Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: security safe

2848 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics

Authors: Matthew I. Bellgard

Abstract:

The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.

Keywords: bioinformatics, food security, personalized medicine, systems approach

Procedia PDF Downloads 409
2847 Cloud Computing Impact on e-Government Adoption

Authors: Ali Elshabrawy

Abstract:

Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.

Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges

Procedia PDF Downloads 336
2846 Formal Models of Sanitary Inspections Teams Activities

Authors: Tadeusz Nowicki, Radosław Pytlak, Robert Waszkowski, Jerzy Bertrandt, Anna Kłos

Abstract:

This paper presents methods for formal modeling of activities in the area of sanitary inspectors outbreak of food-borne diseases. The models allow you to measure the characteristics of the activities of sanitary inspection and as a result allow improving the performance of sanitary services and thus food security.

Keywords: food-borne disease, epidemic, sanitary inspection, mathematical models

Procedia PDF Downloads 293
2845 A Machine Learning Approach for Detecting and Locating Hardware Trojans

Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He

Abstract:

The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.

Keywords: hardware trojans, physical properties, machine learning, hardware security

Procedia PDF Downloads 133
2844 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 370
2843 Is More Inclusive More Effective? The 'New Style' Public Distribution System in India

Authors: Avinash Kishore, Suman Chakrabarti

Abstract:

In September 2013, the parliament of India enacted the National Food Security Act (NFSA) which entitles two-thirds of India’s population to five kilograms of rice, wheat or coarse cereals per person per month at one to three rupees per kilogram. Five states in India—Andhra Pradesh, Chhattisgarh, Tamil Nadu, Odisha and West Bengal—had already implemented somewhat similar changes in the TPDS a few years earlier using their own budgetary resources. They made rice—coincidentally, all five states are predominantly rice-eating—available in fair price shops to a majority of their population at very low prices (less than Rs.3/kg). This paper tries to account for the changes in household consumption patterns associated with the change in TPDS policy in these states using data from household consumption surveys by the National Sample Survey Organization (NSSO). NSS data show improvement in the coverage of TPDS and average off-take of grains from fair price shops between 2004-05 and 2009-10 across all states of India. However, the increase in coverage and off-take was significantly higher in four out of these five states than in the rest of India. An average household in these states purchased three kilos more rice per month from fair price shops than its counterpart in non-treated states as a result of more generous TPDS policies backed by administrative reforms. The increase in consumption of PDS rice was the highest in Chhattisgarh, the poster state of PDS reforms. Households in Chhattisgarh used money saved on rice to spend more on pulses, edible oil, vegetables and sugar and other non-food items. We also find evidence that making TPDS more inclusive and more generous is not enough unless it is supported by administrative reforms to improve grain delivery and control diversion to open markets.

Keywords: public distribution system, social safety-net, national food security act, diet quality, Chhattisgarh

Procedia PDF Downloads 361
2842 Free Radical Scavenging Activity and Total Phenolic Assessment of Drug Repurposed Medicinal Plant Metabolites: Promising Tools against Post COVID-19 Syndromes and Non-Communicable Diseases in Botswana

Authors: D. Motlhanka, M. Mine, T. Bagaketse, T. Ngakane

Abstract:

There is a plethora of evidence from numerous sources that highlights the triumph of naturally derived medicinal plant metabolites with antioxidant capability for repurposed therapeutics. As post-COVID-19 syndromes and non-communicable diseases are on the rise, there is an urgent need to come up with new therapeutic strategies to address the problem. Non-communicable diseases and Post COVID-19 syndromes are classified as socio-economic diseases and are ranked high among threats to health security due to the economic burden they pose to any government budget commitment. Research has shown a strong link between accumulation of free radicals and oxidative stress critical for pathogenesis of non-communicable diseases and COVID-19 syndromes. Botswana has embarked on a robust programme derived from ethno-pharmacognosy and drug repurposing to address these threats to health security. In the current approach, a number of medicinally active plant-derived polyphenolics are repurposed and combined into new medicinal tools to target diabetes, Hypertension, Prostate Cancer and oxidative stress induced Post COVID 19 syndromes such as “brain fog”. All four formulants demonstrated Free Radical scavenging capacities above 95% at 200µg/ml using the diphenylpicryalhydrazyl free radical scavenging assay and the total phenolic contents between 6899-15000GAE(g/L) using the folin-ciocalteau assay respectively. These repurposed medicinal tools offer new hope and potential in the fight against emerging health threats driven by hyper-inflammation and free radical-induced oxidative stress.

Keywords: drug repurposed plant polyphenolics, free radical damage, non-communicable diseases, post COVID 19 syndromes

Procedia PDF Downloads 108
2841 Solving LWE by Pregressive Pumps and Its Optimization

Authors: Leizhang Wang, Baocang Wang

Abstract:

General Sieve Kernel (G6K) is considered as currently the fastest algorithm for the shortest vector problem (SVP) and record holder of open SVP challenge. We study the lattice basis quality improvement effects of the Workout proposed in G6K, which is composed of a series of pumps to solve SVP. Firstly, we use a low-dimensional pump output basis to propose a predictor to predict the quality of high-dimensional Pumps output basis. Both theoretical analysis and experimental tests are performed to illustrate that it is more computationally expensive to solve the LWE problems by using a G6K default SVP solving strategy (Workout) than these lattice reduction algorithms (e.g. BKZ 2.0, Progressive BKZ, Pump, and Jump BKZ) with sieving as their SVP oracle. Secondly, the default Workout in G6K is optimized to achieve a stronger reduction and lower computational cost. Thirdly, we combine the optimized Workout and the Pump output basis quality predictor to further reduce the computational cost by optimizing LWE instances selection strategy. In fact, we can solve the TU LWE challenge (n = 65, q = 4225, = 0:005) 13.6 times faster than the G6K default Workout. Fourthly, we consider a combined two-stage (Preprocessing by BKZ- and a big Pump) LWE solving strategy. Both stages use dimension for free technology to give new theoretical security estimations of several LWE-based cryptographic schemes. The security estimations show that the securities of these schemes with the conservative Newhope’s core-SVP model are somewhat overestimated. In addition, in the case of LAC scheme, LWE instances selection strategy can be optimized to further improve the LWE-solving efficiency even by 15% and 57%. Finally, some experiments are implemented to examine the effects of our strategies on the Normal Form LWE problems, and the results demonstrate that the combined strategy is four times faster than that of Newhope.

Keywords: LWE, G6K, pump estimator, LWE instances selection strategy, dimension for free

Procedia PDF Downloads 49
2840 Ultrasonic Pulse Velocity Investigation of Polypropylene and Steel Fiber Reinforced Concrete

Authors: Erjola Reufi, Jozefita Marku, Thomas Bier

Abstract:

Ultrasonic pulse velocity (UPV) method has been shown for some time to provide a reliable means of estimating properties and offers a unique opportunity for direct, quick and safe control of building damaged by earthquake, fatigue, conflagration and catastrophic scenarios. On this investigation hybrid reinforced concrete has been investigated by UPV method. Hooked end steel fiber of length 50 and 30 mm was added to concrete in different proportion 0, 0.25, 0.5, and 1 % by the volume of concrete. On the other hand, polypropylene fiber of length 12, 6, 3 mm was added to concrete of 0.1, 0.2, and 0.4 % by the volume of concrete. Fifteen different mixture has been prepared to investigate the relation between compressive strength and UPV values and also to investigate on the effect of volume and type of fiber on UPV values.

Keywords: compressive strength, polypropylene fiber, steel fiber, ultrasonic pulse velocity, volume, type of fiber

Procedia PDF Downloads 390
2839 Cultural Adaptation of an Appropriate Intervention Tool for Mental Health among the Mohawk in Quebec

Authors: Liliana Gomez Cardona, Mary McComber, Kristyn Brown, Arlene Laliberté, Outi Linnaranta

Abstract:

The history of colonialism and more contemporary political issues have resulted in the exposure of Kanien'kehá:ka: non (Kanien'kehá:ka of Kahnawake) to challenging and even traumatic experiences. Colonization, religious missions, residential schools as well as economic and political marginalization are the factors that have challenged the wellbeing and mental health of these populations. In psychiatry, screening for mental illness is often done using questionnaires with which the patient is expected to respond to how often he/she has certain symptoms. However, the Indigenous view of mental wellbeing may not fit well with this approach. Moreover, biomedical treatments do not always meet the needs of Indigenous people because they do not understand the culture and traditional healing methods that persist in many communities. Assess whether the questionnaires used to measure symptoms, commonly used in psychiatry are appropriate and culturally safe for the Mohawk in Quebec. Identify the most appropriate tool to assess and promote wellbeing and follow the process necessary to improve its cultural sensitivity and safety for the Mohawk population. Qualitative, collaborative, and participatory action research project which respects First Nations protocols and the principles of ownership, control, access, and possession (OCAP). Data collection based on five focus groups with stakeholders working with these populations and members of Indigenous communities. Thematic analysis of the data collected and emerging through an advisory group that led a revision of the content, use, and cultural and conceptual relevance of the instruments. The questionnaires measuring psychiatric symptoms face significant limitations in the local indigenous context. We present the factors that make these tools not relevant among Mohawks. Although the scale called Growth and Empowerment Measure (GEM) was originally developed among Indigenous in Australia, the Mohawk in Quebec found that this tool comprehends critical aspects of their mental health and wellbeing more respectfully and accurately than questionnaires focused on measuring symptoms. We document the process of cultural adaptation of this tool which was supported by community members to create a culturally safe tool that helps in growth and empowerment. The cultural adaptation of the GEM provides valuable information about the factors affecting wellbeing and contributes to mental health promotion. This process improves mental health services by giving health care providers useful information about the Mohawk population and their clients. We believe that integrating this tool in interventions can help create a bridge to improve communication between the Indigenous cultural perspective of the patient and the biomedical view of health care providers. Further work is needed to confirm the clinical utility of this tool in psychological and psychiatric intervention along with social and community services.

Keywords: cultural adaptation, cultural safety, empowerment, Mohawks, mental health, Quebec

Procedia PDF Downloads 134
2838 Soft Infrastructure in Tourism Development

Authors: Seetanah Boopen, Padachi Kesseven, R. Juwaheer , R. V. Sannassee, M. L. Lamport

Abstract:

This study aims primarily at investigating the importance of soft infrastructure in tourism development for the case of an island economy namely Mauritius. The study in the first place assesses the level of perceived and actual satisfaction of the present state of the different types of soft tourism infrastructure and the allied services provided by tourism stakeholders in Mauritius and address the identified gaps. In order to address the study objectives, a rigorous survey analysis among 1741 international tourists at the departure lounge of the Sir Seewoosagur International Airport of Mauritius was carried out. The respondents placed significant emphasis on the different elements of the soft infrastructure dimension, where many of the elements falling under this dimension were rated with a high mean score. In particular the visitors rated communication, both internet and telephone services, and security to be most important. Significant gap has been found in the categories of ‘Health’ and ‘Security’. This indicates that the tourists ascribe high importance to the soft infrastructure dimension. The link between the respondent profile and the key variables which influence the tourist choice of the island as a destination are found to be equally important for most of the international tourists. However, these were deemed to be more critical for tourists travelling with family members. Although the survey instrument attempted to measure any gap between on the one hand, the importance of the infrastructure dimension and on the other hand, the level of satisfaction with the infrastructure dimension, overall the results do not show any statistically significant gap among the different elements of the infrastructural dimension. The study dwells into further analysis by engaging into an econometric framework related to a Probit Model, using the data collected, to gauge the effect of soft infrastructure on tourist intention to repeat or recommend the destination. The results confirm that soft infrastructure is found to be sensible to tourists, although relatively less sensitive as compared to tourism and transport and hotel infrastructure.

Keywords: tourism development, soft infrastructure, Mauritius, hotel infrastructure

Procedia PDF Downloads 475
2837 Application of Unstructured Mesh Modeling in Evolving SGE of an Airport at the Confluence of Multiple Rivers in a Macro Tidal Region

Authors: A. A. Purohit, M. M. Vaidya, M. D. Kudale

Abstract:

Among the various developing countries in the world like China, Malaysia, Korea etc., India is also developing its infrastructures in the form of Road/Rail/Airports and Waterborne facilities at an exponential rate. Mumbai, the financial epicenter of India is overcrowded and to relieve the pressure of congestion, Navi Mumbai suburb is being developed on the east bank of Thane creek near Mumbai. The government due to limited space at existing Mumbai Airports (domestic and international) to cater for the future demand of airborne traffic, proposes to build a new international airport near Panvel at Navi Mumbai. Considering the precedence of extreme rainfall on 26th July 2005 and nearby townships being in a low-lying area, wherein new airport is proposed, it is inevitable to study this complex confluence area from a hydrodynamic consideration under both tidal and extreme events (predicted discharge hydrographs), to avoid inundation of the surrounding due to the proposed airport reclamation (1160 hectares) and to determine the safe grade elevation (SGE). The model studies conducted using the application of unstructured mesh to simulate the Panvel estuarine area (93 km2), calibration, validation of a model for hydraulic field measurements and determine the maxima water levels around the airport for various extreme hydrodynamic events, namely the simultaneous occurrence of highest tide from the Arabian Sea and peak flood discharges (Probable Maximum Precipitation and 26th July 2005) from five rivers, the Gadhi, Kalundri, Taloja, Kasadi and Ulwe, meeting at the proposed airport area revealed that: (a) The Ulwe River flowing beneath the proposed airport needs to be diverted. The 120m wide proposed Ulwe diversion channel having a wider base width of 200 m at SH-54 Bridge on the Ulwe River along with the removal of the existing bund in Moha Creek is inevitable to keep the SGE of the airport to a minimum. (b) The clear waterway of 80 m at SH-54 Bridge (Ulwe River) and 120 m at Amra Marg Bridge near Moha Creek is also essential for the Ulwe diversion and (c) The river bank protection works on the right bank of Gadhi River between the NH-4B and SH-54 bridges as well as upstream of the Ulwe River diversion channel are essential to avoid inundation of low lying areas. The maxima water levels predicted around the airport keeps SGE to a minimum of 11m with respect to Chart datum of Ulwe Bundar and thus development is not only technologically-economically feasible but also sustainable. The unstructured mesh modeling is a promising tool to simulate complex extreme hydrodynamic events and provides a reliable solution to evolve optimal SGE of airport.

Keywords: airport, hydrodynamics, safe grade elevation, tides

Procedia PDF Downloads 247
2836 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 76
2835 Guided Wave in a Cylinder with Trepezoid Cross-Section

Authors: Nan Tang, Bin Wu, Cunfu He

Abstract:

The trapezoid rods are widely used in civil engineering as load –carrying members. Ultrasonic guided wave is one of the most popular techniques in analyzing the propagation of elastic guided wave. The goal of this paper is to investigate the propagation of elastic waves in the isotropic bar with trapezoid cross-section. Dispersion curves that describe the relationship between the frequency and velocity provide the fundamental information to describe the propagation of elastic waves through a structure. Based on the SAFE (semi-analytical finite element) a linear algebraic system of equations is obtained. By using numerical methods, dispersion curves solved for the rods with the trapezoid cross-section. These fundamental information plays an important role in applying ultrasonic guided waves to NTD for structures with trapezoid cross section.

Keywords: guided wave, dispersion, finite element method, trapezoid rod

Procedia PDF Downloads 283
2834 Human Absorbed Dose Assessment of 68Ga-Dotatoc Based on Biodistribution Data in Syrian Rats

Authors: S. Zolghadri, M. Naderi, H. Yousefnia, A. Ramazani, A. R. Jalilian

Abstract:

The aim of this work was to evaluate the values of absorbed dose of 68Ga-DOTATOC in numerous human organs. 68Ga-DOTATOC was prepared with the radiochemical purity of higher than 98% and by specific activity of 39.6 MBq/nmol. The complex demonstrated great stability at room temperature and in human serum at 37° C at least 2 h after preparation. Significant uptake was observed in somatostatin receptor-positive tissues such as pancreas and adrenal. The absorbed dose received by human organs was evaluated based on biodistribution studies in Syrian rats by the radiation absorbed dose assessment resource (RADAR) method. Maximum absorbed dose was obtained in the pancreas, kidneys, and adrenal with 0.105, 0.074, and 0.010 mGy/MBq, respectively. The effective absorbed dose was 0.026 mSv/MBq for 68Ga-DOTATOC. The results showed that 68Ga-DOTATOC can be considered as a safe and effective agent for clinically PET imaging applications.

Keywords: effective absorbed dose, Ga-68, octreotide, MIRD

Procedia PDF Downloads 508
2833 A ‘Just and Loving Gaze’ on Sexuality and Attachment: Why I Think (Not) All Homosexual Relationships are Borne Out of an Abandonment and Attachment Crisis

Authors: Victor Counted

Abstract:

John Bowlby's Attachment theory is often a framework used by many researchers to understand human relationship experiences with close 'others'. In this short brief on sexuality, I tried to discuss homosexual relationships from three attachment positions, or if you like, conditions, in relation to the compensation and correspondence hypothesis used to understand an individual's attachment orientation with an attachment figure who is seen as a secure base, safe haven, and some kind of target for proximity seeking. Drawing from the springs of virtue and hope in light of Murdock’s ‘just and love gaze’ model, I allowed myself to see the homosexual cases cited in positive terms, as I related to the situations and experiences of our homosexual ‘others’ from the guiding herald of Moltmann's theology of hope. This approach allowed me to conclusively convince readers to engage sexuality from a tolerating tendency of hope in our thinking and thoughts towards the actions and conditions of our dynamic world which is always plunging toward the future.

Keywords: attachment, wellbeing, sexuality, homosexuality, abandonment, tolerance of hope, wise fool

Procedia PDF Downloads 398
2832 Improved Food Security and Alleviation of Cyanide Intoxication through Commercialization and Utilization of Cassava Starch by Tanzania Industries

Authors: Mariam Mtunguja, Henry Laswai, Yasinta Muzanilla, Joseph Ndunguru

Abstract:

Starchy tuberous roots of cassava provide food for people but also find application in various industries. Recently there has been the focus of concentrated research efforts to fully exploit its potential as a sustainable multipurpose crop. High starch yield is the important trait for commercial cassava production for the starch industries. Furthermore, cyanide present in cassava root poses a health challenge in the use of cassava for food. Farming communities where cassava is a staple food, prefer bitter (high cyanogenic) varieties as protection from predators and thieves. As a result, food insecure farmers prefer growing bitter cassava. This has led to cyanide intoxication to this farming communities. Cassava farmers can benefit from marketing cassava to starch producers thereby improving their income and food security. This will decrease dependency on cassava as staple food as a result of increased income and be able to afford other food sources. To achieve this, adequate information is required on the right cassava cultivars and appropriate harvesting period so as to maximize cassava production and profitability. This study aimed at identifying suitable cassava cultivars and optimum time of harvest to maximize starch production. Six commonly grown cultivars were identified and planted in a complete random block design and further analysis was done to assess variation in physicochemical characteristics, starch yield and cyanogenic potentials across three environments. The analysis showed that there is a difference in physicochemical characteristics between landraces (p ≤ 0.05), and can be targeted to different industrial applications. Among landraces, dry matter (30-39%), amylose (11-19%), starch (74-80%) and reducing sugars content (1-3%) varied when expressed on a dry weight basis (p ≤ 0.05); however, only one of the six genotypes differed in crystallinity and mean starch granule particle size, while glucan chain distribution and granule morphology were the same. In contrast, the starch functionality features measured: swelling power, solubility, syneresis, and digestibility differed (p ≤ 0.05). This was supported by Partial least square discriminant analysis (PLS-DA), which highlighted the divergence among the cassavas based on starch functionality, permitting suggestions for the targeted uses of these starches in diverse industries. The study also illustrated genotypic difference in starch yield and cyanogenic potential. Among landraces, Kiroba showed potential for maximum starch yield (12.8 t ha-1) followed by Msenene (12.3 t ha-1) and third was Kilusungu (10.2 t ha-1). The cyanide content of cassava landraces was between 15 and 800 ppm across all trial sites. GGE biplot analysis further confirmed that Kiroba was a superior cultivar in terms of starch yield. Kilusungu had the highest cyanide content and average starch yield, therefore it can also be suitable for use in starch production.

Keywords: cyanogen, cassava starch, food security, starch yield

Procedia PDF Downloads 205
2831 Hepatitis B Virus Infection Among Egyptian Children Vaccinated during Infancy

Authors: Iman I. Salama, Samia M. Sami, Somaia I. Salama, Zeinab N. Said, Thanaa M. Rabah, Aida M. Abdel-Mohsin

Abstract:

This is a national community-based project to evaluate the effectiveness of HBV vaccination program in prevention of infection. HBV markers were tested in the sera of 3600 vaccinated children. Infected children were followed up for 1 year. Prevalence of HBV infection was 0.39 % (0.28% positive for anti-HBc, 0.03% positive for HBsAg and 0.08% positive for both). One year later, 50% of positive anti-HBc children turned negative with sustained positivity for positive HBsAg cases. HBV infection was significantly higher at age above 9 years (0.6%) compared to 0.2% at age 3-9 years and 0% at younger age (P < 0.05). Logistic analysis revealed that predictors for HBV infection were history of blood transfusion, regular medical injection, and family history of either HBV infection or drug abuse (adjusted odds ratios 6.2, 5.6, 7.6 & 19.1 respectively). HBV vaccination program produced adequate protection. Adherence to infection control measures and safe blood transfusion are recommended.

Keywords: HBV infection, HBV vaccine, children, Egypt

Procedia PDF Downloads 428
2830 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment

Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan

Abstract:

With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.

Keywords: data sharing, cross-domain, data exchange, publish-subscribe

Procedia PDF Downloads 113
2829 Heat Transfer Enhancement through Hybrid Metallic Nanofluids Flow with Viscous Dissipation and Joule Heating Effect

Authors: Khawar Ali

Abstract:

We present the numerical study of unsteady hydromagnetic (MHD) flow and heat transfer characteristics of a viscous incompressible electrically conducting water-based hybrid metallic nanofluid (containing Cu-Au/ H₂O nanoparticles) between two orthogonally moving porous coaxial disks with suction. Different from the classical shooting methodology, we employ a combination of a direct and an iterative method (SOR with optimal relaxation parameter) for solving the sparse systems of linear algebraic equations arising from the FD discretization of the linearized self similar nonlinear ODEs. Effects of the governing parameters on the flow and heat transfer are discussed and presented through tables and graphs. The findings of the present investigation may be beneficial for the electronic industry in maintaining the electronic components under effectiveand safe operational conditions.

Keywords: heat transfer enhancement, hybrid metallic nanofluid, viscous dissipation and joule heating effect , Two dimensional flow

Procedia PDF Downloads 215
2828 Heavy Liquid Metal Coolant – the Key Safety Element in the Complex of New Nuclear Energy Technologies

Authors: A. Orlov, V. Rachkov

Abstract:

The future of Nuclear Energetics is seen in fast reactors with inherent safety working in the closed nuclear fuel cycle. The concept of inherent safety, which lies in deterministic elimination of the most severe accidents due to inherent properties of the reactor rather than through building up engineered barriers, is a cornerstone of success in ensuring safety and economic efficiency of future Nuclear Energetics. The focus of this paper is one of the key elements of inherent safety - the lead coolant of a nuclear reactor. Advantages of lead coolant for reactor application, influence on safety are reviewed. BREST-OD-300 fast reactor, currently being developed in Russia withing the “Proryv” Project utilizes lead coolant and a special set of measures and devices, called technology of lead coolant that ensures safe operation in a wide range of temperatures. Here these technological elements are reviewed, and current progress in their development is discussed.

Keywords: BREST-OD-300. , fast reactor, inherent safety, lead coolant

Procedia PDF Downloads 134
2827 Economic Important of Manta Ray Watching Tourism in Dampier Strait, Raja Ampat, West Papua, Indonesia

Authors: Maulita Sari Hani, Abraham B. Sianipar, Jamaluddin Jompa, Natsir Nessa, Alan T. White

Abstract:

Manta ray is an icon for tourism in Raja Ampat. The tourist volume has been increased for the past ten years which up to approximately 23,000 tourists in 2017. Since 2013, Conservation International Indonesia deployed satellite and acoustic tags on manta ray in Dampier strait to track the species and identify the aggregation areas. These findings encourage the government and the local community to boost conservation through the management of marine protected areas for tourism purposes. Community in Dampier strait including the village of Arborek, Kurkapa, Kapisawar, and Sawingray involved in variety of small scale tourism business including homestay, dive shop, tour operator, and crafts. Working groups of related local businesses were established to support the local community and to ensure the sustainability of the economic viability and environmental sustainability. In order to analyze the economic benefits of manta ray tourism, this study was conducted to identify the number of local business in Dampier Strait and the economic impacts in terms of local finance security, social, humanity, individual, and physical assets. The results of this study identify 30 homestays, 2 dive shops, 10 tour operators, 30 women involved in crafts, and about 50 villagers worked for dive resorts. In addition to community assets, we confirmed the welfare of community has been improved in terms of food security, households, education for children, savings, and health insurance.

Keywords: marine wildlife tourism, elasmobranch, conservation, ecotourism, co-management, economic viability, environmental sustainability

Procedia PDF Downloads 197
2826 Hydrodynamic Analysis with Heat Transfer in Solid Gas Fluidized Bed Reactor for Solar Thermal Applications

Authors: Sam Rasoulzadeh, Atefeh Mousavi

Abstract:

Fluidized bed reactors are known as highly exothermic and endothermic according to uniformity in temperature as a safe and effective mean for catalytic reactors. In these reactors, a wide range of catalyst particles can be used and by using a continuous operation proceed to produce in succession. Providing optimal conditions for the operation of these types of reactors will prevent the exorbitant costs necessary to carry out laboratory work. In this regard, a hydrodynamic analysis was carried out with heat transfer in the solid-gas fluidized bed reactor for solar thermal applications. The results showed that in the fluid flow the input of the reactor has a lower temperature than the outlet, and when the fluid is passing from the reactor, the heat transfer happens between cylinder and solar panel and fluid. It increases the fluid temperature in the outlet pump and also the kinetic energy of the fluid has been raised in the outlet areas.

Keywords: heat transfer, solar reactor, fluidized bed reactor, CFD, computational fluid dynamics

Procedia PDF Downloads 156
2825 Computational Chemical-Composition of Carbohydrates in the Context of Healthcare Informatics

Authors: S. Chandrasekaran, S. Nandita, M. Shivathmika, Srikrishnan Shivakumar

Abstract:

The objective of the research work is to analyze the computational chemical-composition of carbohydrates in the context of healthcare informatics. The computation involves the representation of complex chemical molecular structure of carbohydrate using graph theory and in a deployable Chemical Markup Language (CML). The parallel molecular structure of the chemical molecules with or without other adulterants for the sake of business profit can be analyzed in terms of robustness and derivatization measures. The rural healthcare program should create awareness in malnutrition to reduce ill-effect of decomposition and help the consumers to know the level of such energy storage mixtures in a quantitative way. The earlier works were based on the empirical and wet data which can vary from time to time but cannot be made to reuse the results of mining. The work is carried out on the quantitative computational chemistry on carbohydrates to provide a safe and secure right to food act and its regulations.

Keywords: carbohydrates, chemical-composition, chemical markup, robustness, food safety

Procedia PDF Downloads 365
2824 Benefits of The ALIAmide Palmitoyl-Glucosamine Co-Micronized with Curcumin for Osteoarthritis Pain: A Preclinical Study

Authors: Enrico Gugliandolo, Salvatore Cuzzocrea, Rosalia Crupi

Abstract:

Osteoarthritis (OA) is one of the most common chronic pain conditions in dogs and cats. OA pain is currently viewed as a mixed phenomenon involving both inflammatory and neuropathic mechanisms at the peripheral (joint) and central (spinal and supraspinal) levels. Oxidative stress has been implicated in OA pain. Although nonsteroidal anti-inflammatory drugs are commonly prescribed for OA pain, they should be used with caution in pets because of adverse effects in the long term and controversial efficacy on neuropathic pain. An unmet need remains for safe and effective long-term treatments for OA pain. Palmitoyl-glucosamine (PGA) is an analogue of the ALIAamide palmitoylethanolamide, i.e., a body’s own endocannabinoid-like compound playing a sentinel role in nociception. PGA, especially in the micronized formulation, was shown safe and effective in OA pain. The aim of this study was to investigate the effect of a co-micronized formulation of PGA with the natural antioxidant curcumin (PGA-cur) on OA pain. Ten Sprague-Dawley male rats were used for each treatment group. The University of Messina Review Board for the care and use of animals authorized the study. On day 0, rats were anesthetized (5.0% isoflurane in 100% O2) and received intra-articular injection of MIA (3 mg in 25 μl saline) in the right knee joint, with the left being injected an equal volume of saline. Starting the third day after MIA injection, treatments were administered orally three times per week for 21 days, at the following doses: PGA 20 mg/kg, curcumin 10 mg/kg, PGA-cur (2:1 ratio) 30 mg/kg. On day 0 and 3, 7, 14 and 21 days post-injection, mechanical allodynia was measured using a dynamic plantar Von Frey hair aesthesiometer and expressed as paw withdrawal threshold (PWT) and latency (PWL). Motor functional recovery of the rear limb was evaluated on the same time points by walking track analysis using the sciatic functional index. On day 21 post-MIA injection, the concentration of the following inflammatory and nociceptive mediators was measured in serum using commercial ELISA kits: tumor necrosis factor alpha (TNF-α), interleukin-1 beta (IL-1β), nerve growth factor (NGF) and matrix metalloproteinase-1-3-9 (MMP-1, MMP-3, MMP-9). The results were analyzed by ANOVA followed by Bonferroni post-hoc test for multiple comparisons. Micronized PGA reduced neuropathic pain, as shown by the significant higher PWT and PWL values compared to vehicle group (p < 0.0001 for all the evaluated time points). The effect of PGA-cur was superior at all time points (p < 0.005). PGA-cur restored motor function already on day 14 (p < 0.005), while micronized PGA was effective a week later (D21). MIA-induced increase in the serum levels of all the investigated mediators was inhibited by PGA-cur (p < 0.01). PGA was also effective, except on IL-1 and MMP-3. Curcumin alone was inactive in all the experiments at any time point. The encouraging results suggest that PGA-cur may represent a valuable option in OA pain management and warrant further confirmation in well-powered clinical trials.

Keywords: ALIAmides, curcumin, osteoarthritis, palmitoyl-glucosamine

Procedia PDF Downloads 97
2823 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 77
2822 An Amphibious House for Flood Prone Areas in Godavari River Basin

Authors: Gangadhara Rao K.

Abstract:

In Andhra Pradesh traditionally, the flood problem had been confined to the flooding of smaller rivers. But the drainage problem in the coastal delta zones has worsened, multiplying the destructive potential of cyclones and increasing flood hazards. As a result of floods, the people living around these areas are forced to move out of their traditions in search of higher altitude places. This paper will be discussing about suitability of techniques used in Bangladesh in context of Godavari river basin in Andhra Pradesh. The study considers social, physical and environmental conditions of the region. The methods for achieving this objective includes the study of both cases from Bangladesh and Andhra Pradesh. Comparison with the existing techniques and suit to our requirements and context. If successful, we can adopt those techniques and this might help the people living in riverfront areas to stay safe during the floods without losing their traditional lands.

Keywords: amphibious, bouyancy, floating, architecture, flood resistent

Procedia PDF Downloads 157
2821 Hampering The 'Right to Know': Consequences of the Excessive Interpretation of the Notion of Exemption from the Right to Information

Authors: Tomasz Lewinski

Abstract:

The right to know becomes gradually recognised as an increasing number of states adopts national legislations regarding access to state-held information. Laws differ from each other in the scope of the right to information (hereinafter: RTI). In all regimes of RTI, there are exceptions from the general notion of the right. States’ authorities too often use exceptions to justify refusals to requests for state-held information. This paper sets out how states hamper RTI basing on the notion of exception and by not providing an effective procedure that could redress unlawful denials. This paper bases on two selected examples of RTI incorporation into the national legal regime, United Kingdom, and South Africa. It succinctly outlines the international standard given in Article 19 of the International Covenant on Civil and Political Rights (hereinafter: ICCPR) and its influence on the RTI in selected countries. It shortly demonstrates as a background to further analysis the Human Rights Committee’s jurisprudence and standards articulated by successive Special Rapporteurs on freedom of opinion and expression. Subsequently, it presents a brief comparison of these standards with the regional standards, namely the African Charter on Human and Peoples' Rights and the European Convention on Human Rights. It critically discusses the regimes of exceptions in RTI legislations in respective national laws. It shows how excessive these regimes are, what implications they have for the transparency in general. Also, the objective is to divide exceptions enumerated in legislations of selected states in relation to exceptions provided in Article 19 of the ICCPR. Basing on the established division of exceptions by its natures, it compares both regimes of exceptions related to the principle of national security. That is to compare jurisprudence of domestic courts, and overview practices of states’ authorities applied to RTI requests. The paper evaluates remedies available in legislations, including contexts of the length and costs of the subsequent proceedings. This provides a general assessment of the given mechanisms and present potential risks of its ineffectiveness. The paper relies on examination of the national legislations, comments of the credible non-governmental organisations (e.g. The Public's Right to Know Principles on Freedom of Information Legislation by the Article 19, The Tshwane Principles on National Security and the Right to Information), academics and also the research of the relevant judgements delivered by domestic and international courts. Conclusion assesses whether selected countries’ legislations go in line with international law and trends, whether the jurisprudence of the regional courts provide appropriate benchmarks for national courts to address RTI issues effectively. Furthermore, it identifies the largest disadvantages of current legislations and to what outcomes it leads in domestic courts jurisprudences. In the end, it provides recommendations and policy arguments for states to improve transparency and support local organisations in their endeavours to establish more transparent states and societies.

Keywords: access to information, freedom of information, national security, right to know, transparency

Procedia PDF Downloads 198
2820 Eco-Agriculture for Effective Solid Waste Management in Minna, Nigeria

Authors: A. Abdulkadir, Y. M. Bello, A. A. Okhimamhe, H. Ibrahim, M. B. Matazu, L. S. Barau

Abstract:

The increasing volume of solid waste generated, collected and disposed daily complicate adequate management of solid waste by the relevant agency like Niger State Environmental Protection Agency (NISEPA). In addition, the impacts of solid waste on the natural environment and human livelihood require identification of cost-effective ways for sustainable municipal waste management in Nigeria. These signal the need for identifying environment-friendly initiative and local solution to address municipal solid waste. A research field was secured at Pago, Minna, Niger State which is located in the guinea savanna belt of Nigeria, within longitude 60 3614311- 4511 and latitude 90 291 37.6111- .6211 N. Poultry droppings, decomposed household waste manure and NPK treatment were used. The experimental field was divided into three replications and four (4) treatments on each replication making a total of twelve (12) plots. The treatments were allotted using Randomized Complete Block Design (RCBD) and Data collected was analyzed using SPSS software and RCBD. The result depicts variation in plant height and number of leaves at 50% flowering; Poultry dropping records the highest height as a number of leaves for waste manure competes fairly well with NPK treatment. Similarly, the varying treatments significantly increase vegetable yield, as the control (Nontreatment) records the least yield for the three vegetable samples. Adoption of this organic manure for cultivation does not only enhance environment quality and attainment of food security but will contribute to local economic development, poverty alleviation, and social inclusion.

Keywords: environmental issues, food security, NISEPA, solid waste

Procedia PDF Downloads 329
2819 Occurence And Management Of Coliform Bacteria On Tomatoes

Authors: Cho Achidi

Abstract:

Tomato is a crucial food crop significantly contributes to global food and nutrition security. However, postharvest losses severely limit its role. Therefore, it is necessary to develop sustainable strategies to minimize these losses and improve the shelf-life of tomato fruits. One of the major concerns is bacterial infections, particularly by faecal coliform bacteria, which can cause food poisoning and illnesses like diarrhoea and dysentery. This study seeks to identify the presence of coliform bacteria on tomato fruits in fields and markets in Muea, Buea Municipality. The study also evaluated different management strategies to reduce the bacterial incidence and load on tomato fruits. A total of 200 fruits were sampled for both the coliform survey and shelf-life analysis. Ten farmers and traders provided samples, including asymptomatic and symptomatic tomato fruits. The samples designated for shelf-life analysis were treated with Aquatab, warm water, lemon, and onion. The results indicated that out of the 80 symptomatic samples collected, 12.5% contained faecal and total coliform species. Among the ten farms sampled, 14% were infected with coliform bacteria, with the highest infestation rate of 60% recorded in field 4. Furthermore, 15% of the asymptomatic tomato fruits were found to be infected by coliform bacteria. Regarding the management strategies, Aquatabs exhibited the highest efficacy in reducing the incidence of coliform bacteria on tomato fruits, followed by onion and lemon extracts. Although hot water treatment effectively removed bacteria from the fruits, damaging the cell wall negatively affected their shelf-life. Overall, this study emphasizes the severity of coliform bacterial pathogens in the Muea area, particularly their occurrence on asymptomatic tomatoes, which poses a significant concern for plant quarantine services. It also demonstrates potential options for mitigating this bacterial challenge.

Keywords: tomato, shelf-life analysis, food and nutrition security, coliform bbacteria

Procedia PDF Downloads 57