Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: security safe

2518 Influence of Error Correction Codes on the Quality of Optical Broadband Connections

Authors: Mouna Hemdi, Jamel bel Hadj Tahar

Abstract:

The increasing development of multimedia applications requiring the simultaneous transport of several different services contributes to the evolution of the need for very high-speed network. In this paper, we propose an effective solution to achieve the very high speed while retaining elements of the optical transmission channel. So our study focuses on error correcting codes that aim for quality improvement on duty. We present a comparison of the quality of service for single channels and integrating the code BCH, RS and LDPC in order to find the best code in the different conditions of the transmission.

Keywords: code error correction, high speed broadband, optical transmission, information systems security

Procedia PDF Downloads 378
2517 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 302
2516 Managing Truck Drivers’ Fatigue: A Critical Review of the Literature and Recommended Remedies

Authors: Mozhgan Aliakbari, Sara Moridpour

Abstract:

In recent years, much attention has been given to truck drivers’ fatigue management. Long working hours negatively influence truck drivers’ physiology, health, and safety. However, there is little empirical research in the heavy vehicle transport sector in Australia to identify the influence of working hours’ management on drivers’ fatigue and consequently, on the risk of crashes and injuries. There is no national legislation regulating the number of hours or kilometres travelled by truck drivers. Consequently, it is almost impossible to define a standard number of hours or kilometres for truck drivers in a safety management system. This paper reviews the existing studies concerning safe system interventions such as tachographs in relation to fatigue caused by long working hours. This paper also reviews the literature to identify the influence of frequency of rest breaks on the reduction of work-related road transport accidents involving trucks. A framework is presented to manage truck drivers’ fatigue, which may result in the reduction of injuries and fatalities involving heavy vehicles.

Keywords: fatigue, time management, trucks, traffic safety

Procedia PDF Downloads 269
2515 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 399
2514 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: communication, computer network, data collection, probe

Procedia PDF Downloads 349
2513 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 97
2512 Using Agility in Building Business Process Management Solutions

Authors: Krešimir Fertalj, Mladen Matejaš

Abstract:

In turbulent modern economy, the companies need to properly manage their business processes. Well defined and stable business processes ensure the security of crucial data and application, and provide a quality product or service to the end customer. On the other side constant changes on the market, new regulatory provisions and emerging new technologies require the need of issuing prompt and effective changes of business process. In this article, we explore the use of agile principles in working with business process management (BPM) solutions. We deal with difficulties in BPM development cycle, review the benefits of using agility and choose the basic agile principles that ensure the success of a BPM project.

Keywords: agile development, BPM environment, Kanban, SCRUM, XP

Procedia PDF Downloads 309
2511 The Developmental Process of Panic Disorder: Focusing on the Psychological Dynamics of a Family Therapy Case

Authors: Tai-Young Park, Yangjin Park

Abstract:

Introduction: This study analyzed a family therapy case involving a female client in her thirties with panic disorder (PD) in South Korea. We identified five stages of the psychological process in the development of PD and examined external situations, family dynamics, and psychological experiences at each stage. Method: The client, mother, sister, and husband participated in therapy. Researchers analyzed the transcripts, notes, and video recordings of the therapy sessions. A thematic analysis was used to examine the data and display our findings using a network. Results: The developmental process of PD was as follows: (1) formation of anxiety, (2) sheltered life, (3) crisis, (4) loss of safe haven, and (5) inner breakdown. Conclusion: The family dynamics that developed as a result of coping with external situations in each stage contributed to clients’ psychological experiences. These psychological experiences triggered anxiety, which led to the development of PD. Moreover, this study empirically suggests that family dynamics can be associated with a person’s internal experiences that could lead to PD. Our findings highlight the significance of functional family dynamics and coping patterns when facing difficult external situations or crises.

Keywords: developmental process, family therapy, panic disorder, psychological dynamics

Procedia PDF Downloads 80
2510 Strabismus Management in Retinoblastoma Survivors

Authors: Babak Masoomian, Masoud Khorrami Nejad, Hamid Riazi Esfahani

Abstract:

Purpose: To report the result of strabismus surgery in eye-salvaged retinoblastoma (Rb) patients. Methods: A retrospective case series including 18 patients with Rb and strabismus who underwent strabismus surgery after completing tumor treatment by a single pediatric ophthalmologist. Results: A total of 18 patients (10 females and 8 males) were included with a mean age of 13.3 ± 3.0 (range, 2-39) months at the time tumor presentation and 6.0 ± 1.5 (range, 4-9) years at the time of strabismus surgery. Ten (56%) patients had unilateral, and 8(44%) had bilateral involvement, and the most common worse eye tumor’s group was D (n=11), C (n=4), B (n=2) and E (n=1). Macula was involved by the tumors in 12 (67%) patients. The tumors were managed by intravenous chemotherapy (n=8, 47%), intra-arterial chemotherapy (n=7, 41%) and both (n=3, 17%). After complete treatment, the average time to strabismus surgery was 29.9 ± 20.5 (range, 12-84) months. Except for one, visual acuity was equal or less than 1.0 logMAR (≤ 20/200) in the affected eye. Seven (39%) patients had exotropia, 11(61%) had esotropia (P=0.346) and vertical deviation was found in 8 (48%) cases. The angle of deviation was 42.0 ± 10.4 (range, 30-60) prism diopter (PD) for esotropic and 35.7± 7.9 (range, 25-50) PD for exotropic patients (P=0.32) that after surgery significantly decreased to 8.5 ± 5.3 PD in esotropic cases and 5.9±6.7 PD in exotropic cases (P<0.001). The mean follow-up after surgery was 15.2 ± 2.0 (range, 10-24) months, in which 3 (17%) patients needed a second surgery. Conclusion: Strabismus surgery in treated Rb is safe, and results of the surgeries are acceptable and close to the general population. There was not associated with tumor recurrence or metastasis.

Keywords: retinoblastoma, strabismus, chemotherapy, surgery

Procedia PDF Downloads 47
2509 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary

Authors: Lorand Ujhazi

Abstract:

The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.

Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security

Procedia PDF Downloads 294
2508 Water Sources in 3 Local Municipalities of O. R. Tambo District Municipality, South Africa: A Comparative Study

Authors: Betek Cecilia Kunseh, Musampa Christopher

Abstract:

Despite significant investment and important progress, access to safe potable water continues to be one of the most pressing challenges for rural communities in O R Tambo District Municipality. This is coupled with the low income of most residents and government's policy which obliges municipalities to supply basic water usually set at 6 kilolitres per month to each household free of charge. During the research, data was collected from three local municipalities of O. R. Tambo, i.e. King Sabata Dalindyebo, Mhlontlo and Ingquza Hill local municipalities. According to the result, significant differences exist between the sources of water in the different local municipalities from which data was collected. The chi square was use to calculated the differences between the sources of water and the calculated critical value of the District Municipality was 18.77 which is more than the stipulated critical value of 3.84. More people in Mhlontlo Local Municipality got water from the taps while a greater percentage of households in King Sataba Dalindyebo and Ingquza hill local municipalities got their water from the natural sources. 77% of the sample population complained that there have been no improvements in water provision because they still get water from natural sources and even the remaining 33% that were getting water from the taps still have to depend on natural sources because the taps are most of the time broken and it takes a long time to fix them.

Keywords: availability, water, sources, supply

Procedia PDF Downloads 324
2507 Managing Virtual Teams in a Pandemic

Authors: M. Jafari Toosy, A. Zamani

Abstract:

This article, considering the result of pandemics at the international level and all activities and projects performed virtually and the need for resource management and virtual teams in this period identifies the components of virtual management after searching the available resources. Exploration of virtual management in the pandemic era is explored in 10 international articles. The results of research with this method and according to the tasks and topics related to management knowledge and definition of virtual teams can be divided into topics such as planning, decision making, control, organization, leadership, attention to growth and capability, resources and facilities, Communication, creativity, innovation and security. In order to explain the nature of virtual management, a definition of virtual management was provided.

Keywords: management, virtual, virtual team management, pandemic, team

Procedia PDF Downloads 172
2506 RFID and Intelligence: A Smart Authentication Method for Blind People​

Authors: V. Vishu, R. Manimegalai

Abstract:

A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life.

Keywords: AES, encryption, intelligence, smart key

Procedia PDF Downloads 229
2505 Investigation on Unsteady Flow of a Turbine Stage with Negative Bowed Stator

Authors: Keke Gao, Tao Lin, Yonghui Xie, Di Zhang

Abstract:

Complicated unsteady flow in axial turbines produces high-frequency unsteady aerodynamic exciting force, which threatens the safe operation of turbines. This paper illustrates how negative-bowed stator reduces the rotor unsteady aerodynamic exciting force by unsteady flow field. With the support of three-dimensional viscous compressible Navier-Stokes equation, the single axial turbines with 0, -10 and -20 degree bowed stator are comparably investigated, aiming to identify the flow field structure difference caused by various negative-bowed degrees. The results show that negative-bowed stator strengthens the turbulence kinetic energy, which is further strengthened with the increase of negative-bowed degree. Meanwhile, the flow phenomenon including stator wakes and passage vortex is shown. In addition, the interaction of upstream negative-bowed wakes contributes to the reduction of unsteady blade load fluctuation. Furthermore, the aerodynamic exciting force decreases with the increasing negative bowed degree, while the efficiency is correspondingly reduced. This paper provides the reference for the alleviation of the harmful impact caused by unsteady interaction with the method of wake control.

Keywords: unsteady flow, axial turbine, wake, aerodynamic force, loss

Procedia PDF Downloads 286
2504 Child-Friendly Cities: A Child's Participation in the Local Government to Improve the Status of Rights of the Child

Authors: Asma Khalid

Abstract:

Children’s drawings are unique as children are. Children manifest their happiness, sadness, future dreams, likes, dislikes through drawings. Research with children aged 8-12 was conducted in 2017 in which it was asked to them ‘what they think about child-friendly cities?’ The focus was to get ideas from children about the cities in which they live and what they want in their cities. The research was conducted in different private schools. Children were accessed through teachers and principals of the schools (the gatekeepers). Consent forms were developed for children which contained information about the research project and their consent was taken on paper. It was ensured that children are not forced to take part in the research and they can leave the research whenever they want, without informing anyone. The qualitative participatory approach was taken where children were given papers and colors to draw their ideas. During the research, it was found that children are interested in showing their emotions and liking through drawing as this medium seems easy and comfortable to them as compared to have the individual face to face interviews or participate in surveys. However, the clarity of the ideas presented in the drawings was discussed at length with children in their school’s premises. Results of the research show that children like to live in clean, green places which are also safe for them. Furthermore, they want to live with their families and want to have recreational activities including parks in their nearby vicinity.

Keywords: qualitative participative research clean, children, drawing, clean, green and protected place, family

Procedia PDF Downloads 174
2503 A Customize Battery Management Approach for Satellite

Authors: Muhammad Affan, Muhammad Ilyas Raza, Muhammad Harris Hashmi

Abstract:

This work is attributed to the battery management unit design of student Satellites under Pakistan National Student Satellite Program (PNSSP). The aim has been to design a customized, low-cost, efficient, reliable and less-complex battery management scheme for the Satellite. Nowadays, Lithium Ion (Li-ion) batteries have become the de-facto standard for remote applications, especially for satellites. Li-ion cells are selected for secondary storage. The design also addresses Li-ion safety requirements by monitoring, balancing and protecting cells for safe and prolonged operation. Accurate voltage measurement of individual cells was the main challenge because all the actions triggered were based on the digital voltage measurement. For this purpose, a resistive-divider network is used to maintain simplicity and cost-effectiveness. To cater the problem of insufficient i/o pins on microcontroller, fast multiplexers and de-multiplexers were used. The discrepancy inherited in the given design is the dissipation of heat due to the dissipative resistors. However, it is still considered to be the optimum adoption, considering the simple and cost-effective nature of the passive balancing technique. Furthermore, it is a completely unique solution, customized to meet specific requirements. However, there is still an option for a more advanced and expensive design.

Keywords: satellite, battery module, passive balancing, dissipative

Procedia PDF Downloads 121
2502 Combination of Standard Secondary Raw Materials and New Production Waste Materials in Green Concrete Technology

Authors: M. Tazky, R. Hela, P. Novosad, L. Osuska

Abstract:

This paper deals with the possibility of safe incorporation fluidised bed combustion fly ash (waste material) into cement matrix together with next commonly used secondary raw material, which is high-temperature fly ash. Both of these materials have a very high pozzolanic ability, and the right combination could bring important improvements in both the physico-mechanical properties and the better durability of a cement composite. This paper tries to determine the correct methodology for designing green concrete by using modern methods measuring rheology of fresh concrete and following hydration processes. The use of fluidised bed combustion fly ash in cement composite production as an admixture is not currently common, but there are some real possibilities for its potential. The most striking negative aspect is its chemical composition which supports the development of new product formation, influencing the durability of the composite. Another disadvantage is the morphology of grains, which have a negative effect on consistency. This raises the question of how this waste can be used in concrete production to emphasize its positive properties and eliminate negatives. The focal point of the experiment carried out on cement pastes was particularly on the progress of hydration processes, aiming for the possible acceleration of pozzolanic reactions of both types of fly ash.

Keywords: high temperature fly ash, fluidized bed combustion fly ash, pozzolan, CaO (calcium oxide), rheology

Procedia PDF Downloads 195
2501 Synthesis of New Anti-Tuberculosis Drugs

Authors: M. S. Deshpande, Snehal D. Bomble

Abstract:

Tuberculosis (TB) is a deadly contagious disease that is caused by a bacterium called Mycobacterium tuberculosis. More than sixty years ago, the introduction of the first anti-TB drugs for the treatment of TB (streptomycin (STR), p-aminosalcylic acid (PAS), isoniazid (INH), and then later ethambutol (EMB) and rifampicin (RIF)) gave optimism to the medical community, and it was believed that the disease would be completely eradicated soon. Worldwide, the number of TB cases has continued to increase, but the incidence rate has decreased since 2003. Recently, highly drug-resistant forms of TB have emerged worldwide. The prolonged use of classical drugs developed a growing resistance and these drugs have gradually become less effective and incapable to meet the challenges, especially those of multi drug resistant (MDR)-TB, extensively drug resistant (XDR)-TB, and HIV-TB co-infections. There is an unmet medical need to discover newer synthetic molecules and new generation of potent drugs for the treatment of tuberculosis which will shorten the time of treatment, be potent and safe while effective facing resistant strains and non-replicative, latent forms, reduce adverse side effect and not interfere in the antiretroviral therapy. This paper attempts to bring out the review of anti-TB drugs, and presents a novel method of synthesizing new anti-tuberculosis drugs and potential compounds to overcome the bacterial resistance and combat the re-emergence of tuberculosis.

Keywords: tuberculosis, mycobacterium, multi-drug resistant (MDR)-TB, extensively drug resistant (XDR)-TB

Procedia PDF Downloads 363
2500 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 545
2499 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 282
2498 Suggestions to the Legislation about Medical Ethics and Ethics Review in the Age of Medical Artificial Intelligence

Authors: Xiaoyu Sun

Abstract:

In recent years, the rapid development of Artificial Intelligence (AI) has extensively promoted medicine, pharmaceutical, and other related fields. The medical research and development of artificial intelligence by scientific and commercial organizations are on the fast track. The ethics review is one of the critical procedures of registration to get the products approved and launched. However, the SOPs for ethics review is not enough to guide the healthy and rapid development of artificial intelligence in healthcare in China. Ethical Review Measures for Biomedical Research Involving Human Beings was enacted by the National Health Commission of the People's Republic of China (NHC) on December 1st, 2016. However, from a legislative design perspective, it was neither updated timely nor in line with the trends of AI international development. Therefore, it was great that NHC published a consultation paper on the updated version on March 16th, 2021. Based on the most updated laws and regulations in the States and EU, and in-depth-interviewed 11 subject matter experts in China, including lawmakers, regulators, and key members of ethics review committees, heads of Regulatory Affairs in SaMD industry, and data scientists, several suggestions were proposed on top of the updated version. Although the new version indicated that the Ethics Review Committees need to be created by National, Provincial and individual institute levels, the review authorities of different levels were not clarified. The suggestion is that the precise scope of review authorities for each level should be identified based on Risk Analysis and Management Model, such as the complicated leading technology, gene editing, should be reviewed by National Ethics Review Committees, it will be the job of individual institute Ethics Review Committees to review and approve the clinical study with less risk such as an innovative cream to treat acne. Furthermore, to standardize the research and development of artificial intelligence in healthcare in the age of AI, more clear guidance should be given to data security in the layers of data, algorithm, and application in the process of ethics review. In addition, transparency and responsibility, as two of six principles in the Rome Call for AI Ethics, could be further strengthened in the updated version. It is the shared goal among all countries to manage well and develop AI to benefit human beings. Learned from the other countries who have more learning and experience, China could be one of the most advanced countries in artificial intelligence in healthcare.

Keywords: biomedical research involving human beings, data security, ethics committees, ethical review, medical artificial intelligence

Procedia PDF Downloads 159
2497 Imidacloprid and Acetamiprid Residues in Okra and Brinjal Grown in Peri-Urban Environments and Their Dietary Intake Assessment

Authors: Muhammad Atif Randhawa, Adnan Amjad

Abstract:

Assessment of insecticides used for growing vegetables in comparison with their safety status was the main purpose of this study. A total of 180 samples of okra (Abelmoschus esculentus L.) and brinjal (Solanum melongena L.) comprising 30 samples of each vegetable were collected from the peri-urban farming system of Multan, Faisalabad and Gujranwala. The mean value for imidacloprid residues found in brinjal (0.226 mg kg-1) and okra (0.176 mg kg-1) from Multan region were greater than the residues reported from Gujranwala and Faisalabad, showing excessive application of imidacloprid in Multan. Out of total 180 samples analysed for imidacloprid and acetamaprid residues, (90 samples for each of okra and brinjal), 104 (58%) and 117 (65%) samples contained detectable imidacloprid and acetamiprid residues, respectively. Whereas 10% and 15% samples exceeded their respective MRLs for imidacloprid and acetamiprid residues. Dietary intake assessment for imidacloprid and acetamiprid was calculated according to their MPI values 3.84 and 4.48 mg person-1day-1, respectively. The dietary intake assessment data revealed that although a reasonable proportion of samples exceeded the MRLs in studied areas but their consumption was found within safe limit in comparison to values obtained for MPI.

Keywords: Acceptable Daily Intake (ADI), insecticides, Maximum Residual Limits (MRLs), risk assessment, vegetables

Procedia PDF Downloads 303
2496 The Risk of Occupational Health in the Shipbuilding Industry in Bangladesh

Authors: Md. Rashel Sheikh

Abstract:

The shipbuilding industry in Bangladesh had become a fast-growing industry in recent years when it began to export newly built ships. The various activities of shipbuilding industries in their limited, confined spaces added occupational worker exposures to chemicals, dusts, and metal fumes. The aim of this literature search is to identify the potential sources of occupational health hazards in shipyards and to promote the regulation of appropriate personal protective equipment (PPE) for the workers. In shipyards, occupational workers are involved in various activities, such as the manufacture, repair, maintenance, dismantling of boats and ships, building small ocean-going vessels and ferries. The occupational workers in the shipbuilding industry suffer from a number of hazardous issues, such as asthma, dermatitis, hearing deficits, and musculoskeletal disorders. The use of modern technologies, such as underwater plasma welding, electron beam welding, and friction stir welding and laser cutting and welding, and appropriate PPE (i.e., long-sleeved shirt and long pants, shoes plus socks, safety masks, chemical resistant gloves, eyewear, face shield, and respirators) can help reduce the occupational exposure to environmental hazards created by different activities in the shipyards. However, most shipyards in Bangladesh use traditional methods, e.g., flame cutting and arc, that add hazardous waste and pollutants to the environment in and around the shipyard. The safety and security of occupational workers in the shipyard workplace are very important. It is the primary responsibility of employers to ensure the safety and security of occupational workers in the shipyards. Employers must use advanced technologies and supply adequate and appropriate PPE for the workers. There are a number of accidents and illnesses that happen daily in the shipyard industries in Bangladesh due to the negligence and lack of adequate technologies and appropriate PPE. In addition, there are no specific regulations and implementations available to use the PPE. It is essential to have PPE regulations and strict enforcement for the adoption of PPE in the shipbuilding industries in Bangladesh. Along with the adoption of PPE with regular health examinations, health education to the workers regarding occupational hazards and lifestyle diseases are also important and require reinforcement. Monitoring health and safety hazards in shipyards are essential to enhance worker protection, and ensure worker safety, and mitigate workplace injuries and illnesses.

Keywords: shipbuilding Industries, health education, occupational health hazards, personal protective equipment, shipyard workers, occupational workers, shipyards

Procedia PDF Downloads 153
2495 Cross Matching: An Improved Method to Obtain Comprehensive and Consolidated Evidence

Authors: Tuula Heinonen, Wilhelm Gaus

Abstract:

At present safety, assessment starts with animal tests although their predictivity is often poor. Even after extended human use experimental data are often judged as the core information for risk assessment. However, the best opportunity to generate true evidence is to match all available information. Cross matching methodology combines the different fields of knowledge and types of data (e.g. in-vitro and in-vivo experiments, clinical observations, clinical and epidemiological studies, and daily life observations) and gives adequate weight to individual findings. To achieve a consolidated outcome, the information from all available sources is analysed and compared with each other. If single pieces of information fit together a clear picture becomes visible. If pieces of information are inconsistent or contradictory careful consideration is necessary. 'Cross' can be understood as 'orthographic' in geometry or as 'independent' in mathematics. Results coming from different sources bring independent and; therefore, they result in new information. Independent information gives a larger contribution to evidence than results coming repeatedly from the same source. A successful example of cross matching is the assessment of Ginkgo biloba where we were able to come to the conclusive result: Ginkgo biloba leave extract is well tolerated and safe for humans.

Keywords: cross-matching, human use, safety assessment, Ginkgo biloba leave extract

Procedia PDF Downloads 272
2494 Risky Driving Behavior among Bus Driver in Jakarta

Authors: Ratri A. Benedictus, Felicia M. Yolanda

Abstract:

Public transport is a crucial issue for capital city in developing country, such as Jakarta. Inadequate number and low quality of public transport services resulting personal vehicles as the main option. As a result, traffic jams are getting worse in Jakarta. The low quality of public transport, particularly buses, compounded by the risk behavior of the driver. Traffic accidents involving public bus in Jakarta were often the case, even result in fatality. The purpose of this study is to get a description of risk behavior among the public bus drivers in Jakarta. 132 bus drivers become respondent of this study. Risky Driving Behavior scale of Dorn were used. Data were analyzed using descriptive statistics. 51.5% of respondents felt often showing risky behavior while on driving. The highest type of risky driving behavior is still using the unsafe bus (62%). Followed by trespass the bus line (30%), over speed (21%), violate the road signs (15%) and driving with unhealthy physical condition (4%). Results of this study suggested that high understanding of the bus drivers on their risk behaviors have not lead to the emergence of safe driving behavior. Therefore, together with technical engineering and instrumentation work intervention over this issue, psychological aspects also need to be considered, such as: risk perception, safety attitude,safety culture, locus of control and Fatalism.

Keywords: bus driver, psychological factors, public transportation, risky driving behavior

Procedia PDF Downloads 338
2493 Analysis of Histamine Content in Selected Food Products from the Serbian Market

Authors: Brizita Djordjevic, Bojana Vidovic, Milica Zrnic, Uros Cakar, Ivan Stankovic, Davor Korcok, Sladjana Sobajic

Abstract:

Histamine is a biogenic amine, which is formed by enzymatic decarboxylation from the amino acid histidine. It can be found in foods such as fish and fish products, meat and fermented meat products, cheese, wine and beer. The presence of histamine in these foods can indicate microbiological spoilage or poor manufacturing processes. The consumption of food containing large amounts of histamine can have toxicological consequences. In 62 food products (31 canned fish products, 19 wines and 12 cheeses) from the market of Serbia the content of histamine was determined using enzyme-linked immunosorbent assay (ELISA) test kit according to the manufacturer's instructions (Immunolab GmbH, Kassel, Germany). The detection limits of this assay were 20 µg/kg for fish and cheese and 4 µg/L for wine. The concentration of histamine varied between 0.16-207 mg/kg in canned fish products, 0.03-1.47 mg/kg in cheeses and 0.01- 0.18 mg/L in wines. In all analyzed canned fish products the results obtained for the histamine were below the limits set by European and national legislation, so they can be considered acceptable and safe for the health consumers. The levels of histamine in analyzed cheeses and wines were very low and did not pose safety concerns.

Keywords: cheese, enzyme-linked immunosorbent assay, histamine, fish products, wine

Procedia PDF Downloads 435
2492 Performance Analysis of Scalable Secure Multicasting in Social Networking

Authors: R. Venkatesan, A. Sabari

Abstract:

Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.

Keywords: multicasting, scalability, security, social network

Procedia PDF Downloads 279
2491 Covid-19, Diagnosis with Computed Tomography and Artificial Intelligence, in a Few Simple Words

Authors: Angelis P. Barlampas

Abstract:

Target: The (SARS-CoV-2) is still a threat. AI software could be useful, categorizing the disease into different severities and indicate the extent of the lesions. Materials and methods: AI is a new revolutionary technique, which uses powered computerized systems, to do what a human being does more rapidly, more easily, as accurate and diagnostically safe as the original medical report and, in certain circumstances, even better, saving time and helping the health system to overcome problems, such as work overload and human fatigue. Results: It will be given an effort to describe to the inexperienced reader (see figures), as simple as possible, how an artificial intelligence system diagnoses computed tomography pictures. First, the computerized machine learns the physiologic motives of lung parenchyma by being feeded with normal structured images of the lung tissue. Having being used to recognizing normal structures, it can then easily indentify the pathologic ones, as their images do not fit to known normal picture motives. It is the same way as when someone spends his free time in reading magazines with quizzes, such as <> and <>. General conclusion: The AI mimics the physiological processes of the human mind, but it does that more efficiently and rapidly and provides results in a few seconds, whereas an experienced radiologist needs many days to do that, or even worse, he is unable to accomplish such a huge task.

Keywords: covid-19, artificial intelligence, automated imaging, CT, chest imaging

Procedia PDF Downloads 42
2490 Characterization of the Catalytic and Structural Roles of the Human Hexokinase 2 in Cancer Progression

Authors: Mir Hussain Nawaz, Lyudmila Nedyalkova, Haizhong Zhu, Wael M. Rabeh

Abstract:

In this study, we aim to biochemically and structurally characterize the interactions of human HK2 with the mitochondria in addition to the role of its N-terminal domain in catalysis and stability of the full-length enzyme. Here, we solved the crystal structure of human HK2 in complex with glucose and glucose-6-phosphate (PDB code: 2NZT), where it is a homodimer with catalytically active N- and C-terminal domains linked by a seven-turn α-helix. Different from the inactive N-terminal domains of isozymes 1 and 3, the N- domain of HK2 not only capable to catalyze a reaction but it is responsible for the thermodynamic stabilizes of the full-length enzyme. Deletion of first α-helix of the N-domain that binds to the mitochondria altered the stability and catalytic activity of the full-length HK2. In addition, we found the linker helix between the N- and C-terminal domains to play an important role in controlling the catalytic activity of the N-terminal domain. HK2 is a major step in the regulation of glucose metabolism in cancer making it an ideal target for the development of new anticancer therapeutics. Characterizing the structural and molecular mechanisms of human HK2 and its role in cancer metabolism will accelerate the design and development of new cancer therapeutics that are safe and cancer specific.

Keywords: cancer metabolism, enzymology, drug discovery, protein stability

Procedia PDF Downloads 252
2489 Experimental Investigation of Hybrid Rocket Motor: Ignition, Throttling and Re-Ignition Phenomena

Authors: A. El-S. Makled, M. K. Al-Tamimi

Abstract:

Ignition phenomena are of great interest area over the past many years, and it has a direct impact on many propulsion and combustion applications. The direct goal of the paper is to realize and evaluate a functioning ignition method, shut-off, throttling and re-start operations for the hybrid rocket motor. A small-scale hybrid rocket motor (SSHRM) is designed, manufactured, demonstrated at various operating conditions and finally equipped for laboratory firing tests with high level of safety. Various solid fuel grains as Polymethyle-methacrylate (PMMA) and Polyethylene (PE) are selected, and it is decided to use the commercial gaseous oxygen (GO2) for its availability and low cost. Examine different types of ignition methods, pyrotechnic charge, fuse wire, heat wire and finally hot oxidizer method by using the heat exchanger, which are proposed as very safe ignition methods. Finally; recognize phenomena of throttling and re-start operations. Ignition by hot GO2 impingement is proved to be a very attractive ignition method for laboratory SSHRM, for its high safety, reliability and acceptable delay time. Finally; the throttling and re-start operations are demonstrated several times and can be carried out more easily with hot air ignition method.

Keywords: hybrid rocket motor, ignition system, re-start phenomena, throttling

Procedia PDF Downloads 292