Search results for: human factor in security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15192

Search results for: human factor in security

13602 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 67
13601 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
13600 Satisfaction Level of Teachers on the Human Resource Management Practices

Authors: Mark Anthony A. Catiil

Abstract:

Teachers are the principal actors in the delivery of quality education to the learners. Unfortunately, as time goes by, some of them got low motivation at work. Absenteeism, tardiness, under time, and non-compliance to school policies are some of the end results. There is, therefore, a need to review the different human resource management practices of the school that contribute to teachers’ work satisfaction and motivation. Hence, this study determined the level of satisfaction of teachers on the human resource management practices of Gingoog City Comprehensive National High School. This mixed-methodology research was focused on the 45 teachers chosen using a stratified random sampling technique. Reliability-tested questionnaires, interviews, and focus group discussions were used to gather the data. Results revealed that the majority of the respondents are female, Teacher I, with MA units and have served for 11-20 years. Likewise, among the human resource management practices of the school, the respondents rated the lowest satisfaction on recruitment and selection (mean=2.15; n=45). This could mean that most of the recruitment and selection practices of the school are not well communicated, disseminated, and implemented. On the other hand, retirement practices of the school were rated with the highest satisfaction among the respondents (mean=2.73; n=45). This could mean that most of the retirement practices of the school are communicated, disseminated, implemented, and functional. It was recommended that the existing human resource management practices on recruitment and selection be reviewed to find out its deficiencies and possible improvement. Moreover, future researchers may also conduct a study between private and public schools in Gingoog City on the same topic for comparison.

Keywords: education, human resource management practices, satisfaction, teachers

Procedia PDF Downloads 128
13599 The Historical Framework of International Crime in International Criminal Law

Authors: Tahraoui Boualem

Abstract:

Researching the historical framework of international crime means examining the historical facts that have contributed to uncovering this serious crime affecting international interests, and the law by which the study of the subject of international crime is determined is international criminal law, which is a branch of public international law. In this context, the historical study of international crime means recognizing the existence of an international community governed by international law, which makes us acknowledge that ancient societies lacked such stable and recurring international relations. Therefore, an attempt to monitor international crime in those ancient societies is only to demonstrate a historical fact that those societies have known some features of this crime, and have contributed in one way or another to the development of international criminal law without defining its concept or legal nature. The international community has affirmed the principle of establishing peace, achieving security, and respecting human rights. As a basis for friendly relations between the people of the international community and in case of prejudice, such as the aggressors breaching the obligations imposed on them, whether in time of peace or war.

Keywords: historical framework, of international crime, peace or war., international law

Procedia PDF Downloads 100
13598 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion

Authors: Yuval Reinfeld

Abstract:

This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.

Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power

Procedia PDF Downloads 24
13597 Ligandless Extraction and Determination of Trace Amounts of Lead in Pomegranate, Zucchini and Lettuce Samples after Dispersive Liquid-Liquid Microextraction with Ultrasonic Bath and Optimization of Extraction Condition with RSM Design

Authors: Fariba Tadayon, Elmira Hassanlou, Hasan Bagheri, Mostafa Jafarian

Abstract:

Heavy metals are released into water, plants, soil, and food by natural and human activities. Lead has toxic roles in the human body and may cause serious problems even in low concentrations, since it may have several adverse effects on human. Therefore, determination of lead in different samples is an important procedure in the studies of environmental pollution. In this work, an ultrasonic assisted-ionic liquid based-liquid-liquid microextraction (UA-IL-DLLME) procedure for the determination of lead in zucchini, pomegranate, and lettuce has been established and developed by using flame atomic absorption spectrometer (FAAS). For UA-IL-DLLME procedure, 10 mL of the sample solution containing Pb2+ was adjusted to pH=5 in a glass test tube with a conical bottom; then, 120 μL of 1-Hexyl-3-methylimidazolium hexafluoro phosphate (CMIM)(PF6) was rapidly injected into the sample solution with a microsyringe. After that, the resulting cloudy mixture was treated by ultrasonic for 5 min, then the separation of two phases was obtained by centrifugation for 5 min at 3000 rpm and IL-phase diluted with 1 cc ethanol, and the analytes were determined by FAAS. The effect of different experimental parameters in the extraction step including: ionic liquid volume, sonication time and pH was studied and optimized simultaneously by using Response Surface Methodology (RSM) employing a central composite design (CCD). The optimal conditions were determined to be an ionic liquid volume of 120 μL, sonication time of 5 min, and pH=5. The linear ranges of the calibration curve for the determination by FAAS of lead were 0.1-4 ppm with R2=0.992. Under optimized conditions, the limit of detection (LOD) for lead was 0.062 μg.mL-1, the enrichment factor (EF) was 93, and the relative standard deviation (RSD) for lead was calculated as 2.29%. The levels of lead for pomegranate, zucchini, and lettuce were calculated as 2.88 μg.g-1, 1.54 μg.g-1, 2.18 μg.g-1, respectively. Therefore, this method has been successfully applied for the analysis of the content of lead in different food samples by FAAS.

Keywords: Dispersive liquid-liquid microextraction, Central composite design, Food samples, Flame atomic absorption spectrometry.

Procedia PDF Downloads 283
13596 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 364
13595 Development of an Interactive Display-Control Layout Design System for Trains Based on Train Drivers’ Mental Models

Authors: Hyeonkyeong Yang, Minseok Son, Taekbeom Yoo, Woojin Park

Abstract:

Human error is the most salient contributing factor to railway accidents. To reduce the frequency of human errors, many researchers and train designers have adopted ergonomic design principles for designing display-control layout in rail cab. There exist a number of approaches for designing the display control layout based on optimization methods. However, the ergonomically optimized layout design may not be the best design for train drivers, since the drivers have their own mental models based on their experiences. Consequently, the drivers may prefer the existing display-control layout design over the optimal design, and even show better driving performance using the existing design compared to that using the optimal design. Thus, in addition to ergonomic design principles, train drivers’ mental models also need to be considered for designing display-control layout in rail cab. This paper developed an ergonomic assessment system of display-control layout design, and an interactive layout design system that can generate design alternatives and calculate ergonomic assessment score in real-time. The design alternatives generated from the interactive layout design system may not include the optimal design from the ergonomics point of view. However, the system’s strength is that it considers train drivers’ mental models, which can help generate alternatives that are more friendly and easier to use for train drivers. Also, with the developed system, non-experts in ergonomics, such as train drivers, can refine the design alternatives and improve ergonomic assessment score in real-time.

Keywords: display-control layout design, interactive layout design system, mental model, train drivers

Procedia PDF Downloads 306
13594 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 155
13593 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 420
13592 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH

Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung

Abstract:

In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.

Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality

Procedia PDF Downloads 301
13591 Connecting African Ubuntu and Social Work Practices for Human Rights: The Value of Dignity and Worth of a Person

Authors: Meinrad Haule Lembuka

Abstract:

Social work profession one of its primary mission is to restore and maintain human rights where social workers recognise all humanity as equal, and so too the philosophies that have developed across the world’s regions. Ubuntu means African Humanism, where realization of human rights has been a primary role for every member of community to protect other member. Before Universal declaration of human rights, African societies had a long history of embracing human rights through Ubuntu approach model. The article used Ubuntu theory to guide the review process of existing literature since Ubuntu theory since is grounded in African cultural values and ecology, and it was thought that application of Ubuntu theory was relevant to reflect reality of Ubuntu model and indigenization of social work in African context. Results have shown that in realization of human rights, Ubuntu was practiced is termed as model, philosophy, cultural values, way of life or framework originated in sub-sahara Africa and some of remarkably practice model in several African communities such as Angola, (gimuntu), Botswana (muthu), Burkina Faso (maaya), Ghana (biako ye), Malawi (umunthu), Mali (maaya/hadama de ya), Namibia (omundu), Nigeria (mutunchi/iwa/agwa), (bantu), Sierra Leonne (maaya), South Africa (ubuntu/botho) and Tanzania (utu/obuntu/bumuntu). Collective and holistic mechanism of Ubuntu is found through an Ubuntu framework that is contributed by individual, family, community and spirit that is characterised by interconnectedness of all things and beings. Each society has its own name but the practice remained the same and realization of human rights in Africa context was centred through human dignity, Ubuntu is built under cultural values of humanism that brings implications for African social worker to integrate this indigenous model into social work practice in restoring and maintain human rights. Social workers should promote policies and practices that demonstrate respect for human life, difference, support and expansion of cultural knowledge and resources, advocate for programmes and institutions that demonstrate cultural competence and promote policies that safeguard the rights and confirm equity and social justice for all people.

Keywords: African ubuntu, indigenous practice, African humanism, African human rights, social work and human rights

Procedia PDF Downloads 71
13590 Patterns of Change in Specific Behaviors of Autism Symptoms for Boys and for Girls Across Childhood

Authors: Einat Waizbard, Emilio Ferrer, Meghan Miller, Brianna Heath, Derek S. Andrews, Sally J. Rogers, Christine Wu Nordahl, Marjorie Solomon, David G. Amaral

Abstract:

Background: Autism symptoms are comprised of social-communication deficits and restricted/repetitive behaviors (RRB). The severity of these symptoms can change during childhood, with differences between boys and girls. From the literature, it was found that young autistic girls show a stronger tendency to decrease and a weaker tendency to increase their overall autism symptom severity levels compared to young autistic boys. It is not clear, however, which symptoms are driving these sex differences across childhood. In the current study, we evaluated the trajectories of independent autism symptoms across childhood and compared the patterns of change in such symptoms between boys and girls. Method: The study included 183 children diagnosed with autism (55 girls) evaluated three times across childhood, at ages 3, 6 and 11. We analyzed 22 independent items from the Autism Diagnostic Observation Scheudule-2 (ADOS-2), the gold-standard assessment tool for autism symptoms, each item representing a specific autism symptom. First, we used latent growth curve models to estimate the trajectories for the 22 ADOS-2 items for each child in the study. Second, we extracted the factor scores representing the individual slopes for each ADOS-2 item (i.e., slope representing that child’s change in that specific item). Third, we used factor analysis to identify common patterns of change among the ADOS-2 items, separately for boys and girls, i.e., which autism symptoms tend to change together and which change independently across childhood. Results: The best-emerging patterns for both boys and girls identified four common factors: three factors representative of changes in social-communication symptoms and one factor describing changes in RRB. Boys and girls showed the same pattern of change in RRB, with four items (e.g., speech abnormalities) changing together across childhood and three items (e.g., mannerisms) changing independently of other items. For social-communication deficits in boys, three factors were identified: the first factor included six items representing initiating and engaging in social-communication (e.g., quality of social overtures, conversation), the second factor included five items describing responsive social-communication (e.g., response to name) and the third factor included three items related to different aspects of social-communication (e.g., level of language). Girls’ social-communications deficits also loaded onto three factors: the first factor included five items (e.g., unusual eye contact), the second factor included six items (e.g., quality of social response), and the third factor included four items (e.g., showing). Some items showed similar patterns of change for both sexes (e.g., responsive joint attention), while other items showed differences (e.g., shared enjoyment). Conclusions: Girls and boys had different patterns of change in autism symptom severity across childhood. For RRB, both sexes showed similar patterns. For social-communication symptoms, however, there were both similarities and differences between boys and girls in the way symptoms changed over time. The strongest patterns of change were identified for initiating and engaging in social communication for boys and responsive social communication for girls.

Keywords: autism spectrum disorder, autism symptom severity, symptom trajectories, sex differences

Procedia PDF Downloads 51
13589 Simulation-Based Validation of Safe Human-Robot-Collaboration

Authors: Titanilla Komenda

Abstract:

Human-machine-collaboration defines a direct interaction between humans and machines to fulfil specific tasks. Those so-called collaborative machines are used without fencing and interact with humans in predefined workspaces. Even though, human-machine-collaboration enables a flexible adaption to variable degrees of freedom, industrial applications are rarely found. The reasons for this are not technical progress but rather limitations in planning processes ensuring safety for operators. Until now, humans and machines were mainly considered separately in the planning process, focusing on ergonomics and system performance respectively. Within human-machine-collaboration, those aspects must not be seen in isolation from each other but rather need to be analysed in interaction. Furthermore, a simulation model is needed that can validate the system performance and ensure the safety for the operator at any given time. Following on from this, a holistic simulation model is presented, enabling a simulative representation of collaborative tasks – including both, humans and machines. The presented model does not only include a geometry and a motion model of interacting humans and machines but also a numerical behaviour model of humans as well as a Boole’s probabilistic sensor model. With this, error scenarios can be simulated by validating system behaviour in unplanned situations. As these models can be defined on the basis of Failure Mode and Effects Analysis as well as probabilities of errors, the implementation in a collaborative model is discussed and evaluated regarding limitations and simulation times. The functionality of the model is shown on industrial applications by comparing simulation results with video data. The analysis shows the impact of considering human factors in the planning process in contrast to only meeting system performance. In this sense, an optimisation function is presented that meets the trade-off between human and machine factors and aids in a successful and safe realisation of collaborative scenarios.

Keywords: human-machine-system, human-robot-collaboration, safety, simulation

Procedia PDF Downloads 361
13588 Application of Probiotics in the Management of Food Allergies: A Review

Authors: Amir Hosseinvand

Abstract:

Probiotics have health-giving effects on the human body, so by stimulating the immune system, they prevent many occurrences they are diseases and food allergies in humans. There are various bacteria in the human digestive system; some are useful, some are harmless, and other groups of bacteria are harmful to human health. These bacteria should be in balance in the body of people in a normal state. In certain conditions, such as a person's high stress, aging, continuous use of antibiotics, or improper diet, the intestinal microbial flora has changed, and these changes cause some diseases in people. Probiotics have health benefits for the human body and are often found in the digestive system of healthy people. Nevertheless, fermented foods such as fermented dairy products such as yogurt, cheese, buttermilk or fermented pickles contain some species of these bacteria that are useful. But the important point that should be noted is that due to modern and industrial life, high fat and high protein diets, and excessive use of antibiotics, the number of these bacteria in people's bodies has decreased, and it is necessary to consume probiotics either in the form of probiotic foods or in the form of supplements. Probiotics with mild stimulation of the immune system increase the immunity level of the body and prevent the occurrence of food allergies in people.

Keywords: human health, dairy products, food allergies, probiotic

Procedia PDF Downloads 35
13587 Real-Time Loop-Mediated Isothermal Amplification Assay for Rapid Detection of Human Papillomavirus 16 in Oral Squamous Cell Carcinoma

Authors: Suharni Mohamad Suharni Mohamad, Nurul Izzati Hamzan Nurul Izzati Hamzan, Norhayu Abdul Rahman Norhayu Abdul Rahman, Siti Suraiya Md Noor Siti Suraiya Md Noor

Abstract:

Human papillomavirus (HPV) is an important risk factor for development of oral cancer. HPV16 is the most common type found in HPV-positive squamous cell carcinoma. In the present study, we established a real-time loop-mediated isothermal amplification (real-time LAMP) for detection of HPV16. A set of six primers was specially designed to recognize eight distinct sequences of HPV16-E6. Detection and quantification was achieved by real-time monitoring using a real-time turbidimeter based on threshold time required for turbidity in the LAMP reaction. LAMP reagents (MgSO4, dNTPs, Bst polymerase concentrations) and various incubation times and temperatures were optimized. The sensitivity was determined using 10-fold serial dilutions of HPV16 standard strain. The specificity of was evaluated using other HPV genotypes. The optimized method was established with specifically designed primers by real-time detection in approximately 30 min at 65°C. The limit of detection of HPV16 using the LAMP assay was 10 pg/ml that could be detected in 30 min. The LAMP assay was 10 times more sensitive than the conventional PCR in detecting HPV16. No cross-reactivity with other HPV genotypes was observed. This quantitative real-time LAMP assay may improve diagnostic potential for the detection and quantification of HPV16 in clinical samples and epidemiological studies due to its rapidity, simplicity, high sensitivity and specificity. This assay will be further evaluated with HPV DNAs of saliva from patients with oral squamous cell carcinoma. Acknowledgement: This study was financially supported by the ScienceFund Grant, Ministry of Science, Technology and Innovation (305/PPSG/6113219).

Keywords: Oral Squamous Cell Carcinoma (OSCC), Human Papillomavirus 16 (HPV16), Loop-Mediated Isothermal Amplification (LAMP), rapid detection

Procedia PDF Downloads 406
13586 Solving Crimes through DNA Methylation Analysis

Authors: Ajay Kumar Rana

Abstract:

Predicting human behaviour, discerning monozygotic twins or left over remnant tissues/fluids of a single human source remains a big challenge in forensic science. Recent advances in the field of DNA methylations which are broadly chemical hallmarks in response to environmental factors can certainly help to identify and discriminate various single-source DNA samples collected from the crime scenes. In this review, cytosine methylation of DNA has been methodologically discussed with its broad applications in many challenging forensic issues like body fluid identification, race/ethnicity identification, monozygotic twins dilemma, addiction or behavioural prediction, age prediction, or even authenticity of the human DNA. With the advent of next-generation sequencing techniques, blooming of DNA methylation datasets and together with standard molecular protocols, the prospect of investigating and solving the above issues and extracting the exact nature of the truth for reconstructing the crime scene events would be undoubtedly helpful in defending and solving the critical crime cases.

Keywords: DNA methylation, differentially methylated regions, human identification, forensics

Procedia PDF Downloads 321
13585 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 619
13584 The Applicability of Just Satisfaction in Inter-State Cases: A Case Study of Cyprus versus Turkey

Authors: Congrui Chen

Abstract:

The European Court of Human Rights (hereinafter ECtHR) delivered its judgment of just satisfaction on the case of Cyprus v. Turkey, ordering a lump sum of 9,000,000 euros as the just compensation. It is the first time that the ECtHR applied the Article 41 of just compensation in an inter-state case, and it stands as the highest amount of just compensation awarded in the history of the ECtHR. The Cyprus v. Turkey case, which represents the most crucial contribution to European peace in the history of the court. This thesis uses the methodologies of textual research, comparison analysis, and case law study to go further on the following two questions specifically:(i) whether the just compensation is applicable in an inter-state case; (ii) whether such just compensation is of punitive nature. From the point of view of general international law, the essence of the case is the state's responsibility for the violation of individual rights. In other words, the state takes a similar diplomatic protection approach to seek relief. In the course of the development of international law today, especially with the development of international human rights law, States that have a duty to protect human rights should bear corresponding responsibilities for their violations of international human rights law. Under the specific system of the European Court of Human Rights, the just compensation for article 41 is one of the specific ways of assuming responsibility. At the regulatory level, the European Court of Human Rights makes it clear that the just satisfaction of article 41 of the Convention does not include punitive damages, as it relates to the issue of national sovereignty. Nevertheless, it is undeniable that the relief to the victim and the punishment to the responsible State are two closely integrated aspects of responsibility. In other words, compensatory compensation has inherent "punitive".

Keywords: European Court of Human Right, inter-state cases, just satisfaction, punitive damages

Procedia PDF Downloads 270
13583 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
13582 Using the Family Justice System to Respond to ISIS Returnees: The UK Experience

Authors: Fatima Ahdash

Abstract:

Over the last 6-7 years, the UK has resorted to using the family courts and the family justice system more generally as a way of dealing with children and young people either traveling to or returning from ISIS territories in the Middle East. This is an important innovation in counter-terrorism laws and practices in the UK: never before have the family courts been used for the purpose of preventing and countering terrorism anywhere in the world. This paper will examine this innovation; it will explore how, why, and the implications of the interaction between family law and counter-terrorism, particularly on the human rights of the parents and children involved. It will question whether the use of the family courts provides a more useful, and perhaps human rights compliant, method of tackling terrorism and extremism when compared to other more Draconian legal and administrative methods.

Keywords: counter-terrorism, family justice, law, human rights

Procedia PDF Downloads 212
13581 Offline High Voltage Diagnostic Test Findings on 15MVA Generator of Basochhu Hydropower Plant

Authors: Suprit Pradhan, Tshering Yangzom

Abstract:

Even with availability of the modern day online insulation diagnostic technologies like partial discharge monitoring, the measurements like Dissipation Factor (tanδ), DC High Voltage Insulation Currents, Polarization Index (PI) and Insulation Resistance Measurements are still widely used as a diagnostic tools to assess the condition of stator insulation in hydro power plants. To evaluate the condition of stator winding insulation in one of the generators that have been operated since 1999, diagnostic tests were performed on the stator bars of 15 MVA generators of Basochhu Hydropower Plant. This paper presents diagnostic study done on the data gathered from the measurements which were performed in 2015 and 2016 as part of regular maintenance as since its commissioning no proper aging data were maintained. Measurement results of Dissipation Factor, DC High Potential tests and Polarization Index are discussed with regard to their effectiveness in assessing the ageing condition of the stator insulation. After a brief review of the theoretical background, the strengths of each diagnostic method in detecting symptoms of insulation deterioration are identified. The interesting results observed from Basochhu Hydropower Plant is taken into consideration to conclude that Polarization Index and DC High Voltage Insulation current measurements are best suited for the detection of humidity and contamination problems and Dissipation Factor measurement is a robust indicator of long-term ageing caused by oxidative degradation.

Keywords: dissipation Factor (tanδ), polarization Index (PI), DC High Voltage Insulation Current, insulation resistance (IR), Tan Delta Tip-Up, dielectric absorption ratio

Procedia PDF Downloads 312
13580 Beyond Juridical Approaches: The Role of Sociological Approach in Promoting Human Rights of Migrants

Authors: Ali Aghahosseini Dehaghani

Abstract:

Every year in this globalized world, thousands of migrants leave their countries hoping to find a better situation of life in other parts of the world. In this regard, many questions, from a human rights point of view, have been raised about how this phenomenon should be managed in the host countries. Although legal approaches such as legislation and litigation are inevitable in the way to respect the human rights of migrants, there is an increasing consensus about the fact that a strict juridical approach is inadequate to protect as well as to prevent violations of migrants’ rights. Indeed, given the multiplicity of factors that affect and shape the application of these rights and considering the fact that law is a social phenomenon, what is needed is an interdisciplinary approach, which combines both juridical approaches and perspectives from other disciplines. In this respect, a sociological approach is important because it shows the social processes through which human rights of migrants have been constructed or violated in particular social situations. Sociologists who study international migration ask the questions such as how many people migrate, who migrates, why people migrate, what happens to them once they arrive in the host country, how migration affects sending and receiving communities, the extent to which migrants help the economy, the effects of migration on crimes, and how migrants change the local communities. This paper is an attempt to show how sociology can promote human rights of migrants. To this end, the article first explores the usefulness and value of an interdisciplinary approach to realize how and to what extent sociology may improve and promote the human rights of migrants in the destination country. It then examines mechanisms which help to reach to a systematic integration of law and sociological discipline to advance migrants’ rights as well as to encourage legal scholars to consider the implications of societal structures in their works.

Keywords: human rights, migrants, sociological approach, interdisciplinary study

Procedia PDF Downloads 454
13579 Comparison of Food Products Contaminated by DDTs in South Africa and Mozambique

Authors: Lesa A. Thompson, Yoshinori Ikenaka, Victor Wepener, Mayumi Ishizuka

Abstract:

One method for controlling malaria in endemic regions is the killing of vector mosquitoes using pesticides such as DDT in indoor residual spraying (IRS). This study was carried out to investigate the presence of and human health risk due to DDT and its metabolites (collectively, DDTs) contaminating human food sources in areas where DDT is used for IRS. Free-range chicken products (meat and eggs) were collected from homesteads in KwaZulu-Natal Province in the northeast of South Africa, and fish meat samples from Maputo Bay in neighbouring Mozambique. Samples were analysed for DDTs (o,p’-DDT, p,p’-DDT, o,p’-DDD, p,p’-DDD, o,p’-DDE and p,p’-DDE) using a gas chromatograph with electron capture detector (GC-ECD). DDTs were detected in all food types, with the predominant congener being p,p’-DDE. The presence of p,p’-DDT confirmed recent release of DDT into the environment. By using concentration levels detected in foods and national consumption levels, the risk to human health through consumption of such food products was calculated. In order of risk level, these were: chicken eggs > chicken meat > fish meat. Human risk (carcinogenic) values greater than one suggest there is an increased health risk through consumption of these foods.

Keywords: DDT, food contamination, human health risk, Mozambique, South Africa

Procedia PDF Downloads 342
13578 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 112
13577 Journey of Silver Workers Post Retirement in India: An Exploratory Study

Authors: Avani Maniar, Shivani Mehta

Abstract:

Population aging is one of the most challenging issues of the twenty-first century, facing both developed and developing countries worldwide. In the developed world, there has already been a substantial amount of research on aging and work to help understand the capacity and potential of older people. They attract ever ones attention. Their existence in human society gives rise to variety of responses, reactions and apprehensions, because it connotes on greater part, to some kind of compulsion or willingness that prompt elderly to decide to work after retirement. Work due to social attention and assurance for security both economical and social. In this age, elderly aspire for psychological security with due attention. But the fact remains that despite age related limitations good number of persons in their age of sixty and beyond were hunting for work that would support them and get them some kind of support and in it turns helps them to remain physically and mentally active. Based on the existing diversities in the ageing process, it may be stated that there is a need to pay greater attention to the increasing awareness on the ageing issues and its socio-economic effects and to promote the development of policies and programmes for dealing with an ageing society. Addressing the needs, wants, and well-being of elderly people is essential for maintaining a healthy productive workforce in an aging society. This paper will draw on the results of the study about reasons of elderly working post retirement, problems faced by them and about the future of retirement to ask how widespread negative attitudes and stereotypes among employers are and whether these attitudes influence behavior towards older employees. The aim of research is not only to point out certain stereotypes concerning the elderly labour force, but also to stress that unless preconditions for overcoming these stereotypes are created and employment opportunities are given to this segment of the labour force, full employment as an ultimate goal of global economic policy cannot be achieved.

Keywords: employers, India, inequality, problems, reasons of working, silver workers

Procedia PDF Downloads 160
13576 The Improvement of Turbulent Heat Flux Parameterizations in Tropical GCMs Simulations Using Low Wind Speed Excess Resistance Parameter

Authors: M. O. Adeniyi, R. T. Akinnubi

Abstract:

The parameterization of turbulent heat fluxes is needed for modeling land-atmosphere interactions in Global Climate Models (GCMs). However, current GCMs still have difficulties with producing reliable turbulent heat fluxes for humid tropical regions, which may be due to inadequate parameterization of the roughness lengths for momentum (z0m) and heat (z0h) transfer. These roughness lengths are usually expressed in term of excess resistance factor (κB^(-1)), and this factor is used to account for different resistances for momentum and heat transfers. In this paper, a more appropriate excess resistance factor (〖 κB〗^(-1)) suitable for low wind speed condition was developed and incorporated into the aerodynamic resistance approach (ARA) in the GCMs. Also, the performance of various standard GCMs κB^(-1) schemes developed for high wind speed conditions were assessed. Based on the in-situ surface heat fluxes and profile measurements of wind speed and temperature from Nigeria Micrometeorological Experimental site (NIMEX), new κB^(-1) was derived through application of the Monin–Obukhov similarity theory and Brutsaert theoretical model for heat transfer. Turbulent flux parameterizations with this new formula provides better estimates of heat fluxes when compared with others estimated using existing GCMs κB^(-1) schemes. The derived κB^(-1) MBE and RMSE in the parameterized QH ranged from -1.15 to – 5.10 Wm-2 and 10.01 to 23.47 Wm-2, while that of QE ranged from - 8.02 to 6.11 Wm-2 and 14.01 to 18.11 Wm-2 respectively. The derived 〖 κB〗^(-1) gave better estimates of QH than QE during daytime. The derived 〖 κB〗^(-1)=6.66〖 Re〗_*^0.02-5.47, where Re_* is the Reynolds number. The derived κB^(-1) scheme which corrects a well documented large overestimation of turbulent heat fluxes is therefore, recommended for most regional models within the tropic where low wind speed is prevalent.

Keywords: humid, tropic, excess resistance factor, overestimation, turbulent heat fluxes

Procedia PDF Downloads 202
13575 Tuned Mass Damper Effects of Stationary People on Structural Damping of Footbridge Due to Dynamic Interaction in Vertical Motion

Authors: M. Yoneda

Abstract:

It is known that stationary human occupants act as dynamic mass-spring-damper systems and can change the modal properties of civil engineering structures. This paper describes the full scale measurement to explain the tuned mass damper effects of stationary people on structural damping of footbridge with center span length of 33 m. A human body can be represented by a lumped system consisting of masses, springs, and dashpots. Complex eigenvalue calculation is also conducted by using ISO5982:1981 human model (two degree of freedom system). Based on experimental and analytical results for the footbridge with the stationary people in the standing position, it is demonstrated that stationary people behave as a tuned mass damper and that ISO5982:1981 human model can explain the structural damping characteristics measured in the field.

Keywords: dynamic interaction, footbridge, stationary people, structural damping

Procedia PDF Downloads 274
13574 Literary Translation Human vs Machine: An Essay about Online Translation

Authors: F. L. Bernardo, R. A. S. Zacarias

Abstract:

The ways to translate are manifold since textual genres undergoing translations are diverse. In this essay, our goal is to give special attention to the literary genre and to the online translation tool Google Translate (GT), widely used either by nonprofessionals or by scholars, in order to show evidence of the indispensability of human wit in a good translation. Our study has its basis on a literary review of prominent authors, with emphasis on translation categories. Also highlighting the issue of polysemous literary translation, we aim to shed light on the translator’s craft and the fallible nature of online translation. To better illustrate these principles, the methodology consisted on performing a comparative analysis involving the original text Moll Flanders by Daniel Defoe in English to its online translation given by GT and to a translation into Brazilian Portuguese performed by a human. We proceeded to identifying and analyzing the degrees of textual equivalence according to the following categories: volume, levels and order. The results have attested the unsuitability in a translation done by a computer connected to the World Wide Web.

Keywords: Google Translator, human translation, literary translation, Moll Flanders

Procedia PDF Downloads 651
13573 A Migration Policy Gone Wrong: A Study on How the Encampment Policy Undermines Refugees’ Potentials and Fails Local Economy: A Case of East Africa

Authors: John Bosco Ngendakurio

Abstract:

The key question this paper asks is, ‘how does the refugee encampment policy undermine refugees’ potentials and fail local economy in East African countries?’ It is important to develop a full understanding of the legacies of the encampment policy for refugees’ performances economically, socially, and politically. The negative impacts of the encampment policy include the lack of participation or access to opportunities outside the refugee camps such as employment, education, and local integration, unfair imprisonments and constant alienation of refugees, mental and physical health issues, just to name a few. Evidence suggests that refugee camps in East Africa have progressively become open detention centres due to their designs, their locations, and movement restrictions imposed on refugees. Such restrictions in a region that hosts millions of refugees do not only undermine refugees’ potentials, but it also hurts the local economy- host countries miss out in many ways. Outlining the negative impacts of the encampment policy will enable governments and relevant non-governmental actors, including policymakers, to re-consider this policy with the aim to improve refugees’ participation and contributions in the broader society, promote socially cohesive practices, and help millions of refugees gain independence and reach their potentials financially, socially and politically, finally and truly giving the voice to the voiceless. The encampment policy undermines the general human security in East Africa, and it is one of the migration practices showcasing East African governments’ lack of will to protect human rights, especially within the most vulnerable population groups such as refugees.

Keywords: migration policy, immigration, refugees, encampment, migration, integration, social cohesion

Procedia PDF Downloads 133