Search results for: internet protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2651

Search results for: internet protocol

1091 Effect of Scrotal Circumference on Freezability of Bangladeshi Crossbred Bulls

Authors: Ajeet K. Jha, Pankaj K. Jha, Pravin Mishra

Abstract:

The study was conducted to evaluate the freezability of crossbred bulls’ semen at early age. Semen of three consecutive collections at 7 days interval from 12 crossbred bulls 17 was evaluated. The age at first collection was 15 to 20 months. Evaluation of semen was done soon after collection. Triladyl, Minitub, Germany was used as extender and was frozen using standard semen freezing protocol. Post-thaw sperm motility was evaluated. Morphology of paraformaldehyde fixed spermatozoa was evaluated under differential interference phase contrast microscopy and the viability of spermatozoa was evaluated by using stain SYBR-14 (1 mM/ml) and propidium iodide (2.41 mM/ml) under an epifluorescent microscopy. Scrotal circumference was correlated with all possible measures in all groups of crossbred bulls. Volume of semen, sperm concentration, total number of spermatozoa, initial sperm motility, post-thaw sperm motility, proportion of normal spermatozoa and proportion of live spermatozoa were compared among individual bull within and between two groups of crossbred bulls. A significant positive correlation was observed between scrotal circumference and volume of semen and between scrotal circumference and the total number of sperm production per ejaculate (r = 0.72, p < 0.04). Significant variation was observed in different semen parameters among individual bulls within the same group (p < 0.05) but no significant variation was found between two groups of crossbred bulls. Out of 12 bulls, semen freezability of 10 bulls was found satisfactory while semen of 2 bulls (Local × Friesian) was unsatisfactory. In conclusion, crossbred bulls aged 18 months having scrotal circumference > 30 cm produce freezable quality semen.

Keywords: Bangladesh, crossbred bull, scrotal circumference, semen freezability

Procedia PDF Downloads 163
1090 Towards Printed Green Time-Temperature Indicator

Authors: Mariia Zhuldybina, Ahmed Moulay, Mirko Torres, Mike Rozel, Ngoc-Duc Trinh, Chloé Bois

Abstract:

To reduce the global waste of perishable goods, a solution for monitoring and traceability of their environmental conditions is needed. Temperature is the most controllable environmental parameter determining the kinetics of physical, chemical, and microbial spoilage in food products. To store the time-temperature information, time-temperature indicator (TTI) is a promising solution. Printed electronics (PE) has shown a great potential to produce customized electronic devices using flexible substrates and inks with different functionalities. We propose to fabricate a hybrid printed TTI using environmentally friendly materials. The real-time TTI profile can be stored and transmitted to the smartphone via Near Field Communication (NFC). To ensure environmental performance, Canadian Green Electronics NSERC Network is developing green materials for the ink formulation with different functionalities. In terms of substrate, paper-based electronics has gained the great interest for utilization in a wide area of electronic systems because of their low costs in setup and methodology, as well as their eco-friendly fabrication technologies. The main objective is to deliver a prototype of TTI using small-scale printed techniques under typical printing conditions. All sub-components of the smart labels, including a memristor, a battery, an antenna compatible with NFC protocol, and a circuit compatible with integration performed by an offsite supplier will be fully printed with flexography or flat-bed screen printing.

Keywords: NFC, printed electronics, time-temperature indicator, hybrid electronics

Procedia PDF Downloads 137
1089 Prevalence of Anxiety and Depression: A Descriptive Cross-Sectional Study among Individuals with Substance-Related Disorders in Argentina

Authors: Badino Manuel, Farias María Alejandra

Abstract:

Anxiety and depression are considered the main mental health issues found in people with substance-related disorders. Furthermore, substance-related disorders, anxiety-related and depressive disorders are among the leading causes of disability and are associated with increased mortality. The co-occurrence of substance-related disorders and these mental health conditions affect the accuracy in diagnosis, treatment plan, and recovery process. The aim is to describe the prevalence of anxiety and depression in patients with substance-related disorders in a mental health service in Córdoba, Argentina. A descriptive cross-sectional study was conducted among patients with substance-related disorders (N=305). Anxiety and depression were assessed using the Patient Health Questionnaire-4 (PHQ-4) during the period from December 2021 to March 2022. For a total of 305 participants, 71,8% were male, 25,6% female and 2,6% non-binary. As regards marital status, 51,5% were single, 21,6% as a couple, 5,9% married, 15,4% separated and 5,6% divorced. In relation to education status, 26,2% finished university, 56,1% high school, 16,4% only primary school and 1,3% no formal schooling. Regarding age, 10,8% were young, 84,3% were adults, and 4,9% were elderly. In-person treatment represented 64,6% of service users, and 35,4% were conducted through teleconsultation. 15,7% of service users scored 3 or higher for anxiety, and 32,1% scored 3 or higher for depression in the PHQ-4. 13,1% obtained a score of 3 or higher for both anxiety and depression. It is recommended to identify anxiety and depression among patients with substance-related disorders to improve the quality of diagnosis, treatment, and recovery. It is suggested to apply PHQ-4, PHQ-9 within the protocol of care for these patients.

Keywords: addiction, anxiety, depression, mental health

Procedia PDF Downloads 84
1088 The Role of Interactive White Boards towards Achieving Transactional Learning in the Context of Open Distance Learning

Authors: M. Van Zyl, M. H. A. Combrinck, E. J. Spamer

Abstract:

Due to the need for higher education in South Africa, the country experiences a rapid growth in open distance learning, especially in rural areas. It is difficult for people to enrol fulltime at contact universities, owing to work and financial constraints. The Unit for Open Distance Learning (UODL) at the North-West University (NWU), Potchefstroom campus, South Africa was established in 2013 with its main function to deliver open distance learning programmes to 30 000 students from the Faculties of Education Sciences, Theology and Health Sciences. With the use of interactive whiteboards (IWBs), the NWU and UODL are now able to deliver lectures to students concurrently at 60 regional open learning centres across Southern Africa as well as to an unlimited number of individuals with Internet access worldwide. Although IWBs are not new, our initiative is to use them more extensively in order to create more contact between lecturers and students. To be able to ensure and enhance quality education it is vital to determine students’ perceptions on the delivery of programmes by means of IWBs. Therefore, the aim of the study is to explore students’ perceptions for the use of IWBs in the delivery of programmes in terms of Moore’s Theory of Transactional Distance.

Keywords: interactive white board, open distance learning, technology, transactional learning

Procedia PDF Downloads 438
1087 Allopurinol Prophylactic Therapy in the Prevention of Contrast Induced Nephropathy in High Risk Patients Undergoing Coronary Angiography: A Prospective Randomized Controlled Trial

Authors: Seyed Fakhreddin Hejazi, Leili Iranirad, Mohammad Sadeghi, Mohsen Talebizadeh

Abstract:

Background: Contrast-induced nephropathy (CIN) remains to be a potentially serious complication of radiographic procedures. We performed this clinical trial to assess the preventive effect of allopurinol against CIN in high-risk patients undergoing coronary angiography. Methods: In this prospective randomized controlled trial, 140 patients with at least two risk factors for CIN undergoing coronary angiography were randomly assigned to either the allopurinol group or the control group. Patients in the allopurinol group received 300 mg allopurinol 24 hours before a procedure and intravenous hydration for 12 hours before and after coronary angiography, whereas patients in the control group received intravenous hydration. Serum creatinine (SCr), blood urea nitrogen (BUN) and uric acid were measured before contrast exposure and at 48 hours. CIN was defined as an increase of 25% in serum creatinine (SCr) or >0.5 mg/dl 48 hours after contrast administration. Results: CIN occurred in 11 out of 70 (7.9%) patients in the control group and in 8 out of 70 (5.7%) patients in the allopurinol group. There was no significant difference in the incidence of CIN between the two groups at 48 hours after administering the radiocontrast agent (p = 0.459). However, there were significant differences between the two groups in SCr, BUN, uric acid, and eGFR 48 hours after radiocontrast administration (p < 0.05). Conclusion: Our findings revealed that allopurinol had no substantial efficacy over hydration protocol in high-risk patients for the development of CIN.

Keywords: contrast-induced nephropathy, allopurinol, coronary angiography, contrast agent

Procedia PDF Downloads 227
1086 Empirical Evaluation of Game Components Based on Learning Theory: A Preliminary Study

Authors: Seoi Lee, Dongjoo Chin, Heewon Kim

Abstract:

Gamification refers to a technique that applies game elements to non-gaming elements, such as education and exercise, to make people more engaged in these behaviors. The purpose of this study was to identify effective elements in gamification for changing human behaviors. In order to accomplish this purpose, a survey based on learning theory was developed, especially for assessing antecedents and consequences of behaviors, and 8 popular and 8 unpopular games were selected for comparison. A total of 407 adult males and females were recruited via crowdsourcing Internet marketplace and completed the survey, which consisted of 19 questions for antecedent and 14 questions for consequences. Results showed no significant differences in consequence questions between popular and unpopular games. For antecedent questions, popular games are superior to unpopular games in character customization, play type selection, a sense of belonging, patch update cycle, and influence or dominance. This study is significant in that it reveals the elements of gamification based on learning theory. Future studies need to empirically validate whether these factors affect behavioral change.

Keywords: gamification, learning theory, antecedent, consequence, behavior change, behaviorism

Procedia PDF Downloads 203
1085 Design and Implementation of Medium Access Control Based Routing on Real Wireless Sensor Networks Testbed

Authors: Smriti Agarwal, Ashish Payal, B. V. R. Reddy

Abstract:

IEEE 802.15.4 is a Low Rate Wireless Personal Area Networks (LR-WPAN) standard combined with ZigBee, which is going to enable new applications in Wireless Sensor Networks (WSNs) and Internet of Things (IoT) domain. In recent years, it has become a popular standard for WSNs. Wireless communication among sensor motes, enabled by IEEE 802.15.4 standard, is extensively replacing the existing wired technology in a wide range of monitoring and control applications. Researchers have proposed a routing framework and mechanism that interacts with the IEEE 802.15.4 standard using software platform. In this paper, we have designed and implemented MAC based routing (MBR) based on IEEE 802.15.4 standard using a hardware platform “SENSEnuts”. The experimental results include data through light and temperature sensors obtained from communication between PAN coordinator and source node through coordinator, MAC address of some modules used in the experimental setup, topology of the network created for simulation and the remaining battery power of the source node. Our experimental effort on a WSN Testbed has helped us in bridging the gap between theoretical and practical aspect of implementing IEEE 802.15.4 for WSNs applications.

Keywords: IEEE 802.15.4, routing, WSN, ZigBee

Procedia PDF Downloads 382
1084 A Wireless Sensor System for Continuous Monitoring of Particulate Air Pollution

Authors: A. Yawootti, P. Intra, P. Sardyoung, P. Phoosomma, R. Puttipattanasak, S. Leeragreephol, N. Tippayawong

Abstract:

The aim of this work is to design, develop and test the low-cost implementation of a particulate air pollution sensor system for continuous monitoring of outdoors and indoors particulate air pollution at a lower cost than existing instruments. In this study, measuring electrostatic charge of particles technique via high efficiency particulate-free air filter was carried out. The developed detector consists of a PM10 impactor, a particle charger, a Faraday cup electrometer, a flow meter and controller, a vacuum pump, a DC high voltage power supply and a data processing and control unit. It was reported that the developed detector was capable of measuring mass concentration of particulate ranging from 0 to 500 µg/m3 corresponding to number concentration of particulate ranging from 106 to 1012 particles/m3 with measurement time less than 1 sec. The measurement data of the sensor connects to the internet through a GSM connection to a public cellular network. In this development, the apparatus was applied the energy by a 12 V, 7 A internal battery for continuous measurement of about 20 hours. Finally, the developed apparatus was found to be close agreement with the import standard instrument, portable and benefit for air pollution and particulate matter measurements.

Keywords: particulate, air pollution, wireless communication, sensor

Procedia PDF Downloads 344
1083 A Literature Review on Virtual Interventions for Midlife Women

Authors: Daniel D'Souza, Ping Zou

Abstract:

The period before, during, and after menopause is a sensitive time for women as they experience intense physical and psychological health changes and symptoms. These changes accompany the hormonal changes that mark the end of a woman’s reproductive age. To help mitigate and cope with these changes, prompt and correct treatment is needed. eHealth has emerged as a branch of telemedicine in the past few decades as an alternate avenue for patients to receive care quickly and conveniently, as it relies on the Internet and computers. Within the past few years, eHealth has also given rise to mHealth, which is the use of personal mobile devices to receive treatment and care. However, there is a lack of study on their use for menopause. This review aimed to review and summarize the literature for eHealth or mHealth and menopause. Several databases related to women’s health and digital health were searched for original studies about eHealth or mHealth and menopause. The search yielded 25 results. The results were generally positive, with these interventions being feasible and having positive effects on physical and psychosocial outcomes. However, several issues were raised regarding their design process that may inadvertently prevent these interventions from addressing the needs of all potential users. Therefore, while eHealth and mHealth certainly represent a future model of healthcare delivery for menopausal women, further research and design modifications are needed before this can happen.

Keywords: eHealth, menopause, mHealth, midlife women

Procedia PDF Downloads 121
1082 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 152
1081 Optimizing Microwave Assisted Extraction of Anti-Diabetic Plant Tinospora cordifolia Used in Ayush System for Estimation of Berberine Using Taguchi L-9 Orthogonal Design

Authors: Saurabh Satija, Munish Garg

Abstract:

Present work reports an efficient extraction method using microwaves based solvent–sample duo-heating mechanism, for the extraction of an important anti-diabetic plant Tinospora cordifolia from AYUSH system for estimation of berberine content. The process is based on simultaneous heating of sample matrix and extracting solvent under microwave energy. Methanol was used as the extracting solvent, which has excellent berberine solubilizing power and warms up under microwave attributable to its great dispersal factor. Extraction conditions like time of irradition, microwave power, solute-solvent ratio and temperature were optimized using Taguchi design and berberine was quantified using high performance thin layer chromatography. The ranked optimized parameters were microwave power (rank 1), irradiation time (rank 2) and temperature (rank 3). This kind of extraction mechanism under dual heating provided choice of extraction parameters for better precision and higher yield with significant reduction in extraction time under optimum extraction conditions. This developed extraction protocol will lead to extract higher amounts of berberine which is a major anti-diabetic moiety in Tinospora cordifolia which can lead to development of cheaper formulations of the plant Tinospora cordifolia and can help in rapid prevention of diabetes in the world.

Keywords: berberine, microwave, optimization, Taguchi

Procedia PDF Downloads 317
1080 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 109
1079 Unlocking the Puzzle of Borrowing Adult Data for Designing Hybrid Pediatric Clinical Trials

Authors: Rajesh Kumar G

Abstract:

A challenging aspect of any clinical trial is to carefully plan the study design to meet the study objective in optimum way and to validate the assumptions made during protocol designing. And when it is a pediatric study, there is the added challenge of stringent guidelines and difficulty in recruiting the necessary subjects. Unlike adult trials, there is not much historical data available for pediatrics, which is required to validate assumptions for planning pediatric trials. Typically, pediatric studies are initiated as soon as approval is obtained for a drug to be marketed for adults, so with the adult study historical information and with the available pediatric pilot study data or simulated pediatric data, the pediatric study can be well planned. Generalizing the historical adult study for new pediatric study is a tedious task; however, it is possible by integrating various statistical techniques and utilizing the advantage of hybrid study design, which will help to achieve the study objective in a smoother way even with the presence of many constraints. This research paper will explain how well the hybrid study design can be planned along with integrated technique (SEV) to plan the pediatric study; In brief the SEV technique (Simulation, Estimation (using borrowed adult data and applying Bayesian methods)) incorporates the use of simulating the planned study data and getting the desired estimates to Validate the assumptions.This method of validation can be used to improve the accuracy of data analysis, ensuring that results are as valid and reliable as possible, which allow us to make informed decisions well ahead of study initiation. With professional precision, this technique based on the collected data allows to gain insight into best practices when using data from historical study and simulated data alike.

Keywords: adaptive design, simulation, borrowing data, bayesian model

Procedia PDF Downloads 55
1078 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 324
1077 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 314
1076 Towards Reliable Mobile Cloud Computing

Authors: Khaled Darwish, Islam El Madahh, Hoda Mohamed, Hadia El Hennawy

Abstract:

Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers.

Keywords: cloud computing, mobile cloud computing, reliability, availability, OpenStack

Procedia PDF Downloads 378
1075 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 397
1074 The Effects of Three Months of HIIT on Plasma Adiponectin on Overweight College Men

Authors: M. J. Pourvaghar, M. E. Bahram, M. Sayyah, Sh. Khoshemehry

Abstract:

Adiponectin is a cytokine secreted by the adipose tissue that functions as an anti-inflammatory, antiathrogenic and anti-diabetic substance. Its density is inversely correlated with body mass index. The purpose of this research was to examine the effect of 12 weeks of high intensity interval training (HIIT) with the level of serum adiponectin and some selected adiposity markers in overweight and fat college students. This was a clinical research in which 24 students with BMI between 25 kg/m2 to 30 kg/m2. The sample was purposefully selected and then randomly assigned into two groups of experimental (age =22.7±1.5 yr.; weight = 85.8±3.18 kg and height =178.7±3.29 cm) and control (age =23.1±1.1 yr.; weight = 79.1±2.4 kg and height =181.3±4.6 cm), respectively. The experimental group participated in an aerobic exercise program for 12 weeks, three sessions per weeks at a high intensity between 85% to 95% of maximum heart rate (considering the over load principle). Prior and after the termination of exercise protocol, the level of serum adiponectin, BMI, waist to hip ratio, and body fat percentages were calculated. The data were analyzed by using SPSS: PC 16.0 and statistical procedure such as ANCOVA, was used. The results indicated that 12 weeks of intensive interval training led to the increase of serum adiponectin level and decrease of body weight, body fat percent, body mass index and waist to hip ratio (P < 0.05). Based on the results of this research, it may be concluded that participation in intensive interval training for 12 weeks is a non-invasive treatment to increase the adiponectin level while decreasing some of the anthropometric indices associated with obesity or being overweight.

Keywords: adiponectin, cardiovascular, interval, overweight, training

Procedia PDF Downloads 299
1073 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 91
1072 Evaluation of Opposite Type Heterologous MAT Genes Transfer in the Filamentous Fungi Neofusicoccum mediterraneum and Verticillium dahliae

Authors: Stavros Palavouzis, Alexandra Triantafyllopoulou, Aliki Tzima, Epaminondas Paplomatas

Abstract:

Mating-type genes are present in most filamentous fungi, even though teleomorphs for all species have not been recorded. Our study tries to explore the effect of different growth conditions on the expression of MAT genes in Neofusicoccum mediterraneum. As such, selected isolates were grown in potato dextrose broth or in water agar supplemented with pine needles under a 12 h photoperiod, as well as in constant darkness. Mycelia and spores were collected at different time points, and RNA extraction was performed, with the extracted product being used for cDNA synthesis. New primers for MAT gene expression were designed while qPCR results are underway. The second part of the study involved the isolation and cloning in a selected pGEM-T vector of the Botryosphaeria dothidea MAT1 1 1 and MAT1 2 1 mating genes, including flanking regions. As a next step, the genes were amplified using newly designed primers with engineered restriction sites. Amplicons were excised and subsequently sub-cloned in appropriate binary vectors. The constructs were afterward inserted into Agrobacterium tumefaciens and utilized for Agrobacterium-mediated transformation (ATMT) of Neofusicoccum mediterraneum. At the same time, the transformation of a Verticillium dahliae tomato race 1 strain (70V) was performed as a control. While the procedure was successful in regards to V. dahliae, transformed strains of N. mediterraneum could not be obtained. At present, a new transformation protocol, which utilizes a combination of protoplast and Agro transformation, is being evaluated.

Keywords: anamorph, heterothallism, perithecia, pycnidia, sexual stage

Procedia PDF Downloads 162
1071 An Experience of Translating an Excerpt from Sophie Adonon’s Echos de Femmes from French to English, Using Reverso.

Authors: Michael Ngongeh Mombe

Abstract:

This Paper seeks to investigate an assertion made by some colleagues that there is no need paying a human translator to translate their literary texts, that there are softwares such as Reverso that can be used to do the translation. The main objective of this study is to examine the veracity of this assertion using Reverso to translate a literary text without any post-editing by a human translator. The work is based on two theories: Skopos and Communicative theories of translation. The work is a documentary research where data were collected from published documents in libraries, on the internet and from the translation produced by Reverso. We made a comparative text analyses of both source and target texts in a bid to highlight the weaknesses and strengths of the software. Findings of this work revealed that those who advocate the use of only Machine translation do so in ignorance of the translation mistakes usually made by the software. From the review of all the 268 segments of translation, we found out that the translation produced by Reverso is fraught with errors. We therefore recommend the use of human translators to either do the translation of their literary texts or revise the translation produced by machine to conform to the skopos of the work. This paper is based on Reverso translation. Similar works in the near future will be based on the other translation softwares to determine their weaknesses and strengths.

Keywords: machine translation, human translator, Reverso, literary text

Procedia PDF Downloads 73
1070 A Systematic Mapping of the Use of Information and Communication Technology (ICT)-Based Remote Agricultural Extension for Women Smallholders

Authors: Busiswa Madikazi

Abstract:

This systematic mapping study explores the underrepresentation of women's contributions to farming in the Global South within the development of Information and Communication Technologies (ICT)-based extension methods. Despite women farmers constituting 70% of the agricultural labour force, their productivity is hindered by various constraints, including illiteracy, household commitments, and limited access to credit and markets. A systematic mapping approach was employed with the aim of identifying evidence gaps in existing ICT extension for women farmers. The data collection protocol follows a structured approach, incorporating key criteria for inclusion, exclusion, search strategy, and coding and the PICO strategy (Population, Intervention, Comparator, and Outcome). The results yielded 119 articles that qualified for inclusion. The findings highlight that mobile phone apps (WhatsApp) and radio/television programming are the primary extension methods employed while integrating ICT with training, field visits, and demonstrations are underutilized. Notably, the study emphasizes the inadequate attention to critical issues such as food security, gender equality, and attracting youth to farming within ICT extension efforts. These findings indicate a significant policy and practice gap, neglecting community-driven approaches that cater to women's specific needs and enhance their agricultural production. Map highlights the importance of refocusing ICT extension efforts to address women farmers’ unique challenges, thereby contributing to their empowerment and improving agricultural practices.

Keywords: agricultural extension, ICT, women farmers, smallholders

Procedia PDF Downloads 46
1069 Assessment of Human Factors Analysis and Classification System in Construction Accident Prevention

Authors: Zakari Mustapha, Clinton Aigbavboa, Wellington Didi Thwala

Abstract:

Majority of the incidents and accidents in complex high-risk systems that exist in the construction industry and other sectors have been attributed to unsafe acts of workers. The purpose of this paper was to asses Human Factors Analysis and Classification System (HFACS) in construction accident prevention. The study was conducted through the use of secondary data from journals, books and internet to achieve the objective of the study. The review of literature looked into details of different views from different scholars about HFACS framework in accidents investigations. It further highlighted on various sections or disciplines of accident occurrences in human performance within the construction. The findings from literature review showed that unsafe acts of a worker and unsafe working conditions are the two major causes of accident in the construction industry.Most significant factor in the cause of site accident in the construction industry is unsafe acts of a worker. The findings also show how the application of HFACS framework in the investigation of accident will lead to the identification of common trends. Further findings show that provision for the prevention of accident will be made based on past accident records to identify and prioritize where intervention is needed within the construction industry.

Keywords: accident, construction, HFACS, unsafe acts

Procedia PDF Downloads 305
1068 Insecticide Resistance Detection on Filarial Vector, Simulium (Simulium) nobile (Diptera: Simuliidae) in Malaysia

Authors: Chee Dhang Chen, Hiroyuki Takaoka, Koon Weng Lau, Poh Ruey Tan, Ai Chdon Chin, Van Lun Low, Abdul Aziz Azidah, Mohd Sofian-Azirun

Abstract:

Susceptibility status of Simulium (Simulium) nobile (Diptera: Simuliidae) adults obtained from Pahang, Malaysia was evaluated against 11 adulticides representing four major insecticide classes: organochlorines (DDT, dieldrin), organophosphates (malathion, fenitrothion), carbamates (bendiocarb, propoxur) and pyrethroids (etofenprox, deltamethrin, lambdacyhalothrin, permethrin, cyfluthrin). The adult bioassay was conducted according to WHO standard protocol to determine the insecticide susceptibility. Mortality at 24 h post treatment was used as indicator for susceptibility status. The results revealed that S. nobile obtained was susceptible to propoxur, cyfluthrin and bendiocarb with 100% mortality. S. nobile was resistant or exhibited some tolerant against lambdacyhalothrin and deltamethrin with mortality ranged ≥ 90% but < 98%. S. nobile populations in Pahang exhibited different level of resistant against 11 adulticides with mortality ranged from 60.00 ± 10.00 to 100.00 ± 0.00. In conclusion, S. nobile populations in Pahang were susceptible to propoxur, cyfluthrin and bendiocarb. The susceptibility status of S. nobile in descending order was propoxur, cyfluthrin > bendicarb > deltamethrin > lambdacyhalothrin > permethrin > etofenprox > DDT > malathion > fenitrothion > dieldrin. Regular surveys should be conducted to monitor the susceptibility status of this insect vector in order to prevent further development of resistance.

Keywords: black fly, adult bioassay, insecticide resistance, Malaysia

Procedia PDF Downloads 253
1067 Interpreting Privacy Harms from a Non-Economic Perspective

Authors: Christopher Muhawe, Masooda Bashir

Abstract:

With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.

Keywords: data breach and misuse, economic harms, privacy harms, psychological harms

Procedia PDF Downloads 173
1066 Development of Intelligent Construction Management System Using Web-Camera Image and 3D Object Image

Authors: Hyeon-Seung Kim, Bit-Na Cho, Tae-Woon Jeong, Soo-Young Yoon, Leen-Seok Kang

Abstract:

Recently, a construction project has been large in the size and complicated in the site work. The web-cameras are used to manage the construction site of such a large construction project. They can be used for monitoring the construction schedule as compared to the actual work image of the planned work schedule. Specially, because the 4D CAD system that the construction appearance is continually simulated in a 3D CAD object by work schedule is widely applied to the construction project, the comparison system between the real image of actual work appearance by web-camera and the simulated image of planned work appearance by 3D CAD object can be an intelligent construction schedule management system (ICON). The delayed activities comparing with the planned schedule can be simulated by red color in the ICON as a virtual reality object. This study developed the ICON and it was verified in a real bridge construction project in Korea. To verify the developed system, a web-camera was installed and operated in a case project for a month. Because the angle and zooming of the web-camera can be operated by Internet, a project manager can easily monitor and assume the corrective action.

Keywords: 4D CAD, web-camera, ICON (intelligent construction schedule management system), 3D object image

Procedia PDF Downloads 489
1065 Design of SAE J2716 Single Edge Nibble Transmission Digital Sensor Interface for Automotive Applications

Authors: Jongbae Lee, Seongsoo Lee

Abstract:

Modern sensors often embed small-size digital controller for sensor control, value calibration, and signal processing. These sensors require digital data communication with host microprocessors, but conventional digital communication protocols are too heavy for price reduction. SAE J2716 SENT (single edge nibble transmission) protocol transmits direct digital waveforms instead of complicated analog modulated signals. In this paper, a SENT interface is designed in Verilog HDL (hardware description language) and implemented in FPGA (field-programmable gate array) evaluation board. The designed SENT interface consists of frame encoder/decoder, configuration register, tick period generator, CRC (cyclic redundancy code) generator/checker, and TX/RX (transmission/reception) buffer. Frame encoder/decoder is implemented as a finite state machine, and it controls whole SENT interface. Configuration register contains various parameters such as operation mode, tick length, CRC option, pause pulse option, and number of nibble data. Tick period generator generates tick signals from input clock. CRC generator/checker generates or checks CRC in the SENT data frame. TX/RX buffer stores transmission/received data. The designed SENT interface can send or receives digital data in 25~65 kbps at 3 us tick. Synthesized in 0.18 um fabrication technologies, it is implemented about 2,500 gates.

Keywords: digital sensor interface, SAE J2716, SENT, verilog HDL

Procedia PDF Downloads 275
1064 Effect of the Endotracheal Care Nursing Guideline Utilization on the Incidence of Endotracheal Tube Displacement, Oxygen Deficiency after Extubation, Re-intubation, and Nurses Satisfaction

Authors: Rabeab Khunpukdee, Aranya Sukchoui, Nonluk Somgit, Chitima Bunnaul

Abstract:

Endotracheal displacement is a major risk of life threatening among critically ill patients. Standard nursing protocol is needed to minimize this risk and to improve clinical outcomes. To evaluate the effectiveness of the endothacheal care nursing guideline. The incidence rates of endochacheal displacement, oxygen deficiency after extubation, re-intubation, and nurse’s satisfaction on the utilization of the endotracheal care nursing guideline. An evidence-based nursing practice framework was used to develop the endotracheal care nursing guideline. The guideline valid content was review by a 3 panel of experts. The index of item objective (IOC) of the guideline was 0.93. The guideline was implemented in 130 patients (guideline group) and 19 registered nurses at a medicine ward, Had Yai hospital, Thailand. Patient’s outcomes were evaluated by comparison with those 155 patients who received the routine nursing care (routine care group). Descriptive statistics, frequency, percentage, mean, standard deviation and Mann Whitney U-test was analyzed using the computer program. All significantly and better outcomes were found in the guideline group compared to the routine care group. The guideline group has less incidence rates of endotracheal displacement (1.54 % vs 9.03 %, p < 0.05), and none of the guideline group had oxygen deficiency after extubation (0 % vs 83.33%) compared to the routine care group. All of the 2 patients in the guideline group, compared to 6 of 14 patients in the routine care group were re-intubation. The overall rate of re-intubation in the total group (n = 130 vs 155) was seen less in the guideline group than the routine care group (1.54 % vs 3.87). Overall, nurses satisfaction was at high-level (89.50%) on the utilization of the guideline.

Keywords: endotracheal care, nursing guideline, re-intubation, satisfaction

Procedia PDF Downloads 496
1063 Study on Conservation and Regeneration of the Industrial Buildings

Authors: Rungpansa Noichan, Bart Julian Dewancker

Abstract:

The conservation and regeneration of historical industrial building is one of the most important issues to be solved in today’s urban development in the world. There are growing numbers of industrial building in which promoting heritage conservation maybe a helpful tool for a sustainable city in social, urban restructuring, environmental and economic component. This paper identifies the key attributes of conservation and regeneration industrial building from the literature, were discussed by reviewing its development at home and abroad. The authors have investigated 93 industrial buildings, which were used as industrial building before and reused into buildings with another function afterward. The data to be discussed below were mainly collected from various publications but also from available internet sources. This study focuses on green transformation, historical culture heritage, transformation techniques, and urban regeneration based on the empirical researches on the historical industrial building and site. Moreover, we focus on social, urban environment and sustainable development. The implications of the study provide suggestions for future improvements in the conservation and regeneration of historical industrial building, and inspire new ways of use, so the building becomes flexible and can consequently be adaptable to changes in order to survive time. Therefore, the building does not take into account only its future impact in the environment and society. Instead, it focuses on its entire life cycle.

Keywords: industrial building, heritage conservation, green transformation, regeneration, sustainable development

Procedia PDF Downloads 349
1062 Effect of Post Circuit Resistance Exercise Glucose Feeding on Energy and Hormonal Indexes in Plasma and Lymphocyte in Free-Style Wrestlers

Authors: Miesam Golzadeh Gangraj, Younes Parvasi, Mohammad Ghasemi, Ahmad Abdi, Saeid Fazelifar

Abstract:

The purpose of the study was to determine the effect of glucose feeding on energy and hormonal indexes in plasma and lymphocyte immediately after wrestling – base techniques circuit exercise (WBTCE) in young male freestyle wrestlers. Sixteen wrestlers (weight = 75/45 ± 12/92 kg, age = 22/29 ± 0/90 years, BMI = 26/23 ± 2/64 kg/m²) were randomly divided into two groups: control (water), glucose (2 gr per kg body weight). Blood samples were obtained before, immediately, and 90 minutes of the post-exercise recovery period. Glucose (2 g/kg of body weight, 1W/5V) and water (equal volumes) solutions were given immediately after the second blood sampling. Data were analyzed by using an ANOVA (a repeated measure) and a suitable post hoc test (LSD). A significant decrease was observed in lymphocytes glycogen immediately after exercise (P < 0.001). In the experimental group, increase Lymphocyte glycogen concentration (P < 0.028) than in the control group in 90 min post-exercise. Plasma glucose concentrations increased in all groups immediately after exercise (P < 0.05). Plasma insulin concentrations in both groups decreased immediately after exercise, but at 90 min after exercise, its level was significantly increased only in glucose group (P < 0.001). Our results suggested that WBTCE protocol could be affected cellular energy sources and hormonal response. Furthermore, Glucose consumption can increase the lymphocyte glycogen and better energy within the cell.

Keywords: glucose feeding, lymphocyte, Wrestling – base techniques circuit , exercise

Procedia PDF Downloads 252