Search results for: internet protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2666

Search results for: internet protocol

806 Expression Level of Dehydration-Responsive Element Binding/DREB Gene of Some Local Corn Cultivars from Kisar Island-Maluku Indonesia Using Quantitative Real-Time PCR

Authors: Hermalina Sinay, Estri L. Arumingtyas

Abstract:

The research objective was to determine the expression level of dehydration responsive element binding/DREB gene of local corn cultivars from Kisar Island Maluku. The study design was a randomized block design with single factor consist of six local corn cultivars obtained from farmers in Kisar Island and one reference varieties wich has been released by the government as a drought-tolerant varieties and obtained from Cereal Crops Research Institute (ICERI) Maros South Sulawesi. Leaf samples were taken is the second leaf after the flag leaf at the 65 days after planting. Isolation of total RNA from leaf samples was carried out according to the protocols of the R & A-BlueTM Total RNA Extraction Kit and was used as a template for cDNA synthesis. The making of cDNA from total RNA was carried out according to the protocol of One-Step Reverse Transcriptase PCR Premix Kit. Real Time-PCR was performed on cDNA from reverse transcription followed the procedures of Real MODTM Green Real-Time PCR Master Mix Kit. Data obtained from the real time-PCR results were analyzed using relative quantification method based on the critical point / Cycle Threshold (CP / CT). The results of gene expression analysis of DREB gene showed that the expression level of the gene was highest obtained at Deep Yellow local corn cultivar, and the lowest one was obtained at the Rubby Brown Cob cultivar. It can be concluded that the expression level of DREB gene of Deep Yellow local corn cultivar was highest than other local corn cultivars and Srikandi variety as a reference variety.

Keywords: expression, level, DREB gene, local corn cultivars, Kisar Island, Maluku

Procedia PDF Downloads 288
805 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 85
804 Influences on Female Gender Identity and Role in Pre-School, Saudi Arabian: Analyzing Children's Perspectives through Narratives and Teachers' Pedagogies

Authors: Mona Alzahrani

Abstract:

Microworld theories can help to define the many influences on female development. In this research, theories together with narratives have been used to discover the reality of children’s gender perceptions in Saudi Arabia. Today, Saudi Arabia is considered a ‘closed and conserved’ society due to tribal, cultural and religious factors. This study focuses on how young girls in Saudi Arabia learn about what is expected of them as females. Cultural beliefs and experiences contribute to children’s notions of identity. Moreover, significant others such as more experienced peers, teachers, parents, and other members of a society can influence a child’s development of knowledge through interactions within their social world. There are dominant influences from the Saudi State. These influences have very strong devices and perceptions of what or how a female should act and be. However, children may have other viewpoints, as it also needs to be considered that the Internet and other media sources could have an influence. Consequently, difficulties could exist for these young children to feel an authentic sense of belonging. The study gathered data using a multi-method approach that elicited the perspectives of the children using ‘multiple modes of expression’ such as observations, story-telling, picture prompt cards, group interviews, drawings and annotations. For this study, prompts and a book was devised, specifically, for use in a Saudi setting. It was found that Saudi young girls in preschool were heteronomous, mainly influenced by culture and society, in their perceptions of female gender and role.

Keywords: Saudi Arabia, pre-school, female, teachers, gender, identity, role

Procedia PDF Downloads 141
803 The Transcutaneous Auricular Vagus Nerve Stimulation in Treatment of Depression and Anxiety Disorders in Recovery Patient with Feeding and Eating Disorders

Authors: Y. Melis, E. Apicella, E. Dozio, L. Mendolicchio

Abstract:

Introduction: Feeding and Eating Disorders (FED) represent the psychiatric pathology with the highest mortality rate and one of the major disorders with the highest psychiatric and clinical comorbidity. The vagus nerve represents one of the main components of the sympathetic and parasympathetic nervous system and is involved in important neurophysiological functions. In FED, there is a spectrum of symptoms which with TaVNS (Transcutaneous Auricular Vagus Nerve Stimulation) therapy, is possible to have a therapeutic efficacy. Materials and Methods: Sample subjects are composed of 15 female subjects aged > 18 ± 51. Admitted to a psychiatry community having been diagnosed according to DSM-5: anorexia nervosa (AN) (N= 9), bulimia nervosa (BN) (N= 5), binge eating disorder (BED) (N= 1). The protocol included 9 weeks of Ta-VNS stimulation at a frequency of 1.5-3.5 mA for 4 hours per day. The variables detected are the following: Heart Rate Variability (HRV), Hamilton Depression Rating Scale (HAMD-HDRS-17), Body Mass Index (BMI), Beck Anxiety Index (BAI). Results: Data analysis showed statistically significant differences between recording times (p > 0.05) in HAM-D (t0 = 18.28 ± 5.31; t4 = 9.14 ± 7.15), in BAI (t0 = 24.7 ± 10.99; t4 = 13.8 ± 7.0). The reported values show how during (T0-T4) the treatment there is a decay of the degree in the depressive state, in the state of anxiety, and an improvement in the value of BMI. In particular, the BMI in the AN-BN sub-sample had a minimum gain of 5% and a maximum of 11%. The analysis of HRV did not show a clear change among subjects, thus confirming the discordance of the activity of the sympathetic and parasympathetic nervous system in FED. Conclusions: Although the sample does not possess a relevant value to determine long-term efficacy of Ta-VNS or on a larger population, this study reports how the application of neuro-stimulation in FED may become a further approach therapeutic. Indeed, substantial improvements are highlighted in the results and confirmed hypotheses proposed by the study.

Keywords: feeding and eating disorders, neurostimulation, anxiety disorders, depression

Procedia PDF Downloads 134
802 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 329
801 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)

Authors: Essam Mansour

Abstract:

The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.

Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait

Procedia PDF Downloads 296
800 Treatment with RRx-001, a Minimally Toxic NLRP3 Inhibitor in Phase 3 Clinical Trials, Improves Exercise and Skeletal Muscle Oxidative Capacity in Untrained Mice

Authors: Pedro Cabrales, Scott Caroen, Tony R. Reid, Bryan Oronsky

Abstract:

Introduction and Purpose RRx-001 is an NLRP3 inhibitor and Nrf2 agonist in Phase 3 trials for the treatment of cancer. The purpose of this study was to examine whether treatment with RRx-001, given itsanti-inflammatory and antioxidant properties, improvedexercise and skeletal muscle oxidative capacity in mice on the generalpremiss that better health outcomes correlatewith more activity. Material and Methods Male and female adult mice (n=6 per group) were subjected to an endurance exercise capacity (EEC)test until exhaustion on a motorized treadmill after 3 once weekly doses of either RRx-001 5 mg/kg, RRx-001 2 mg/kg, or vehicle. The EEC protocol consisted of a treadmill velocity of 30meters per min at an uphill inclination (slope of 10%) until the mice reached fatigue, which was defined as the inability of the mice to maintain the appropriate pace despitecontinuous hand stimulation for 1 min. The concentration of malondialdehyde (MDA), an indicator of lipid peroxidation, and creatine kinase (CK), an indicator of muscle damage, in the blood samples collected immediately after the acute exercise was determined with a commercial ELISA assay kit. ResultsThe exhaustive exercise times of the RRx-001 groups were significantly longer than that of the vehicle group (p<0.05) by weeks 2 and 3. In addition, MDA levels in the gastrocnemius, soleus, and extensor digitorum longus muscles were significantly lower than those of the vehicle group were (p<0.05), as were the serum CK levels(p<0.05). ConclusionsIn conclusion, this study found that RRx-001 has anti-fatigue properties, as evidenced by an increase in exercise capacity with RRx-001 treatment, and protects against strenuous exercise-induced muscle damage and lipid peroxidation. This data potentially supports the use of RRx-001 in the clinic to improve exercise performance and reduce physical fatigue.

Keywords: RRx-001, anti-fatigue, muscle protection, increased exercise tolerance, lipid peroxidation

Procedia PDF Downloads 88
799 Commerce and Islamic Banking System

Authors: Rahmoune Abdelhaq

Abstract:

Systemic Islamic banking has been in practice for long but started receiving due attention and high popularity since last decade. It has received a warm welcome from all over the world and these banks operating on Islamic principles have been able to get a sizeable business not only in Islamic countries but in non-Islamic countries too. Despite exemplary advancements and achievements, there remains number of controversies over various underlying concepts and practices. This paper basically explores and highlights all those controversies and challenges which are in minds of different school of thoughts and are needed to be addressed and overcome if Islamic banking continues flourishing the way it is at present. The authors have also tried to suggest suitable remedies to overcome these challenges where appropriate. As well, This paper makes an attempt to review major principles surrounding the working of Islamic banking and its historical growth. A brief overview of main differences between the Islamic banking and the conventional banking. In addition, references are particularly made to implications arising from the emergence of e-commerce and the realities that the Islamic Shari’ah law has to consider in adopting the new phenomenon into its banking system. This paper shows, whilst the conventional banking and financial system is based on the principle of rationality and interest, the Islamic financial system is based on morality and social justice which prohibits interest as a means of speculation and injustice. The concepts of e-business such as e-commerce and e-banking are acceptable in Islam as since in Islam anything is halal unless prohibited by Shari’ah, dealing with business by internet is considered as Shari’ah compliant. This paper, therefore, provides the latest thinking of e-business from an Islamic viewpoint, thus creating a reference point and valued information for a future research.

Keywords: Islamic Finance, principles of Islamic banking, Islamic commerce, Shari’ah compliant

Procedia PDF Downloads 400
798 Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana

Authors: Akosua Asantewaa Anane

Abstract:

Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing.

Keywords: social activism, cialdini’s six principles of persuasion, news curation, niche authorities

Procedia PDF Downloads 54
797 Smartphones as a Tool of Mobile Journalism in Saudi Arabia

Authors: Ahmed Deen

Abstract:

The introduction of the mobile devices which were equipped with internet access and a camera, as well as the messaging services, has become a major inspiration for the use of the mobile devices in the growth in the reporting of news. Mobile journalism (MOJO) was a creation of modern technology, especially the use of mobile technology for video journalism purposes. MOJO, thus, is the process by which information is collected and disseminated to society, through the use of mobile technology, and even the use of the tablets. This paper seeks to better understand the ethics of Saudi mobile journalists towards news coverage. Also, this study aims to explore the relationship between minimizing harms and truth-seeking efforts among Saudi mobile journalists. Three main ethics were targeted in this study, which are seek truth and report it, minimize harm, and being accountable. Diffusion of innovation theory applied to reach this study’s goals. The non- probability sampling approach, ‘Snowball Sampling’ was used to target 124 survey participants, an online survey via SurveyMonkey that was distributed through social media platforms as a web link. The code of ethics of the Society of Professional Journalists has applied as a scale in this study. This study found that the relationship between minimizing harm and truth-seeking efforts is significantly moderate among Saudi mobile journalists. Also, it is found that the level journalistic experiences and using smartphones to cover news are weakly and negatively related to the perceptions of mobile journalism among Saudi journalists, while Saudi journalists who use their smartphone to cover the news between 1-3 years, were the majority of participants (55 participants by 51.4%).

Keywords: mobile journalism, Saudi journalism, smartphone, Saudi Arabia

Procedia PDF Downloads 158
796 The Implementation of Entrepreneurial Marketing in Small Business Enterprise

Authors: Iin Mayasari

Abstract:

This study aims at exploring the influence of aspects of entrepreneurial marketing on a firm’s performance. Entrepreneurs are not only supported by resources control to obtain sustainable competitive advantage, but it should also be supported by intangible resources. Entrepreneurial marketing provides the opportunity for entrepreneurs to proactively find better ways to create value for desired customers, to create innovation, and to build customer equity. Entrepreneurial marketing has the medium between entrepreneurship and marketing, and serves as an umbrella for many of the emergent perspectives on marketing. It has eight underlying dimensions. They are proactiveness, calculated risk-taking, innovativeness, an opportunity focus, entrepreneurial orientation, resource leveraging, customer intensity, and value creating. The research method of the study was a qualitative study by having an interview with 8 small companies in Kudus Region, the Central Java, Indonesia. The interviewees were the owner and the manager of the company that had the scope work of small business enterprise in wood crafting industry. The interview was related to the implementation of the elements of the entrepreneurial marketing. The result showed that the small business enterprises had implemented the elements of entrepreneurial marketing in supporting their daily activities. The understanding based on the theoretical implementation was well executed by the owner and managers. The problems in managing small business enterprises were related to the full support by the government and the branding management. Furthermore, the innovation process should be improved especially the use of internet to promote the product, to expand the market and to increase the firm’s performance.

Keywords: entrepreneurial marketing, innovativeness, risk taking, opportunity focus

Procedia PDF Downloads 285
795 Time to Pancreatic Surgery after Preoperative Biliary Drainage in Periampullary Cancers: A Systematic Review and Meta‑Analysis

Authors: Maatouk Mohamed, Nouira Mariem, Hamdi Kbir Gh, Mahjoubi M. F., Ben Moussa M.

Abstract:

Background and aim: Preoperative biliary drainage (PBD) has been introduced to lower bilirubin levels and to control the negative effects of obstructive jaundice in patients with malignant obstructive jaundice undergoing pancreaticoduodenectomy (PD). The optimal time interval between PBD and PD is still not clear. Delaying surgery by 4 to 6 weeks is the commonly accepted practice. However, delayed PD has been shown to decrease the rate of resection and adversely affect the tumor grading and prognosis. Thus, the purpose of our systematic review and meta-analysis was to evaluate the optimal period for PBD prior to PD: short or prolonged in terms of postoperative morbidity and survival outcomes. Methods: Trials were searched in PubMed, Science Direct, Google Scholar, and Cochrane Library until November 2022. Studies using PBD in patients with malignant obstructive jaundice that compared short duration group (SDG) (surgery performed within 3-4 weeks) with prolonged duration group (PDG) (at least 3-4 weeks after PBD) were included in this study. The risk of bias was assessed using the Rob v2 and Robins-I tools. The priori protocol was published in PROSPERO (ID: CRD42022381405). Results: Seven studies comprising 1625 patients (SDG 870, PDG 882) were included. All studies were non-randomized, and only one was prospective. No significant differences were observed between the SDG and PDG in mortality (OR= 0.59; 95% CI [0.30, 1.17], p=0.13), major morbidity (Chi² = 30.28, p <0.00001; I² = 87%), pancreatic fistula (Chi² = 6.61, p = 0.25); I² = 24%), post pancreatectomy haemorrhage (OR= 1.16; 95% CI [0.67, 2.01], p=0.59), positive drainage culture (OR= 0.36; 95% CI [0.10, 1.32], p=0.12), septic complications (OR= 0.78; 95% CI [0.23, 2.72], p=0.70), wound infection (OR= 0.08, p=0.07), operative time (MD= 0.21; p=0.21). Conclusion: Early surgery within 3 or 4 weeks after biliary drainage is both safe and effective. Thus, it is reasonable to suggest early surgery following PBD for patients having resectable periampullary cancers.

Keywords: preoperative biliary drainage, pancreatic cancer, pancreatic surgery, complication

Procedia PDF Downloads 59
794 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 82
793 Kinetics and Toxicological Effects of Kickxia elatine Extract-Based Silver Nanoparticles on Rat Brain Acetylcholinesterase

Authors: Noor Ul Huda, Mushtaq Ahmed, Nadia Mushtaq, Naila Sher, Rahmat Ali Khan

Abstract:

Purpose: The green synthesis of AgNPs has been favored over chemical synthesis due to their distinctive properties such as high dispersion, surface-to-volume ratio, low toxicity, and easy preparation. In the present work, the biosynthesis of AgNPs (KE-AgNPs) was carried out in one step by using the traditionally used plant Kickxia elatine (KE) extract and then investigated its enzyme inhibiting activity against rat’s brain acetylcholinesterase (AChE) in vitro. Methods: KE-AgNPs were synthesized from 1mM AgNO₃ using KE extract and characterized by UV–spectroscopy, SEM, EDX, XRD, and FTIR analysis. Rat’s brain acetylcholinesterase (AChE) inhibition activity was evaluated by the standard protocol. Results: UV–spectrum at 416 nm confirmed the formation of KE-AgNPs. X-ray diffraction (XRD) pattern presented 2θ values corresponding to the crystalline nature of KE-AgNPs with an average size of 42.47nm. The scanning electron microscope (SEM) analysis confirmed the presence of spherical-shaped and huge density KE-AgNPs with a size of 50nm. Fourier transform infrared spectroscopy (FT-IR) suggested that the functional groups present in KE extract and on the surface of KE-AgNPs are responsible for the stability of biosynthesized NPs. Energy dispersive X-ray (EDX) displayed an intense sharp peak at 3.2 keV, presenting that Ag was the chief element with 61.67%. Both KE extract and KE-AgNPs showed good and potent anti-AChE activity, with higher inhibition potential at a concentration of 175 µg/ml. Statistical analysis showed that both KEE and AgNPs exhibited non-competitive type inhibition against AChE, i.e., Vmax decreased (34.17-68.64% and 22.29- 62.10%) in the concentration-dependent mode for KEE and KE-AgNPs respectively and while Km values remained constant. Conclusions: KEE and KE-AgNPs can be considered an inhibitor of rats’ brain AChE, and the synthesis of KE-AgNPs-based drugs can be used as a cheaper and alternative option against diseases such as Alzheimer’s disease.

Keywords: Kickxia elatine, AgNPs, brain homogenate, acetylcholinesterase, kinetics

Procedia PDF Downloads 109
792 Muscle Neurotrophins Family Response to Resistance Exercise

Authors: Rasoul Eslami, Reza Gharakhanlou

Abstract:

NT-4/5 and TrkB have been proposed to be involved in the coordinated adaptations of the neuromuscular system to elevated level of activity. Despite the persistence of this neurotrophin and its receptor expression in adult skeletal muscle, little attention has been paid to the functional significance of this complex in the mature neuromuscular system. Therefore, the purpose of this research was to study the effect of one session of resistance exercise on mRNA expression of NT4/5 and TrkB proteins in slow and fast muscles of Wistar Rats. Male Wistar rats (10 mo of age, preparation of Pasteur Institute) were housed under similar living conditions in cages (in groups of four) at room temperature under a controlled light/dark (12-h) cycle with ad libitum access to food and water. A number of sixteen rats were randomly divided to two groups (resistance exercise (T) and control (C); n=8 for each group). The resistance training protocol consisted of climbing a 1-meter–long ladder, with a weight attached to a tail sleeve. Twenty-four hours following the main training session, rats of T and C groups were anaesthetized and the right soleus and flexor hallucis longus (FHL) muscles were removed under sterile conditions via an incision on the dorsolateral aspect of the hind limb. For NT-4/5 and TrkB expression, quantitative real time RT-PCR was used. SPSS software and independent-samples t-test were used for data analysis. The level of significance was set at P < 0.05. Data indicate that resistance training significantly (P<0.05) decreased mRNA expression of NT4/5 in soleus muscle. However, no significant alteration was detected in FHL muscle (P>0.05). Our results also indicate that no significant alterations were detected for TrkB mRNA expression in soleus and FHL muscles (P>0.05). Decrease in mRNA expression of NT4/5 in soleus muscle may be as result of post-translation regulation following resistance training. Also, non-alteration in TrkB mRNA expression was indicated in probable roll of P75 receptor.

Keywords: neurotrophin-4/5 (NT-4/5), TrkB receptor, resistance training, slow and fast muscles

Procedia PDF Downloads 432
791 Implementing of Indoor Air Quality Index in Hong Kong

Authors: Kwok W. Mui, Ling T. Wong, Tsz W. Tsang

Abstract:

Many Hong Kong people nowadays spend most of their lifetime working indoor. Since poor Indoor Air Quality (IAQ) potentially leads to discomfort, ill health, low productivity and even absenteeism in workplaces, a call for establishing statutory IAQ control to safeguard the well-being of residents is urgently required. Although policies, strategies, and guidelines for workplace IAQ diagnosis have been developed elsewhere and followed with remedial works, some of those workplaces or buildings have relatively late stage of the IAQ problems when the investigation or remedial work started. Screening for IAQ problems should be initiated as it will provide information as a minimum provision of IAQ baseline requisite to the resolution of the problems. It is not practical to sample all air pollutants that exit. Nevertheless, as a statutory control, reliable, rapid screening is essential in accordance with a compromise strategy, which balances costs against detection of key pollutants. This study investigates the feasibility of using an IAQ index as a parameter of IAQ control in Hong Kong. The index is a screening parameter to identify the unsatisfactory workplace IAQ and will highlight where a fully effective IAQ monitoring and assessment is needed for an intensive diagnosis. There already exist a number of representative common indoor pollutants based on some extensive IAQ assessments. The selection of pollutants is surrogate to IAQ control consists of dilution, mitigation, and emission control. The IAQ Index and assessment will look at high fractional quantities of these common measurement parameters. With the support of the existing comprehensive regional IAQ database and the IAQ Index by the research team as the pre-assessment probability, and the unsatisfactory IAQ prevalence as the post-assessment probability from this study, thresholds of maintaining the current measures and performing a further IAQ test or IAQ remedial measures will be proposed. With justified resources, the proposed IAQ Index and assessment protocol might be a useful tool for setting up a practical public IAQ surveillance programme and policy in Hong Kong.

Keywords: assessment, index, indoor air quality, surveillance programme

Procedia PDF Downloads 258
790 Dental Pathologies and Diet in Pre-hispanic Populations of the Equatorial Pacific Coast: Literature Review

Authors: Ricardo Andrés Márquez Ortiz

Abstract:

Objective. The objective of this literature review is to compile updated information from studies that have addressed the association between dental pathologies and diet in prehistoric populations of the equatorial Pacific coast. Materials and method. The research carried out corresponds to a documentary study of ex post facto retrospective, historiographic and bibliometric design. A bibliographic review search was carried out in the libraries of the Colombian Institute of Anthropology and History (ICANH) and the National University of Colombia for books and articles on the archeology of the region. In addition, a search was carried out in databases and the Internet for books and articles on dental anthropology, archeology and dentistry on the relationship between dental pathologies and diet in prehistoric and current populations from different parts of the world. Conclusions. The complex societies (500 BC - 300 AD) of the equatorial Pacific coast used an agricultural system of intensive monoculture of corn (Zea mays). This form of subsistence was reflected in an intensification of dental pathologies such as dental caries, dental abscesses generated by cavities, and enamel hypoplasia associated with a lower frequency of wear. The Upper Formative period (800 A.D. -16th century A.D.) is characterized by the development of polyculture, slash-and-burn agriculture, as an adaptive agricultural strategy to the ecological damage generated by the intensive economic activity of complex societies. This process leads to a more varied diet, which generates better dental health.

Keywords: dental pathologies, nutritional diet, equatorial pacific coast, dental anthropology

Procedia PDF Downloads 40
789 Spawning Induction and Early Larval Development of the Giant Reef Clam Periglypta multicostata (Sowerby, 1835) under Controlled Conditions

Authors: Jose Melena, Rosa Santander, Tanya Gonzalez, Richard Duque, Juan Illanes

Abstract:

Ecuador is one of the countries with the greatest aquatic biodiversity worldwide. In particular, there are at least a dozen native marine species with great aquaculture potential locally. This research concerns one of those species. It has proposed to implement experimental protocols in order to induce spawning and to generate the early larval development of the giant reef clam P. multicostata under controlled conditions. Bioassays were carried out with one adult batch (n= 8) with an average valvar length of 118,4 ± 5,8 mm, which were collected near of the Puerto Santa Rosa (2° 12' 30'' S, 80° 58' 28'' W), Santa Elena Province. During a short acclimation stage, the eight adults of giant reef clam P. multicostata were exposed to thermal stress. Briefly, the experimental protocol for spawning induction was based on the application of 20°C for 1 h and 30°C for 1 h on P. multicostata broodstock at least three consecutive times by one day. After spawning, collected sexual material was released for external fertilization process. After the delivery of gametes, it was achieved 3,25 × 10⁶ viable zygotes. As results, fertilized eggs had 56 µm diameter; while first and second cell divisions were observed to 2,5 h post-fertilization, with individual average length of 68 ± 5 µm and polar body. Latter cell divisions, including gastrula stage, appeared at 9 h post-fertilization, with individual average length of 73 ± 4 µm and trochophore stage at 15 h post-fertilization with individual average length of 75 ± 4 µm. In addition, veliger stage was registered at 20 h post-fertilization with individual average length of 82 ± 6 µm. Umboned larvae appeared at day 8 post-fertilization, with individual average length of 148 ± 6 µm. These pioneering results worldwide can strengthen the local conservation process of the overexploited P. multicostata and to encourage its production for commercial purposes.

Keywords: Ecuador, larval development, Periglypta multicostata, spawning induction

Procedia PDF Downloads 126
788 The Attitudes towards English Relative to Other Languages in Indonesia: Discrepancies between Policy and Usage

Authors: Rani Silvia

Abstract:

English has surpassed other languages to become the most widely taught and studied foreign language in Indonesia. This reflects the tendency of the Indonesian public to participate in global mainstream culture, which is longstanding but has been greatly facilitated by the widespread availability of television, the traditional media, and more recently the Internet and social media. However, despite increasing exposure and a history of teaching and study, mastery of English remains low, even as interest and perceived importance continue to increase. This along with Indonesia’s extremely complex linguistic environment has increased the status and value associated with the use of English and is changing the dynamic of language use nationwide. This study investigates the use of English in public settings in Indonesia as well as the attitudes of Indonesian speakers towards English. A case study was developed to explicate this phenomenon in a major Indonesian city. Fifty individuals, including both professionals and lay people, were interviewed about their language preferences as well as their perceptions about English as compared to other languages, such as the local language, Indonesian as the national language, and other foreign languages. Observations on the use of language in the public environment in advertising, signs, and other forms of public expression were analyzed to identify language preferences at this level and their relationship to current language policy. This study has three major findings. First, Indonesian speakers have more positive attitudes towards English than other languages; second, English has encroached on domains in which Indonesian should be used; and third, perceived awareness of the importance of Indonesian as an introduced national language seems to be declining to suggest a failure of policy. The study includes several recommendations for the future development of language planning in determining and directing language use in a public context in Indonesia.

Keywords: English, Indonesia, language attitudes, language policy

Procedia PDF Downloads 99
787 A Retrospective Study of the Effects of Xenophobia on South Africa-Nigeria Relations

Authors: O. Fayomi, F. Chidozie, C. Ayo

Abstract:

The underlying causes of xenophobia are complex and varied. Xenophobia has to do with being contemptuous of that which is foreign, especially of strangers or of people from different countries or cultures. Unemployment and mounting poverty among South Africans at the bottom of the economic ladder have provoked fears of the competition that better educated and experienced migrants can represent. South Africa’s long track-record of violence as a means of protest and the targeting of foreigners in particular, and, the documented tensions over migration policy and the scale of repatriation serve a very good explanation for its xenophobia. It was clear that while most of the attacks were directed against foreign, primarily African, migrants, this was not the rule. Attacks were also noted against Chinese-speakers, Pakistani migrants as well as against South Africans from minority language groups (in the conflict areas). Settlements that have recently experienced the expression of ‘xenophobic’ violence have also been the site of violent and other forms of protest around other issues, most notably service delivery. The failure of government in service delivery was vexed on this form of xenophobia. Due to the increase in migration, this conflict is certainly not temporary in nature. Xenophobia manifests in different regions and communities with devastating effects on the affected nationals. Nigerians living in South Africa have been objects of severe attacks and assault as a result of this xenophobic attitude. It is against this background that this study seeks to investigate the xenophobic attacks against Nigerians in South Africa. The methodology is basically qualitative with the use of secondary sources such as books, journals, newspapers and internet sources.

Keywords: xenophobia, unemployment, poverty, Nigeria, South Africa

Procedia PDF Downloads 462
786 Using Industrial Service Quality to Assess Service Quality Perception in Television Advertisement: A Case Study

Authors: Ana L. Martins, Rita S. Saraiva, João C. Ferreira

Abstract:

Much effort has been placed on the assessment of perceived service quality. Several models can be found in literature, but these are mainly focused on business-to-consumer (B2C) relationships. Literature on how to assess perceived quality in business-to-business (B2B) contexts is scarce both conceptually and in terms of its application. This research aims at filling this gap in literature by applying INDSERV to a case study situation. Under this scope, this research aims at analyzing the adequacy of the proposed assessment tool to other context besides the one where it was developed and by doing so analyzing the perceive quality of the advertisement service provided by a specific television network to its B2B customers. The INDSERV scale was adopted and applied to a sample of 33 clients, via questionnaires adapted to interviews. Data was collected in person or phone. Both quantitative and qualitative data collection was performed. Qualitative data analysis followed content analysis protocol. Quantitative analysis used hypotheses testing. Findings allowed to conclude that the perceived quality of the television service provided by television network is very positive, being the Soft Process Quality the parameter that reveals the highest perceived quality of the service as opposed to Potential Quality. To this end, some comments and suggestions were made by the clients regarding each one of these service quality parameters. Based on the hypotheses testing, it was noticed that only advertisement clients that maintain a connection to the television network from 5 to 10 years do show a significant different perception of the TV advertisement service provided by the company in what the Hard Process Quality parameter is concerned. Through the collected data content analysis, it was possible to obtain the percentage of clients which share the same opinions and suggestions for improvement. Finally, based on one of the four service quality parameter in a B2B context, managerial suggestions were developed aiming at improving the television network advertisement perceived quality service.

Keywords: B2B, case study, INDSERV, perceived service quality

Procedia PDF Downloads 197
785 An Advanced Approach to Detect and Enumerate Soil-Transmitted Helminth Ova from Wastewater

Authors: Vivek B. Ravindran, Aravind Surapaneni, Rebecca Traub, Sarvesh K. Soni, Andrew S. Ball

Abstract:

Parasitic diseases have a devastating, long-term impact on human health and welfare. More than two billion people are infected with soil-transmitted helminths (STHs), including the roundworms (Ascaris), hookworms (Necator and Ancylostoma) and whipworm (Trichuris) with majority occurring in the tropical and subtropical regions of the world. Despite its low prevalence in developed countries, the removal of STHs from wastewater remains crucial to allow the safe use of sludge or recycled water in agriculture. Conventional methods such as incubation and optical microscopy are cumbersome; consequently, the results drastically vary from person-to-person observing the ova (eggs) under microscope. Although PCR-based methods are an alternative to conventional techniques, it lacks the ability to distinguish between viable and non-viable helminth ova. As a result, wastewater treatment industries are in major need for radically new and innovative tools to detect and quantify STHs eggs with precision, accuracy and being cost-effective. In our study, we focus on the following novel and innovative techniques: -Recombinase polymerase amplification and Surface enhanced Raman spectroscopy (RPA-SERS) based detection of helminth ova. -Use of metal nanoparticles and their relative nanozyme activity. -Colorimetric detection, differentiation and enumeration of genera of helminth ova using hydrolytic enzymes (chitinase and lipase). -Propidium monoazide (PMA)-qPCR to detect viable helminth ova. -Modified assay to recover and enumerate helminth eggs from fresh raw sewage. -Transcriptome analysis of ascaris ova in fresh raw sewage. The aforementioned techniques have the potential to replace current conventional and molecular methods thereby producing a standard protocol for the determination and enumeration of helminth ova in sewage sludge.

Keywords: colorimetry, helminth, PMA-QPCR, nanoparticles, RPA, viable

Procedia PDF Downloads 289
784 Composite Materials from Epoxidized Linseed Oil and Lignin

Authors: R. S. Komartin, B. Balanuca, R. Stan

Abstract:

the last decades, studies about the use of polymeric materials of plant origin, considering environmental concerns, have captured the interest of researchers because these represent an alternative to petroleum-derived materials. Vegetable oils are one of the preferred alternatives for petroleum-based raw materials having long aliphatic chains similar to hydrocarbons which means that can be processed using conventional chemistry. Epoxidized vegetable oils (EVO) are among the most interesting products derived from oil both for their high reactivity (epoxy group) and for the potential to react with compounds from various classes. As in the case of epoxy resins starting from petrochemical raw materials, those obtained from EVO can be crosslinked with different agents to build polymeric networks and can also be reinforced with various additives to improve their thermal and mechanical performances. Among the multitude of known EVO, the most common in industrial practice are epoxidized linseed oils (ELO) and epoxidized soybean oils (ESO), the first with an iodine index over 180, the second having a lower iodine index but being cheaper. On the other hand, lignin (Ln) is the second natural organic material as a spread, whose use has long been hampered because of the high costs associated with its isolation and purification. In this context, our goal was to obtain new composite materials with satisfactory intermediate properties in terms of stiffness and elasticity using the characteristics of ELO and Ln and choosing the proper curing procedure. In the present study linseed oil (LO) epoxidation was performed using peracetic acid generated in situ. The obtained bio-based epoxy resin derived from linseed oil was used further to produce the new composites byloading Ln in various mass ratios. The resulted ELO-Ln blends were subjected to a dual-curing protocol, namely photochemical and thermal. The new ELO-Ln composites were investigated by FTIR spectrometry, thermal stability, water affinity, and morphology. The positive effect of lignin regarding the thermal stability of the composites could be proved. The results highlight again the still largely unexplored potential of lignin in industrial applications.

Keywords: composite materials, dual curing, epoxidized linseed oil, lignin

Procedia PDF Downloads 145
783 The Strategic Entering Time of a Commerce Platform

Authors: Chia-li Wang

Abstract:

The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.

Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy

Procedia PDF Downloads 76
782 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 283
781 Building Atmospheric Moisture Diagnostics: Environmental Monitoring and Data Collection

Authors: Paula Lopez-Arce, Hector Altamirano, Dimitrios Rovas, James Berry, Bryan Hindle, Steven Hodgson

Abstract:

Efficient mould remediation and accurate moisture diagnostics leading to condensation and mould growth in dwellings are largely untapped. Number of factors are contributing to the rising trend of excessive moisture in homes mainly linked with modern living, increased levels of occupation and rising fuel costs, as well as making homes more energy efficient. Environmental monitoring by means of data collection though loggers sensors and survey forms has been performed in a range of buildings from different UK regions. Air and surface temperature and relative humidity values of residential areas affected by condensation and/or mould issues were recorded. Additional measurements were taken through different trials changing type, location, and position of loggers. In some instances, IR thermal images and ventilation rates have also been acquired. Results have been interpreted together with environmental key parameters by processing and connecting data from loggers and survey questionnaires, both in buildings with and without moisture issues. Monitoring exercises carried out during Winter and Spring time show the importance of developing and following accurate protocols for guidance to obtain consistent, repeatable and comparable results and to improve the performance of environmental monitoring. A model and a protocol are being developed to build a diagnostic tool with the goal of performing a simple but precise residential atmospheric moisture diagnostics to distinguish the cause entailing condensation and mould generation, i.e., ventilation, insulation or heating systems issue. This research shows the relevance of monitoring and processing environmental data to assign moisture risk levels and determine the origin of condensation or mould when dealing with a building atmospheric moisture excess.

Keywords: environmental monitoring, atmospheric moisture, protocols, mould

Procedia PDF Downloads 130
780 Challenges for Adopting Circular Economy Toward Business Innovation and Supply Chain

Authors: Kapil Khanna, Swee Kuik, Joowon Ban

Abstract:

The current linear economic system is unsustainable due to its dependence on the uncontrolled exploitation of diminishing natural resources. The integration of business innovation and supply chain management has brought about the redesign of business processes through the implementation of a closed-loop approach. The circular economy (CE) offers a sustainable solution to improve business opportunities in the near future by following the principles of rejuvenation and reuse inspired by nature. Those business owners start to rethink and consider using waste as raw material to make new products for consumers. The implementation of CE helps organisations to incorporate new strategic plans for decreasing the use of virgin materials and nature resources. Supply chain partners that are geographically dispersed rely heavily on innovative approaches to support supply chain management. Presently, numerous studies have attempted to establish the concept of supply chain management (SCM) by integrating CE principles, which are commonly denoted as circular SCM. While many scholars have recognised the challenges of transitioning to CE, there is still a lack of consensus on business best practices that can facilitate companies in embracing CE across the supply chain. Hence, this paper strives to scrutinize the SCM practices utilised for CE, identify the obstacles, and recommend best practices that can enhance a company's ability to incorporate CE principles toward business innovation and supply chain performance. Further, the paper proposes future research in the field of using specific technologies such as artificial intelligence, Internet of Things, and blockchain as business innovation tools for supply chain management and CE adoption.

Keywords: business innovation, challenges, circular supply chain, supply chain management, technology

Procedia PDF Downloads 81
779 Expression of Somatostatin and Neuropeptide Y in Dorsal Root Ganglia Following Hind Paw Incision in Rats

Authors: Anshu Bahl, Saroj Kaler, Shivani Gupta, S B Ray

Abstract:

Background: Somatostatin is an endogenous regulatory neuropeptide. Somatostatin and its analogues play an important role in neuropathic and inflammatory pain. Neuropeptide Y is extensively distributed in the mammalian nervous system. NPY has an important role in blood pressure, circadian rhythm, obesity, appetite and memory. The purpose was to investigate somatostatin and NPY expression in dorsal root ganglia during pain. The plantar incision model in rats is similar to postoperative pain in humans. Methods: 24 adult male Sprague dawley rats were distributed randomly into two groups – Control (n=6) and incision (n=18) groups. Using Hargreaves apparatus, thermal hyperalgesia behavioural test for nociception was done under basal condition and after surgical incision in right hind paw at different time periods (day 1, 3 and 5). The plantar incision was performed as per standard protocol. Perfusion was done using 4% paraformaldehyde followed by extraction of dorsal root ganglia at L4 level. The tissue was processed for immunohistochemical localisation for somatostatin and neuropeptide Y. Results: Post incisional groups (day 1, 3 and 5) exhibited significant decrease of paw withdrawal latency as compared to control groups. Somatostatin expression was noted under basal conditions. It decreased on day 1, but again gradually increased on day 3 and further on day five post incision. The expression of Neuropeptide Y was noted in the cytoplasm of dorsal root ganglia under basal conditions. Compared to control group, expression of neuropeptide Y decreased on day one after incision, but again gradually increased on day 3. Maximum expression was noted on day five post incision. Conclusion: Decrease in paw withdrawal latency indicated nociception, particularly on day 1. In comparison to control, somatostatin and NPY expression was decreased on day one post incision. This could be correlated with increased axoplasmic flow towards the spinal cord. Somatostatin and NPY expression was maximum on day five post incision. This could be due to decreased migration from the site of synthesis towards the spinal cord.

Keywords: dorsal root ganglia, neuropeptide y, postoperative pain, somatostatin

Procedia PDF Downloads 165
778 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 184
777 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 285