Search results for: nutrition security
1703 The Effect of Vitamin D Deficiency on Endothelial Function in Atherosclerosis Patients Living in Saudi Arabia
Authors: Wedad Azhar
Abstract:
Vitamin D is an essential fat-soluble vitamin that is required for the maintenance of good health. It is obtained either through exposure to sunlight (ultraviolet B radiation) or through dietary sources. The role of vitamin D is beyond bone health. Indeed, it plays a critical role in the immune system and a broad range of organ functions such as the cardiovascular system. Moreover, vitamin D plays a critical role in the endothelial function, which is one of the main indicators of atherosclerosis. This study is investigating the correlation between vitamin D status and endothelial function in preventing and treating atherosclerosis especially in country that has ample of sunshine but yet, Saudis from suffering from this issue vitamin D deficiency and insufficiency. Ninety participants from both genders and aged 40 to 60will be involved. The participants will be categorised into three groups: the control group will be healthy persons, patients at risk of developing atherosclerosis, patients formally diagnosed atherosclerosis. Half of the participants in each group should already have been taking vitamin D supplementations. Fasting blood samples will be taken from the participants for biochemical assays. Endothelial function will be assist by flow-mediated dilation of the brachial artery. Participants will be asked to complete a questionnaire on their social and economic status, education level, daily exposure to sunlight, smoking status, consumption of supplements and medication, and a food frequency of vitamin D intake. The data will be analysed using SPSS.Keywords: atherosclerosis, endothelial function, nutrition, vitamin D
Procedia PDF Downloads 2961702 The Uniting Control Lyapunov Functions in Permanent Magnet Synchronous Linear Motor
Authors: Yi-Fei Yang, Nai-Bao He, Shao-Bang Xing
Abstract:
This study investigates the permanent magnet synchronous linear motor (PMSLM) chaotic motion under the specific physical parameters, the stability and the security of motor-driven system will be unavoidably influenced. Therefore, it is really necessary to investigate the methods of controlling or suppressing chaos in PMSLM. Firstly, we derive a chaotic model of PMSLM in the closed-loop system. Secondly, in order to realize the local asymptotic stabilization of the mechanical subsystem and the global stabilization of the motor-driven system including electrical subsystem, we propose an improved uniting control lyapunov functions by introducing backstepping approach. Finally, an illustrated example is also given to show the electiveness of the obtained results.Keywords: linear motor, lyapunov functions, chao control, hybrid controller
Procedia PDF Downloads 3411701 Performance of Environmental Efficiency of Energy Consumption in OPEC Countries
Authors: Bahram Fathi, Mahdi Khodaparast Mashhadi, Masuod Homayounifar
Abstract:
Global awareness on energy security and climate change has created much interest in assessing energy efficiency performance. A number of previous studies have contributed to evaluate energy efficiency performance using different analytical techniques among which data envelopment analysis (DEA) has recently received increasing attention. Most of DEA-related energy efficiency studies do not consider undesirable outputs such as CO2 emissions in their modeling framework, which may lead to biased energy efficiency values. Within a joint production frame work of desirable and undesirable outputs, in this paper we construct energy efficiency performance index for measuring energy efficiency performance by using environmental DEA model with CO2 emissions. We finally apply the index proposed to assess the energy efficiency performance in OPEC over time.Keywords: energy efficiency, environmental, OPEC, data envelopment analysis
Procedia PDF Downloads 3901700 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.Keywords: proxy signature, fault tolerance, rsa, key agreement protocol
Procedia PDF Downloads 2881699 The Use of Global Positioning Systems to Evaluate the Effect of Protein and Carbohydrate Supplementation on Collegiate Soccer Performance
Authors: Joshua Bradley, Matthew Buns
Abstract:
This study aimed to identify the effect of concurrent nutritional supplementation on soccer performance as players ingested either carbohydrate CHO (52 g of Cytocarb Maltodextrin) or a combined carbohydrate and protein PRO (Muscle Milk Pro Series 17g CHO + 50 g PRO liquid) supplement. Twelve male, junior college soccer players (age: 18 ± 6 years, wt. 73.3 ± 8.6 kg) completed three trials wearing global positioning systems (GPS) to measure total running distance and sprinting distance during soccer simulation games. The first match simulation was a baseline match with no supplementation. One hour prior to the second match, simulation players were randomly assigned to one of two supplemental groups CHO or CHO + PRO. A repeated measures ANOVA with a Greenhouse-Geisser correction revealed a statistically significant increase in the total distance run for the CHO supplementation group in comparison to the CHO + PRO group (10.19 ± .200 km vs. 9.77± .194km, p = .035). Although the total running distance was meaningfully influenced by the supplementation, the pattern of response for total sprinting distance was not influenced by supplementation. There was a decline in sprinting distance and total running distance from first half to second half, both for the control (M = -0.01 km, SD = 0.17) and CHO supplementation group (-0.04 km, SD = .19), although these differences were not statistically meaningful. There was a positive correlation between sprinting distance and total distance, which was statistically significant (r = -.514, n = 36, p = .01) In conclusion, supplementation influenced the pattern of activity and demonstrated between-trial differences.Keywords: GPS, nutrition, simulation, supplementation
Procedia PDF Downloads 1481698 Fertilizer Procurement and Distribution in Nigeria: Assessing Policy against Implementation
Authors: Jacob Msughter Gwa, Rhys Williams
Abstract:
It is widely known that food security is a major concern in Sub-Saharan Africa. In many regions, including Nigeria, this is due to an agriculture-old problem of soil erosion beyond replacement levels. It seems that the use of fertilizer would be an immediate solution as it can boost agricultural productivity, and low agricultural productivity is attributed to the low use of fertilizers in Nigeria. The Government of Nigeria has been addressing the challenges of food shortage but with limited success. The utilisation of a practical and efficient subsidy programme in addressing this issue seems to be needed. However, the problem of procurement and distribution changes from one stage of subsidy to another. This paper looks at the difference between the ideal and the actual implementation of agricultural fertilizer policies in Nigeria, as it currently runs the risk of meeting required standards on paper but missing the desired real outcomes, and recognises the need to close the gap between the paper work and the realities on the ground.Keywords: agricultural productivity, fertilizer distribution, fertilizer procurement, Nigeria
Procedia PDF Downloads 3721697 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net
Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie
Abstract:
A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.Keywords: reliability, colored Petri net, assessment, payment models, m-commerce
Procedia PDF Downloads 5401696 Synthesis of CeF3:Sm3+ Nanophosphor for Biological Applications
Authors: Mayuri Gandhi, Nayan Agrawal, Harshita Bhatia
Abstract:
In the present work, cerium fluoride (CeF3) was selected as the host material because of its high density, fast response and high radiation resistance, efficient absorption and energy transfer by host (to activator). For the synthesis of CeF3 nanoparticles doped with Sm3+ ion, co-precipitation route was employed. Thus for optimum results, concentration dependent studies of the fluorescence of Sm3+ was carried out. The photoluminescence gave emissions in both visible as well as the NIR region and therefore it can have its application in solar cells, where it can absorb a large spectrum of energy. CeF3:Sm3+ nanoparticles were carefully incorporated in a suitable polymer matrix in order to demonstrate a variety of applications to improve the performance of the polymer materials and use it to develop high grade optoelectronic devices such as LEDs, security labelling, lasers, displays, biological imaging, etc.Keywords: bioimaging, cerium fluoride, NIR emission, samarium
Procedia PDF Downloads 4281695 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists
Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat
Abstract:
This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing
Procedia PDF Downloads 1291694 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation
Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud
Abstract:
Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing
Procedia PDF Downloads 1021693 US-India Strategic Bargaining and Power Balancing in South Asia
Authors: Anila Syed, Manzoor Ahmad
Abstract:
The relationship between United States and India has transformed from estrangement to wider engagement since 2004. With the convergence of interests and shared values both the US and India came close towards each other and evolved strategic partnership through civil nuclear cooperation. This paper analyze the cost and benefit of strategic partnership with India for US, the impact of India’s emergence as regional power on South Asian balance of power and its impact on Pak-US relationship. It also focuses on security structure of the region and challenges for the US to maintain strategic partnership with two rival states (India and Pakistan). The work also gives some recommendations for balancing power in the region in order to ensure durable peace not only between India and Pakistan but also in south Asia.Keywords: US-India strategic partnership, civil-nuclear cooperation, balance of power, impacts on Pak-US relationship
Procedia PDF Downloads 4171692 An Exploration of Health Promotion Approach to Increase Optimal Complementary Feeding among Pastoral Mothers Having Children between 6 and 23 Months in Dikhil, Djibouti
Authors: Haruka Ando
Abstract:
Undernutrition of children is a critical issue, especially for people in the remote areas of the Republic of Djibouti, since household food insecurity, inadequate child caring and feeding, unhealthy environment and lack of clean water, as well as insufficient maternal and child healthcare, are underlying causes which affect. Nomadic pastoralists living in the Dikhil region (Dikhil) are socio-economically and geographically more vulnerable due to displacement, which in turn worsens the situation of child stunting. A high prevalence of inappropriate complementary feeding among pastoral mothers might be a significant barrier to child growth. This study aims to identify health promotion intervention strategies that would support an increase in optimal complementary feeding among pastoral mothers of children aged 6-23 months in Dikhil. There are four objectives; to explore and to understand the existing practice of complementary feeding among pastoral mothers in Dikhil; to identify the barriers in appropriate complementary feeding among the mothers; to critically explore and analyse the strategies for an increase in complementary feeding among the mothers; to make pragmatic recommendations to address the barriers in Djibouti. This is an in-depth study utilizing a conceptual framework, the behaviour change wheel, to analyse the determinants of complementary feeding and categorize health promotion interventions for increasing optimal complementary feeding among pastoral mothers living in Dikhil. The analytical tool was utilized to appraise the strategies to mitigate the selected barriers against optimal complementary feeding. The data sources were secondary literature from both published and unpublished sources. The literature was systematically collected. The findings of the determinants including the barriers of optimal complementary feeding were identified: heavy household workload, caring for multiple children under five, lack of education, cultural norms and traditional eating habits, lack of husbands' support, poverty and food insecurity, lack of clean water, low media coverage, insufficient health services on complementary feeding, fear, poor personal hygiene, and mothers' low decision-making ability and lack of motivation for food choice. To mitigate selected barriers of optimal complementary feeding, four intervention strategies based on interpersonal communication at the community-level were chosen: scaling up mothers' support groups, nutrition education, grandmother-inclusive approach, and training for complementary feeding counseling. The strategies were appraised through the criteria of effectiveness and feasibility. Scaling up mothers' support groups could be the best approach. Mid-term and long-term recommendations are suggested based on the situation analysis and appraisal of intervention strategies. Mid-term recommendations include complementary feeding promotion interventions are integrated into the healthcare service providing system in Dikhil, and donor agencies advocate and lobby the Ministry of Health Djibouti (MoHD) to increase budgetary allocation on complementary feeding promotion to implement interventions at a community level. Moreover, the recommendations include a community health management team in Dikhil training healthcare workers and mother support groups by using complementary feeding communication guidelines and monitors behaviour change of pastoral mothers and health outcome of their children. Long-term recommendations are the MoHD develops complementary feeding guidelines to cover sector-wide collaboration for multi-sectoral related barriers.Keywords: Afar, child food, child nutrition, complementary feeding, complementary food, developing countries, Djibouti, East Africa, hard-to-reach areas, Horn of Africa, nomad, pastoral, rural area, Somali, Sub-Saharan Africa
Procedia PDF Downloads 1291691 The Use of Drones in Measuring Environmental Impacts of the Forest Garden Approach
Authors: Andrew J. Zacharias
Abstract:
The forest garden approach (FGA) was established by Trees for the Future (TREES) over the organization’s 30 years of agroforestry projects in Sub-Saharan Africa. This method transforms traditional agricultural systems into highly managed gardens that produce food and marketable products year-round. The effects of the FGA on food security, dietary diversity, and economic resilience have been measured closely, and TREES has begun to closely monitor the environmental impacts through the use of sensors mounted on unmanned aerial vehicles, commonly known as 'drones'. These drones collect thousands of pictures to create 3-D models in both the visible and the near-infrared wavelengths. Analysis of these models provides TREES with quantitative and qualitative evidence of improvements to the annual above-ground biomass and leaf area indices, as measured in-situ using NDVI calculations.Keywords: agroforestry, biomass, drones, NDVI
Procedia PDF Downloads 1611690 ATC in Competitive Electricity Market Using TCSC
Authors: S. K. Gupta, Richa Bansal
Abstract:
In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric
Procedia PDF Downloads 5001689 Modelling Public Knowledge and Attitude towards Genetically Modified Maize in Kenya
Authors: Ezrah Kipkirui Tonui, George Otieno Orwa
Abstract:
A survey of 138 farmers was conducted in Rift valley, Kenya, in November and December 2013 in three counties (Uasin-gishu, Elgeyo-marakwet, and Tranzoia) to determine public knowledge and attitude towards genetically modified (GM) maize. Above two third (70%) of the respondents had knowledge of GM maize, mostly those educated and male. Female was found to be having low knowledge on GM maize. Public acknowledged the technology’s potential positive impacts, with more than 90% willing to adopt and more than 98% willing to buy GM seedlings at any given price. A small percentage less than 3% were of a negative opinion about willing to buy and adopt GM seeds. We conclude that GM technology has a role to play in food security in Kenya. However, the public needs more information about the technology, which can be provided through established sources of information and training. Finally, public knowledge and attitude on GM maize should be studied on a regular basis, and the survey population broadened to 47 counties.Keywords: public, knowledge, attitudes, GM maize, Kenya
Procedia PDF Downloads 3141688 Application of Biometrics in Patient Identification Card: Case Study of Saudi Arabia
Authors: Sarah Aldhalaan, Tanzila Saba
Abstract:
Healthcare sectors are increasing rapidly to fulfill patient’s needs across the world. A patient identification is considered as the main aspect for a patient to be served in healthcare institutes. Nowadays, people are presenting their insurance card along with their identification card in order to get the needed treatment in hospitals however, this process lack security preferences. The aim of this research paper is to reveal a solution to introduce and use biometrics in healthcare hospitals. The findings show that the people know biometrics since they are interacting with them through different channels and that the need for biometrics techniques to identify patients is essential. Also, the survey relevant questions are used to analyze and add insights on what is are the suitable biometrics to be used in such cases. Moreover, results are presented to exhibit the effectiveness of the used methodology and in analyzing usage of biometrics in hospitals in an enhancing way. Finally, an interesting conclusion of overall work is presented at the end of paper.Keywords: biometrics, healthcare, fingerprint, Saudi Arabia
Procedia PDF Downloads 2511687 Techno Economic Analysis for Solar PV and Hydro Power for Kafue Gorge Power Station
Authors: Elvis Nyirenda
Abstract:
This research study work was done to evaluate and propose an optimum measure to enhance the uptake of clean energy technologies such as solar photovoltaics, the study also aims at enhancing the country’s energy mix from the overdependence on hydro power which is susceptible to droughts and climate change challenges The country in the years 2015 - 2016 and 2018 - 2019 had received rainfall below average due to climate change and a shift in the weather pattern; this resulted in prolonged power outages and load shedding for more than 10 hours per day. ZESCO Limited, the utility company that owns infrastructure in the generation, transmission, and distribution of electricity (state-owned), is seeking alternative sources of energy in order to reduce the over-dependence on hydropower stations. One of the alternative sources of energy is Solar Energy from the sun. However, solar power is intermittent in nature and to smoothen the load curve, investment in robust energy storage facilities is of great importance to enhance security and reliability of electricity supply in the country. The methodology of the study looked at the historical performance of the Kafue gorge upper power station and utilised the hourly generation figures as input data for generation modelling in Homer software. The average yearly demand was derived from the available data on the system SCADA. The two dams were modelled as natural battery with the absolute state of charging and discharging determined by the available water resource and the peak electricity demand. The software Homer Energy System is used to simulate the scheme incorporating a pumped storage facility and Solar photovoltaic systems. The pumped hydro scheme works like a natural battery for the conservation of water, with the only losses being evaporation and water leakages from the dams and the turbines. To address the problem of intermittency on the solar resource and the non-availability of water for hydropower generation, the study concluded that utilising the existing Hydro power stations, Kafue Gorge upper and Kafue Gorge Lower to work conjunctively with Solar energy will reduce power deficits and increase the security of supply for the country. An optimum capacity of 350MW of solar PV can be integrated while operating Kafue Gorge power station in both generating and pumping mode to enable efficient utilisation of water at Kafue Gorge upper Dam and Kafue Gorge Lower dam.Keywords: hydropower, solar power systems, energy storage, photovoltaics, solar irradiation, pumped hydro storage system, supervisory control and data acquisition, Homer energy
Procedia PDF Downloads 1201686 Determining Food Habits in Süleymanpasa Town of Tekirdag City, Turkey
Authors: Emine Yilmaz, Ismail Yilmaz, Harun Uran
Abstract:
Food-borne problems have been placed among the most leading problems of the society especially in recent years. This state arises as a problem which affects the society wholly such as the supply of food stuffs that are necessary for an individual to perform his physiological and biological functions, their amount, compound, their effects on health and distribution by individuals. This study was conducted in order to determine the sensitivities and criteria of people, who have different socio-economic backgrounds and live in Süleymanpasa Town of Tekirdag City, in their preference of food stuffs. The research data were collected by means of Interview Technique with individuals within the scope of the study (300) and applying surveys with convenience sampling. According to the research results, quality appears in the first rank among the factors by which consumers are affected while buying food stuffs. Consumers stated that they try to be careful with not buying food sold outdoors. The most preferred food among the ones being sold outdoor were found to be breakfast food. Also, food stuff which consumers become the most selective for while buying was determined to be meat and meat products. Due to general knowledge about the food stuff consumed in human nutrition may affect their health negatively; consumers expressed that they are very relevant with their diets and this circumstances affects their purchase preferences.Keywords: consumption, food safety, consumer behaviour, purchase preferences
Procedia PDF Downloads 3261685 International Trade, Food Security, and Climate Change in an Era of Liberal Trade
Authors: M. Barsa
Abstract:
This paper argues that current liberal trade regimes have had the unfortunate effect of concentrating food production by area and by crop. While such hyper-specialization and standardization might be efficient under ordinary climate conditions, the increasing severity of climate shocks makes such a food production system especially vulnerable. Examining domestic US crop production, and the fact that similar patterns are evident worldwide, this paper explores the vulnerabilities of several major crops and suggests that the academic arguments surrounding increasing liberalization of trade are ill-suited to the climate challenges to come. Indeed, a case can be made that protectionist measures—especially by developing countries whose agricultural sectors are vulnerable to the cheap US and European exports—are increasingly necessary to scatter food production geographically and to retain a resilient diversity of crop varieties.Keywords: climate change, crop resilience, diversity, international trade
Procedia PDF Downloads 1341684 The Culture of Extrajudicial Executions: An Investigative Study of the Philippines’ Fifth Republic
Authors: Nathalie Quinto, Danielle Solancho
Abstract:
In 1986, after Marcos’ Martial Law of 1972, the Philippines revised its constitution for the fifth time, under the Aquino Administration. Extrajudicial violence was expected to be lessened, if not completely eradicated after this was passed. However, state-sponsored executions continued to persist even in the present time. There are currently identified policy gaps when it comes to extrajudicial cases, as there is no generally accepted definition of the term in the Philippines. In this paper, a triangulation method of historically published papers, key informant interviews, and focus group discussions of academics, scholars, and people who are involved in various cases found, was utilized for the methodology. This paper explores the establishment of a normalized system of state-sponsored executions in the country and why the state resorts to this kind of action. It found that due to a weak political, and social institution, a culture of extrajudicial executions was established.Keywords: extrajudicial execution, human rights, justice, security
Procedia PDF Downloads 2671683 Technology Transfer of Indigenous Technologies: Emerging Aid to Indian Health Sector
Authors: Tripta Dixit, Smita Sahu, William Selvamurthy, Sadhana Srivastava
Abstract:
India is battling with the issues of accessibility, affordability and availability of quality health to the masses. Indian medical heritage which dated back to 3000 BC unveils the rich knowledge pool which has undergone a perceptible change over years, such as eradication of many communicable diseases, increasing individual awareness of quality health and import driven medical device market etc. Despite a slew of initiatives the holistic slogan of ‘health for all’ remains elusive and a concern for the nation. The 21st-century projects a myriad of challenges like cultural diversity, large population, demographic dividend and geographical segmentation leading to varied needs of people as per their regional conditions of climate, disease prevalence, nutrition and sanitation. But these challenges are also opportunities for the development of indigenous, low cost and accessible technologies to tackle them. This requires reinforcing the potential of indigenous technologies in coordination with prevailing health issues in various regions of country. This paper emphasis on the strategy for exploring the indigenous technologies with entrusted up-scaling to meet the diverse needs of the people. This review proposes to adopt technology transfer as a strategy to establish a vibrant ecosystem for identifying and up-scaling the indigenous medical technologies with diligent hand-holding for public health.Keywords: health, indigenous, medical technology, technology transfer
Procedia PDF Downloads 2551682 Singularization: A Technique for Protecting Neural Networks
Authors: Robert Poenaru, Mihail Pleşa
Abstract:
In this work, a solution that addresses the protection of pre-trained neural networks is developed: Singularization. This method involves applying permutations to the weight matrices of a pre-trained model, introducing a form of structured noise that obscures the original model’s architecture. These permutations make it difficult for an attacker to reconstruct the original model, even if the permuted weights are obtained. Experimental benchmarks indicate that the application of singularization has a profound impact on model performance, often degrading it to the point where retraining from scratch becomes necessary to recover functionality, which is particularly effective for securing intellectual property in neural networks. Moreover, unlike other approaches, singularization is lightweight and computationally efficient, which makes it well suited for resource-constrained environments. Our experiments also demonstrate that this technique performs efficiently in various image classification tasks, highlighting its broad applicability and practicality in real-world scenarios.Keywords: machine learning, ANE, CNN, security
Procedia PDF Downloads 201681 Epidemiology of Primary Bronchopulmonary Cancer in Tunisia
Authors: Melliti Rihab, Zaeid Sonia, Khechine Wiem, Daldoul Amira
Abstract:
Introduction: Lung cancer is the leading cause of cancer death. Its incidence is increasing, and its prognosis remains pejorative. We present the clinical, pathological, and therapeutic characteristics of bronchopulmonary cancer (BPC) in Tunisia. Methods: Retrospective study including patients followed in the oncology department of the University Hospital of Monastir between April 2014 and December 2021 suffering from lung cancer. Results: These are 117 patients, including 86.3% men and 13.7% women (sex ratio 6.3). The average age was 64 years ± 9 (37-83), with 95.7% being over 50 years old. Patients were smokers in 82% of cases. The clinical signs were dominated by chest pain (27.5%) and dyspnea in 21.1% of cases. In 6 patients, an episode of COVID-19 infection revealed the diagnosis. Half of the patients had a PS between 0 and 1. Small cell lung cancer was present in 18 patients (15.4%). The majority of non small cell lung cancer was of the adenocarcinoma type (68.7%). The diagnosis was late (stage IV) in 62.4% of cases. BPC was metastatic to bone (52%), contralateral lung (25.9%), and brain (27.3%). Patients were oligometastatic in 26% of cases. Surgery and radiotherapy were performed respectively in 14.5% and 23.1% of cases. Three-quarters of the patients had had nutrition (75.2%). The ROS1 mutation was present in 1 patient. PDL-1 expression was >40% in 2 patients. Survival was mean eight months ± 7.4. Conclusion: Lung cancer is diagnosed at a late stage in Tunisia. The lack of molecular study for non-small cell PBC and the lack of marketing authorization for tyrosine kinase inhibitors in Tunisia make the management incomplete.Keywords: SCLC, NCSLC, ROS1, PDL1
Procedia PDF Downloads 831680 Clicking Based Graphical Password Scheme Resistant to Spyware
Authors: Bandar Alahmadi
Abstract:
The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.Keywords: security, password, authentication, attack, applications
Procedia PDF Downloads 1701679 Enhancing the Safety Climate and Reducing Violence against Staff in Closed Hospital Wards
Authors: Valerie Isaak
Abstract:
This study examines the effectiveness of an intervention program aimed at enhancing a unit-level safety climate as a way to minimize the risk of employees being injured by patient violence. The intervention program conducted in maximum security units in one of the psychiatric hospitals in Israel included a three day workshop. Safety climate was examined before and after the implementation of the intervention. We also collected data regarding incidents involving patient violence. Six months after the intervention a significant improvement in employees’ perceptions regarding management’s commitment to safety were found as well as a marginally significant improvement in communication concerning safety issues. Our research shows that an intervention program aimed at enhancing a safety climate is associated with a decrease in the number of aggressive incidents. We conclude that such an intervention program is likely to return the sense of safety and reduce the scope of violence.Keywords: violence, intervention, safety climate, performance, public sector
Procedia PDF Downloads 3571678 Social Reforms and the Welfare State in America after the New Deal (1945-1969)
Authors: Aziza Tahar Djebbar
Abstract:
Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms
Procedia PDF Downloads 4631677 Indicators of Radicalization in Prisons Facilities: Identification and Assessment
Authors: David Kramsky, Barbora Vegrichtova
Abstract:
The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.Keywords: indicators, moral decision, radicalism, social profile
Procedia PDF Downloads 2191676 Effect of Silicon Sulphate and Silicic Acid Rates on Growth, Yield and Nutritional Status of Wheat (Triticum aestivum L.)
Authors: R. G. Shemi, M. A. Abo Horish, Kh. M. A. Mekled
Abstract:
The utilization of silicon (Si) sources is a crucial agricultural tool that requires optimization to promote sustainable practices. The application of Si provides the implementation of biological mechanisms of plant nutrition, growth promotion, and protection. The aims of this experiment were to investigate the relative efficacy of Si sources and levels on the growth, yield, and mineral content of wheat. The study examined the effects of silicon sulphate and silicic acid levels on growth, spike characteristics, yield parameters, and macro- and micronutrient concentrations of wheat during the 2-season. The entire above-indicated parameters were significantly (p < 0.05) increased with increasing levels of silicon sulphate and silicic acid compared to the control. Foliar application of silicon sulphate 150 ppm and silicic acid 60 ppm statistically (p < 0.05) enhanced grain N concentration and the grain yield by 136.14 and 77.85%, 43.49 and 34.52% in the 1st season, and by 78.62 and 54.40%, 43.53 and 33.18% in the 2nd season, respectively, as compared with control. Overall, foliar applications of silicon sulphate at 150 ppm and silicic acid at 60 ppm were greatly efficient amongst all Si levels and sources in improving growth and spike characters, increasing yield parameters, and elevating grain nutrients. Finally, the treatment of silicon sulfate at 150 ppm was more effective than the treatment of silicic acid at 60 ppm in increasing growth, grain nutrients, and productivity of wheat and attaining agricultural sustainability under experiment conditions.Keywords: wheat, silicon sulphate, silicic acid, grain nutrients
Procedia PDF Downloads 251675 Debate between Breast Milk and Formula Milk in Nutritional Value
Authors: Nora Alkharji, Wafa Fallatah
Abstract:
Introduction: One of the major issues to consider when is deciding on what to feed a baby is the quality of the food itself. Whilst commercially prepared infant formulas are a nutritious alternative to breast milk, and even contain some vitamins and nutrients, most major medical organizations consider breastfeeding the best nutritional option for babies. Choosing whether to breastfeed or formula feed your baby is one of the first decisions expectant parents will make. The American Academy of Pediatrics (AAP) is in agreement with other organizations such as the American Medical Association (AMA), the American Dietetic Association (ADA), and the World Health Organization (WHO) in recommending breastfeeding as the best nutrition for babies and best suited for a baby's digestive system. In addition, breastfeeding helps in the combatting of infections, prevention of allergies, and protection against various chronic conditions. The decision to breastfeed or formula feed one’s baby is a very personal one. However, certain points need to be clarified regarding the nutritional value of breastfeeding versus formula feeding to allow for informed decision-making. Methodology: -A formal debate about whether to breastfeed or formula feed babies as the better choice. -There will be two debaters, both lactation consultants -Arguments will be based on evidence-based medicine -Duration period of debated: 45 min Result: Clarification and heightened awareness of the benefits of breastfeeding. Conclusion: This debate will make the choice between breastfeeding or formula feeding a relatively easy one to make by both health worker and parents.Keywords: breastmilk, formula milk, nutritional, comparison
Procedia PDF Downloads 4691674 A Study of Safety of Data Storage Devices of Graduate Students at Suan Sunandha Rajabhat University
Authors: Komol Phaisarn, Natcha Wattanaprapa
Abstract:
This research is a survey research with an objective to study the safety of data storage devices of graduate students of academic year 2013, Suan Sunandha Rajabhat University. Data were collected by questionnaire on the safety of data storage devices according to CIA principle. A sample size of 81 was drawn from population by purposive sampling method. The results show that most of the graduate students of academic year 2013 at Suan Sunandha Rajabhat University use handy drive to store their data and the safety level of the devices is at good level.Keywords: security, safety, storage devices, graduate students
Procedia PDF Downloads 356