction. In the same way, ingratiation as a moderator variable is tested. We applied regression analysis to test the hypothesis. The findings of the current research, which was conducted with 240 employees in the public sector in Indonesia, show that the perception of organizational politics has a negative effect on job satisfaction. In contrast, ingratiation plays a role that fully moderates the relationship between organizational politics and organizational outcomes and changes the correlation between the perception of organizational politics on job satisfaction. Employees who use ingratiation as a coping mechanism tend to do so when they perceive a high degree of organizational politics.

Keywords: ingratiation, impression management, job satisfaction, perception of organizational politics

Procedia PDF Downloads 129
2394 Effect of Heat Treatment on Mechanical Properties and Wear Behavior of Al7075 Alloy Reinforced with Beryl and Graphene Hybrid Metal Matrix Composites

Authors: Shanawaz Patil, Mohamed Haneef, K. S. Narayanaswamy

Abstract:

In the recent years, aluminum metal matrix composites were most widely used, which are finding wide applications in various field such as automobile, aerospace defense etc., due to their outstanding mechanical properties like low density, light weight, exceptional high levels of strength, stiffness, wear resistance, high temperature resistance, low coefficient of thermal expansion and good formability. In the present work, an effort is made to study the effect of heat treatment on mechanical properties of aluminum 7075 alloy reinforced with constant weight percentage of naturally occurring mineral beryl and varying weight percentage of graphene. The hybrid composites are developed with 0.5 wt. %, 1wt.%, 1.5 wt.% and 2 wt.% of graphene and 6 wt.% of beryl  by stir casting liquid metallurgy route. The cast specimens of unreinforced aluminum alloy and hybrid composite samples were prepared for heat treatment process and subjected to solutionizing treatment (T6) at a temperature of 490±5 oC for 8 hours in a muffle furnace followed by quenching in boiling water. The microstructure analysis of as cast and heat treated hybrid composite specimens are examined by scanning electron microscope (SEM). The tensile test and hardness test of unreinforced aluminum alloy and hybrid composites are examined. The wear behavior is examined by pin-on disc apparatus. The results of as cast specimens and heat treated specimens were compared. The heat treated Al7075-Beryl-Graphene hybrid composite had better properties and significantly improved the ultimate tensile strength, hardness and reduced wear loss when compared to aluminum alloy and  as cast hybrid composites.

Keywords: beryl, graphene, heat treatment, mechanical properties

Procedia PDF Downloads 132
2393 Stability Analysis for an Extended Model of the Hypothalamus-Pituitary-Thyroid Axis

Authors: Beata Jackowska-Zduniak

Abstract:

We formulate and analyze a mathematical model describing dynamics of the hypothalamus-pituitary-thyroid homoeostatic mechanism in endocrine system. We introduce to this system two types of couplings and delay. In our model, feedback controls the secretion of thyroid hormones and delay reflects time lags required for transportation of the hormones. The influence of delayed feedback on the stability behaviour of the system is discussed. Analytical results are illustrated by numerical examples of the model dynamics. This system of equations describes normal activity of the thyroid and also a couple of types of malfunctions (e.g. hyperthyroidism).

Keywords: mathematical modeling, ordinary differential equations, endocrine system, delay differential equation

Procedia PDF Downloads 320
2392 Sovereign Debt Restructuring: A Study of the Inadequacies of the Contractual Approach

Authors: Salamah Ansari

Abstract:

In absence of a comprehensive international legal regime for sovereign debt restructuring, majority of the complications arising from sovereign debt restructuring are frequently left to the uncertain market forces. The resort to market forces for sovereign debt restructuring has led to a phenomenal increase in litigations targeting assets of defaulting sovereign nations, internationally across jurisdictions with the first major wave of lawsuits against sovereigns in the 1980s with the Latin American crisis. Recent experiences substantiate that majority of obstacles faced during sovereign debt restructuring process are caused by inefficient creditor coordination and collective action problems. Collective action problems manifest as grab race, rush to exits, holdouts, the free rider problem and the rush to the courthouse. On defaulting, for a nation to successfully restructure its debt, all the creditors involved must accept some reduction in the value of their claims. As a single holdout creditor has the potential to undermine the restructuring process, hold-out creditors are snowballing with the increasing probability of earning high returns through litigations. This necessitates a mechanism to avoid holdout litigations and reinforce collective action on the part of the creditor. This can be done either through a statutory reform or through market-based contractual approach. In absence of an international sovereign bankruptcy regime, the impetus is mostly on inclusion of collective action clauses in debt contracts. The preference to contractual mechanisms vis- a vis a statutory approach can be explained with numerous reasons, but that's only part of the puzzle in trying to understand the economics of the underlying system. The contractual approach proposals advocate the inclusion of certain clauses in the debt contract for an orderly debt restructuring. These include clauses such as majority voting clauses, sharing clauses, non- acceleration clauses, initiation clauses, aggregation clauses, temporary stay on litigation clauses, priority financing clauses, and complete revelation of relevant information. However, voluntary market based contractual approach to debt workouts has its own complexities. It is a herculean task to enshrine clauses in debt contracts that are detailed enough to create an orderly debt restructuring mechanism while remaining attractive enough for creditors. Introduction of collective action clauses into debt contracts can reduce the barriers in efficient debt restructuring and also have the potential to improve the terms on which sovereigns are able to borrow. However, it should be borne in mind that such clauses are not a panacea to the huge institutional inadequacy that persists and may lead to worse restructuring outcomes.

Keywords: sovereign debt restructuring, collective action clauses, hold out creditors, litigations

Procedia PDF Downloads 143
2391 Green, Smooth and Easy Electrochemical Synthesis of N-Protected Indole Derivatives

Authors: Sarah Fahad Alajmi, Tamer Ezzat Youssef

Abstract:

Here, we report a simple method for the direct conversion of 6-Nitro-1H-indole into N-substituted indoles via electrochemical dehydrogenative reaction with halogenated reagents under strongly basic conditions through N–R bond formation. The N-protected indoles have been prepared under moderate and scalable electrolytic conditions. The conduct of the reactions was performed in a simple divided cell under constant current without oxidizing reagents or transition-metal catalysts. The synthesized products have been characterized via UV/Vis spectrophotometry, 1H-NMR, and FTIR spectroscopy. A possible reaction mechanism is discussed based on the N-protective products. This methodology could be applied to the synthesis of various biologically active N-substituted indole derivatives.

Keywords: green chemistry, 1H-indole, heteroaromatic, organic electrosynthesis

Procedia PDF Downloads 146
2390 Effects of the Quality Construction of Public Construction in Taiwan to Implementation Three Levels Quality Management Institution

Authors: Hsin-Hung Lai, Wei Lo

Abstract:

Whether it is in virtue or vice for a construction quality of public construction project, it is one of the important indicators for national economic development and overall construction, the impact on the quality of national life is very deep. In recent years, a number of scandal of public construction project occurred, the requirements of the government agencies and the public require the quality of construction of public construction project are getting stricter than ever, the three-level public construction project construction quality of quality control system implemented by the government has a profound impact. This study mainly aggregated the evolution of ISO 9000 quality control system, the difference between the practice of implementing management of construction quality by many countries and three-level quality control of our country, so we explored and found that almost all projects of enhancing construction quality are dominated by civil organizations in foreign countries, whereas, it is induced by the national power in our country and develop our three-level quality control system and audit mechanism based on IOS system and implement the works by legislation, we also explored its enhancement and relevance with construction quality of public construction project that are intervened by such system and national power, and it really presents the effectiveness of construction quality been enhanced by the audited result. The three-level quality control system of our country to promote the policy of public construction project is almost same with the quality control system of many developed countries; however our country mainly implements such system on public construction project only, we promote the three-level quality control system is for enhancing the quality of public construction project, for establishing effective quality management system, so as to urge, correct and prevent the defects of quality management by manufacturers, whereas, those developed countries is comprehensively promoting (both public construction project and civil construction) such system. Therefore, this study is to explore the scope for public construction project only; the most important is the quality recognition by the executor, either good quality or deterioration is not a single event, there is a certain procedure extends from the demand and feasibility analysis, design, tendering, contracting, construction performance, inspection, continuous improvement, completion and acceptance, transferring and meeting the needs of the users, all of mentioned above have a causal relationship and it is a systemic problems. So the best construction quality would be manufactured and managed by reasonable cost if it is by extensive thinking and be preventive. We aggregated the implemented results in the past 10 years (2005 to 2015), the audited results of both in central units and local ones were slightly increased in A-grade while those listed in B-grade were decreased, although the levels were not evidently upgraded, yet, such result presents that the construction quality of concept of manufacturers are improving, and the construction quality has been established in the design stage, thus it is relatively beneficial to the enhancement of construction quality of overall public construction project.

Keywords: ISO 9000, three-level quality control system, audit and review mechanism for construction implementation, quality of construction implementation

Procedia PDF Downloads 325