Search results for: human factor in security
13333 Efficient Principal Components Estimation of Large Factor Models
Authors: Rachida Ouysse
Abstract:
This paper proposes a constrained principal components (CnPC) estimator for efficient estimation of large-dimensional factor models when errors are cross sectionally correlated and the number of cross-sections (N) may be larger than the number of observations (T). Although principal components (PC) method is consistent for any path of the panel dimensions, it is inefficient as the errors are treated to be homoskedastic and uncorrelated. The new CnPC exploits the assumption of bounded cross-sectional dependence, which defines Chamberlain and Rothschild’s (1983) approximate factor structure, as an explicit constraint and solves a constrained PC problem. The CnPC method is computationally equivalent to the PC method applied to a regularized form of the data covariance matrix. Unlike maximum likelihood type methods, the CnPC method does not require inverting a large covariance matrix and thus is valid for panels with N ≥ T. The paper derives a convergence rate and an asymptotic normality result for the CnPC estimators of the common factors. We provide feasible estimators and show in a simulation study that they are more accurate than the PC estimator, especially for panels with N larger than T, and the generalized PC type estimators, especially for panels with N almost as large as T.Keywords: high dimensionality, unknown factors, principal components, cross-sectional correlation, shrinkage regression, regularization, pseudo-out-of-sample forecasting
Procedia PDF Downloads 15013332 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 1313331 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 5513330 Human Resources and Business Result: An Empirical Approach Based on RBV Theory
Authors: Xhevrie Mamaqi
Abstract:
Organization capacity learning is a process referring to the sum total of individual and collective learning through training programs, experience and experimentation, among others. Today, in-business ongoing training is one of the most important strategies for human capital development and it is crucial to sustain and improve workers’ knowledge and skills. Many organizations, firms and business are adopting a strategy of continuous learning, encouraging employees to learn new skills continually to be innovative and to try new processes and work in order to achieve a competitive advantage and superior business results. This paper uses the Resource Based View and Capacities (RBV) approach to construct a hypothetical relationships model between training and business results. The test of the model is applied on transversal data. A sample of 266 business of Spanish sector service has been selected. A Structural Equation Model (SEM) is used to estimate the relationship between ongoing training, represented by two latent dimension denominated Human and Social Capital resources and economic business results. The coefficients estimated have shown the efficient of some training aspects explaining the variation in business results.Keywords: business results, human and social capital resources, training, RBV theory, SEM
Procedia PDF Downloads 30013329 ‘Transnationalism and the Temporality of Naturalized Citizenship
Authors: Edward Shizha
Abstract:
Citizenship is not only political, but it is also a socio-cultural expectation that naturalized immigrants desire for. However, the outcomes of citizenship desirability are determined by forces outside the individual’s control based on legislation and laws that are designed at the macro and exosystemic levels by politicians and policy makers. These laws are then applied to determine the status (permanency or temporariness) of citizenship for immigrants and refugees, but the same laws do not apply to non-immigrant citizens who attain it by birth. While theoretically, citizenship has generally been considered an irrevocable legal status and the highest and most secure legal status one can hold in a state, it is not inviolate for immigrants. While Article 8 of the United Nations Convention on the Reduction of Statelessness provides grounds for revocation of citizenship obtained by immigrants and refugees in host countries, nation-states have their own laws tied to the convention that provide grounds for revocation. Ever since the 9/11 attacks in the USA, there has been a rise in conditional citizenship and the state’s withdrawal of citizenship through revocation laws that denaturalize citizens who end up not merely losing their citizenship but also the right to reside in the country of immigration. Because immigrants can be perceived as a security threat, the securitization of citizenship and the legislative changes have been adopted to specifically allow greater discretionary power in stripping people of their citizenship.The paper ‘Do We Really Belong Here?’ Transnationalism and the Temporality of Naturalized Citizenship examines literature on the temporality of naturalized citizenship and questions whether citizenship, for newcomers (immigrants and refugees), is a protected human right or a privilege. The paper argues that citizenship in a host country is a well sought-after status by newcomers. The question is whether their citizenship, if granted, has a permanent or temporary status and whether it is treated in the same way as that of non-immigrant citizens. The paper further argues that, despite citizenship having generally been considered an irrevocable status in most Western countries, in practice, if not in law, for immigrants and refugees, citizenship comes with strings attached because of policies and laws that control naturalized citizenship. These laws can be used to denationalize naturalized citizens through revocations for those stigmatized as ‘undesirables’ who are threatened with deportation. Whereas non-immigrant citizens (those who attain it by birth) have absolute right to their citizenship, this is seldom the case for immigrants.This paper takes a multidisciplinary approach using Urie Bronfenbrenner’s ecological systems theory, the macrosystem and exo-system, to examine and review literature on the temporality of naturalized citizenship and questions whether citizenship is a protected right or a privilege for immigrants. The paper challenges the human rights violation of citizenship revocation and argues for equality of treatment for all citizens despite how they acquired their citizenship. The fragility of naturalized citizenship undermines the basic rights and securities that citizenship status can provide to the person as an inclusive practice in a diverse society.Keywords: citizenship, citizenship revocation, dual citizenship, human rights, naturalization, naturalized citizenship
Procedia PDF Downloads 7513328 Down Regulation of Smad-2 Transcription and TGF-B1 Signaling in Nano Sized Titanium Dioxide-Induced Liver Injury in Mice by Potent Antioxidants
Authors: Maha Z. Rizk, Sami A. Fattah, Heba M. Darwish, Sanaa A. Ali, Mai O. Kadry
Abstract:
Although it is known that nano-TiO2 and other nanoparticles can induce liver toxicity, the mechanisms and the molecular pathogenesis are still unclear. The present study investigated some biochemical indices of nano-sized Titanium dioxide (TiO2 NPS) toxicity in mice liver and the ameliorative efficacy of individual and combined doses of idebenone, carnosine and vitamin E. Nano-anatase TiO2 (21 nm) was administered as a total oral dose of 2.2 gm/Kg daily for 2 weeks followed by the afore-mentioned antioxidants daily either individually or in combination for 1month. TiO2-NPS induced a significant elevation in serum levels of alanine aminotransferase (ALT), aspartate aminotransferase (AST) and hepatic oxidative stress biomarkers [lipid peroxides (LP), and nitric oxide levels (NOX), while it significantly reduced glutathione reductase (GR), reduced glutathione (GSH) and glutathione peroxidase(GPX) levels. Moreover the quantitative RT-PCR analysis showed that nano-anatase TiO2 can significantly alter the mRNA and protein expressions of the fibrotic factors TGF-B1, VEGFand Smad-2. Histopathological examination of hepatic tissue reinforced the previous biochemical results. Our results also implied that inflammatory responses and liver injury may be involved in nano-anatase TiO2-induced liver toxicity Tumor necrosis factor-α (TNF-α) and Interleukin -6 (IL-6) and increased the percent of DNA damage which was assessed by COMET assay in addition to the apoptotic marker Caspase-3. Moreover mRNA gene expression observed by RT-PCR showed a significant overexpression in nuclear factor relation -2 (Nrf2), nuclear factor kappa beta (NF-Kβ) and the apoptotic factor (bax), and a significant down regulation in the antiapoptotic factor (bcl2) level. In conclusion idebenone, carnosine and vitamin E ameliorated the deviated previously mentioned parameters with variable degrees with the most pronounced role in alleviating the hazardous effect of TiO2 NPS toxicity following the combination regimen.Keywords: Nano-anatase TiO2, TGF-B1, SMAD-2
Procedia PDF Downloads 42413327 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 25413326 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 35913325 Efficient Internal Generator Based on Random Selection of an Elliptic Curve
Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
Abstract:
The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.Keywords: PRNG, security, cryptosystem, ECC
Procedia PDF Downloads 44413324 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19813323 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 14913322 Identification of Potential Predictive Biomarkers for Early Diagnosis of Preeclampsia Growth Factors to microRNAs
Authors: Sadia Munir
Abstract:
Preeclampsia is the contributor to the worldwide maternal mortality of approximately 100,000 deaths a year. It complicates about 10% of all pregnancies and is the first cause of maternal admission to intensive care units. Predicting preeclampsia is a major challenge in obstetrics. More importantly, no major progress has been achieved in the treatment of preeclampsia. As placenta is the main cause of the disease, the only way to treat the disease is to extract placental and deliver the baby. In developed countries, the cost of an average case of preeclampsia is estimated at £9000. Interestingly, preeclampsia may have an impact on the health of mother or infant, beyond the pregnancy. We performed a systematic search of PubMed including the combination of terms such as preeclampsia, biomarkers, treatment, hypoxia, inflammation, oxidative stress, vascular endothelial growth factor A, activin A, inhibin A, placental growth factor, transforming growth factor β-1, Nodal, placenta, trophoblast cells, microRNAs. In this review, we have summarized current knowledge on the identification of potential biomarkers for the diagnosis of preeclampsia. Although these studies show promising data in early diagnosis of preeclampsia, the current value of these factors as biomarkers, for the precise prediction of preeclampsia, has its limitation. Therefore, future studies need to be done to support some of the very promising and interesting data to develop affordable and widely available tests for early detection and treatment of preeclampsia.Keywords: activin, biomarkers, growth factors, miroRNA
Procedia PDF Downloads 44213321 Vertical Distribution of Heavy Metals and Enrichment in Core Marine Sediments of East Malaysia by INAA and ICP-MS
Authors: Ahmadreza Ashraf, Elias Saion, Elham Gharib Shahi, Chee Kong Yap, Mohd Suhaimi Hamzah
Abstract:
Fifty-five core marine sediments from three locations at South China Sea and one location each at Sulu Sea and Sulawesi Sea of coastal East Malaysia was analyzed for heavy metals using Instrumental Neutron Activation Analysis and Inductively Coupled Plasma Mass Spectroscopy. The enrichment factor of As, Cd, Cr, Cu, Ni, Pb, and Zn varied from 0.42 to 4.26, 0.50 to 2.34, 0.31 to 0.82, 0.20 to 0.61, 0.91 to 1.92, 0.23 to 1.52, and 0.90 to 1.28 respectively, with the modified degree of contamination values below 0.6. Comparative data show that coastal East Malaysia is of low levels of contamination.Keywords: coastal East Malaysia, core marine sediments, enrichment factor, heavy metals, INAA and ICP method, modified degree of contamination
Procedia PDF Downloads 33513320 Questioning Eugenics and the Dignity of the Human Person in the Age of Science Technology
Authors: Ephraim Ibekwe
Abstract:
The field of biomedical science has offered modern man more options to choose from than ever before about what their future children will be or look like. Today, embryo selection techniques, for instance, has availed most people the power to choose the sex of their child, to avoid the birth of a child with a disability, or even to choose deliberately to create a disabled child. With new biotechnological tools emerging daily, many people deem parents personally and socially responsible for the results of their choosing to bear children, i.e. all tests should be done, and parents are responsible for only “keeping” healthy children. Some fear parents may soon be left to their own devices if they have children who require extra time and social spending. As with other discoveries in the area of genetic engineering, such possibilities raise important ethical issues – questions about which of these choices are morally permissible or morally wrong. Hence, the preoccupation of this article is to understand the extent to which the questions that Eugenics posits on the human person can be answered with keen clarity. With an analytical posture, this article, while not deriding the impact of biotechnology and the medical sciences, argues for Human dignity in its strictest consideration.Keywords: dignity, eugenics, human person, technology and biomedical science
Procedia PDF Downloads 14013319 Relating Symptoms with Protein Production Abnormality in Patients with Down Syndrome
Authors: Ruolan Zhou
Abstract:
Trisomy of human chromosome 21 is the primary cause of Down Syndrome (DS), and this genetic disease has significantly burdened families and countries, causing great controversy. To address this problem, the research takes an approach in exploring the relationship between genetic abnormality and this disease's symptoms, adopting several techniques, including data analysis and enrichment analysis. It also explores open-source websites, such as NCBI, DAVID, SOURCE, STRING, as well as UCSC, to complement its result. This research has analyzed the variety of genes on human chromosome 21 with simple coding, and by using analysis, it has specified the protein-coding genes, their function, and their location. By using enrichment analysis, this paper has found the abundance of keratin production-related coding-proteins on human chromosome 21. By adopting past researches, this research has attempted to disclose the relationship between trisomy of human chromosome 21 and keratin production abnormality, which might be the reason for common diseases in patients with Down Syndrome. At last, by addressing the advantage and insufficiency of this research, the discussion has provided specific directions for future research.Keywords: Down Syndrome, protein production, genome, enrichment analysis
Procedia PDF Downloads 12613318 Nutraceuticals of Chemical Synthesis: Special Glycans as Prebiotics for the Holobiont
Authors: M. Menapace
Abstract:
Introduction: Herbal remedies express the idea of natural products used as pharmacotherapy or supplementation in case of need. Whether they are obtained directly by plants or synthesised chemically, prebiotics are considered nutraceuticals of natural origin, i.e., products made available for health reasons and self-medication. Methods: A literature review has been performed by screening manuscripts with prebiotics as herbal nutraceuticals (including chemically synthesized compounds, such as human milk oligosaccharides [HMO]) and evaluating the chemical structure of fibers in diverse food sources (principally herbals). Results: An examination of recent literature led to the fundamental concept of the holobiont as key in understanding the importance of prebiotics for the nonhost part of the metaorganism (microbiota) called a human being. This multispecies entity requires prebiotic fibers to avoid a state of disequilibrium (dysbiosis) that fosters diseases. Conclusions: Numerous human-derived glycans (special oligosaccharides that mimic in structure and function not only blood type antigens but also herbal fibers) have been identified as essential for the maintenance of the equilibrium (eubiosis) within the human holobiont in the modern age. These products are planned to be used not just as additions to baby milk formulas but as food supplements for the health of adults. In the context of alternative medicine, human-derived glycan-based supplements may represent the next step on the road to complete well-being.Keywords: glycans, herbal remedy, prebiotics, food supplement
Procedia PDF Downloads 13313317 Identification of miRNA-miRNA Interactions between Virus and Host in Human Cytomegalovirus Infection
Authors: Kai-Yao Huang, Tzong-Yi Lee, Pin-Hao Ho, Tzu-Hao Chang, Cheng-Wei Chang
Abstract:
Background: Human cytomegalovirus (HCMV) infects much people around the world, and there were many researches mention that many diseases were caused by HCMV. To understand the mechanism of HCMV lead to diseases during infection. We observe a microRNA (miRNA) – miRNA interaction between HCMV and host during infection. We found HCMV miRNA sequence component complementary with host miRNA precursors, and we also found that the host miRNA abundances were decrease in HCMV infection. Hence, we focus on the host miRNA which may target by the other HCMV miRNA to find theirs target mRNAs expression and analysis these mRNAs affect what kind of signaling pathway. Interestingly, we found the affected mRNA play an important role in some diseases related pathways, and these diseases had been annotated by HCMV infection. Results: From our analysis procedure, we found 464 human miRNAs might be targeted by 26 HCMV miRNAs and there were 291 human miRNAs shows the concordant decrease trend during HCMV infection. For case study, we found hcmv-miR-US22-5p may regulate hsa-mir-877 and we analysis the KEGG pathway which built by hsa-mir-877 validate target mRNA. Additionally, through survey KEGG Disease database found that these mRNA co-regulate some disease related pathway for instance cancer, nerve disease. However, there were studies annotated that HCMV infection casuse cancer and Alzheimer. Conclusions: This work supply a different scenario of miRNA target interactions(MTIs). In previous study assume miRNA only target to other mRNA. Here we wonder there is possibility that miRNAs might regulate non-mRNA targets, like other miRNAs. In this study, we not only consider the sequence similarity with HCMV miRNAs and human miRNA precursors but also the expression trend of these miRNAs. Then we analysis the human miRNAs validate target mRNAs and its associated KEGG pathway. Finally, we survey related works to validate our investigation.Keywords: human cytomegalovirus, HCMV, microRNA, miRNA
Procedia PDF Downloads 43513316 Phorbol 12-Myristate 13-Acetate (PMA)-Differentiated THP-1 Monocytes as a Validated Microglial-Like Model in Vitro
Authors: Amelia J. McFarland, Andrew K. Davey, Shailendra Anoopkumar-Dukie
Abstract:
Microglia are the resident macrophage population of the central nervous system (CNS), contributing to both innate and adaptive immune response, and brain homeostasis. Activation of microglia occurs in response to a multitude of pathogenic stimuli in their microenvironment; this induces morphological and functional changes, resulting in a state of acute neuroinflammation which facilitates injury resolution. Adequate microglial function is essential for the health of the neuroparenchyma, with microglial dysfunction implicated in numerous CNS pathologies. Given the critical role that these macrophage-derived cells play in CNS homeostasis, there is a high demand for microglial models suitable for use in neuroscience research. The isolation of primary human microglia, however, is both difficult and costly, with microglial activation an unwanted but inevitable result of the extraction process. Consequently, there is a need for the development of alternative experimental models which exhibit morphological, biochemical and functional characteristics of human microglia without the difficulties associated with primary cell lines. In this study, our aim was to evaluate whether THP-1 human peripheral blood monocytes would display microglial-like qualities following an induced differentiation, and, therefore, be suitable for use as surrogate microglia. To achieve this aim, THP-1 human peripheral blood monocytes from acute monocytic leukaemia were differentiated with a range of phorbol 12-myristate 13-acetate (PMA) concentrations (50-200 nM) using two different protocols: a 5-day continuous PMA exposure or a 3-day continuous PMA exposure followed by a 5-day rest in normal media. In each protocol and at each PMA concentration, microglial-like cell morphology was assessed through crystal violet staining and the presence of CD-14 microglial / macrophage cell surface marker. Lipopolysaccharide (LPS) from Escherichia coli (055: B5) was then added at a range of concentrations from 0-10 mcg/mL to activate the PMA-differentiated THP-1 cells. Functional microglial-like behavior was evaluated by quantifying the release of prostaglandin (PG)-E2 and pro-inflammatory cytokines interleukin (IL)-1β and tumour necrosis factor (TNF)-α using mediator-specific ELISAs. Furthermore, production of global reactive oxygen species (ROS) and nitric oxide (NO) were determined fluorometrically using dichlorodihydrofluorescein diacetate (DCFH-DA) and diaminofluorescein diacetate (DAF-2-DA) respectively. Following PMA-treatment, it was observed both differentiation protocols resulted in cells displaying distinct microglial morphology from 10 nM PMA. Activation of differentiated cells using LPS significantly augmented IL-1β, TNF-α and PGE2 release at all LPS concentrations under both differentiation protocols. Similarly, a significant increase in DCFH-DA and DAF-2-DA fluorescence was observed, indicative of increases in ROS and NO production. For all endpoints, the 5-day continuous PMA treatment protocol yielded significantly higher mediator levels than the 3-day treatment and 5-day rest protocol. Our data, therefore, suggests that the differentiation of THP-1 human monocyte cells with PMA yields a homogenous microglial-like population which, following stimulation with LPS, undergo activation to release a range of pro-inflammatory mediators associated with microglial activation. Thus, the use of PMA-differentiated THP-1 cells represents a suitable microglial model for in vitro research.Keywords: differentiation, lipopolysaccharide, microglia, monocyte, neuroscience, THP-1
Procedia PDF Downloads 38813315 12x12 MIMO Terminal Antennas Covering the Whole LTE and WiFi Spectrum
Authors: Mohamed Sanad, Noha Hassan
Abstract:
A broadband resonant terminal antenna has been developed. It can be used in different MIMO arrangements such as 2x2, 4x4, 8x8, or even 12x12 MIMO configurations. The antenna covers the whole LTE and WiFi bands besides the existing 2G/3G bands (700-5800 MHz), without using any matching/tuning circuits. Matching circuits significantly reduce the efficiency of any antenna and reduce the battery life. They also reduce the bandwidth because they are frequency dependent. The antenna can be implemented in smartphone handsets, tablets, laptops, notebooks or any other terminal. It is also suitable for different IoT and vehicle applications. The antenna is manufactured from a flexible material and can be bent or folded and shaped in any form to fit any available space in any terminal. It is self-contained and does not need to use the ground plane, the chassis or any other component of the terminal. Hence, it can be mounted on any terminal at different positions and configurations. Its performance does not get affected by the terminal, regardless of its type, shape or size. Moreover, its performance does not get affected by the human body of the terminal’s users. Because of all these unique features of the antenna, multiples of them can be simultaneously used for MIMO diversity coverage in any terminal device with a high isolation and a low correlation factor between them.Keywords: IOT, LTE, MIMO, terminal antenna, WiFi
Procedia PDF Downloads 18613314 Capital Accumulation, Technology Diffusion and Economic Growth: An Empirical Application to Tunisian Case
Authors: Ahmed Bellakhdhar
Abstract:
This paper aims to test the impact of various variables-namely, investment in physical capital, investment in human capital, openness to trade and foreign direct investments, and distance from the technology frontier-on economic growth in the Tunisian context during the period 1976-2010. Empirical results identify that the impact of human capital is significantly positive. This finding confirms the hypothesis that human capital is a main driver of economic performance through its role of improving the internal productive capacity and the absorption of foreign technology especially via foreign direct investments. The effect of FDI is significantly positive in all alternative regressions and the coefficient associated to physical capital variable is positive, but not significant overall. Concerning the import of technologically advanced equipments, our estimates show the absence of a significant direct impact on economic growth in Tunisia. Our empirical results also support the assumption of a non linear relationship between tax and growth and demonstrate the existence of an inverted-U curve between the two variables, in the spirit of the “Laffer curve”.Keywords: Endogenous growth, Human capital, Technology transfer, Absorptive capacity
Procedia PDF Downloads 13213313 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 39213312 Sniff-Camera for Imaging of Ethanol Vapor in Human Body Gases after Drinking
Authors: Toshiyuki Sato, Kenta Iitani, Koji Toma, Takahiro Arakawa, Kohji Mitsubayashi
Abstract:
A 2-dimensional imaging system (Sniff-camera) for gaseous ethanol emissions from a human palm skin was constructed and demonstrated. This imaging system measures gaseous ethanol concentrations as intensities of chemiluminescence (CL) by luminol reaction induced by alcohol oxidase and luminol-hydrogen peroxide system. A conversion of ethanol distributions and concentrations to 2-dimensional CL was conducted on an enzyme-immobilized mesh substrate in a dark box, which contained a luminol solution. In order to visualize ethanol emissions from human palm skin, we developed highly sensitive and selective imaging system for transpired gaseous ethanol at sub ppm-levels. High sensitivity imaging allows us to successfully visualize the emissions dynamics of transdermal gaseous ethanol. The intensity of each pixel on the palm shows the reflection of ethanol concentrations distributions based on the metabolism of oral alcohol administration. This imaging system is significant and useful for the assessment of ethanol measurement of the palmar skin.Keywords: sniff-camera, gas-imaging, ethanol vapor, human body gas
Procedia PDF Downloads 37013311 Fundamentals and Techniques of Organic Agriculture in Egypt
Authors: Moustafa Odah
Abstract:
Organic Agriculture is a new and sustainable agricultural system that depends on the use of organic materials from within the farm resulting from crop residues and animal husbandry and the cultivation of leguminous crops, away from the use of chemicals in fertilization or pest resistance, which leads to the production of safe, clean and healthy food products with nutritional value high and free of chemicals enhance food security; it is also an agricultural model preserve natural resources by improving the fertility and soil characteristics, and enhance biodiversity and biological cycles; additionally, they preserve the environment from pollution, which makes it play an important role in providing food needs of the present generations and the preservation of the rights of the coming generations to achieve sustainable development.Keywords: organic agriculture, food security and achieving sustainable development, fertilization or pest resistance, crop residues and animal husbandry and the cultivation of leguminous crops
Procedia PDF Downloads 8313310 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 32513309 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change
Authors: J. Fryt, K. Pietras, T. Smolen
Abstract:
Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.Keywords: value transmission, value change, intergenerational similarities, differences in values
Procedia PDF Downloads 42913308 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security
Authors: Stanislaw Kosmynka
Abstract:
Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat
Procedia PDF Downloads 52513307 Breaching Treaty Obligations of the Rome Statute of the International Criminal Court: The Case of South Africa
Authors: David Abrahams
Abstract:
In October 2016 South Africa deposited its ‘instrument of withdrawal’ from the Rome Statute of the International Criminal Court, with the Secretary-General of the United Nations. The Rome Statute is the founding document of the treaty-based International Criminal Court (ICC). The ICC has jurisdiction to hear cases where crimes against humanity, war crimes and genocide have been committed, on the basis of individual criminal responsibility. It is therefore not surprising that one of the ICCs mandates is to ensure that the sufferings, due to gross human rights violations towards the civilian population is, in principle, brought to an end by punishing those individuals responsible, thus providing justice to the victims. The ICC is unable to effectively fulfill its mandate and thus depends, in part on the willingness of states to assist the Court in its functions. This requires states to ratify the Statute and to domesticate its provisions, depending on whether it is a monist or dualist state. South Africa ratified the Statute in November 2000, and domesticated the Statute in 2002 by virtue of the Implementation of the Rome Statute of the International Criminal Court Act 27 of 2002. South Africa thus remains under an obligation to cooperate with the ICC until the final date of withdrawal, which is October 2017. An AU Summit was hosted by South Africa during June 2015. Omar Al-Bashir, whom the prosecutor of the ICC has indicted on two separate occasions, was invited to the summit. South Africa made an agreement with the AU that it will honour its obligations in terms of its Diplomatic and Immunities Privileges Act of 2001, by granting immunity to all heads of state, including that of Sudan. This decision by South Africa has raised a plethora of questions regarding the status and hierarchy of international laws versus regional laws versus domestic laws. In particular, this paper explores whether a state’s international law treaty obligations may be suspended in favour of, firstly, regional peace (thus safeguarding the security of the civilian population against further atrocities and other gross violations of human rights), and secondly, head of state immunity. This paper also reflects on the effectiveness of the trias politca in South Africa in relation the manner in which South African courts have confirmed South Africa’s failure in fulfilling its obligations in terms of the Rome Statute. A secondary question which will also be explored, is whether the Rome Statute is currently an effective tool in dealing with gross violations of human rights, particularly in a regional African context, given the desire by a number of African states currently party to the Statute, to engage in a mass exodus from the Statute. Finally, the paper concludes with a proposal that there can be no justice for victims of gross human rights violations unless states are serious in playing an instrumental role in bringing an end to impunity in Africa, and that withdrawing from the ICC without an alternative, effective system in place, will simply perpetuate impunity.Keywords: African Union, diplomatic immunity, impunity, international criminal court, South Africa
Procedia PDF Downloads 52913306 Prevalence and Factors Associated With Concurrent Use of Herbal Medicine and Anti-retroviral Therapy Among HIV/Aids Patients Attending Selected HIV Clinics in Wakiso District
Authors: Nanteza Rachel
Abstract:
Background: Worldwide, there were 36.7 million people living with Human Immunodeficiency Virus (HIV) in 2015, up from 35 million at the end of 2013. Wakiso district is one of the hotspots for the Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) infection in Uganda, with the prevalence of 8.1 %. Herbal medicine has gained popularity among Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) patients as adjuvant therapy to reduce the adverse effects of ART. Regardless of the subsidized and physical availability of the Anti-Retroviral Therapy (ART), majority of Africans living with Human Immunodeficiency Virus (HIV)/ Acquired Immune Deficiency Syndrome (AIDS) resort to adding to their ART traditional medicine. Result found out from a pilot observation made by the PI that indicate 13 out of 30 People Living with AIDS(PLWA) who are attending Human Immunodeficiency Virus (HIV) clinics in Wakiso district reported to be using herbal preparations despite the fact that they were taking Anti Retro Viral (ARVs) this prompted this study to be done. Purpose of the study: To determine the prevalence and factors associated with concurrent use of herbal medicine and anti-retroviral therapy among HIV/AIDS patients attending selected HIV clinics in Wakiso district. Methodology: This was a cross sectional study with both quantitative data collection (use of a questionnaire) and qualitative data collection (key informants’ interviews). A mixed method of sampling was used, that is, purposive and random sampling. Purposive sampling was based on the location in the district and used to select 7 health facilities basing on the 7 health sub districts from Wakiso. Simple random sampling was used to select one HIV clinic from each of the 7 health sub districts. Furthermore, the study units were enrolled in to the study as they entered into the HIV clinics, and 105 respondents were interviewed. Both manual and computer packages (SPSS) were used to analyze the data Results: The prevalence of concurrent use of herbal medicine and ART was 38 (36.2%). Commonly HIV symptom treated with herbs was fever 27(71.1%), diarrhea 3(7.9%) and cough 2(5.3%). Commonly used herbs for fever (Omululuza (Vernonica amydalina), Ekigagi (Aloe sp), Nalongo (Justicia betonica Linn) while for diarrhea was Ntwatwa. The side effects also included; too much pain, itchy pain of HIV, aneamia,felt sick, loss/gain appetite, joint pain and bad dreams. Herbs used to sooth the side effects were; for aneamia was avocado leaves Parea Americana mill The significant factors associated with concurrent use of herbal medicine were being familiar with herbs and conventional medicine for management HIV symptoms being expensive. The other significant factor was exhibiting hostility to patients by health personnel providing HIV care. Conclusion: Herbal medicine is widely used by clients in HIV/AIDS care. Patients being familiar with herbs and conventional medicine being expensive were associated with concurrent use of herbal medicine and ART. The exhibition of hostility to the HIV/AIDS patients by the health care providers was also associated with concurrent use of herbal medicine and ART among HIV/AIDS patients.Keywords: HIV patients, herbal medicine, antiretroviral therapy, factors associated
Procedia PDF Downloads 9713305 Habitat Studies of Etheria elliptica in Some Water Bodies (River Ogbese and Owena Reservoir) in Ondo State, Nigeria
Authors: O. O. Olawusi-Peters, M. O. Adediran, O. A. Ajibare
Abstract:
Etheria elliptica population is declining due to various human activities on the freshwater habitat. This necessitate the habitat study of the mussel in river Ogbese and Owena reservoir in Ondo state, Nigeria in order to know the status of the organism within the ecosystem. Thirty (30) specimens each from River Ogbese and Owena reservoir were sampled between May and August 2012. The meristic variables such as length, breadth, shell thickness and weight of the mussel were measured. Also, some physico-chemical parameters, flow rate and soil profile of the two rivers were studied. In River Ogbese, the weight, length, breadth and thickness variables obtained were; 49.73g, 8.42cm, 3.78cm and 0.53cm respectively. In Owena reservoir, the values were; 111.17g, 8.80cm, 6.64cm, 0.22cm respectively. The condition factor showed that the samples from Owena reservoir (K = 16.33) were healthier than River Ogbese (K = 8.34). Also, the length-weight relationship indicated isometric growth in both water bodies (Ogbese r2 = 0.68; Owena r2 = 0.66). In River Ogbese, the physico-chemical parameters obtained were; temperature (24.3oC), pH (7.12), TDS (72ppm), DO (3.2mg/l), conductivity (145µ), BOD (0.7mg/l). The mean temperature (24.1oC), pH (7.69), TDS (102ppm), DO (3.1mg/l), conductivity (183µ), BOD (0.8mg/l) were obtained from Owena reservoir. The soil samples values obtained from both water bodies are; River Ogbese –phosphorus; 78.78, calcium; 3.60, magnesium; 1.90 and organic matter; 0.17. Owena reservoir - Phosphorus; 3.34, calcium; 4.40, magnesium; 1.20 and organic matter; 0.66. The river flow rate was 0.22m/s for Owena reservoir and 0.26m/s for river Ogbese. The study revealed that Etheria elliptica in Owena reservoir and Ogbese were in good and healthy conditions despite the various human activities on the water bodies. The water quality parameters obtained were within the preferred requirements of the mussels.Keywords: Etheria elliptica, mussels, Owena reservoir, River Ogbese
Procedia PDF Downloads 50813304 Victim Witnesses of Human Trafficking: A Phenomenological Study
Authors: Jireh Reinor L. Vitto, Mylene S. Gumarao, Levy M. Fajanilan, Sheryll Ann M. Castillo, Leonardo B. Dorado, Miriam P. Narbarte
Abstract:
Human trafficking may happen to anyone. The study aimed to explore the experiences of victim witnesses of human trafficking. It utilized a qualitative phenomenological study design. Eighteen women, 15 to 46 years old, had experienced human trafficking (sex or labor trafficking), and with a filed case or not. An in-depth semi-structured, open-ended interview was employed to gather information. Guardians were also interviewed for triangulation purposes. Findings showed that the participants experienced fatigue and abuse for their physical aspect and gained negative feelings such as burdened, sad, scared (fear), stress, anger, trauma, depress and suicidal thoughts for their psychological aspect. For the spiritual aspect, the participants concluded to have enhanced spiritual life where they knew about God, became closer to God, and learned how to pray. They also faced challenges such as dysfunctional family, delinquent friends, exploitation, problems kept from the family, and poverty, which resulted in their becoming victims of human trafficking. To cope with the situation, they utilized family support, prayers, guts or courage (lakas ng loob), negotiation with their employer, and support from kababayans. Their practices and mechanisms to recover were the Blas Ople Center, rescue/entrapment operation, shelter, and embassy. After the incident, the participants shared that they earned to have thoughts of having a good life without going abroad/makabayan, knowledge of overseas Filipino workers, wise choice of friends, contentment, and value for the family.Keywords: victim-witnesses, human trafficking, lived experiences, challenges, coping strategies
Procedia PDF Downloads 131