Search results for: defense/attack strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6398

Search results for: defense/attack strategies

4718 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management

Authors: Ali El Ksimi

Abstract:

In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.

Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy

Procedia PDF Downloads 25
4717 Synthesis, Characterization, and Quantum Investigations on [3+2] Cycloaddition Reaction of Nitrile Oxide with 1,5-Benzodiazepine

Authors: Samir Hmaimou, Marouane Ait Lahcen, Mohamed Adardour, Mohamed Maatallah, Abdesselam Baouid

Abstract:

Due to (3 + 2) cycloaddition and condensation reaction, a wide range of synthetic routes can be used to obtain biologically active heterocyclic compounds. Condensation and (3+2) cycloaddition reactions in heterocyclic syntheses are versatile due to the wide variety of possible combinations of several atoms of the reactants. In this article, we first outline the synthesis of benzodiazepine 4 with two dipolarophilic centers (C=C and C=N) by condensation reaction. Then, we use it for cycloaddition reactions (3+2) with nitrile oxides to prepare oxadiazole-benzodiazepines and pyrazole-benzodiazepine compounds. ¹H and ¹³C NMR are used to establish all the structures of the synthesized products. These condensation and cycloaddition reactions were then analyzed using density functional theory (DFT) calculations at the B3LYP/6-311G(d,p) theoretical level. In this study, the mechanism of the one-step cycloaddition reaction was investigated. Molecular electrostatic potential (MEP) was used to identify the electrophilic and nucleophilic attack sites of the molecules studied. Additionally, Fukui investigations (electrophilic f- and nucleophilic f+) in the various reaction centers of the reactants demonstrate that, whether in the condensation reaction or cycloaddition, the reaction proceeds through the atomic centers with the most important Fukui functions, which is in full agreement with experimental observations. In the condensation reaction, thermodynamic control of regio, chemo, and stereoselectivity is observed, while those of cycloaddition are subject to kinetic control.

Keywords: cycloaddition reaction, regioselectivity, mechanism reaction, NMR analysis

Procedia PDF Downloads 17
4716 Asymmetric Linkages Between Global Sustainable Index (Green Bond) and Cryptocurrency Markets with Portfolio Implications

Authors: Faheem Ur Rehman, Muhammad Khalil Khan, Miao Qing

Abstract:

This study investigated the asymmetric links and portfolio strategies between green bonds and the markets of three different cryptocurrencies, i.e., green, Islamic, and conventional, using data from January 1, 2018, to April 8, 2022, and employing asymmetric TVP-VAR model to quantify risk spillovers in the network analysis. In addition, we use the minimum variance, minimum correlation, and minimum connectedness methodologies to assess the portfolio implications. The results of the asymmetric dynamic connectedness index (TCI) model show that by adopting cryptocurrencies for digital finance, risk spillovers are found to be reduced. The findings of net directional connectedness demonstrate that during the study period, green bonds consistently get return spillovers from all other network variables. Positive return spillovers are bigger in magnitude than negative ones. These results imply that the influence of the green bond market on the cryptocurrency markets is decreasing. Positive return spillovers generate higher connectedness values for (HG, BNB, and TRX) coins and persistent net recipients in the specific network. On the other hand, Cardano and ADA coins are persistent net transmitters in the system. XLM and MIOTA's responsibilities shift over time, and there is evidence of asymmetry when both positive and negative returns are considered. According to the pairwise portfolio weights, BNB vs. BTC has the largest portfolio weights in the system, followed by BNB vs. Ethereum, suggesting the best investment strategies in the network.

Keywords: asymmetric TVP-VAR, global sustainable index, cryptocurrency, portfolios

Procedia PDF Downloads 78
4715 Medical Nutritional Therapy in Human Immunodeficiency Virus Infection with Tuberculosis and Severe Malnutrition: A Case Report

Authors: Lista Andriyati, Nurpudji A Taslim

Abstract:

The human immunodeficiency virus (HIV) patients have potential nutritional and metabolic problems. HIV is a virus that attacks cells T helper and impairs the function of immune cells. Infected individuals gradually become immunodeficient, results in increased susceptibility to a wide range of infections such as tuberculosis (TB). Malnutrition has destructive effects on the immune system and host defense mechanisms. Effective and proper nutritional therapies are important to improve medical outcomes and quality of life, which is associated with functional improvement. A case of 38-years old man admitted to hospital with loss of consciousness and was diagnosed HIV infection and relapse lung TB with severe malnutrition, fever, oral candidiasis, anemia (6.3 g/dL), severe hypoalbuminemia (1.9 g/dL), severe hypokalemia (2.2 mmol/L), immune depletion (1085 /µL) and elevated liver enzyme (ALT 1198/AST 375 U/L). Nutritional intervention by giving 2300 kcal of energy, protein 2 g/IBW/day, carbohydrate 350 g, fat 104 g through enteral and parenteral nutrition. Supplementations administered are zinc, vitamin A, vitamin B1, vitamin B6, vitamin B12, vitamin C, vitamin D, and snakehead fish extract high content of protein albumin (Pujimin®). After 46 days, there are clinical and metabolic improvement in Hb (6.3 to 11.2 g/dL), potassium (2.2 to 3.4 mmol/L), albumin (1.9 to 2.3 g/dL), ALT 1198 to 47/AST 375 to 68 U/L) and improved awareness. In conclusion, nutritional therapy in HIV infection with adequate macronutrients and micronutrients fulfillment and immunonutrition is very important to avoid cachexia and to improve nutritional status and immune disfunction.

Keywords: HIV, hypoalbuminemia, malnutrition, tuberculosis

Procedia PDF Downloads 130
4714 Fostering Students' Engagement with Historical Issues Surrounding the Field of Graphic Design

Authors: Sara Corvino

Abstract:

The aim of this study is to explore the potential of inclusive learning and assessment strategies to foster students' engagement with historical debates surrounding the field of graphic design. The goal is to respond to the diversity of L4 Graphic Design students, at Nottingham Trent University, in a way that instead of 'lowering standards' can benefit everyone. This research tests, measures, and evaluates the impact of a specific intervention, an assessment task, to develop students' critical visual analysis skills and stimulate a deeper engagement with the subject matter. Within the action research approach, this work has followed a case study research method to understand students' views and perceptions of a specific project. The primary methods of data collection have been: anonymous electronic questionnaire and a paper-based anonymous critical incident questionnaire. NTU College of Business Law and Social Sciences Research Ethics Committee granted the Ethical approval for this research in November 2019. Other methods used to evaluate the impact of this assessment task have been Evasys's report and students' performance. In line with the constructivist paradigm, this study embraces an interpretative and contextualized analysis of the collected data within the triangulation analytical framework. The evaluation of both qualitative and quantitative data demonstrates that active learning strategies and the disruption of thinking patterns can foster greater students' engagement and can lead to meaningful learning.

Keywords: active learning, assessment for learning, graphic design, higher education, student engagement

Procedia PDF Downloads 178
4713 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 115
4712 Global Low Carbon Transitions in the Power Sector: A Machine Learning Archetypical Clustering Approach

Authors: Abdullah Alotaiq, David Wallom, Malcolm McCulloch

Abstract:

This study presents an archetype-based approach to designing effective strategies for low-carbon transitions in the power sector. To achieve global energy transition goals, a renewable energy transition is critical, and understanding diverse energy landscapes across different countries is essential to design effective renewable energy policies and strategies. Using a clustering approach, this study identifies 12 energy archetypes based on the electricity mix, socio-economic indicators, and renewable energy contribution potential of 187 UN countries. Each archetype is characterized by distinct challenges and opportunities, ranging from high dependence on fossil fuels to low electricity access, low economic growth, and insufficient contribution potential of renewables. Archetype A, for instance, consists of countries with low electricity access, high poverty rates, and limited power infrastructure, while Archetype J comprises developed countries with high electricity demand and installed renewables. The study findings have significant implications for renewable energy policymaking and investment decisions, with policymakers and investors able to use the archetype approach to identify suitable renewable energy policies and measures and assess renewable energy potential and risks. Overall, the archetype approach provides a comprehensive framework for understanding diverse energy landscapes and accelerating decarbonisation of the power sector.

Keywords: fossil fuels, power plants, energy transition, renewable energy, archetypes

Procedia PDF Downloads 51
4711 Heuristic Algorithms for Time Based Weapon-Target Assignment Problem

Authors: Hyun Seop Uhm, Yong Ho Choi, Ji Eun Kim, Young Hoon Lee

Abstract:

Weapon-target assignment (WTA) is a problem that assigns available launchers to appropriate targets in order to defend assets. Various algorithms for WTA have been developed over past years for both in the static and dynamic environment (denoted by SWTA and DWTA respectively). Due to the problem requirement to be solved in a relevant computational time, WTA has suffered from the solution efficiency. As a result, SWTA and DWTA problems have been solved in the limited situation of the battlefield. In this paper, the general situation under continuous time is considered by Time based Weapon Target Assignment (TWTA) problem. TWTA are studied using the mixed integer programming model, and three heuristic algorithms; decomposed opt-opt, decomposed opt-greedy, and greedy algorithms are suggested. Although the TWTA optimization model works inefficiently when it is characterized by a large size, the decomposed opt-opt algorithm based on the linearization and decomposition method extracted efficient solutions in a reasonable computation time. Because the computation time of the scheduling part is too long to solve by the optimization model, several algorithms based on greedy is proposed. The models show lower performance value than that of the decomposed opt-opt algorithm, but very short time is needed to compute. Hence, this paper proposes an improved method by applying decomposition to TWTA, and more practical and effectual methods can be developed for using TWTA on the battlefield.

Keywords: air and missile defense, weapon target assignment, mixed integer programming, piecewise linearization, decomposition algorithm, military operations research

Procedia PDF Downloads 336
4710 Functionality of Promotional and Advertising Texts: Pragmatic Implications for English-Arabic Translation

Authors: Jamal Gaber Abdalla

Abstract:

In business promotion and advertising, language is used intentionally to create a powerful influence over people and their behavior. In commercial and marketing activities, the choice of language to convey specific messages with the intention of influencing people is pragmatically important. Design and visual content in promotional and advertising texts also have a great persuasive impact on consumers. It is the functional combination of design, language and visual content that helps people to identify a product or service and remember it. Translating promotional and advertising texts between structurally and culturally different languages, such as English and Arabic, usually involves pragmatic/functional shifts that decide the quality of translation. This study explores some of these shifts in translating promotional and advertising texts between English and Arabic and their implications for translation quality. The study is based on a contrastive analysis of data collected from real samples of English-Arabic translations of promotional and advertising texts. The samples cover different promotional and advertising text types and different business domains. The aim is to identify the most recurrent translation shifts and most used translation approaches/strategies that achieve quality in view of the functional nature of promotional and advertising texts and target language culture conventions. The study shows that linguistic shifts and visual shifts are recurrent in English-Arabic translations of promotional and advertising texts. The study also shows that the most commonly used translation approaches/strategies are functional translation, domestication, communicative translation.

Keywords: advertising, Arabic, English, functional translation, promotion

Procedia PDF Downloads 361
4709 Development of Biodegradable Plastic as Mango Fruit Bag

Authors: Andres M. Tuates Jr., Ofero A. Caparino

Abstract:

Plastics have achieved a dominant position in agriculture because of their transparency, lightness in weight, impermeability to water and their resistance to microbial attack. However, this generates a higher quantity of wastes that are difficult to dispose of by farmers. To address these problems, the project aim to develop and evaluate the biodegradable film for mango fruit bag during development. The PBS and starch were melt-blended in a twin-screw extruder and then blown into film extrusion machine. The physic-chemical-mechanical properties of biodegradable fruit bag were done following standard methods of test. Field testing of fruit bag was also conducted to evaluate its durability and efficiency field condition. The PHilMech-FiC fruit bag is made of biodegradable material measuring 6 x 8 inches with a thickness of 150 microns. The tensile strength is within the range of LDPE while the elongation is within the range of HDPE. It is projected that after thirty-six (36) weeks, the film will be totally degraded. Results of field testing show that the quality of harvested fruits using PHilMech-FiC biodegradable fruit bag in terms of percent marketable, non-marketable and export, peel color at the ripe stage, flesh color, TSS, oBrix, percent edible portion is comparable with the existing bagging materials such as Chinese brown paper bag and old newspaper.

Keywords: cassava starch, PBS, biodegradable, chemical, mechanical properties

Procedia PDF Downloads 278
4708 Biomimetic Architecture from the Inspiration by Nature to the Innovation of the Saharan Architecture

Authors: Yassine Mohammed Benyoucef, Razin Andery Dionisovich

Abstract:

Biomimicry is an old approach, but in the scientific conceptualization is new, as an approach of innovation based on the emulation of Nature, in recent years, this approach brings many potential theories and innovations in the architecture field. Indeed, these innovations have changed our view towards other Natural organisms also to the design processes in architecture, now the use of the biomimicry approach allows the application of a great sustainable development. The Sahara area is heading towards a sustainable policy with the desire to develop this rich context in terms of architecture, because of the rapid evolution of the architectural and urban concepts and the technology acceleration in one side, and under the pressure of the architectural crisis and the accelerated urbanization in the Saharan cities on the other side, the imperatives of sustainable development, ecology, climate adaptation, energy needs, are strongly imposed. Besides that, the new architectural and urban projects in the Saharan cities are not reliable in terms of energy efficiency and design and relationship with the environment. This article discusses the using of biomimetic strategy in the sustainable development of Saharan architecture. The aim of the article is to present a synthesis of biomimicry approach and propose the biomimicry as a solution for the development of Saharan architecture which can use this approach as a sustainable and innovation strategy. The biomimicry is the solution for effective strategies of development and can have a great potential point to meet the current challenges of designing efficient for forms or structures, energy efficiency, and climate issues. Moreover, the Sahara can be a favorable soil for great changes, the use of this approach is the key for the most optimal strategies and sustainable development of the Saharan architecture.

Keywords: biomimicry, Sahara, architecture, nature, innovation, technology

Procedia PDF Downloads 194
4707 Developing a Framework to Aid Sustainable Assessment in Indian Buildings

Authors: P. Amarnath, Albert Thomas

Abstract:

Buildings qualify to be the major consumer of energy and resources thereby urging the designers, architects and policy makers to place a great deal of effort in achieving and implementing sustainable building strategies in construction. Green building rating systems help a great deal in this by measuring the effectiveness of these strategies along with the escalation of building performance in social, environmental and economic perspective, and construct new sustainable buildings. However, for a country like India, enormous population and its rapid rate of growth impose an increasing burden on the country's limited and continuously degrading natural resource base, which also includes the land available for construction. In general, the number of sustainable rated buildings in India is very minimal primarily due to the complexity and obstinate nature of the assessment systems/regulations that restrict the stakeholders and designers in proper implementation and utilization of these rating systems. This paper aims to introduce a data driven and user-friendly framework which cross compares the present prominent green building rating systems such as LEED, BREEAM, and GRIHA and subsequently help the users to rate their proposed building design as per the regulations of these assessment frameworks. This framework is validated using the input data collected from green buildings constructed globally. The proposed system has prospects to encourage the users to test the efficiency of various sustainable construction practices and thereby promote more sustainable buildings in the country.

Keywords: BREEAM, GRIHA, green building rating systems, LEED, sustainable buildings

Procedia PDF Downloads 138
4706 Research on Public Space Optimization Strategies for Existing Settlements Based on Intergenerational Friendliness

Authors: Huanhuan Qiang, Sijia Jin

Abstract:

Population aging has become a global trend, and China has entered an aging society, implementing an active aging system focused on home and community-based care. However, most urban communities where elderly people live face issues such as monotonous planning, unappealing landscapes, and inadequate aging infrastructure, which do not meet the requirements for active aging. Intergenerational friendliness and mutual assistance are key components in China's active aging policy framework. Therefore, residential development should prioritize enhancing intergenerational friendliness. Residential and public spaces are central to community life and well-being, offering new and challenging venues to improve relationships among residents of different ages. They are crucial for developing intergenerational communities with diverse generations and non-blood relationships. This paper takes the Maigaoqiao community in Nanjing, China, as a case study, examining intergenerational interactions in public spaces. Based on Maslow's hierarchy of needs and using time geography analysis, it identifies the spatiotemporal behavior characteristics of intergenerational groups in outdoor activities. Then construct an intergenerational-friendly evaluation system and an IPA quadrant model for public spaces in residential areas. Lastly, it explores optimization strategies for public spaces to promote intergenerational friendly interactions, focusing on five aspects: accessibility, safety, functionality, a sense of belonging, and interactivity.

Keywords: intergenerational friendliness, demand theory, spatiotemporal behavior, IPA analysis, existing residential public space

Procedia PDF Downloads 4
4705 The Untranslatability of the Qur’an

Authors: Mina Elhjouji

Abstract:

The aim of this paper is to raise awareness of the untranslatability of the Qur’an and to suggest some solutions that can help the translator in the process of transferring the meaning from the source text to the target text as much as possible. After the introduction, the miraculous character of the Qur’an shall be illustrated. Then, the difficulty of translating religious texts will be shown in terms of different causes; thematic, cultural, and linguistic. Some examples shall illustrate each type of these difficulties. Finally, some strategies that can help translate the Quran’s meanings will be suggested.

Keywords: translation, religious text, untranslatability, The Qur’an miracle, communicative theory

Procedia PDF Downloads 12
4704 Effectiveness of Parent Coaching Intervention for Parents of Children with Developmental Disabilities in the Home and Community

Authors: Elnaz Alimi, Keriakoula Andriopoulos, Sam Boyer, Weronika Zuczek

Abstract:

Occupational therapists can use coaching strategies to guide parents in providing therapy for their children with developmental disabilities. Evidence from various fields has shown increased parental self-efficacy and positive child outcomes as benefits of home and community-based parent coaching models. A literature review was conducted to investigate the effectiveness of parent coaching interventions delivered in home and community settings for children with developmental disabilities ages 0-12, on a variety of parent and child outcomes. CINAHL Plus, PsycINFO, PubMed, OTseeker were used as databases. The inclusion criteria consisted of: children with developmental disabilities ages 0-12 and their parents, parent coaching models conducted in the home and community, and parent and child outcomes. Studies were excluded if they were in a language other than English and published before 2000. Results showed that parent coaching interventions led to more positive therapy outcomes in child behaviors and symptoms related to their diagnosis or disorder. Additionally, coaching strategies had positive effects on parental satisfaction with therapy, parental self-efficacy, and family dynamics. Findings revealed decreased parental stress and improved parent-child relationships. Further research on parent coaching could involve studying the feasibility of coaching within occupational therapy specifically, incorporating cultural elements into coaching, qualitative studies on parental satisfaction with coaching, and measuring the quality of life outcomes for the whole family.

Keywords: coaching model, developmental disabilities, occupational therapy, pediatrics

Procedia PDF Downloads 194
4703 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 259
4702 A Systematic Literature Review on the Prevalence of Academic Plagiarism and Cheating in Higher Educational Institutions

Authors: Sozon, Pok Wei Fong, Sia Bee Chuan, Omar Hamdan Mohammad

Abstract:

Owing to the widespread phenomenon of plagiarism and cheating in higher education institutions (HEIs), it is now difficult to ensure academic integrity and quality education. Moreover, the COVID-19 pandemic has intensified the issue by shifting educational institutions into virtual teaching and assessment mode. Thus, there is a need to carry out an extensive and holistic systematic review of the literature to highlight plagiarism and cheating in both prevalence and form among HEIs. This paper systematically reviews the literature concerning academic plagiarism and cheating in HEIs to determine the most common forms and suggest strategies for resolution and boosting the academic integrity of students. The review included 45 articles and publications for the period from February 12, 2018, to September 12, 2022, in the Scopus database aligned with the Systematic Review and Meta-Analysis (PRISMA) guidelines in the selection, filtering, and reporting of the papers for review from which a conclusion can be drawn. Based on the results, out of the studies reviewed, 48% of the quantitative results of students were plagiarized and obtained through cheating, with 84% coming from the fields of Humanities. Moreover, Psychology and Social Sciences studies accumulated 9% and 7% articles respectively. Based on the results, individual factors, institutional factors, and social and cultural factors have contributed to plagiarism and cheating cases in HEIs. The resolution of this issue can be the establishment of ethical and moral development initiatives and modern academic policies and guidelines supported by technological strategies of testing.

Keywords: plagiarism, cheating, systematic review, academic integrity

Procedia PDF Downloads 74
4701 Discursive Legitimation Strategies in ISIS’ Online Magazine, Dabiq: A Discourse Historical Approach

Authors: Sahar Rasoulikolamaki

Abstract:

ISIS (also known as DAASH) is an Islamic fundamentalist group that has been known as a global threat to the whole world for their radicalizing approach and application of online platforms as a tool to portray their activities, to disseminate their ideology, and to commit recruiting activities. This study is an attempt to carry out a critical discourse analysis on the argumentative devices by which ISIS legitimizes or delegitimizes positive or negative constructions of social practices in Dabiq. It tries to shed light on how texts in Dabiq as linguistic elements in the micro level of analysis relate to ISIS’ ideology as the higher-up macro level and in other words, how local structures contributed to the construction and transference of a global structure or ideology and vice versa. Therefore, following the relevant analytical frameworks, the study focuses on both micro-level of analysis of arguments (topoi) and macro-structure of legitimation and delegitimation in Dabiq. This purpose is nailed using the analytical categories and tools provided by Wodak’s Discourse Historical Approach (DHA) such as argumentation strategies (topoi), by which the coded language of legitimation/delegitimation and persuasion as used in Dabiq are explored. The ensuing findings demonstrate that Dabiq rigorously relies on the positive representation of the in-group course of actions and justifying its violence and, at the same time, the negative representation of the out-group behavior through implementing various topoi to achieve its desired outcome, which is the ideological manipulation and powerful self-depiction, as well as the supporter recruitment.

Keywords: argumentation, discourse-historical approach, ideology, legitimation and delegitimation, topoi

Procedia PDF Downloads 135
4700 Examining Terrorism through a Constructivist Framework: Case Study of the Islamic State

Authors: Shivani Yadav

Abstract:

The Study of terrorism lends itself to the constructivist framework as constructivism focuses on the importance of ideas and norms in shaping interests and identities. Constructivism is pertinent to understand the phenomenon of a terrorist organization like the Islamic State (IS), which opportunistically utilizes radical ideas and norms to shape its ‘politics of identity’. This ‘identity’, which is at the helm of preferences and interests of actors, in turn, shapes actions. The paper argues that an effective counter-terrorism policy must recognize the importance of ideas in order to counter the threat arising from acts of radicalism and terrorism. Traditional theories of international relations, with an emphasis on state-centric security problematic, exhibit several limitations and problems in interpreting the phenomena of terrorism. With the changing global order, these theories have failed to adapt to the changing dimensions of terrorism, especially ‘newer’ actors like the Islamic State (IS). The paper observes that IS distinguishes itself from other terrorist organizations in the way that it recruits and spreads its propaganda. Not only are its methods different, but also its tools (like social media) are new. Traditionally, too, force alone has rarely been sufficient to counter terrorism, but it seems especially impossible to completely root out an organization like IS. Time is ripe to change the discourse around terrorism and counter-terrorism strategies. The counter-terrorism measures adopted by states, which primarily focus on mitigating threats to the national security of the state, are preoccupied with statist objectives of the continuance of state institutions and maintenance of order. This limitation prevents these theories from addressing the questions of justice and the ‘human’ aspects of ideas and identity. These counter-terrorism strategies adopt a problem-solving approach that attempts to treat the symptoms without diagnosing the disease. Hence, these restrictive strategies fail to look beyond calculated retaliation against violent actions in order to address the underlying causes of discontent pertaining to ‘why’ actors turn violent in the first place. What traditional theories also overlook is that overt acts of violence may have several causal factors behind them, some of which are rooted in the structural state system. Exploring these root causes through the constructivist framework helps to decipher the process of ‘construction of terror’ and to move beyond the ‘what’ in theorization in order to describe ‘why’, ‘how’ and ‘when’ terrorism occurs. Study of terrorism would much benefit from a constructivist analysis in order to explore non-military options while countering the ideology propagated by the IS.

Keywords: constructivism, counter terrorism, Islamic State, politics of identity

Procedia PDF Downloads 189
4699 Detection of Elephant Endotheliotropic Herpes Virus in a Wild Asian Elephant Calf in Thailand by Using Real-Time PCR

Authors: Bopit Puyati, Anchittha Kaewchana, Nuntita Ruksachat

Abstract:

In January 2018, a male wild elephant, approximately 2 years old, was found dead in Phu Luang Wildlife Sanctuary, Loei province. The elephant was likely to die around 2 weeks earlier. The carcass was decayed without any signs of attack or bullet. No organs were removed. A deadly viral disease was suspected. Different organs including lung, liver, intestine and tongue were collected and submitted to the veterinary research and development center, Surin province for viral detection. The samples were then examined with real-time PCR for detecting U41 Major DNA binding protein (MDBP) gene and with conventional PCR for the presence of specific polymerase gene. We used tumor necrosis factor (TNF) gene as the internal control. In our real-time PCR, elephant endotheliotropic herpesvirus (EEHV) was recovered from lung, liver, and tongue whereas only tongue provided a positive result in the conventional PCR. All samples were positive with TNF gene detection. To our knowledge, this is the first report of EEHV detection in wild elephant in Thailand. EEHV surveillance in this wild population is strongly suggested. Linkage between EEHV in wild and domestic elephants should be further explored.

Keywords: elephant endotheliotropic herpes virus, PCR, Thailand, wild Asian elephant

Procedia PDF Downloads 144
4698 Internalized HIV Stigma, Mental Health, Coping, and Perceived Social Support among People Living with HIV/AIDS in Aizawl District, Mizoram

Authors: Mary Ann L. Halliday, Zoengpari Gohain

Abstract:

The stigma associated with HIV-AIDS negatively affect mental health and ability to effectively manage the disease. While the number of People living with HIV/AIDS (PLHIV) has been increasing day by day in Mizoram (a small north-eastern state in India), research on HIV/AIDS stigma has so far been limited. Despite the potential significance of Internalized HIV Stigma (IHS) in the lives of PLHIV, there has been very limited research in this area. It was therefore, felt necessary to explore the internalized HIV stigma, mental health, coping and perceived social support of PLHIV in Aizawl District, Mizoram. The present study was designed with the objectives to determine the degree of IHS, to study the relationship between the socio-demographic characteristics and level of IHS, to highlight the mental health status, coping strategies and perceived social support of PLHIV and to elucidate the relationship between these psychosocial variables. In order to achieve the objectives of the study, six hypotheses were formulated and statistical analyses conducted accordingly. The sample consisted of 300 PLWHA from Aizawl District, 150 males and 150 females, of the age group 20 to 70 years. Two- way classification of “Gender” (male and female) and three-way classification of “Level of IHS” (High IHS, Moderate IHS, Low IHS) on the dependent variables was employed, to elucidate the relationship between Internalized HIV Stigma, mental health, coping and perceived social support of PLHIV. The overall analysis revealed moderate level of IHS (67.3%) among PLHIV in Aizawl District, with a small proportion of subjects reporting high level of IHS. IHS was found to be significantly different on the basis of disclosure status, with the disclosure status of PLHIV accounting for 9% variability in IHS.  Results also revealed more or less good mental health among the participants, which was assessed by minimal depression (50.3%) and minimal anxiety (45%), with females with high IHS scoring significantly higher in both depression and anxiety (p<.01). Examination of the coping strategies of PLHIV found that the most frequently used coping styles were Acceptance (91%), Religion (84.3%), Planning (74.7%), Active Coping (66%) and Emotional Support (52.7%). High perception of perceived social support (48%) was found in the present study. Correlation analysis revealed significant positive relationships between IHS and depression as well as anxiety (p<.01), thus revealing that IHS negatively affects the mental health of PLHIV. Results however revealed that this effect may be lessened by the use of various coping strategies by PLHIV as well as their perception of social support.

Keywords: Aizawl, anxiety, depression, internalized HIV stigma, HIV/AIDS, mental health, mizoram, perceived social support

Procedia PDF Downloads 262
4697 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 191
4696 Programmed Cell Death in Datura and Defensive Plant Response toward Tomato Mosaic Virus

Authors: Asma Alhuqail, Nagwa Aref

Abstract:

Programmed cell death resembles a real nature active defense in Datura metel against TMV after three days of virus infection. Physiological plant response was assessed for asymptomatic healthy and symptomatic infected detached leaves. The results indicated H2O2 and Chlorophyll-a as the most potential parameters. Chlorophyll-a was considered the only significant predictor variant for the H2O2 dependent variant with a P value of 0.001 and R-square of 0.900. The plant immune response was measured within three days of virus infection using the cutoff value of H2O2 (61.095 lmol/100 mg) and (63.201 units) for the tail moment in the Comet Assay. Their percentage changes were 255.12% and 522.40% respectively which reflects the stress of virus infection in the plant. Moreover, H2O2 showed 100% specificity and sensitivity in the symptomatic infected group using the receiver-operating characteristic (ROC). All tested parameters in the symptomatic infected group had significant correlations with twenty-five positive and thirty-one negative correlations where the P value was <0.05 and 0.01. Chlorophyll-a parameter had a crucial role of highly significant correlation between total protein and salicylic acid. Contrarily, this correlation with tail moment unit was (r = _0.930, P <0.01) where the P value was < 0.01. The strongest significant negative correlation was between Chlorophyll-a and H2O2 at P < 0.01, while moderate negative significant correlation was seen for Chlorophyll-b where the P value < 0.05. The present study discloses the secret of the three days of rapid transient production of activated oxygen species (AOS) that was enough for having potential quantitative physiological parameters for defensive plant response toward the virus.

Keywords: programmed cell death, plant–adaptive immune response, hydrogen peroxide (H2O2), physiological parameters

Procedia PDF Downloads 247
4695 The Evaluation of Children Who Had Chest Pain on Pediatric Emergency Department

Authors: Sabiha Sahin

Abstract:

Background: Chest pain is a common complaint in children visiting the emergency department (ED). True organic problems like cardiac disease are rare. We assess the etiology of chest pain among children visiting a Pediatric ED in Eskisehir Osmangazi University. Method: We prospectively evaluated of children with chest pain who visited our Pediatric ED between 1 January 2013 and 31 December 2014. Any case of trauma-associated chest pain was excluded from this study. Results: A total of 100 patients (54 boys, 46 girls), mean age: 11,86±3,51 (age range, 6–17 years) were enrolled into this study; 100 patients had chest radiograms (100 %). Pneumonia was identified in 15 patients. All patients had electrocardiogram study (100 %) and 16 of them showed abnormalities. Additional diagnostic tests were performed on all patients including complete blood count analysis, cardiac markers (CK-MB, Troponin I) and lactate (blood gas analysis). Echocardiograms were performed on all patients and 16 of them showed abnormality (five of majör abnormality). Panendoscopy was done in 20 patients, and gastroesophageal reflux was found in 12 (%12). Overall, idiopathic chest pain and myalgia was the most common diagnosis (32 %). Other associated disorders were asthma (12 %), panic attack (13 %). Conclusion: The most common cause of chest pain prompting a child to visit the ED is idiopathic chest pain. Careful physical examination can reveal important clues and save many unnecessary examinations.

Keywords: child, chest pain, pediatric emergency department, evaluation

Procedia PDF Downloads 253
4694 Eye Tracking Syntax in Language Education

Authors: Marcus Maia

Abstract:

The present study reports and discusses the use of eye tracking qualitative data in reading workshops in Brazilian middle and high schools and in Generative Syntax and Sentence Processing courses at the undergraduate and graduate levels at the Federal University of Rio de Janeiro, respectively. Both endeavors take the sentential level as the proper object to be metacognitively explored in language education (cf. Chomsky, Gallego & Ott, 2019) to develop innate science forming capacity and knowledge of language. In both projects, non-discrepant qualitative eye tracking data collected and quantitatively analyzed in experimental syntax and psycholinguistic studies carried out in Lapex (Experimental Psycholinguistics Laboratory of the Federal University of Rio de Janeiro) were displayed to students as a point of departure, triggering discussions. Classes would generally start with the display of videos showing eye tracking data, such as gaze plots and heatmaps from several studies in Psycholinguistics and Experimental Syntax that we had already developed in our laboratory. The videos usually triggered discussions with students about linguistic and psycholinguistic issues, such as the reading of sentences for gist, garden-path sentences, syntactic and semantic anomalies, the filled-gap effect, island effects, direct and indirect cause, and recursive constructions, among other topics. Active, problem-solving based methodologies were employed with the objective of stimulating student participation. The communication also discusses the importance of developing full literacy, epistemic vigilance and intellectual self-defense in an infodemic world in the lines of Maia (2022).

Keywords: reading, educational psycholinguistics, eye-tracking, active methodology

Procedia PDF Downloads 66
4693 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 503
4692 Coping Strategies of Parents of a Child with Asthma in Relation to the Child's Disease

Authors: Irma Nool, Katriin Saueauk, Ebe Siimson, Vlada Žukova, Elise Gertrud Vellet

Abstract:

Background: Asthma is one of themostcommonchronicdiseases in children, whichcansignificantlyaffectchildren, and challengetheirfamilies. The unpredictability, frequency, and control of asthma attacks have a profound effect on the daily lives of familieswithasthmaticchildren. Thereis a growing body of researchshowingthatthequality of life of parents and childrenislinkedtothedevelopment of asthma. Theoretical and clinicalstudiesprovethat a positive and well-functioningfamilysystemhelpstocopebetterwiththediagnosis of the chronic disease. The aim of theresearchwastodescribethecopingstrategies of parents of a childwithasthmaconcerningthechild'sillness. Method: Theresearchwasanempirical, quantitative, descriptive study. Thesamplewastheparents of a child with asthma at the Tallinn Children'sHospital, whose child was in inpatienttreatmentbetween 07.04.2021 and 12.09.2021. This is a convenient sample. 59 parentsrepliedtothequestionnaire. The questionnaire “CopingInventoryforStressfulSituations” wasusedtocollectthedata, whichwastranslatedinto Estonian and Russian using a back-and-forthtranslationtechnique. Thequestionnairewasanswered on a 5-point Likert scale. Dataanalysiswasperformedusing SPSS 26.0, descriptive statistics, with mean values and standard deviation. The Mann-Whitney U test wasusedtocomparefathers and motherscopingstrategies. PermissiontoconductresearchhasbeenobtainedfromtheEthicsCommitteeforHuman Research of theInstituteforHealthDevelopment. Results: The mean age of the respondents was 40 ± 6.2 years (median 40), withtheyoungestbeing 27 yearsold and the oldest being 57 yearsold. Of the respondents, 51 (86.4%) were mothers, and 8 (13.6%) werefathers. Parentsusedthemosttask-orientedcopingstrategies (mean 3.35 ± 0.602) and theleastemotion-orientedcopingstrategies (mean 1.97 ± 0.526). Mothersusedmoretask-orientedcopingstrategies (p = 0.001) than fathers. Fathersusedemotion-orientedcopingstrategiesless (p = 0.024) than mothers. mothersplantheirtimebetter (p = 0.043), focus on the problem and look at how to solve it (p = 0.007), and makeanefforttogetthingsdone (p = 0.045). mothersblamethemselvesmorefornotknowingwhattodo (p = 0.045) and worryaboutwhattheyshoulddo (p = 0.027). mothers look more at the goods displayed in the shop windows (p = 0.018) and go for a walk (p = 0.007) compared to fathers. Conclusions: The results of theresearchshowedthatproblem-orientedcopingstrategiesare used the most and there are differences in the behavior of fathers and mothers. Thisshouldbetakenintoaccountwhenprovidingfamily-centered nursing care.

Keywords: asthma, coping strategies, parents, family

Procedia PDF Downloads 114
4691 Contribution of Crime Scene and Autopsy Investigation to the Solving of the Case in the Case of Death as a Result of Self-Harm

Authors: Murat Mert, Yusuf Ozer, Fatih Kolay

Abstract:

Behaviour of giving harm to the body in literature has been named as “self-injury”, “self-mutilation” ve “self-harm”. “Self-injury”, or “self-mutilation” is generally used for the same meaning and mentioned as an action which is committed to the body itself directly. As is seen that alcohol and drug users have injured their bodies because of deprivation, whereas behaviour of self-injury in some societies is accepted as religious and cultural, it has nevertheless been diagnosed in people who have a borderline personality disorder, histrionic personality disorder, psychotic personality disorder and mood disorder. There has not been any direct self-murder tendency in people having self-harmed. However, death cases can be seen together with loss of consciousness depending on loss of blood by exceeding the limit in the course of injury action. 34- year old – male person who was alcohol addicted, having had a psycological treatment beforehand, had mutilated his small intestine together with fatty tissue by cutting his body with a razor-blade at the thought of insects strolling around the body (delirium tremens) due to deprivation attack and had died in the result of various cuts. In this study, crime scene investigation and death mechanism of the person having had self-harmed in a result of abstinence syndrome will be explained. Relevant criteria which differentiate this case from homicide will be examined.

Keywords: self-injury, autopsy, abstinence syndrome, CSI

Procedia PDF Downloads 94
4690 A Qualitative Look at Mental Health Stressors in Response to COVID-19

Authors: Gabriel G. Gaft, Xayvinay Xiong, Amanda Sunday

Abstract:

The emergent pandemic from COVID-19 virus has forced people to adjust to major changes. These changes include all elements of family and work life and required people to engage in novel behaviors. For many people, the social norms to which they have been accustomed no longer prevail. Not surprisingly, such enormous changes in daily life have been associated with greater problems in mental health; and research regarding ways in which mental health professionals can support people is more necessary than ever before. It is often useful to assess people’s reactions through surveys and utilize quantitative data to answer questions about coping strategies etc. It is also likely, however, that a host of individual factors are going to contribute to what might be considered 'good' or 'bad' coping mechanisms to a worldwide pandemic. To this end, qualitative studies—where the individual’s subjective experience is highlighted—are likely to provide more vital information for mental health professionals interested in supporting the particular person in front of them. This study reports on qualitative data, where X participants were asked questions about social distancing, coping strategies, and general attitudes towards social changes resulting from the COVID-19 pandemic. Informal interviews were conducted during the months of June-July 2020. Data were analyzed using Interpretative Phenomenological Analyses. Themes were identified first for each participant and then compared across different individual participants. Several findings emerged. First, all participants understood major health messages being imparted by governing bodies such as the CDC and WHO. The researchers feel this finding is important as it suggests health messages are at least being effectively communicated. Second, there was a clear trend for themes which highlighted the conflicting emotions participants felt about the changes they were expected to endure: positive and negative elements were identified, although a participant who had pre-existing conditions placed greater emphasis on the negative elements. One participant who was particularly interested in impression management also exclusively emphasized negative emotions. Third, participants who were able to reevaluate priorities—what Lazarus might call secondary appraisals—experienced social distancing as a positive rather than negative phenomenon. Finally, participants who were able to develop specific strategies—such as boundaries for work and self-care—reported themes of adjustment and contentment. Taken together, these findings suggest mental health practitioners can assist people to adjust more positively through specific techniques focusing on re-evaluation of life priorities and strategic coping skills.

Keywords: COVID-19, pandemic, phenomenology, virus

Procedia PDF Downloads 120
4689 Therapeutical Role of Copper Oxide Nanoparticles (CuO NPs) for Breast Cancer Therapy

Authors: Dipranjan Laha, Parimal Karmakar

Abstract:

Metal oxide nanoparticles are well known to generate oxidative stress and deregulate normal cellular activities. Among these, transition metals copper oxide nanoparticles (CuO NPs) are more compelling than others and able to modulate different cellular responses. In this work, we have synthesized and characterized CuO NPs by various biophysical methods. These CuO NPs (~30 nm) induce autophagy in human breast cancer cell line, MCF7 in a time and dose-dependent manner. Cellular autophagy was tested by MDC staining, induction of green fluorescent protein light chain 3 (GFP-LC3B) foci by confocal microscopy, transfection of pBABE-puro mCherry-EGFP-LC3B plasmid and western blotting of autophagy marker proteins LC3B, beclin1, and ATG5. Further, inhibition of autophagy by 3-Methyladenine (3-MA) decreased LD50 doses of CuO NPs. Such cell death was associated with the induction of apoptosis as revealed by FACS analysis, cleavage of PARP, dephosphorylation of Bad and increased cleavage product of caspase3. siRNA-mediated inhibition of autophagy-related gene beclin1 also demonstrated similar results. Finally, induction of apoptosis by 3-MA in CuO NPs treated cells were observed by TEM. This study indicates that CuO NPs are a potent inducer of autophagy which may be a cellular defense against the CuO NPs mediated toxicity and inhibition of autophagy switches the cellular response into apoptosis. A combination of CuO NPs with the autophagy inhibitor is essential to induce apoptosis in breast cancer cells. Acknowledgments: The authors would like to acknowledge for financial support for this research work to the Department of Biotechnology (No. BT/PR14661/NNT/28/494/2010), Government of India.

Keywords: nanoparticle, autophagy, apoptosis, siRNA-mediated inhibition

Procedia PDF Downloads 440