Search results for: attacks and controls
1434 Analysing Responses of Intermediate and Expert Karate Athletes towards the Gyaku-Zuki Using Virtual Reality
Authors: Nicole Bandow, Peter Emmermacher, Oliver Wienert, Steffen Masik, Kerstin Witte
Abstract:
Karate-kumite is a fast sport where a good perception and anticipation of movements is needed in order to respond appropriately. Perception and anticipation are therefore essential for an efficient and precise movement control and a limiting factor in karate kumite. Previous studies only used 2D video technologies combined with the occlusion technique to study anticipation in sports. These studies showed limitations in the usage of 2D video footage in regards to realism and the presentation of depth information. To overcome these issues a virtual 3D environment was developed to create a similar to real life environment. The aim of this study was to compare the differences in responses of intermediate and expert karate athletes towards temporally and spatially occluded virtual karate attacks from two attackers. Five male expert and five intermediate karate athletes responded physically to nine (3 temporal combined with 3 spatial) occluded attacks of the Gyaku-Zuki of each attacker in the 3D virtual environment. The responses were evaluated in regards to correct point of time and appropriate response technique. Significant differences between the expertises’ responses for the attackers were found. Experts respond more often correct to early information of attacks than novices.Keywords: anticipation, karate, occlusion, virtual reality
Procedia PDF Downloads 4721433 Evaluation of Promoter Hypermethylation in Tissue and Blood of Non-Small Cell Lung Cancer Patients and Association with Survival
Authors: Ashraf Ali, Kriti Upadhyay, Puja Sohal, Anant Mohan, Randeep Guleria
Abstract:
Background: Gene silencing by aberrant promoter hypermethylation is common in lung cancer and is an initiating event in its development. Aim: To evaluate the gene promoter hypermethylation frequency in serum and tissue of lung cancer patients. Method: 95 newly diagnosed untreated advance stage lung cancer patients and 50 cancer free matched controls were studied. Bisulfite modification of tissue and serum DNA was done; modified DNA was used as a template for methylation-specific PCR analysis. Survival was assessed for one year. Results: Of 95 patients, 82% were non-small cell lung cancer (34% squamous cell carcinoma, 34% non-small cell lung cancer and 14% adenocarcinoma) and 18% were small cell lung cancer. Biopsy revealed that tissue of 89% and 75% of lung cancer patients and 85% and 52% of controls had promoter hypermethylated for MGMT (p=0.35) and p16(p<0.001) gene, respectively. In serum, 33% and 49% of lung cancer patients and 28% and 43% controls were positive for MGMT and p16 gene. No significant correlation was found between survival and clinico-pathological parameters. Conclusion: High gene promoter methylation frequency of p16 gene in tissue biopsy may be linked with early stages of carcinogenesis. Appropriate follow-up is required for confirmation of this finding.Keywords: lung cancer, MS- PCR, methylation, molecular biology
Procedia PDF Downloads 1941432 Exact and Approximate Controllability of Nuclear Dynamics Using Bilinear Controls
Authors: Ramdas Sonawane, Mahaveer Gadiya
Abstract:
The control problem associated with nuclear dynamics is represented by nonlinear integro-differential equation with additive controls. To control chain reaction, certain amount of neutrons is added into (or withdrawn out of) chamber as and when required. It is not realistic. So, we can think of controlling the reactor dynamics by bilinear control, which enters the system as coefficient of state. In this paper, we study the approximate and exact controllability of parabolic integro-differential equation controlled by bilinear control with non-homogeneous boundary conditions in bounded domain. We prove the existence of control and propose an explicit control strategy.Keywords: approximate control, exact control, bilinear control, nuclear dynamics, integro-differential equations
Procedia PDF Downloads 4441431 Gut Microbiota in Patients with Opioid Use Disorder: A 12-week Follow up Study
Authors: Sheng-Yu Lee
Abstract:
Aim: Opioid use disorder is often characterized by repetitive drug-seeking and drug-taking behaviors with severe public health consequences. Animal model showed that opioid-induced perturbations in the gut microbiota causally relate to neuroinflammation, deficits in reward responding, and opioid tolerance, possibly due to changes in gut microbiota. Therefore, we propose that the dysbiosis of gut microbiota can be associated with pathogenesis of opioid dependence. In this current study, we explored the differences in gut microbiota between patients and normal controls and in patients before and after initiation of methadone treatment program for 12 weeks. Methods: Patients with opioid use disorder between 20 and 65 years were recruited from the methadone maintenance outpatient clinic in 2 medical centers in the Southern Taiwan. Healthy controls without any family history of major psychiatric disorders (schizophrenia, bipolar disorder and major depressive disorder) were recruited from the community. After initial screening, 15 patients with opioid use disorder joined the study for initial evaluation (Week 0), 12 of them completed the 12-week follow-up while receiving methadone treatment and ceased heroin use (Week 12). Fecal samples were collected from the patients at baseline and the end of 12th week. A one-time fecal sample was collected from the healthy controls. The microbiota of fecal samples were investigated using 16S rRNA V3V4 amplicon sequencing, followed by bioinformatics and statistical analyses. Results: We found no significant differences in species diversity in opioid dependent patients between Week 0 and Week 12, nor compared between patients at both points and controls. For beta diversity, using principal component analysis, we found no significant differences between patients at Week 0 and Week 12, however, both patient groups showed significant differences compared to control (P=0.011). Furthermore, the linear discriminant analysis effect size (LEfSe) analysis was used to identify differentially enriched bacteria between opioid use patients and healthy controls. Compared to controls, the relative abundance of Lactobacillaceae Lactobacillus (L. Lactobacillus), Megasphaera Megasphaerahexanoica (M. Megasphaerahexanoica) and Caecibacter Caecibactermassiliensis (C Caecibactermassiliensis) were increased in patients at Week 0, while Coriobacteriales Atopobiaceae (C. Atopobiaceae), Acidaminococcus Acidaminococcusintestini (A. Acidaminococcusintestini) and Tractidigestivibacter Tractidigestivibacterscatoligenes (T. Tractidigestivibacterscatoligenes) were increased in patients at Week 12. Conclusion: In conclusion, we suggest that the gut microbiome community maybe linked to opioid use disorder, such differences may not be altered even after 12-week of cessation of opioid use.Keywords: opioid use disorder, gut microbiota, methadone treatment, follow up study
Procedia PDF Downloads 1061430 Resistance to Sulfuric Acid Attacks of Self-Consolidating Concrete: Effect Metakaolin and Various Cements Types
Authors: Kianoosh Samimi, Farhad Estakhr, Mahdi Mahdikhani, Faramaz Moodi
Abstract:
Due to their fluidity and simplicity of use, self-compacting concretes (SCCs) have undeniable advantages. In recent years, the role of metakaolin as a one of pozzolanic materials in concrete has been considered by researchers. It can modify various properties of concrete, due to high pozzolanic reactions and also makes a denser microstructure. The objective of this paper is to examine the influence of three type of Portland cement and metakaolin on fresh state, compressive strength and sulfuric acid attacks in self- consolidating concrete at early age up to 90 days of curing in lime water. Six concrete mixtures were prepared with three types of different cement as Portland cement type II, Portland Slag Cement (PSC), Pozzolanic Portland Cement (PPC) and 15% substitution of metakaolin by every cement. The results show that the metakaolin admixture increases the viscosity and the demand amount of superplasticizer. According to the compressive strength results, the highest value of compressive strength was achieved for PSC and without any metakaolin at age of 90 days. Conversely, the lowest level of compressive strength at all ages of conservation was obtained for PPC and containing 15% metakaolin. According to this study, the total substitution of PSC and PPC by Portland cement type II is beneficial to the increasing in the chemical resistance of the SCC with respect to the sulfuric acid attack. On the other hand, this increase is more noticeable by the use of 15% of metakaolin. Therefore, it can be concluded that metakaolin has a positive effect on the chemical resistance of SCC containing of Portland cement type II, PSC, and PPC.Keywords: SCC, metakaolin, cement type, durability, compressive strength, sulfuric acid attacks
Procedia PDF Downloads 1851429 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4061428 Association of Vitamin D Levels in Obese and Non-Obese Patients with Polycystic Ovarian Syndrome in East Indian Populations
Authors: Dipanshu Sur, Ratnabali Chakravorty
Abstract:
Introduction: Polycystic ovary syndrome (PCOS) is the most common metabolic abnormality such as changes in lipid profile, diabetes, hypertension and metabolic syndrome occurring in women. Hypovitaminsis D was found to be associated with the development of obesity and insulin resistance in women with PCOS. Aim: To evaluate the association of vitamin D levels in obese and non-obese patients with PCOS in an East Indian populations. Methods: A case control study was conducted. It enrolled 100 cases of PCOS based on Rotterdam criteria and 100 ovulatory normal cases matched for their age and BMI. Vitamin D levels were compared in the obese and non-obese PCOS groups and also with the controls. Results: The mean age of subjects was 29.48 ± 3.29 years in the PCOS group and 26.24 ± 2.56 years in the control group. Hypovitaminosis D was present in 75 out of 100 PCOS women (75.0%) and 25 women (25.0%) showed sufficient 25OHD levels ≥30 ng/ml. Women with PCOS had significantly lower total serum calcium (8.4 ± 0.25 mg/dl versus 9.8 ± 0.17 mg/dl in controls), and 25 OHD (21.2 ± 2.56 ng/ml versus 32.6 ± 2.23 ng/ml in control group) than ovulatory normal women. This difference remained significant for both groups after adjustment for BMI. Obese women in both groups had significantly lower concentration of calcium and 25OHD than normal weight patients in this study. Conclusion: Our study shows majority of the patients and controls had vitamin D deficiency and there was significant difference in the vitamin D levels in PCOS group and controls as well as obese and non-obese groups. This may reflect the vitamin D deficiency status of the community. Vitamin D deficiency should demands immediate attention as it is a severe problem among the East Indian population.Keywords: vitamin D deficiency, polycystic ovary syndrome, obese, hypovitaminsis D
Procedia PDF Downloads 3161427 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study
Authors: Michael I. Okereke, Ambrose I. Akpoyomare
Abstract:
This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.Keywords: blast resistance, blast enhancement, explosives, material behavior
Procedia PDF Downloads 3731426 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks
Authors: Naghmeh Moradpoor Sheykhkanloo
Abstract:
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection
Procedia PDF Downloads 4691425 Externalised Migration Controls and the Deportation of Minors and Potential Refugees from Mexico
Authors: Vickie Knox
Abstract:
Since the ‘urgent humanitarian crisis’ of the arrival of tens of thousands of Central American minors at the Mexico-US border in early 2014, the USA has increasingly externalised migration controls to Mexico. Although the resulting policy ‘Plan Frontera Sur’ claimed to protect migrants’ human rights, it has manifested as harshly delivered in-country controls and an alarming increase in deportations, particularly of minors. This is of particular concern given the ongoing situation of forced migration caused by criminal violence in Central America because these deportations do not all comply with Mexico’s international obligations and with its own legal framework for international protection that allows inter alia verbal asylum claims and grants minors additional protection against deportation. Notably, the volume of deportations, the speed with which they are carried out and the lack of adequate screening indicate non-compliance with the principle of non-refoulement and the right to claim asylum or other forms of protection. Based on qualitative data gathered in fieldwork in 2015 and quantitative data covering the period 2014-2016, this research details three types of adverse outcome resulting from these externalised controls: human rights violations perpetrated in order to deliver the policy–namely, deportations that may not comply with the principle of non-refoulement or the protection of minors; human rights violations perpetrated in the execution of policy–such as violations by state actors during apprehension and detention; and adverse consequences of the policy – such as increased risk during transit. This research has particular resonance as the Trump era brings tighter enforcement in the region, and has broader relevance for the study of externalisation tools on a global level.Keywords: deportation, externalisation, forced migration, non-refoulement
Procedia PDF Downloads 1511424 Identification of New Familial Breast Cancer Susceptibility Genes: Are We There Yet?
Authors: Ian Campbell, Gillian Mitchell, Paul James, Na Li, Ella Thompson
Abstract:
The genetic cause of the majority of multiple-case breast cancer families remains unresolved. Next generation sequencing has emerged as an efficient strategy for identifying predisposing mutations in individuals with inherited cancer. We are conducting whole exome sequence analysis of germ line DNA from multiple affected relatives from breast cancer families, with the aim of identifying rare protein truncating and non-synonymous variants that are likely to include novel cancer predisposing mutations. Data from more than 200 exomes show that on average each individual carries 30-50 protein truncating mutations and 300-400 rare non-synonymous variants. Heterogeneity among our exome data strongly suggest that numerous moderate penetrance genes remain to be discovered, with each gene individually accounting for only a small fraction of families (~0.5%). This scenario marks validation of candidate breast cancer predisposing genes in large case-control studies as the rate-limiting step in resolving the missing heritability of breast cancer. The aim of this study is to screen genes that are recurrently mutated among our exome data in a larger cohort of cases and controls to assess the prevalence of inactivating mutations that may be associated with breast cancer risk. We are using the Agilent HaloPlex Target Enrichment System to screen the coding regions of 168 genes in 1,000 BRCA1/2 mutation-negative familial breast cancer cases and 1,000 cancer-naive controls. To date, our interim analysis has identified 21 genes which carry an excess of truncating mutations in multiple breast cancer families versus controls. Established breast cancer susceptibility gene PALB2 is the most frequently mutated gene (13/998 cases versus 0/1009 controls), but other interesting candidates include NPSR1, GSN, POLD2, and TOX3. These and other genes are being validated in a second cohort of 1,000 cases and controls. Our experience demonstrates that beyond PALB2, the prevalence of mutations in the remaining breast cancer predisposition genes is likely to be very low making definitive validation exceptionally challenging.Keywords: predisposition, familial, exome sequencing, breast cancer
Procedia PDF Downloads 4931423 An Investigation of the Effects of Word Length on Amblyopic Eye Movement during Reading
Authors: Yahya Maeni
Abstract:
It is well established that amblyopic patients have a reduced reading performance and oculomotor deficits. Word length has a significant impact on reading performance and eye movement behaviour during reading. As there no previous attempts to assess whether amblyopic eyes would be affected by word length while reading. This study aims to assess the effect of word length on amblyopic eye movement behaviour during reading including fixation duration, number of fixation and gaze duration. 21 adults with amblyopia and 21 age-matched controls participated in the study (age ± SD) (23.80 ± 4.66) for amblyopes and (24.20 ± 3.58) for Controls. Eye movement was recorded during reading binocularly using Eyelink 1000. Study was designed as 2 x 2 (amblyopia vs. control) x 2 lengths (4 letters, and 8 letters). Compared to controls, the amblyopic participants report significant longer duration of fixation, higher number of fixation and longer gaze duration for short words with far higher significant difference for long words. It could be concluded that eye movement in amblyopia during reading might be accounted for by the length of a word within a text and this could possible explanation of reduced reading performance among amblyopes. By understanding the effect of word length on amblyopia will shed light on reading deficits in amblyopia and help to determine the reading needs of amplyopes in educational and clinical settings.Keywords: amblyopia, eye movement, reading, fixation
Procedia PDF Downloads 1501422 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection
Authors: Muhammad Ali
Abstract:
Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection
Procedia PDF Downloads 1251421 Acupuncture and Topiramat in Treatment of Migraine
Authors: Lazgeen Mohammed
Abstract:
The greatest advantage of acupuncture over western medicine is that it is safe . Unlike synthetic drugs, acupuncture has virtually no side effects, and the procedures for treating headaches are much less invasive. Migraine headaches are usually one-sided, pulsating or throbbing, and moderate or severe in intensity.. Some patients also experience auras, a neurological symptom that develops gradually over 5-20 minutes. The patient may see brief flashes or waves of light, or changes in their vision. Other common features of auras include vertigo, imbalance, confusion and numbness.Acupuncture had been used to treat 50 patients suffering from migraine ,topiramat (topamax) given to prevent the attacks, duration of treatment is 10 weeks , the patients were fallowed up for one year .Topiramat is called an anticonvulsant.Topiramat is also used to prevent migraine headaches in adults and teenagers who are at least 12 years old. This medicine will only prevent migraine headaches or reduce the number of attacks. It will not treat a headache that has already begun.Keywords: acpuncture, migraine, topiramat, headache
Procedia PDF Downloads 711420 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 1391419 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems
Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi
Abstract:
The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks
Procedia PDF Downloads 3531418 Design and Implementation of a Cross-Network Security Management System
Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).Keywords: network security management, device organization, emergency response, cross-network
Procedia PDF Downloads 1681417 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors
Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang
Abstract:
We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls
Procedia PDF Downloads 1111416 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success
Authors: Haydar Teymourlouei
Abstract:
Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.Keywords: awareness, competition, cybersecurity, laboratories, workforce
Procedia PDF Downloads 3341415 Visual Odometry and Trajectory Reconstruction for UAVs
Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini
Abstract:
The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight
Procedia PDF Downloads 2181414 Analysis of iPSC-Derived Dopaminergic Neuron Susceptibility to Influenza and Excitotoxicity in Non-Affective Psychosis
Authors: Jamileh Ahmed, Helena Hernandez, Gabriel De Erausquin
Abstract:
H1N1 virus susceptibility of iPSC-derived DA neurons from schizophrenia patients and controls will compared. C57/BL-6 fibroblasts were reprogrammed into iPSCs using a lenti-viral vector containing SOKM genes. Pluripotency verification with the AP assay and immunocytochemistry ensured iPSC presence. The experimental outcome of ISPCs from DA neuron differentiation will be discussed in the Results section. Fibroblasts from patients and controls will be reprogrammed into iPSCs using a sendai-virus vector containing SOKM. IPSCs will be characterized using the AP assay, immunocytochemistry and RT-PCR. IPSCs will then be differentiated into DA neurons. Gene methylation will be compared for both groups with custom-designed microarrays.Keywords: schizophrenia, iPSCs, stem cells, neuroscience
Procedia PDF Downloads 4291413 Direct and Indirect Impacts of Predator Conflict in Kanha National Park, India
Authors: Diane H. Dotson, Shari L. Rodriguez
Abstract:
Habitat for predators is on the decline worldwide, which often brings humans and predators into conflict over remaining shared space and common resources. While the direct impacts of human predator conflict on humans (i.e., attacks on livestock or humans resulting in injury or death) are well documented, the indirect impacts of conflict on humans (i.e., downstream effects such as fear, stress, opportunity costs, PTSD) have not been addressed. We interviewed 437 people living in 54 villages on the periphery of Kanha National Park, India, to assess the amount and severity of direct and indirect impacts of predator conflict. While 58% of livestock owners believed that predator attacks on livestock guards occurred frequently and 62% of those who collect forest products believed that predator attacks on those collecting occurred frequently, less than 20% of all participants knew of someone who had experienced an attack. Data related to indirect impacts suggest that such impacts are common; 76% of participants indicated they were afraid a predator will physically injure them. Livestock owners reported that livestock guarding took time away from their primary job (61%) and getting enough sleep (73%), and believed that it increased their vulnerability to illnesses (80%). These results suggest that the perceptions of risk of predator attack are likely inflated, yet the costs of human predator impacts may be substantially higher than previously estimated, particularly related to human well-being, making the implementation of appropriate and effective conservation and conflict mitigation strategies and policies increasingly urgent.Keywords: direct impacts, indirect impacts, human-predator conflict, India
Procedia PDF Downloads 1561412 Evaluation of Nutrition Supplement on Body Composition during Catch-Up Growth, in a Pre-Clinical Model of Growth Restriction
Authors: Bindya Jacob
Abstract:
The aim of the present study was to assess the quality of catchup growth induced by Oral Nutrition Supplement (ONS), in animal model of growth restriction due to under nutrition. Quality of catch-up growth was assessed by proportion of lean body mass (LBM) and fat mass (FM). Young SD rats were food restricted at 70% of normal caloric intake for 4 weeks; and re-fed at 120% of normal caloric intake for 4 weeks. Refeeding diet had 50% calories from animal diet and 50% from ONS formulated for optimal growth. After refeeding, the quantity and quality of catch-up growth were measured including weight, length, LBM and FM. During nutrient restriction, body weight and length of animals was reduced compared to healthy controls. Both LBM and FM were significantly lower than healthy controls (p < 0.001). Refeeding with ONS resulted in increase of weight and length, with significant catch-up growth compared to baseline (p < 0.001). Detailed examination of body composition showed that the catch-up in body weight was due to proportionate increase of LBM and FM, resulting in a final body composition similar to healthy controls. This data supports the use of well-designed ONS for recovery from growth restriction due to under nutrition, and return to normal growth trajectory characterized by normal ratio of lean and fat mass.Keywords: catch up growth, body composition, nutrient restriction, healthy growth
Procedia PDF Downloads 4381411 Resisting Adversarial Assaults: A Model-Agnostic Autoencoder Solution
Authors: Massimo Miccoli, Luca Marangoni, Alberto Aniello Scaringi, Alessandro Marceddu, Alessandro Amicone
Abstract:
The susceptibility of deep neural networks (DNNs) to adversarial manipulations is a recognized challenge within the computer vision domain. Adversarial examples, crafted by adding subtle yet malicious alterations to benign images, exploit this vulnerability. Various defense strategies have been proposed to safeguard DNNs against such attacks, stemming from diverse research hypotheses. Building upon prior work, our approach involves the utilization of autoencoder models. Autoencoders, a type of neural network, are trained to learn representations of training data and reconstruct inputs from these representations, typically minimizing reconstruction errors like mean squared error (MSE). Our autoencoder was trained on a dataset of benign examples; learning features specific to them. Consequently, when presented with significantly perturbed adversarial examples, the autoencoder exhibited high reconstruction errors. The architecture of the autoencoder was tailored to the dimensions of the images under evaluation. We considered various image sizes, constructing models differently for 256x256 and 512x512 images. Moreover, the choice of the computer vision model is crucial, as most adversarial attacks are designed with specific AI structures in mind. To mitigate this, we proposed a method to replace image-specific dimensions with a structure independent of both dimensions and neural network models, thereby enhancing robustness. Our multi-modal autoencoder reconstructs the spectral representation of images across the red-green-blue (RGB) color channels. To validate our approach, we conducted experiments using diverse datasets and subjected them to adversarial attacks using models such as ResNet50 and ViT_L_16 from the torch vision library. The autoencoder extracted features used in a classification model, resulting in an MSE (RGB) of 0.014, a classification accuracy of 97.33%, and a precision of 99%.Keywords: adversarial attacks, malicious images detector, binary classifier, multimodal transformer autoencoder
Procedia PDF Downloads 1121410 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
Authors: Vikram Prabhu, Mohammad Shikh Bahaei
Abstract:
This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark
Procedia PDF Downloads 3011409 Bone Mineral Density of the Lumbar Spine, Femur in Elite Egyptian Male Swimmers
Authors: Magdy Abouzeid
Abstract:
Introduction: Physical activity has been shown to have a positive effect on bone mineral density (BMD) and bone mineral content (BMC) among children, adolescents, and adults. Sports characterized by little or moderate weight bearing or impact have a low osteogenic effect. However, the action of such sports on bone turnover remains unclear. Swimming, as a non-weight-bearing sport, has been considered to be insignificant in the maintenance of bone mass. Purpose: To examine this issue we measured (BMD) and(BMC) of the lumbar spine, proximal femur via dual energy x-ray absorptiometry in the group of elite male swimmers, and determine the effect of swimming training on bone health and compared the results with matched controls group in age, body weight and height. Materials and Methods: Twenty-five male swimmers (age 20.7+/-0.8 years) training for 12-15 hours/week; and the controls group consisted of 25 non-active male (age 21.3 +/-1.3 years) were studied BMD and BMC of lumbar spine, femur were assessed via (DXA) absorptiometry. Results: There was significant difference between swimmers and control group in BMD and BMC, BMD of Swimmers was significantly greater than controls at all sites. The lumbar spine (1, 08 +/-0.202 vs., 0717+0.57 gxcm (-2), right proximal femur (1, 02 +/-, 044 vs., 771+/-, 027 gxcm (-2), and left proximal femur (1.374+/-0.212 vs. 1.01 +/-0.141 gxcm (-2). Swimmers were significantly taller, and had greater BMC and BMD compared to the controls group (P<0.001). Conclusions: These results suggest that swimming training may be beneficial in the prevention or therapy of OSTEOPENIA, and may lead to increased (BMD) and (BMC) for male swimmers. Swimming may be an effective non-pharmacological intervention for the adults and adolescent. Further research with younger athletes of another type of aquatics sport is warranted to better identify the periods of BMD development during which Aquatics sport has the greatest impact on bone health.Keywords: bone mineral density, lumbar spine, femur, swimming, DXA absorptiometry
Procedia PDF Downloads 3221408 Crystalline Silica Exposure in Tunnelling: Identifying Barriers to Safe Practices
Authors: Frederick Anlimah, Vinod Gopaldasani, Catherine MacPhail, Brian Davies
Abstract:
The construction industry, particularly tunnel construction, exposes workers to respirable crystalline silica (RCS), which can cause incurable illnesses such as silicosis and lung cancer. Despite various control measures, exposures remain inadequately controlled. This research aimed to identify the barriers and challenges hindering the implementation of effective controls and the adoption of safe work practices to protect workers from RCS exposure in tunnelling. A mixed-method approach was employed for this research. Tunnel construction workers were observed, surveyed and interviewed to gauge their knowledge and attitudes and understand their challenges in reducing RCS exposure. The preliminary analysis of the data reveals a diverse array of sociotechnical factors interacting to influence RCS exposure. It is noteworthy that participants consistently emphasised the project as the most exemplary one they have been involved in, although there is room for improvement. While there is a commendable level of knowledge about RCS exposure and control in tunnelling, there is a striking lack of perceived satisfaction regarding dust control. Several factors were identified as interacting to prevent the effective management of dust. These include perceived time pressure, absence of on-tool dust controls, low risk perceptions among workers, and inadequate enforcement of controls. Moreover, participants highlighted communication and heat-related challenges as hindrances to the continuous wear of respirators. This research highlights the need for a paradigm shift in tunnel construction to address the barriers associated with RCS exposure reduction. It emphasises the importance of collaboration among various stakeholders, advocating for more effective controls and enforcement strategies and enhanced worker education through knowledge sharing.Keywords: respirable crystalline silica, dust control, worker practices, exposure prevention, silicosis
Procedia PDF Downloads 681407 Mutational Analysis of DNase I Gene in Diabetic Patients
Authors: Hateem Zafar Kayani, Nageen Hussain
Abstract:
The main aim is to analyze the mutations of DNASE I gene in diabetic patients. A total of 120 diabetes patients and 120 controls were sampled. The total number of male diabetic patients included in the study was 79 (66%) while female patients were 41 (34%) in number. Exon 8 of the DNASE I gene was amplified by using thermo cycler. The possible band of interest was located at 165 base pairs. Two samples showed similar missense mutations at 127th position of exon 8 which replaced amino acid Arginine (Arg) to Glutamine (Gln). All controls showed no mutations. The association of diabetes with different levels of blood pressure and body mass index (BMI) were found to be significant.Keywords: deoxyribonuclease I, polymerase chain reaction, insulin-dependent diabetes mellitus, non-insulin dependent diabetes mellitus
Procedia PDF Downloads 3251406 Frequent Pattern Mining for Digenic Human Traits
Authors: Atsuko Okazaki, Jurg Ott
Abstract:
Some genetic diseases (‘digenic traits’) are due to the interaction between two DNA variants. For example, certain forms of Retinitis Pigmentosa (a genetic form of blindness) occur in the presence of two mutant variants, one in the ROM1 gene and one in the RDS gene, while the occurrence of only one of these mutant variants leads to a completely normal phenotype. Detecting such digenic traits by genetic methods is difficult. A common approach to finding disease-causing variants is to compare 100,000s of variants between individuals with a trait (cases) and those without the trait (controls). Such genome-wide association studies (GWASs) have been very successful but hinge on genetic effects of single variants, that is, there should be a difference in allele or genotype frequencies between cases and controls at a disease-causing variant. Frequent pattern mining (FPM) methods offer an avenue at detecting digenic traits even in the absence of single-variant effects. The idea is to enumerate pairs of genotypes (genotype patterns) with each of the two genotypes originating from different variants that may be located at very different genomic positions. What is needed is for genotype patterns to be significantly more common in cases than in controls. Let Y = 2 refer to cases and Y = 1 to controls, with X denoting a specific genotype pattern. We are seeking association rules, ‘X → Y’, with high confidence, P(Y = 2|X), significantly higher than the proportion of cases, P(Y = 2) in the study. Clearly, generally available FPM methods are very suitable for detecting disease-associated genotype patterns. We use fpgrowth as the basic FPM algorithm and built a framework around it to enumerate high-frequency digenic genotype patterns and to evaluate their statistical significance by permutation analysis. Application to a published dataset on opioid dependence furnished results that could not be found with classical GWAS methodology. There were 143 cases and 153 healthy controls, each genotyped for 82 variants in eight genes of the opioid system. The aim was to find out whether any of these variants were disease-associated. The single-variant analysis did not lead to significant results. Application of our FPM implementation resulted in one significant (p < 0.01) genotype pattern with both genotypes in the pattern being heterozygous and originating from two variants on different chromosomes. This pattern occurred in 14 cases and none of the controls. Thus, the pattern seems quite specific to this form of substance abuse and is also rather predictive of disease. An algorithm called Multifactor Dimension Reduction (MDR) was developed some 20 years ago and has been in use in human genetics ever since. This and our algorithms share some similar properties, but they are also very different in other respects. The main difference seems to be that our algorithm focuses on patterns of genotypes while the main object of inference in MDR is the 3 × 3 table of genotypes at two variants.Keywords: digenic traits, DNA variants, epistasis, statistical genetics
Procedia PDF Downloads 1221405 Bank Internal Controls and Credit Risk in Europe: A Quantitative Measurement Approach
Authors: Ellis Kofi Akwaa-Sekyi, Jordi Moreno Gené
Abstract:
Managerial actions which negatively profile banks and impair corporate reputation are addressed through effective internal control systems. Disregard for acceptable standards and procedures for granting credit have affected bank loan portfolios and could be cited for the crises in some European countries. The study intends to determine the effectiveness of internal control systems, investigate whether perceived agency problems exist on the part of board members and to establish the relationship between internal controls and credit risk among listed banks in the European Union. Drawing theoretical support from the behavioural compliance and agency theories, about seventeen internal control variables (drawn from the revised COSO framework), bank-specific, country, stock market and macro-economic variables will be involved in the study. A purely quantitative approach will be employed to model internal control variables covering the control environment, risk management, control activities, information and communication and monitoring. Panel data from 2005-2014 on listed banks from 28 European Union countries will be used for the study. Hypotheses will be tested and the Generalized Least Squares (GLS) regression will be run to establish the relationship between dependent and independent variables. The Hausman test will be used to select whether random or fixed effect model will be used. It is expected that listed banks will have sound internal control systems but their effectiveness cannot be confirmed. A perceived agency problem on the part of the board of directors is expected to be confirmed. The study expects significant effect of internal controls on credit risk. The study will uncover another perspective of internal controls as not only an operational risk issue but credit risk too. Banks will be cautious that observing effective internal control systems is an ethical and socially responsible act since the collapse (crisis) of financial institutions as a result of excessive default is a major contagion. This study deviates from the usual primary data approach to measuring internal control variables and rather models internal control variables in a quantitative approach for the panel data. Thus a grey area in approaching the revised COSO framework for internal controls is opened for further research. Most bank failures and crises could be averted if effective internal control systems are religiously adhered to.Keywords: agency theory, credit risk, internal controls, revised COSO framework
Procedia PDF Downloads 316