Search results for: attacks and controls
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1585

Search results for: attacks and controls

205 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 29
204 Developing a Model to Objectively Assess the Culture of Individuals and Teams in Order to Effectively and Efficiently Achieve Sustainability in the Manpower

Authors: Ahmed Mohamed Elnady Mohamed Elsafty

Abstract:

This paper explains a developed applied objective model to measure the culture qualitatively and quantitatively, whether in individuals or in teams, in order to be able to use culture correctly or modify it efficiently. This model provides precise measurements and consistent interpretations by being comprehensive, updateable, and protected from being misled by imitations. Methodically, the provided model divides the culture into seven dimensions (total 43 cultural factors): First dimension is outcome-orientation which consists of five factors and should be highest in leaders. Second dimension is details-orientation which consists of eight factors and should be in highest intelligence members. Third dimension is team-orientation which consists of five factors and should be highest in instructors or coaches. Fourth dimension is change-orientation which consists of five factors and should be highest in soldiers. Fifth dimension is people-orientation which consists of eight factors and should be highest in media members. Sixth dimension is masculinity which consists of seven factors and should be highest in hard workers. Last dimension is stability which consists of seven factors and should be highest in soft workers. In this paper, the details of all cultural factors are explained. Practically, information collection about each cultural factor in the targeted person or team is essential in order to calculate the degrees of all cultural factors using the suggested equation of multiplying 'the score of factor presence' by 'the score of factor strength'. In this paper, the details of how to build each score are explained. Based on the highest degrees - to identify which cultural dimension is the prominent - choosing the tested individual or team in the supposedly right position at the right time will provide a chance to use minimal efforts to make everyone aligned to the organization’s objectives. In other words, making everyone self-motivated by setting him/her at the right source of motivation is the most effective and efficient method to achieve high levels of competency, commitment, and sustainability. Modifying a team culture can be achieved by excluding or including new members with relatively high or low degrees in specific cultural factors. For conclusion, culture is considered as the software of the human beings and it is one of the major compression factors on the managerial discretion. It represents the behaviors, attitudes, and motivations of the human resources which are vital to enhance quality and safety, expanding the market share, and defending against attacks from external environments. Thus, it is tremendously essential and useful to use such a comprehensive model to measure, use, and modify culture.

Keywords: culture dimensions, culture factors, culture measurement, cultural analysis, cultural modification, self-motivation, alignment to objectives, competency, sustainability

Procedia PDF Downloads 164
203 Attributable Mortality of Nosocomial Infection: A Nested Case Control Study in Tunisia

Authors: S. Ben Fredj, H. Ghali, M. Ben Rejeb, S. Layouni, S. Khefacha, L. Dhidah, H. Said

Abstract:

Background: The Intensive Care Unit (ICU) provides continuous care and uses a high level of treatment technologies. Although developed country hospitals allocate only 5–10% of beds in critical care areas, approximately 20% of nosocomial infections (NI) occur among patients treated in ICUs. Whereas in the developing countries the situation is still less accurate. The aim of our study is to assess mortality rates in ICUs and to determine its predictive factors. Methods: We carried out a nested case-control study in a 630-beds public tertiary care hospital in Eastern Tunisia. We included in the study all patients hospitalized for more than two days in the surgical or medical ICU during the entire period of the surveillance. Cases were patients who died before ICU discharge, whereas controls were patients who survived to discharge. NIs were diagnosed according to the definitions of ‘Comité Technique des Infections Nosocomiales et les Infections Liées aux Soins’ (CTINLIS, France). Data collection was based on the protocol of Rea-RAISIN 2009 of the National Institute for Health Watch (InVS, France). Results: Overall, 301 patients were enrolled from medical and surgical ICUs. The mean age was 44.8 ± 21.3 years. The crude ICU mortality rate was 20.6% (62/301). It was 35.8% for patients who acquired at least one NI during their stay in ICU and 16.2% for those without any NI, yielding an overall crude excess mortality rate of 19.6% (OR= 2.9, 95% CI, 1.6 to 5.3). The population-attributable fraction due to ICU-NI in patients who died before ICU discharge was 23.46% (95% CI, 13.43%–29.04%). Overall, 62 case-patients were compared to 239 control patients for the final analysis. Case patients and control patients differed by age (p=0,003), simplified acute physiology score II (p < 10-3), NI (p < 10-3), nosocomial pneumonia (p=0.008), infection upon admission (p=0.002), immunosuppression (p=0.006), days of intubation (p < 10-3), tracheostomy (p=0.004), days with urinary catheterization (p < 10-3), days with CVC ( p=0.03), and length of stay in ICU (p=0.003). Multivariate analysis demonstrated 3 factors: age older than 65 years (OR, 5.78 [95% CI, 2.03-16.05] p=0.001), duration of intubation 1-10 days (OR, 6.82 [95% CI, [1.90-24.45] p=0.003), duration of intubation > 10 days (OR, 11.11 [95% CI, [2.85-43.28] p=0.001), duration of CVC 1-7 days (OR, 6.85[95% CI, [1.71-27.45] p=0.007) and duration of CVC > 7 days (OR, 5.55[95% CI, [1.70-18.04] p=0.004). Conclusion: While surveillance provides important baseline data, successful trials with more active intervention protocols, adopting multimodal approach for the prevention of nosocomial infection incited us to think about the feasibility of similar trial in our context. Therefore, the implementation of an efficient infection control strategy is a crucial step to improve the quality of care.

Keywords: intensive care unit, mortality, nosocomial infection, risk factors

Procedia PDF Downloads 406
202 Prediction of Terrorist Activities in Nigeria using Bayesian Neural Network with Heterogeneous Transfer Functions

Authors: Tayo P. Ogundunmade, Adedayo A. Adepoju

Abstract:

Terrorist attacks in liberal democracies bring about a few pessimistic results, for example, sabotaged public support in the governments they target, disturbing the peace of a protected environment underwritten by the state, and a limitation of individuals from adding to the advancement of the country, among others. Hence, seeking for techniques to understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities is the topmost priority of the government in every country. This research aim is to develop an efficient deep learning-based predictive model for the prediction of future terrorist activities in Nigeria, addressing low-quality prediction accuracy problems associated with the existing solution methods. The proposed predictive AI-based model as a counterterrorism tool will be useful by governments and law enforcement agencies to protect the lives of individuals in society and to improve the quality of life in general. A Heterogeneous Bayesian Neural Network (HETBNN) model was derived with Gaussian error normal distribution. Three primary transfer functions (HOTTFs), as well as two derived transfer functions (HETTFs) arising from the convolution of the HOTTFs, are namely; Symmetric Saturated Linear transfer function (SATLINS ), Hyperbolic Tangent transfer function (TANH), Hyperbolic Tangent sigmoid transfer function (TANSIG), Symmetric Saturated Linear and Hyperbolic Tangent transfer function (SATLINS-TANH) and Symmetric Saturated Linear and Hyperbolic Tangent Sigmoid transfer function (SATLINS-TANSIG). Data on the Terrorist activities in Nigeria gathered through questionnaires for the purpose of this study were used. Mean Square Error (MSE), Mean Absolute Error (MAE) and Test Error are the forecast prediction criteria. The results showed that the HETFs performed better in terms of prediction and factors associated with terrorist activities in Nigeria were determined. The proposed predictive deep learning-based model will be useful to governments and law enforcement agencies as an effective counterterrorism mechanism to understand the parameters of terrorism and to design strategies to deal with terrorism before an incident actually happens and potentially causes the loss of precious lives. The proposed predictive AI-based model will reduce the chances of terrorist activities and is particularly helpful for security agencies to predict future terrorist activities.

Keywords: activation functions, Bayesian neural network, mean square error, test error, terrorism

Procedia PDF Downloads 165
201 Interventions for Children with Autism Using Interactive Technologies

Authors: Maria Hopkins, Sarah Koch, Fred Biasini

Abstract:

Autism is lifelong disorder that affects one out of every 110 Americans. The deficits that accompany Autism Spectrum Disorders (ASD), such as abnormal behaviors and social incompetence, often make it extremely difficult for these individuals to gain functional independence from caregivers. These long-term implications necessitate an immediate effort to improve social skills among children with an ASD. Any technology that could teach individuals with ASD necessary social skills would not only be invaluable for the individuals affected, but could also effect a massive saving to society in treatment programs. The overall purpose of the first study was to develop, implement, and evaluate an avatar tutor for social skills training in children with ASD. “Face Say” was developed as a colorful computer program that contains several different activities designed to teach children specific social skills, such as eye gaze, joint attention, and facial recognition. The children with ASD were asked to attend to FaceSay or a control painting computer game for six weeks. Children with ASD who received the training had an increase in emotion recognition, F(1, 48) = 23.04, p < 0.001 (adjusted Ms 8.70 and 6.79, respectively) compared to the control group. In addition, children who received the FaceSay training had higher post-test scored in facial recognition, F(1, 48) = 5.09, p < 0.05 (adjusted Ms: 38.11 and 33.37, respectively) compared to controls. The findings provide information about the benefits of computer-based training for children with ASD. Recent research suggests the value of also using socially assistive robots with children who have an ASD. Researchers investigating robots as tools for therapy in ASD have reported increased engagement, increased levels of attention, and novel social behaviors when robots are part of the social interaction. The overall goal of the second study was to develop a social robot designed to teach children specific social skills such as emotion recognition. The robot is approachable, with both an animal-like appearance and features of a human face (i.e., eyes, eyebrows, mouth). The feasibility of the robot is being investigated in children ages 7-12 to explore whether the social robot is capable of forming different facial expressions to accurately display emotions similar to those observed in the human face. The findings of this study will be used to create a potentially effective and cost efficient therapy for improving the cognitive-emotional skills of children with autism. Implications and study findings using the robot as an intervention tool will be discussed.

Keywords: autism, intervention, technology, emotions

Procedia PDF Downloads 381
200 Identifying the Determinants of Compliance with Maritime Environmental Legislation in the North and Baltic Sea Area: A Model Developed from Exploratory Qualitative Data Collection

Authors: Thea Freese, Michael Gille, Andrew Hursthouse, John Struthers

Abstract:

Ship operators on the North and Baltic Sea have been experiencing increased political interest in marine environmental protection and cleaner vessel operations. Stricter legislation on SO2 and NOx emissions, ballast water management and other measures of protection are currently being phased in or will come into force in the coming years. These measures benefit the health of the marine environment, while increasing company’s operational costs. In times of excess shipping capacity and linked consolidation in the industry non-compliance with environmental rules is one way companies might hope to stay competitive with both intra- and inter-modal trade. Around 5-15% of industry participants are believed to neglect laws on vessel-source pollution willingly or unwillingly. Exploratory in-depth interviews conducted with 12 experts from various stakeholder groups informed the researchers about variables influencing compliance levels, including awareness and apprehension, willingness to comply, ability to comply and effectiveness of controls. Semi-structured expert interviews were evaluated using qualitative content analysis. A model of determinants of compliance was developed and is presented here. While most vessel operators endeavour to achieve full compliance with environmental rules, a lack of availability of technical solutions, expediency of implementation and operation and economic feasibility might prove a hindrance. Ineffective control systems on the other hand foster willing non-compliance. With respect to motivations, lacking time, lacking financials and the absence of commercial advantages decrease compliance levels. These and other variables were inductively developed from qualitative data and integrated into a model on environmental compliance. The outcomes presented here form part of a wider research project on economic effects of maritime environmental legislation. Research on determinants of compliance might inform policy-makers about actual behavioural effects of shipping companies and might further the development of a comprehensive legal system for environmental protection.

Keywords: compliance, marine environmental protection, exploratory qualitative research study, clean vessel operations, North and Baltic Sea area

Procedia PDF Downloads 383
199 Mapping the Turbulence Intensity and Excess Energy Available to Small Wind Systems over 4 Major UK Cities

Authors: Francis C. Emejeamara, Alison S. Tomlin, James Gooding

Abstract:

Due to the highly turbulent nature of urban air flows, and by virtue of the fact that turbines are likely to be located within the roughness sublayer of the urban boundary layer, proposed urban wind installations are faced with major challenges compared to rural installations. The challenge of operating within turbulent winds can however, be counteracted by the development of suitable gust tracking solutions. In order to assess the cost effectiveness of such controls, a detailed understanding of the urban wind resource, including its turbulent characteristics, is required. Estimating the ambient turbulence and total kinetic energy available at different control response times is essential in evaluating the potential performance of wind systems within the urban environment should effective control solutions be employed. However, high resolution wind measurements within the urban roughness sub-layer are uncommon, and detailed CFD modelling approaches are too computationally expensive to apply routinely on a city wide scale. This paper therefore presents an alternative semi-empirical methodology for estimating the excess energy content (EEC) present in the complex and gusty urban wind. An analytical methodology for predicting the total wind energy available at a potential turbine site is proposed by assessing the relationship between turbulence intensities and EEC, for different control response times. The semi-empirical model is then incorporated with an analytical methodology that was initially developed to predict mean wind speeds at various heights within the built environment based on detailed mapping of its aerodynamic characteristics. Based on the current methodology, additional estimates of turbulence intensities and EEC allow a more complete assessment of the available wind resource. The methodology is applied to 4 UK cities with results showing the potential of mapping turbulence intensities and the total wind energy available at different heights within each city. Considering the effect of ambient turbulence and choice of wind system, the wind resource over neighbourhood regions (of 250 m uniform resolution) and building rooftops within the 4 cities were assessed with results highlighting the promise of mapping potential turbine sites within each city.

Keywords: excess energy content, small-scale wind, turbulence intensity, urban wind energy, wind resource assessment

Procedia PDF Downloads 474
198 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 139
197 Biodegradation of Triclosan and Tetracycline in Sewage Sludge by Pleurotus Ostreatus Fungal Pellets

Authors: Ayda Maadani Mallak, Amir lakzian, Elham Khodaverdi, Gholam Hossein Haghnia

Abstract:

The use of pharmaceuticals and personal care products such as antibiotics and antibacterials has been increased in recent years. Since the major part of consumed compounds remains unchanged in the wastewater treatment plant, they will easily find their way into the human food chain following the land use of sewage sludge (SS). Biological treatment of SS is one the most effective methods for expunging contaminants. White rot fungi, due to their ligninolytic enzymes, are extensively used to degrade organic compounds. Among all three different morphological forms and growth patterns of filamentous fungi (mycelia, clumps, and pellets), fungal pellet formation has been the subject of interest in industrial bioprocesses. Therefore this study was aimed to investigate the uptake of tetracycline (TC) and triclosan (TCS) by radish plant (Raphanus sativus) from soil amended with untreated and pretreated SS by P. ostreatus fungal pellets under greenhouse conditions. The experimental soil was amended with 1) Contaminated SS with TC at a concentration of 100 mgkg-1 and pretreated by fungal pellets, 2) Contaminated SS with TC at 100 mgkg-1 and untreated with fungal pellets, 3) Contaminated SS with TCS at a concentration of 50 mgkg-1 and pretreated by fungal pellets, 4) contaminated SS with TCS at 50 mgkg-1 and untreated with fungal pellets. An uncontaminated and untreated SS-amended soil also was considered as control treatment. An AB SCIEX 3200 QTRAP LC-MS/MS system was used in order to analyze the concentration of TC and TCS in plant tissues and soil medium. Results of this study revealed that the presence of TC and TCS in SS-amended soil decreased the radish biomass significantly. The reduction effect of TCS on dry biomass of shoot and root was 39 and 45% compared to controls, whereas for TC, the reduction percentage for shoot and root was 27 and 40.6%, respectively. However, fungal treatment of SS by P. ostreatus pellets reduced the negative effect of both compounds on plant biomass remarkably, as no significant difference was observed compared to control treatments. Pretreatment of SS with P. ostreatus also caused a significant reduction in translocation factor (concentration in shoot/root), especially for TC compound up to 32.3%, whereas this reduction for TCS was less (8%) compared to untreated SS. Generally, the results of this study confirmed the positive effect of using fungal pellets in SS amendment to decrease TC and TCS uptake by radish plants. In conclusion, P. ostreatus fungal pellets might provide future insights into bioaugmentation to remove antibiotics from environmental matrices.

Keywords: antibiotic, fungal pellet, sewage sludge, white-rot fungi

Procedia PDF Downloads 157
196 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 239
195 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 352
194 Metabolic Profiling in Breast Cancer Applying Micro-Sampling of Biological Fluids and Analysis by Gas Chromatography – Mass Spectrometry

Authors: Mónica P. Cala, Juan S. Carreño, Roland J.W. Meesters

Abstract:

Recently, collection of biological fluids on special filter papers has become a popular micro-sampling technique. Especially, the dried blood spot (DBS) micro-sampling technique has gained much attention and is momently applied in various life sciences reserach areas. As a result of this popularity, DBS are not only intensively competing with the venous blood sampling method but are at this moment widely applied in numerous bioanalytical assays. In particular, in the screening of inherited metabolic diseases, pharmacokinetic modeling and in therapeutic drug monitoring. Recently, microsampling techniques were also introduced in “omics” areas, whereunder metabolomics. For a metabolic profiling study we applied micro-sampling of biological fluids (blood and plasma) from healthy controls and from women with breast cancer. From blood samples, dried blood and plasma samples were prepared by spotting 8uL sample onto pre-cutted 5-mm paper disks followed by drying of the disks for 100 minutes. Dried disks were then extracted by 100 uL of methanol. From liquid blood and plasma samples 40 uL were deproteinized with methanol followed by centrifugation and collection of supernatants. Supernatants and extracts were evaporated until dryness by nitrogen gas and residues derivated by O-methyxyamine and MSTFA. As internal standard C17:0-methylester in heptane (10 ppm) was used. Deconvolution and alignment of and full scan (m/z 50-500) MS data were done by AMDIS and SpectConnect (http://spectconnect.mit.edu) software, respectively. Statistical Data analysis was done by Principal Component Analysis (PCA) using R software. The results obtained from our preliminary study indicate that the use of dried blood/plasma on paper disks could be a powerful new tool in metabolic profiling. Many of the metabolites observed in plasma (liquid/dried) were also positively identified in whole blood samples (liquid/dried). Whole blood could be a potential substitute matrix for plasma in Metabolomic profiling studies as well also micro-sampling techniques for the collection of samples in clinical studies. It was concluded that the separation of the different sample methodologies (liquid vs. dried) as observed by PCA was due to different sample treatment protocols applied. More experiments need to be done to confirm obtained observations as well also a more rigorous validation .of these micro-sampling techniques is needed. The novelty of our approach can be found in the application of different biological fluid micro-sampling techniques for metabolic profiling.

Keywords: biofluids, breast cancer, metabolic profiling, micro-sampling

Procedia PDF Downloads 411
193 Depositional Environment and Diagenetic Alterations, Influences of Facies and Fine Kaolinite Formation Migration on Sandstones’ Reservoir Quality, Sarir Formation, Sirt Basin Libya

Authors: Faraj M. Elkhatri, Hana Ali Allafi

Abstract:

The spatial and temporal distribution of diagenetic alterations related impact on the reservoir quality of the Sarir Formation. (present day burial depth of about 9000 feet) Depositional facies and diagenetic alterations are the main controls on reservoir quality of Sarir Formation Sirt Ba-sin Libya; these based on lithology and grain size as well as authigenic clay mineral types and their distributions. However, petrology investigation obtained on study area with five sandstone wells concentrated on main rock components and the parameters that may have impacts on reservoirs. the main authigenic clay minerals are kaolinite and dickite, these investigations have confirmed by X.R.D analysis and clay fraction. mainly Kaolinite and Dickite were extensively presented on all of wells with high amounts. As well as trace of detrital smectite and less amounts of illitized mud-matrix are possibly find by SEM image. Thin layers of clay presented as clay-grain coatings in local depth interpreted as remains of dissolved clay matrix is partly transformed into kaolinite adjacent and towards pore throat. This also may have impacts on most of the pore throats of this sandstone which are open and relatively clean with some of fine martial have been formed on occluded pores. This material is identified by EDS analysis to be collections of not only kaolinite booklets, but also small, disaggregated kaolinite platelets derived from the dis-aggregation of larger kaolinite booklets. These patches of kaolinite not only fill this pore, but also coat some of the sur-rounding framework grains. Quartz grains often enlarged by authigenic quartz overgrowths partially occlude and re-duce porosity. Scanning Electron Microscopy with Energy Dispersive Spectroscopy (SEM) was conducted on the post-test samples to examine any mud filtrate particles that may be in the pore throats. Semi-qualitative elemental data on select-ed minerals observed during the SEM study were obtained using an Energy Dispersive Spectroscopy (EDS) unit. The samples showed mostly clean open pore throats, with limited occlusion by kaolinite.

Keywords: por throat, formation damage, porosity lose, solids plugging

Procedia PDF Downloads 60
192 The International Fight against the Financing of Terrorism: Analysis of the Anti-Money Laundering and Combating Financing of Terrorism Regime

Authors: Loukou Amoin Marie Djedri

Abstract:

Financing is important for all terrorists – from the largest organizations in control of territories, to the smallest groups – not only for spreading fear through attacks, but also to finance the expansion of terrorist dogmas. These organizations pose serious threats to the international community. The disruption of terrorist financing aims to create a hostile environment for the growth of terrorism and to limit considerably the terrorist groups capacities. The World Bank (WB), together with the International Monetary Fund (IMF), decided to include in their scope the Fight against the money laundering and the financing of terrorism, in order to assist Member States in protecting their internal financial system from terrorism use and abuse and reinforcing their legal system. To do so, they have adopted the Anti-Money Laundering /Combating Financing of Terrorism (AML/CFT) standards that have been set up by the Financial Action Task Force. This set of standards, recognized as the international standards for anti-money laundering and combating the financing of terrorism, has to be implemented by States Members in order to strengthen their judicial system and relevant national institutions. However, we noted that, to date, some States Members still have significant AML/CFT deficiencies, which can constitute serious threats not only to the country’s economic stability but also for the global financial system. In addition, studies stressed out that repressive measures are more implemented by countries than preventive measures, which could be an important weakness in a state security system. Furthermore, we noticed that the AML/CFT standards evolve slowly, while techniques used by terrorist networks keep developing. The goal of the study is to show how to enhance the AML/CFT global compliance through the work of the IMF and the WB, to help member states to consolidate their financial system. To encourage and ensure the effectiveness of these standards, a methodology for assessing the compliance with the AML/CFT standards has been created to follow up the concrete implementation of these standards and to provide accurate technical assistance to countries in need. A risk-based approach has also been adopted as a key component of the implementation of the AML/CFT Standards, with the aim of strengthening the efficiency of the standards. Instead, we noted that the assessment is not efficient in the process of enhancing AML/CFT measures because it seems to lack of adaptation to the country situation. In other words, internal and external factors are not enough taken into account in a country assessment program. The purpose of this paper is to analyze the AML/CFT regime in the fight against the financing of terrorism and to find lasting solutions to achieve the global AML/CFT compliance. The work of all the organizations involved in this combat is imperative to protect the financial network and to lead to the disintegration of terrorist groups in the future.

Keywords: AML/CFT standards, financing of terrorism, international financial institutions, risk-based approach

Procedia PDF Downloads 275
191 Efficiency of Nutritional Support Treatments in Children With Failure to Thrive

Authors: Mehves Isiklar Ekici, Ceyda Tuna Kirsaclioglu, Zarife Kuloglu, Aydan Kansu

Abstract:

Malnutrition is an important cause of morbidity and mortality as it accounts for 45% of child deaths under the age of 5 worldwide. Therefore, early recognition and effective treatment of failure to thrive and malnutrition are important. In this study, it was aimed to retrospectively evaluate the nutritional support treatment approaches (nutrition education and diet enrichment / use of enteral nutrition products) applied in children followed up with growth failure without underlying organic causes, and to compare the efficacy of nutritional support treatments. In this study, children aged 1 month to 18 years diagnosed with growth failure who were followed up for at least 12 months between January 2011 and February 2020, were included. Anthropometric measurements at baseline and during follow-up, type of nutritional support therapy and treatment compliance were evaluated based on the retrospective records. 119 children (median age:3.2, 69 girls) were included in the study. Nutrition education and dietary enrichment were provided to 28% of the patients (Group 1). In addition to dietary education and recommendations, enteral nutrition supplements was given in 78% of them (Group 2). Compliance to the treatment rates of the patients in Group 1 and Group 2 were not significantly different at both 6th and 12th month controls. At the end of the follow up children who comply with the treatment in Group 1 had significant increase in weight for age z scores (-1.74 vs 0.05, respectively, p=0.019) and body mass index z scores (-1.47 vs -0.53, respectively, p=0.034) compared with baseline measurements. Similar to Group 1, in Group 2 children with treatment compliance, had a significant increase in weight for age z scores (-2.24 vs. -0.54, respectively, p=0.00) and body mass index z scores (-2.27 vs. -1.06, respectively, p=0.00) compared with baseline measurements. The rate of patients with severe malnutrition decreased from 15% to 12%, for moderate malnutrition decreased from 54% to 33%. Moreover, it was observed that this decrease in the rate of patients with both severe and moderate malnutrition was more prominent in patients under 3 years of age. Although there was a significant increase in anthropometric measurements with treatment in both groups, there was no significant difference in between two groups terms of change in anthropometric measurements (p>0.05), therefore effectiveness. Failure to thrive and malnutrition in infancy and childhood cause health problems that can affect adult life. To conclude, nutritional education - dietary enrichment. recommendations and use of enteral nutrition supplements were both proven beneficial in this study. Researchers are willing to underline that the most important part of the treatment is to include the family to the process to ensure the treatment compliance.

Keywords: enteral nutrition supplements, failure to thrive, malnutrition, nutritional education

Procedia PDF Downloads 110
190 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 171
189 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 125
188 Mobilizing Resources for Social Entrepreneurial Opportunity: A Framework of Engagement Strategy

Authors: Balram Bhushan

Abstract:

The emergence of social entrepreneurship challenges the strict categorization of not-for-profit, for-profit and hybrid organizations. Although the blurring of boundaries helps social entrepreneurial organizations (SEOs) make better use of emerging opportunities, it poses a significant challenge while mobilizing money from different sources. Additionally, for monetary resources, the legal framework of the host country may further complicate the issue by imposing strict accounting standards. Under such circumstances, the resource providers fail to recognize the suitable engagement strategy with the SEO of their choice. Based on the process of value creation and value capture, this paper develops a guiding framework for resource providers to design an appropriate mix of engagement with the identified SEOs. Essentially, social entrepreneurship creates value at the societal level, but value capture is a characteristic of an organization. Additionally, SEOs prefer value creation over value capture. The paper argued that the nature of the relationship between value creation and value capture determines the extent of blurred boundaries of the organization. Accordingly, synergistic, antagonistic and sequential relationships were proposed between value capture and value creation. When value creation is synergistically associated with value creation, the preferred nature of such action falls within the nature of for-profit organizations within the strictest legal framework. Banks offering micro-loans are good examples of this category. Opposite to this, the antagonist relationship between value creation and value capture, where value capture opportunities are sacrificed for value creation, dictates non-profit organizational structure. Examples of this category include non-government organizations and charity organizations. Finally, the sequential relationship between value capture opportunities is followed for value creation opportunities and guides the action closer to the hybrid structure. Examples of this category include organizations where a non-for-profit unit controls for-profit units of the organization either legally or structurally. As an SEO may attempt to utilize multiple entrepreneurial opportunities falling across any of the three relationships between value creation and value capture, the resource providers need to evaluate an appropriate mix of these relationships before designing their engagement strategies. The paper suggests three guiding principles for the engagement strategy. First, the extent of investment should be proportional to the synergistic relationship between value capture and value creation. Second, the subsidized support should be proportional to the sequential relationship. Finally, the funding (charity contribution) should be proportional to the antagonistic relationship. Finally, the resource providers are needed to keep a close watch on the evolving relationship between value creation and value capture for introducing appropriate changes in their engagement strategy.

Keywords: social entrepreneurship, value creation, value capture, entrepreneurial opportunity

Procedia PDF Downloads 132
187 Music Listening in Dementia: Current Developments and the Potential for Automated Systems in the Home: Scoping Review and Discussion

Authors: Alexander Street, Nina Wollersberger, Paul Fernie, Leonardo Muller, Ming Hung HSU, Helen Odell-Miller, Jorg Fachner, Patrizia Di Campli San Vito, Stephen Brewster, Hari Shaji, Satvik Venkatesh, Paolo Itaborai, Nicolas Farina, Alexis Kirke, Sube Banerjee, Eduardo Reck Miranda

Abstract:

Escalating neuropsychiatric symptoms (NPS) in people with dementia may lead to earlier care home admission. Music listening has been reported to stimulate cognitive function, potentially reducing agitation in this population. We present a scoping review, reporting on current developments and discussing the potential for music listening with related technology in managing agitation in dementia care. Of two searches for music listening studies, one focused on older people or people living with dementia where music listening interventions, including technology, were delivered in participants’ homes or in institutions to address neuropsychiatric symptoms, quality of life and independence. The second included any population focusing on the use of music technology for health and wellbeing. In search one 70/251 full texts were included. The majority reported either statistical significance (6, 8.5%), significance (17, 24.2%) or improvements (26, 37.1%). Agitation was specifically reported in 36 (51.4%). The second search included 51/99 full texts, reporting improvement (28, 54.9%), significance (11, 21.5%), statistical significance (1, 1.9%) and no difference compared to the control (6, 11.7%). The majority in the first focused on mood and agitation, and the second on mood and psychophysiological responses. Five studies used AI or machine learning systems to select music, all involving healthy controls and reporting benefits. Most studies in both reviews were not conducted in a home environment (review 1 = 12; 17.1%; review 2 = 11; 21.5%). Preferred music listening may help manage NPS in the care home settings. Based on these and other data extracted in the review, a reasonable progression would be to co-design and test music listening systems and protocols for NPS in all settings, including people’s homes. Machine learning and automated technology for music selection and arousal adjustment, driven by live biodata, have not been explored in dementia care. Such approaches may help deliver the right music at the appropriate time in the required dosage, reducing the use of medication and improving quality of life.

Keywords: music listening, dementia, agitation, scoping review, technology

Procedia PDF Downloads 112
186 The Study of Periodontal Health Status in Menopausal Women with Osteoporosis Referred to Rheumatology Clinics in Yazd and Healthy People

Authors: Mahboobe Daneshvar

Abstract:

Introduction: Clinical studies on the effect of systemic conditions on periodontal diseases have shown that some systemic deficiencies may provide grounds for the onset of periodontal diseases. One of these systemic problems is osteoporosis, which may be a risk factor for the onset and exacerbation of periodontitis. This study tends to evaluate periodontal indices in osteoporotic menopausal women and compare them with healthy controls. Materials and Methods: In this case-control study, participants included 45-75-year-old menopausal women referred to rheumatology wards of the Khatamolanbia Clinic and Shahid Sadoughi Hospital in Yazd; Their bone density was determined by DEXA-scan and by imaging the femoral-lumbar bone. Thirty patients with osteoporosis and 30 subjects with normal BMD were selected. Then, informed consent was obtained for participation in the study. During the clinical examinations, tooth loss (TL), plaque index (PI), gingival recession, pocket probing depth (PPD), clinical attachment loss (CAL), and tooth mobility (TM) were measured to evaluate the periodontal status. These clinical examinations were performed to determine the periodontal status by catheter, mirror and probe. Results: During the evaluation, there was no significant difference in PPD, PI, TM, gingival recession, and CAL between case and control groups (P-value>0.05); that is, osteoporosis has no effect on the above factors. These periodontal factors are almost the same in both healthy and patient groups. In the case of missing teeth, the following results were obtained: the mean of missing teeth was 22.173% of the total teeth in the case group and 18.583% of the total teeth in the control group. In the study of the missing teeth in the case and control groups, there was a significant relationship between case and control groups (P-value = 0.025). Conclusion: In fact, since periodontal disease is multifactorial and microbial plaque is the main cause, osteoporosis is considered a predisposing factor in exacerbation or persistence of periodontal disease. In patients with osteoporosis, usually pathological fractures, hormonal changes, and aging lead to reduced physical activity and affect oral health, which leads to the manifestation of periodontal disease. But this disease increases tooth loss by changing the shape and structure of bone trabeculae and weakening them. Osteoporosis does not seem to be a deterministic factor in the incidence of periodontal disease, since it affects bone quality rather than bone quantity.

Keywords: plaque index, Osteoporosis, tooth mobility, periodontal packet

Procedia PDF Downloads 72
185 A Conceptual Model of the 'Driver – Highly Automated Vehicle' System

Authors: V. A. Dubovsky, V. V. Savchenko, A. A. Baryskevich

Abstract:

The current trend in the automotive industry towards automatic vehicles is creating new challenges related to human factors. This occurs due to the fact that the driver is increasingly relieved of the need to be constantly involved in driving the vehicle, which can negatively impact his/her situation awareness when manual control is required, and decrease driving skills and abilities. These new problems need to be studied in order to provide road safety during the transition towards self-driving vehicles. For this purpose, it is important to develop an appropriate conceptual model of the interaction between the driver and the automated vehicle, which could serve as a theoretical basis for the development of mathematical and simulation models to explore different aspects of driver behaviour in different road situations. Well-known driver behaviour models describe the impact of different stages of the driver's cognitive process on driving performance but do not describe how the driver controls and adjusts his actions. A more complete description of the driver's cognitive process, including the evaluation of the results of his/her actions, will make it possible to more accurately model various aspects of the human factor in different road situations. This paper presents a conceptual model of the 'driver – highly automated vehicle' system based on the P.K. Anokhin's theory of functional systems, which is a theoretical framework for describing internal processes in purposeful living systems based on such notions as goal, desired and actual results of the purposeful activity. A central feature of the proposed model is a dynamic coupling mechanism between the decision-making of a driver to perform a particular action and changes of road conditions due to driver’s actions. This mechanism is based on the stage by stage evaluation of the deviations of the actual values of the driver’s action results parameters from the expected values. The overall functional structure of the highly automated vehicle in the proposed model includes a driver/vehicle/environment state analyzer to coordinate the interaction between driver and vehicle. The proposed conceptual model can be used as a framework to investigate different aspects of human factors in transitions between automated and manual driving for future improvements in driving safety, and for understanding how driver-vehicle interface must be designed for comfort and safety. A major finding of this study is the demonstration that the theory of functional systems is promising and has the potential to describe the interaction of the driver with the vehicle and the environment.

Keywords: automated vehicle, driver behavior, human factors, human-machine system

Procedia PDF Downloads 145
184 Phytochemical Screening, Proximate Analysis, Lethality Studies and Anti-Tumor Potential of Annona muricata L. (Soursop) Fruit Extract in Rattus novergicus

Authors: O. C. Abbah, O. Obidoa, J. Omale

Abstract:

Prostate tumor is fast becoming a leading cause of morbidity and mortality in human male adults, with 50 percent of men aged 50 years and above having histological evidence of the benign tumor. The study was set out to undertake phytochemical screening and proximate analysis of the pulp of A. muricata fruit - soursop; to determine the acute toxicity of the fruit pulp extract and its effect on male albino Wistar rats with concurrent induction of experimental benign prostate hyperplasia (BPH). Eighteen rats (average weight of 100g) were used for the lethality studies and were orally administered graded doses of aqueous extracts of the fruit pulp up to 5000 mg/kg body weight. Twenty five rats weighing 150-200g were divided into five groups of five rats each for the tumor studies. The groups included four controls – Hormone control, HC, which took Testosterone, T; and Estradiol, E2 – only, in olive oil as vehicle; Vehicle control, VC; Soursop control, SC, which received the extract only; VS, Vehicle and Soursop – and the Test group, TG (500mg/kg b.w.). All rats were dosed orally. Tumor was induced with exogenous Testosterone propionate: Estradiol valerate at 300µg: 80µg/kg b.w. (respectively) in olive oil, administered subcutaneously in the inguinal region of the rats on alternate days for 21 days. Administration of the fruit pulp at graded doses up to 5000mg/kg resulted in no lethality even after 72 hours. Results from tumor studies revealed that the administration of the fruit extracts significantly (p < 0.05) reduced the relative prostate weight of the TG compared with the HC, with values of 006±0.001 and 0.010±0.003 respectively. Treatment with vehicle, soursop and vehicle with soursop caused no significant (p>0.05) change in prostate size, with their respective relative prostate weights being 0.002±0.001, 0.004±0.002 and 0.002±0.001 compared with TG. Also, treatment with A. muricata fruit extract significantly decreased (p < 0.05) serum prostate specific antigen, PSA, in TG compared with HC, with values 0.055±0.017 and 0.194±0.068 ng/ml respectively. Furthermore, A. muricata administration displayed Testosterone boosting, Estradiol lowering and consequently testosterone-estradiol ratio increasing potential at the end of the 21 days. The preventive property of soursop against experimental BPH was corroborated by histological evidence in this study. The study concludes that A. muricata fruit holds a great potential for benign prostate tumor prevention and, possibly, management.

Keywords: annona muricata, benign prostate tumor, hormone, preventive potential, soursop

Procedia PDF Downloads 311
183 Assessment of Milk Quality in Vehari: Evaluation of Public Health Concerns

Authors: Muhammad Farhan Saeed, Waheed Aslam Khan, Muhammad Nadeem, Iftikhar Ahmad, Zakir Ali

Abstract:

Milk is an important and fundamental nutrition source of human diet. In Pakistan, the milk used by the consumer is of low quality and is often contaminated due to the lack of quality controls. Mycotoxins produced from molds which contaminate the agriculture commodities of animal feed. Mycotoxins are poisons which affect the animals when they consume contaminated feeds. Aflatoxin AFM1 is naturally occurring form of mycotoxins in milk which is carcinogenic. To assess public awareness regarding milk Aflatoxin contamination, a population-based survey using a questionnaire was carried out from general public and from farmers of both rural and urban areas. It was revealed from the data that people of rural area were more satisfied about quality of available milk but the awareness level about milk contamination was found lower in both areas. Total 297 samples of milk were collected from rural (n=156) and urban (n=141) areas of district Vehari during June-July 2015. Milk samples were collected from three different point sources; farmer, milkman and milkshop. These point sources had three types of dairy milk including cow milk, buffalo milk and mixed milk. After performing ELISA test 18 samples with positive ELISA results were maintain per source for further analysis for aflatoxin M1 (AFM1) by High Performance Liquid Chromatography (HPLC). Higher percentages of samples were found exceeding the permissible limit for urban area. In rural area about 15% samples and from urban area about 35% samples were exceeded the permissible limit of AFM1 with 0.05µg/kg set by European Union. From urban areas about 55% of buffalo, 33% of cows and 17% of mixed milk samples were exceeded the permissible AFM1 level as compared with 17%, 11% and 17% for milk samples from rural areas respectively. Samples from urban areas 33%, 44% and 28% were exceeded the permissible AFM1 level for farmer, milkman and of milk shop respectively as compared with 28% and 17% of farmer and milkman’s samples from rural areas respectively. The presence of AFM1 in milk samples demands the implementation of strict regulations and also urges the need for continuous monitoring of milk and milk products in order to minimize the health hazards. Regulations regarding aflatoxins contamination and adulteration should be strictly imposed to prevent health problems related to milk quality. Permissible limits for aflatoxin should be enforced strongly in Pakistan so that economic loss due to aflatoxin contamination can be reduced.

Keywords: Vehari, aflatoxins AFM1, milk, HPLC

Procedia PDF Downloads 374
182 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 142
181 From the Perspective of a Veterinarian: The Future of Plant Raw Materials Used in the Feeding of Farm Animals

Authors: Ertuğrul Yılmaz

Abstract:

One of the most important occupational groups in the food chain from farm to fork is a veterinary medicine. This occupational group, which has important duties in the prevention of many zoonotic diseases and in public health, takes place in many critical control points from soil to our kitchen. It has important duties from mycotoxins transmitted from the soil to slaughterhouses or milk processing facilities. Starting from the soil, which constitutes 70% of mycotoxin contamination, up to the TMR made from raw materials obtained from the soil, there are all critical control points from feeding to slaughterhouses and milk production enterprises. We can take the precaution of mycotoxins such as Aflatoxin B1, Ochratoxin, Zearalenone, and Fumonisin, which we encounter on farms while in the field. It has been reported that aflatoxin B1 is a casenerogen and passes into milk in studies. It is likely that many mycotoxins pose significant threats to public health and will turn out to be even more dangerous over time. Even raw material storage and TMR preparation are very important for public health. The danger of fumonisin accumulating in the liver will be understood over time. Zoonotic diseases are also explained with examples. In this study, how important veterinarians are in terms of public health is explained with examples. In the two-year mycotoxin screenings, fumonisin mycotoxin was found to be very high in corn and corn by-products, and it was determined that it accumulated in the liver for a long time and remained cornic in animals. It has been determined that mycotoxins are present in all livestock feeds, poultry feeds, and raw materials, not alone, but in double-triple form. Starting from the end, mycotoxin scans should be carried out from feed to raw materials and from raw materials to soil. In this way, we prevent the transmission of mycotoxins to animals and from animals to humans. Liver protectors such as toxin binders, beta-glucan, mannan oligosaccharides, activated carbon, prebiotics, and silymarin were used in certain proportions in the total mixed ratio, and positive results were obtained. Humidity and temperature controls of raw material silos were made at certain intervals. Necropsy was performed on animals that died as a result of mycotoxicosis, and macroscopic photographs were taken of the organs. We have determined that the mycotoxin screening in experimental animals and the feeds made without detecting the presence and amount of bacterial factors affect the results of the project to be made. For this, a series of precautionary plans have been created, starting from the production processes.

Keywords: mycotoxins, feed safety, processes, public health

Procedia PDF Downloads 84
180 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.

Keywords: Belgium, counterterrorism strategies, human rights, immigration law

Procedia PDF Downloads 106
179 Arsenic Contamination in Drinking Water Is Associated with Dyslipidemia in Pregnancy

Authors: Begum Rokeya, Rahelee Zinnat, Fatema Jebunnesa, Israt Ara Hossain, A. Rahman

Abstract:

Background and Aims: Arsenic in drinking water is a global environmental health problem, and the exposure may increase dyslipidemia and cerebrovascular diseases mortalities, most likely through causing atherosclerosis. However, the mechanism of lipid metabolism, atherosclerosis formation, arsenic exposure and impact in pregnancy is still unclear. Recent epidemiological evidences indicate close association between inorganic arsenic exposure via drinking water and Dyslipidemia. However, the exact mechanism of this arsenic-mediated increase in atherosclerosis risk factors remains enigmatic. We explore the association of the effect of arsenic on serum lipid profile in pregnant subjects. Methods: A total 200 pregnant mother screened in this study from arsenic exposed area. Our study group included 100 exposed subjects were cases and 100 Non exposed healthy pregnant were controls requited by a cross-sectional study. Clinical and anthropometric measurements were done by standard techniques. Lipidemic status was assessed by enzymatic endpoint method. Urinary As was measured by inductively coupled plasma-mass spectrometry and adjusted with specific gravity and Arsenic exposure was assessed by the level of urinary arsenic level > 100 μg/L was categorized as arsenic exposed and < 100 μg/L were categorized as non-exposed. Multivariate logistic regression and Student’s t - test was used for statistical analysis. Results: Systolic and diastolic blood pressure both were significantly higher in the Arsenic exposed pregnant subjects compared to the Non-exposed group (p<0.001). Arsenic exposed subjects had 2 times higher chance of developing hypertensive pregnancy (Odds Ratio 2.2). In parallel to the findings in Ar exposed subjects showed significantly higher proportion of triglyceride and total cholesterol and low density of lipo protein when compare to non- arsenic exposed pregnant subjects. Significant correlation of urinary arsenic level was also found with SBP, DBP, TG, T chol and serum LDL-Cholesterol. On multivariate logistic regression showed urinary arsenic had a positive association with DBP, SBP, Triglyceride and LDL-c. Conclusion: In conclusion, arsenic exposure may induce dyslipidemia like atherosclerosis through modifying reverse cholesterol transport in cholesterol metabolism. For decreasing atherosclerosis related mortality associated with arsenic, preventing exposure from environmental sources in early life is an important element.

Keywords: Arsenic Exposure, Dyslipidemia, Gestational Diabetes Mellitus, Serum lipid profile

Procedia PDF Downloads 125
178 Effects of Bleaching Procedures on Dentine Sensitivity

Authors: Suhayla Reda Al-Banai

Abstract:

Problem Statement: Tooth whitening was used for over one hundred and fifty year. The question concerning the whiteness of teeth is a complex one since tooth whiteness will vary from individual to individual, dependent on age and culture, etc. Tooth whitening following treatment may be dependent on the type of whitening system used to whiten the teeth. There are a few side-effects to the process, and these include tooth sensitivity and gingival irritation. Some individuals may experience no pain or sensitivity following the procedure. Purpose: To systematically review the available published literature until 31st December 2021 to identify all relevant studies for inclusion and to determine whether there was any evidence demonstrating that the application of whitening procedures resulted in the tooth sensitivity. Aim: Systematically review the available published works of literature to identify all relevant studies for inclusion and to determine any evidence demonstrating that application of 10% & 15% carbamide peroxide in tooth whitening procedures resulted in tooth sensitivity. Material and Methods: Following a review of 70 relevant papers from searching both electronic databases (OVID MEDLINE and PUBMED) and hand searching of relevant written journals, 49 studies were identified, 42 papers were subsequently excluded, and 7 studies were finally accepted for inclusion. The extraction of data for inclusion was conducted by two reviewers. The main outcome measures were the methodology and assessment used by investigators to evaluate tooth sensitivity in tooth whitening studies. Results: The reported evaluation of tooth sensitivity during tooth whitening procedures was based on the subjective response of subjects rather than a recognized methodology for evaluating. One of the problems in evaluating was the lack of homogeneity in study design. Seven studies were included. The studies included essential features namely: randomized group, placebo controls, doubleblind and single-blind. Drop-out was obtained from two of included studies. Three of the included studies reported sensitivity at the baseline visit. Two of the included studies mentioned the exclusion criteria Conclusions: The results were inconclusive due to: Limited number of included studies, the study methodology, and evaluation of DS reported. Tooth whitening procedures adversely affect both hard and soft tissues in the oral cavity. Sideeffects are mild and transient in nature. Whitening solutions with greater than 10% carbamide peroxide causes more tooth sensitivity. Studies using nightguard vital bleaching with 10% carbamide peroxide reported two side effects tooth sensitivity and gingival irritation, although tooth sensitivity was more prevalent than gingival irritation

Keywords: dentine, sensitivity, bleaching, carbamide peroxde

Procedia PDF Downloads 70
177 Bad Juju: The Translation of the African Zombi to Nigerian and Western Screens

Authors: Randall Gray Underwood

Abstract:

Within the past few decades, zombie cinema has evolved from a niche outgrowth of the horror genre into one of the most widely-discussed and thoroughly-analyzed subgenres of film. Rising to international popularity during the 1970s and 1980s following the release of George Romero’s landmark classic, Night of the Living Dead (1968), and its much-imitated sequel, Dawn of the Dead (1978), the zombie genre returned to global screens in full force at the turn of the century following earth-shattering events such as the 9/11 terrorist attacks, America’s subsequent war in the Middle East, environmental pandemics, and the emergence of a divided and disconnected global populace in the age of social media. Indeed, the presence of the zombie in all manner of art and entertainment—movies, literature, television, video games, comic books, and more—has become nothing short of pervasive, engendering a plethora of scholarly writings, books, opinion pieces, and video essays from all manner of academics, cultural commentators, critics, and casual fans, with each espousing their own theories regarding the zombie’s allegorical and symbolic value within global fiction. Consequently, the walking dead of recent years have been variously positioned as fictive manifestations of human fears of societal collapse, environmental contagion, sexually-transmitted disease, primal regression, dwindling population rates, global terrorism, and the foreign “Other”. Less commonly analyzed within film scholarship, however, is the connection between the zombie’s folkloric roots and native African/Haitian spiritual practice; specifically, how this connection impacts the zombie’s presentation in African films by native storytellers versus in similar narratives told from a western perspective. This work will examine the unlikely connections and contrasts inherent the portrayal of the traditional African/Haitian zombie (or zombi, in Haitian French) in the Nollywood film Witchdoctor of the Livingdead (1985, Charles Abi Enonchong) versus its depiction in the early Hollywood films White Zombie (1932, Victor Halperin) and I Walked with a Zombie (1943, Jacques Tourneur), through analysis of each cinemas’ use of the zombie as a visual metaphor for subjugation/slavery, as well as differences in their representation of the the spiritual folklore from which the figure of the zombie originates. Select films from the post-Night of the Living Dead zombie cinema landscape will also warrant brief discussion in relation to Witchdoctor of the Livingdead.

Keywords: Nollywood, Zombie cinema, Horror cinema, Classical Hollywood

Procedia PDF Downloads 60
176 Functional Neurocognitive Imaging (fNCI): A Diagnostic Tool for Assessing Concussion Neuromarker Abnormalities and Treating Post-Concussion Syndrome in Mild Traumatic Brain Injury Patients

Authors: Parker Murray, Marci Johnson, Tyson S. Burnham, Alina K. Fong, Mark D. Allen, Bruce McIff

Abstract:

Purpose: Pathological dysregulation of Neurovascular Coupling (NVC) caused by mild traumatic brain injury (mTBI) is the predominant source of chronic post-concussion syndrome (PCS) symptomology. fNCI has the ability to localize dysregulation in NVC by measuring blood-oxygen-level-dependent (BOLD) signaling during the performance of fMRI-adapted neuropsychological evaluations. With fNCI, 57 brain areas consistently affected by concussion were identified as PCS neural markers, which were validated on large samples of concussion patients and healthy controls. These neuromarkers provide the basis for a computation of PCS severity which is referred to as the Severity Index Score (SIS). The SIS has proven valuable in making pre-treatment decisions, monitoring treatment efficiency, and assessing long-term stability of outcomes. Methods and Materials: After being scanned while performing various cognitive tasks, 476 concussed patients received an SIS score based on the neural dysregulation of the 57 previously identified brain regions. These scans provide an objective measurement of attentional, subcortical, visual processing, language processing, and executive functioning abilities, which were used as biomarkers for post-concussive neural dysregulation. Initial SIS scores were used to develop individualized therapy incorporating cognitive, occupational, and neuromuscular modalities. These scores were also used to establish pre-treatment benchmarks and measure post-treatment improvement. Results: Changes in SIS were calculated in percent change from pre- to post-treatment. Patients showed a mean improvement of 76.5 percent (σ= 23.3), and 75.7 percent of patients showed at least 60 percent improvement. Longitudinal reassessment of 24 of the patients, measured an average of 7.6 months post-treatment, shows that SIS improvement is maintained and improved, with an average of 90.6 percent improvement from their original scan. Conclusions: fNCI provides a reliable measurement of NVC allowing for identification of concussion pathology. Additionally, fNCI derived SIS scores direct tailored therapy to restore NVC, subsequently resolving chronic PCS resulting from mTBI.

Keywords: concussion, functional magnetic resonance imaging (fMRI), neurovascular coupling (NVC), post-concussion syndrome (PCS)

Procedia PDF Downloads 356