Search results for: privacy preserving mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3307

Search results for: privacy preserving mechanisms

1417 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures

Authors: Silvina Caíno-Lores, Jesús Carretero

Abstract:

Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.

Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing

Procedia PDF Downloads 259
1416 A Novel Protein Elicitor Extracted From Lecanicillium lecanii Induced Resistance Against Whitefly, Bemisia tabaci in Cotton

Authors: Yusuf Ali Abdulle, Azhar Uddin Keerio

Abstract:

Background: Protein elicitors play a key role in signaling or displaying plant defense mechanisms and emerging as vital tools for bio-control of insects. This study was aimed at the characterization of the novel protein elicitor isolated from entomopathogenic fungi Lecanicillium lecanii (V3) strain and its activity against Whitefly, Bemisia tabaci in cotton. The sequence of purified elicitor protein showed 100% similarity with hypothetical protein LEL_00878 [Cordyceps confragosa RCEF 1005], GenBank no (OAA81333.1). This novel protein elicitor has 253 amino acid residues and 762bp with a molecular mass of 29 kDa. The protein recombinant was expressed in Escherichia coli using pET‐28a (+) plasmid. Effects of purified novel protein elicitor on Bemisia tabaci were determined at three concentrations of protein (i.e., 58.32, 41.22, 35.41 μg mL⁻¹) on cotton plants and were exposed to newly molted adult B.tabaci. Bioassay results showed a significant effect of the exogenous application of novel protein elicitor on B. tabaci in cotton. In addition, the gene expression analysis found a significant up-regulation of the major genes associated with salicylic acid (SA) and jasmonic acid (JA) linked plant defense pathways in elicitor protein-treated plants. Our results suggested the potential application of a novel protein elicitor derived from Lecanicillium lecanii as a future bio-intensive controlling approach against the whitefly, Bemisia tabaci.

Keywords: resistance, Lecanicillium lecanii, secondary metabolites, whitefly

Procedia PDF Downloads 184
1415 Photo-Electrochemical/Electro-Fenton Coupling Oxidation System with Fe/Co-Based Anode and Cathode Metal-Organic Frameworks Derivative Materials for Sulfamethoxazole Treatment

Authors: Xin Chen, Xinyong Li, Qidong Zhao, Dong Wang

Abstract:

A new coupling system was constructed by combining photo-electrochemical cell with electro-fenton cell (PEC-EF). The electrode material in this system was derived from MnyFe₁₋yCo Prussian-Blue-Analog (PBA). Mn₀.₄Fe₀.₆Co₀.₆₇-N@C spin-coated on carbon paper behaved as the gas diffusion cathode and Mn₀.₄Fe₀.₆Co₀.₆₇O₂.₂ spin-coated on fluorine-tin oxide glass (FTO) as anode. The two separated cells could degrade Sulfamethoxazole (SMX) simultaneously and some coupling mechanisms by PEC and EF enhancing the degradation efficiency were investigated. The continuous on-site generation of H₂O₂ at cathode through an oxygen reduction reaction (ORR) was realized over rotating ring-disk electrode (RRDE). The electron transfer number (n) of the ORR with Mn₀.₄Fe₀.₆Co₀.₆₇-N@C was 2.5 in the selected potential and pH range. The photo-electrochemical properties of Mn₀.₄Fe₀.₆Co₀.₆₇O₂.₂ were systematically studied, which displayed good response towards visible light. The photoinduced electrons at anode can transfer to cathode for further use. Efficient photo-electro-catalytic performance was observed in degrading SMX. Almost 100% SMX removal was achieved in 120 min. This work not only provided a highly effective technique for antibiotic treatment but also revealed the synergic effect between PEC and EF.

Keywords: electro-fenton, photo-electrochemical, synergic effect, sulfamethoxazole

Procedia PDF Downloads 180
1414 Development of Sustainable Composite Fabric from Orange Peel for Ladies’ Undergarments: A Different Approach Towards Eco-Friendly Textile Design

Authors: Abdul Hafeez, Samiya Shehzadi

Abstract:

This research paper presents a different approach towards eco-friendly textile design by developing a sustainable composite fabric from orange peel for ladies' undergarments. The research focuses on utilizing orange peel to develop a unique orange leather/composite (fabric) through a process involving heating, extracting, and subsequent sun-drying to obtain the composite. The sustainable composite fabric shows properties that are favorable to the development of environmentally friendly undergarments, which not only offer UV protection but also possess healing properties for the skin. Through comprehensive testing and analysis, it has been determined that the orange peel composite fabric has zero harmful effects on the skin, making it a safe and desirable material for intimate wear. Furthermore, the research suggests that the orange peel composite fabric has the potential to reduce the rate of cancer cell growth. While the exact mechanisms and factors contributing to this effect require further investigation, the initial findings indicate promising aspects of the fabric in terms of potential cancer-preventive properties. Research contribution to the field of sustainable textile design by introducing a usual and eco-friendly approach utilizing orange peel waste. This work opens up avenues for further exploration and development of innovative materials that are both sustainable and beneficial for human health.

Keywords: sustainability, composite textiles, extracting, undergarments, eco-friendly, orange peels

Procedia PDF Downloads 66
1413 Catalytic Applications of Metal-Organic Frameworks for Organic Pollutant Removal in Wastewater Treatment: A Review

Authors: Matthew Ndubuisi Abonyi, Christopher Chiedozie Obi, Joseph Tagbo Nwabanne

Abstract:

This review focuses on the application of Metal-Organic Frameworks (MOF)-based catalysts in the degradation of organic pollutants in wastewater. The degradation of organic pollutants in wastewater remains a critical environmental challenge, necessitating innovative solutions for effective treatment. MOFs have garnered significant attention as promising catalysts for this purpose, owing to their exceptional surface area, tunable porosity, and diverse chemical functionalities. It explores various catalytic mechanisms, including photocatalysis, Fenton-like reactions, and other advanced oxidation processes facilitated by MOFs. The review also explores the design strategies that enhance the catalytic performance of MOFs, such as structural modifications, composite formation, and post-synthetic modifications. Furthermore, real-world case studies are presented, highlighting the practical applications and environmental impact of MOF-based catalysts in wastewater treatment. Challenges associated with the scalability and stability of these materials are discussed, along with future directions for research and development. This review highlights the significant potential of MOF-based catalysts in addressing the pressing issue of water pollution and advocates for continued innovation to optimize their application in wastewater treatment.

Keywords: metal-organic frameworks (MOFs), catalysis, wastewater treatment, organic pollutant degradation, photocatalysis

Procedia PDF Downloads 23
1412 Application of the State of the Art of Hydraulic Models to Manage Coastal Problems, Case Study: The Egyptian Mediterranean Coast Model

Authors: Al. I. Diwedar, Moheb Iskander, Mohamed Yossef, Ahmed ElKut, Noha Fouad, Radwa Fathy, Mustafa M. Almaghraby, Amira Samir, Ahmed Romya, Nourhan Hassan, Asmaa Abo Zed, Bas Reijmerink, Julien Groenenboom

Abstract:

Coastal problems are stressing the coastal environment due to its complexity. The dynamic interaction between the sea and the land results in serious problems that threaten coastal areas worldwide, in addition to human interventions and activities. This makes the coastal environment highly vulnerable to natural processes like flooding, erosion, and the impact of human activities as pollution. Protecting and preserving this vulnerable coastal zone with its valuable ecosystems calls for addressing the coastal problems. This, in the end, will support the sustainability of the coastal communities and maintain the current and future generations. Consequently applying suitable management strategies and sustainable development that consider the unique characteristics of the coastal system is a must. The coastal management philosophy aims to solve the conflicts of interest between human development activities and this dynamic nature. Modeling emerges as a successful tool that provides support to decision-makers, engineers, and researchers for better management practices. Modeling tools proved that it is accurate and reliable in prediction. With its capability to integrate data from various sources such as bathymetric surveys, satellite images, and meteorological data, it offers the possibility for engineers and scientists to understand this complex dynamic system and get in-depth into the interaction between both the natural and human-induced factors. This enables decision-makers to make informed choices and develop effective strategies for sustainable development and risk mitigation of the coastal zone. The application of modeling tools supports the evaluation of various scenarios by affording the possibility to simulate and forecast different coastal processes from the hydrodynamic and wave actions and the resulting flooding and erosion. The state-of-the-art application of modeling tools in coastal management allows for better understanding and predicting coastal processes, optimizing infrastructure planning and design, supporting ecosystem-based approaches, assessing climate change impacts, managing hazards, and finally facilitating stakeholder engagement. This paper emphasizes the role of hydraulic models in enhancing the management of coastal problems by discussing the diverse applications of modeling in coastal management. It highlights the modelling role in understanding complex coastal processes, and predicting outcomes. The importance of informing decision-makers with modeling results which gives technical and scientific support to achieve sustainable coastal development and protection.

Keywords: coastal problems, coastal management, hydraulic model, numerical model, physical model

Procedia PDF Downloads 28
1411 Vegan Low Glycemic Index Diet in Appetite Reduction Among Polycystic Ovarian Syndrome (PCOS) Patients Carrying Melanocortin 4 Receptor (MC4R) Variants of (rs12970134), and (rs17782313): A Mini Review

Authors: Jumanah S. Alawfi

Abstract:

Polycystic ovary syndrome (PCOS) is a common endocrinopathy among females in their reproductive years. The incidence cases are nearly 1.55 million among females across the globe, with 0.43 million associated disability-adjusted life-years (DALYs). This syndrome is associated with intricate mechanisms typically characterized by insulin resistance (IR), infertility, overweight and/or obesity. Lifestyle interventions are often prescribed as an adjective treatment. Nonetheless, obesity is a complex disease that encompasses multiple dimensions, such as excessive energy intake and genetics. The melanocortin 4 receptor mutation (MC4R) is an important mediator in appetite. There is emerging evidence that suggests its role in the Body Mass Index (BMI) among PCOS subjects, which poses the question of obesity and/or overweight among the PCOS patients who carry the MC4R variants may be caused by overconsumption. Thereby, using other satiety techniques may be beneficial as a part of personalized nutrition. Therefore, the aim of the current mini-review is to discuss the effect of the vegan low glycemic diet on reducing appetite among PCOS patients. The review shows that there is a gap in the knowledge of the effect of the vegan diet on PCOS patients who carry MC4R variants which need further research.

Keywords: polycystic ovarian syndrome (PCOS), Appetite, Melanocortin 4 Receptor Mutation (MC4R)., Obesity

Procedia PDF Downloads 129
1410 Accessing the 'No-Harm' Principle of Protection of the Mekong River’s Environment

Authors: Hang Thuy Tran, Hanh Hong Pham, Ha Thanh Hoa

Abstract:

From 2009 up to now, the water quantity and water quality of the Mekong River, located in the South of Vietnam, have been significantly reduced. The phenomenon happened as a result of climate change and human activities. The Mekong River is an international source of water, flowing across the borders of 6 countries, with Vietnam downstream. Activities to block the flow or build dams to construct hydroelectricity or diversion in upstream countries are either the direct cause or the risk of further deterioration of the water quality and quantity of the Mekong River, as evidenced by two phenomena which are a saline intrusion and transboundary water pollution. The protection of the crucial source of water is done through bilateral and multilateral cooperation mechanisms, notably the Mekong River Commission, established by members of the Agreement on the Cooperation for the Sustainable Development of the Mekong River Basin 1995. In this document, under Article 7, the 'no-harm' principle requires member states to take appropriate measures to prevent causing substantial damage to other member states. This principle has been practiced through the work of a number of committees established by the commission. However, the content of the rules is undetailed, lacks an implementation monitoring mechanism, and has an unreasonable dispute solution. With such difficulties, the provisions in the principle of no-harm are not adequate to protect the Mekong River's water resources in the current context.

Keywords: no-harm principle, transboundary water pollution, Mekong Commission, international source of water

Procedia PDF Downloads 191
1409 Analysis of Crisis Management Systems of United Kingdom and Turkey

Authors: Recep Sait Arpat, Hakan Güreşci

Abstract:

Emergency, disaster and crisis management terms are generally perceived as the same processes. This conflict effects the approach and delegating policy of the political order. Crisis management starts in the aftermath of the mismanagement of disaster and emergency. In the light of the information stated above in this article Turkey and United Kingdom(UK)’s crisis management systems are analyzed. This article’s main aim is to clarify the main points of the emergency management system of United Kingdom and Turkey’s disaster management system by comparing them. To do this: A prototype model of the political decision making processes of the countries is drawn, decision making mechanisms and the planning functions are compared. As a result it’s found that emergency management policy in Turkey is reactive whereas it’s proactive in UK; as the delegating policy Turkey’s system is similar to UK; levels of emergency situations are similar but not the same; the differences are stemming from the civil order and nongovernmental organizations effectiveness; UK has a detailed government engagement model to emergencies, which shapes the doctrine of the approach to emergencies, and it’s successful in gathering and controlling the whole state’s efforts; crisis management is a sub-phase of UK emergency management whereas it’s accepted as a outmoded management perception and the focal point of crisis management perception in UK is security crisis and natural disasters while in Turkey it is natural disasters. In every anlysis proposals are given to Turkey.

Keywords: crisis management, disaster management, emergency management, turkey, united kingdom

Procedia PDF Downloads 372
1408 Computational Approach for Grp78–Nf-ΚB Binding Interactions in the Context of Neuroprotective Pathway in Brain Injuries

Authors: Janneth Gonzalez, Marco Avila, George Barreto

Abstract:

GRP78 participates in multiple functions in the cell during normal and pathological conditions, controlling calcium homeostasis, protein folding and unfolded protein response. GRP78 is located in the endoplasmic reticulum, but it can change its location under stress, hypoxic and apoptotic conditions. NF-κB represents the keystone of the inflammatory process and regulates the transcription of several genes related with apoptosis, differentiation, and cell growth. The possible relationship between GRP78-NF-κB could support and explain several mechanisms that may regulate a variety of cell functions, especially following brain injuries. Although several reports show interactions between NF-κB and heat shock proteins family members, there is a lack of information on how GRP78 may be interacting with NF-κB, and possibly regulating its downstream activation. Therefore, we assessed the computational predictions of the GRP78 (Chain A) and NF-κB complex (IkB alpha and p65) protein-protein interactions. The interaction interface of the docking model showed that the amino acids ASN 47, GLU 215, GLY 403 of GRP78 and THR 54, ASN 182 and HIS 184 of NF-κB are key residues involved in the docking. The electrostatic field between GRP78-NF-κB interfaces and molecular dynamic simulations support the possible interaction between the proteins. In conclusion, this work shed some light in the possible GRP78-NF-κB complex indicating key residues in this crosstalk, which may be used as an input for better drug design strategy targeting NF-κB downstream signaling as a new therapeutic approach following brain injuries.

Keywords: computational biology, protein interactions, Grp78, bioinformatics, molecular dynamics

Procedia PDF Downloads 342
1407 Simulation Study of Asphaltene Deposition and Solubility of CO2 in the Brine during Cyclic CO2 Injection Process in Unconventional Tight Reservoirs

Authors: Rashid S. Mohammad, Shicheng Zhang, Sun Lu, Syed Jamal-Ud-Din, Xinzhe Zhao

Abstract:

A compositional reservoir simulation model (CMG-GEM) was used for cyclic CO2 injection process in unconventional tight reservoir. Cyclic CO2 injection is an enhanced oil recovery process consisting of injection, shut-in, and production. The study of cyclic CO2 injection and hydrocarbon recovery in ultra-low permeability reservoirs is mainly a function of rock, fluid, and operational parameters. CMG-GEM was used to study several design parameters of cyclic CO2 injection process to distinguish the parameters with maximum effect on the oil recovery and to comprehend the behavior of cyclic CO2 injection in tight reservoir. On the other hand, permeability reduction induced by asphaltene precipitation is one of the major issues in the oil industry due to its plugging onto the porous media which reduces the oil productivity. In addition to asphaltene deposition, solubility of CO2 in the aquifer is one of the safest and permanent trapping techniques when considering CO2 storage mechanisms in geological formations. However, the effects of the above uncertain parameters on the process of CO2 enhanced oil recovery have not been understood systematically. Hence, it is absolutely necessary to study the most significant parameters which dominate the process. The main objective of this study is to improve techniques for designing cyclic CO2 injection process while considering the effects of asphaltene deposition and solubility of CO2 in the brine in order to prevent asphaltene precipitation, minimize CO2 emission, optimize cyclic CO2 injection, and maximize oil production.

Keywords: tight reservoirs, cyclic O₂ injection, asphaltene, solubility, reservoir simulation

Procedia PDF Downloads 386
1406 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 393
1405 Self-Regulation in Socially Rejected Pupils

Authors: Karla Hrbackova, Irena Balaban Cakirpaloglu

Abstract:

This paper is a report on self-regulation in socially rejected pupils. A certain form of social rejection can be found in almost every class within the school environment. Research shows that due to social rejection mechanisms supporting the individual´s effort of reintegration into the group are not triggered. Paradoxically the opposite tendency arises, i.e., an increase in selfish and defeating behaviour. The link between peer exposure and self-regulation is likely to vary as a function of a type and quality of peer interaction (e.g., rejection or acceptance). The paper aims to clarify the level of self-regulation related to interpersonal cognitive problem-solving within the process of social rejection in a school class. The research was done on a sample of 1,133 upper-primary school pupils using the Means-Ends Problem Solving technique (MEPS) and peer sociometric nomination. The results showed that the level of self-regulated skills is related to the status of social rejection. Socially rejected pupils achieve lower levels of self-regulation than other classmates. We found deficiency in the regulation of behaviour, emotions and the regulation of will in the peer rejected pupils with the exception of cognitive regulation in which no differences were detected between socially rejected pupils and other classmates. The results have implications for early prevention and intervention efforts to foster adaptive self-regulation and reduce the risk of later social rejection.

Keywords: interpersonal cognitive problem-solving, self-regulation, socially rejected pupils, upper-primary school pupils

Procedia PDF Downloads 170
1404 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law

Authors: Ida D. Souza, Lena Ashok

Abstract:

Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.

Keywords: child protection, best practices, juvenile justice, reformation teamwork

Procedia PDF Downloads 363
1403 The Virtues and Vices of Leader Empathy: A Review of a Misunderstood Construct

Authors: John G. Vongas, Raghid Al Hajj

Abstract:

In recent years, there has been a surge in research on empathy across disciplines ranging from management and psychology to philosophy and neuroscience. In organizational behavior, in particular, scholars have become interested in leader empathy given the rise of workplace diversity and the growing perception of leaders as managers of group emotions. It would appear that the current zeitgeist in behavioral and philosophical science is that empathy is a cornerstone of morality and that our world would be better off if only more people – and by extension, more leaders – were empathic. In spite of these claims, however, researchers have used different terminologies to explore empathy, confusing it at times with other related constructs such as emotional intelligence and compassion. Second, extant research that specifies what empathic leaders do and how their behavior affects organizational stakeholders, including themselves, does not devolve from a unifying theoretical framework. These problems plague knowledge development in this important research domain. Therefore, to the authors' best knowledge, this paper provides the first comprehensive review and synthesis of the literature on leader empathy by drawing on disparate yet complementary fields of inquiry. It clarifies empathy from other constructs and presents a theoretical model that elucidates the mechanisms by which a leader’s empathy translates into behaviors that could be either beneficial or harmful to the leaders themselves, as well as to their followers and groups. And third, it specifies the boundary conditions under which a leader’s empathy will become manifest. Finally, it suggests ways in which training could be implemented to improve empathy in practice while also remaining skeptical of its conceptualization as a moral or even effective guide in human affairs.

Keywords: compassion, empathy, leadership, group outcomes

Procedia PDF Downloads 135
1402 Size, Shape, and Compositional Effects on the Order-Disorder Phase Transitions in Au-Cu and Pt-M (M = Fe, Co, and Ni) Nanocluster Alloys

Authors: Forrest Kaatz, Adhemar Bultheel

Abstract:

Au-Cu and Pt-M (M = Fe, Co, and Ni) nanocluster alloys are currently being investigated worldwide by many researchers for their interesting catalytic and nanophase properties. The low-temperature behavior of the phase diagrams is not well understood for alloys with nanometer sizes and shapes. These systems have similar bulk phase diagrams with the L12 (Au3Cu, Pt3M, AuCu3, and PtM3) structurally ordered intermetallics and the L10 structure for the AuCu and PtM intermetallics. We consider three models for low temperature ordering in the phase diagrams of Au–Cu and Pt–M nanocluster alloys. These models are valid for sizes ~ 5 nm and approach bulk values for sizes ~ 20 nm. We study the phase transition in nanoclusters with cubic, octahedral, and cuboctahedral shapes, covering the compositions of interest. These models are based on studying the melting temperatures in nanoclusters using the regular solution, mixing model for alloys. Experimentally, it is extremely challenging to determine thermodynamic data on nano–sized alloys. Reasonable agreement is found between these models and recent experimental data on nanometer clusters in the Au–Cu and Pt–M nanophase systems. From our data, experiments on nanocubes about 5 nm in size, of stoichiometric AuCu and PtM composition, could help differentiate between the models. Some available evidence indicates that ordered intermetallic nanoclusters have better catalytic properties than disordered ones. We conclude with a discussion of physical mechanisms whereby ordering could improve the catalytic properties of nanocluster alloys.

Keywords: catalytic reactions, gold nanoalloys, phase transitions, platinum nanoalloys

Procedia PDF Downloads 176
1401 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 156
1400 Countering the Bullwhip Effect by Absorbing It Downstream in the Supply Chain

Authors: Geng Cui, Naoto Imura, Katsuhiro Nishinari, Takahiro Ezaki

Abstract:

The bullwhip effect, which refers to the amplification of demand variance as one moves up the supply chain, has been observed in various industries and extensively studied through analytic approaches. Existing methods to mitigate the bullwhip effect, such as decentralized demand information, vendor-managed inventory, and the Collaborative Planning, Forecasting, and Replenishment System, rely on the willingness and ability of supply chain participants to share their information. However, in practice, information sharing is often difficult to realize due to privacy concerns. The purpose of this study is to explore new ways to mitigate the bullwhip effect without the need for information sharing. This paper proposes a 'bullwhip absorption strategy' (BAS) to alleviate the bullwhip effect by absorbing it downstream in the supply chain. To achieve this, a two-stage supply chain system was employed, consisting of a single retailer and a single manufacturer. In each time period, the retailer receives an order generated according to an autoregressive process. Upon receiving the order, the retailer depletes the ordered amount, forecasts future demand based on past records, and places an order with the manufacturer using the order-up-to replenishment policy. The manufacturer follows a similar process. In essence, the mechanism of the model is similar to that of the beer game. The BAS is implemented at the retailer's level to counteract the bullwhip effect. This strategy requires the retailer to reduce the uncertainty in its orders, thereby absorbing the bullwhip effect downstream in the supply chain. The advantage of the BAS is that upstream participants can benefit from a reduced bullwhip effect. Although the retailer may incur additional costs, if the gain in the upstream segment can compensate for the retailer's loss, the entire supply chain will be better off. Two indicators, order variance and inventory variance, were used to quantify the bullwhip effect in relation to the strength of absorption. It was found that implementing the BAS at the retailer's level results in a reduction in both the retailer's and the manufacturer's order variances. However, when examining the impact on inventory variances, a trade-off relationship was observed. The manufacturer's inventory variance monotonically decreases with an increase in absorption strength, while the retailer's inventory variance does not always decrease as the absorption strength grows. This is especially true when the autoregression coefficient has a high value, causing the retailer's inventory variance to become a monotonically increasing function of the absorption strength. Finally, numerical simulations were conducted for verification, and the results were consistent with our theoretical analysis.

Keywords: bullwhip effect, supply chain management, inventory management, demand forecasting, order-to-up policy

Procedia PDF Downloads 74
1399 Agony and Agency: Discursive Construction of Barren women in the Bible and Traditional African Society

Authors: Vicky Khasandi-Telewa, Sinfree Makoni

Abstract:

Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.

Keywords: integrationism, critical discourse analysis, barrenness, communication strategies, women rights

Procedia PDF Downloads 69
1398 Enhancing Information Technologies with AI: Unlocking Efficiency, Scalability, and Innovation

Authors: Abdal-Hafeez Alhussein

Abstract:

Artificial Intelligence (AI) has become a transformative force in the field of information technologies, reshaping how data is processed, analyzed, and utilized across various domains. This paper explores the multifaceted applications of AI within information technology, focusing on three key areas: automation, scalability, and data-driven decision-making. We delve into how AI-powered automation is optimizing operational efficiency in IT infrastructures, from automated network management to self-healing systems that reduce downtime and enhance performance. Scalability, another critical aspect, is addressed through AI’s role in cloud computing and distributed systems, enabling the seamless handling of increasing data loads and user demands. Additionally, the paper highlights the use of AI in cybersecurity, where real-time threat detection and adaptive response mechanisms significantly improve resilience against sophisticated cyberattacks. In the realm of data analytics, AI models—especially machine learning and natural language processing—are driving innovation by enabling more precise predictions, automated insights extraction, and enhanced user experiences. The paper concludes with a discussion on the ethical implications of AI in information technologies, underscoring the importance of transparency, fairness, and responsible AI use. It also offers insights into future trends, emphasizing the potential of AI to further revolutionize the IT landscape by integrating with emerging technologies like quantum computing and IoT.

Keywords: artificial intelligence, information technology, automation, scalability

Procedia PDF Downloads 17
1397 Climate Teleconnections and Their Influence on the Spread of Dengue

Authors: Edilene Machado, Carolina Karoly, Amanda Britz, Luciane Salvi, Claudineia Brazil

Abstract:

Climate teleconnections refer to the climatic relationships between geographically distant regions, where changes in one location can influence weather patterns in another. These connections can occur through atmospheric and oceanic processes, leading to variations in temperature, precipitation, and other climatic elements. Studying teleconnections is crucial for better understanding the mechanisms that govern global climate and the potential consequences of climate change. A notable example of a teleconnection is the El Niño-Southern Oscillation (ENSO), which involves the interaction between the Equatorial Pacific Ocean and the atmosphere. During El Niño episodes, there is anomalous warming of the surface waters in the Equatorial Pacific, resulting in significant changes in global climate patterns. These changes can affect rainfall distribution, wind patterns, and temperatures in different parts of the world. The cold phase of ENSO, known as La Niña, is often associated with reduced precipitation and below-average temperatures in the state of Rio Grande do Sul, Brazil. Therefore, the objective of this research is to identify patterns between El Niño-Southern Oscillation (ENSO) events in their different phases and dengue transmission. Meteorological data and dengue case records for the city of Porto Alegre, in the southern region of Brazil, were used for the development of this research. The study highlighted that the highest incidence of dengue cases occurred during the cold phase of the El Niño-Southern Oscillation (ENSO).

Keywords: climate patterns, climate teleconnections, climate variability, dengue, El Niño-Southern oscillation

Procedia PDF Downloads 94
1396 Combined Aplication of Indigenous Pseudomonas fluorescens and the AM Fungi as the Potential Biocontrol Agents of Banana Fusarium wilt

Authors: Eri Sulyanti, Trimurti Habazar, Eti Farda Husen, Abdi Dharma, Nasril Nasir

Abstract:

In this study, combination of some biocontrol agents with different mechanisms was an alternative to improve the effectiveness of the biological control agents. Single and combined applications of indigenous Pseudomonas fluorescens and Arbuscular Mychorrhizae Fungi (AM Fungi) isolates were tested to induce the resistance on susceptible Cavendish banana against F.oxysporum f. sp. cubense race 4 under greenhouse conditions. These isolates originally isolated from healthy banana rhizosphere at endemic Fusarium wilt areas in the centre of production banana in West Sumatra. These researches were conducted with Randomized Block Design with 16 treatments and 10 replications. The treatments were three indigenous isolates of Pseudomonas fluorescens (Par1-Cv, Par4-Rj1, Par2-Jt1) and 3 isolates of AM Fungi (Gl1BuA4, Gl2BuA6, and Gl1KeP3. The biocontrol agents were applied as single agents and combination two of them. This study demonstrated that the application of combination biocontrol organisms Pseudomonas fluorescens and AM Fungi provided were more effective than single application. The combination of Par1-Cv and Gl1BuA4 isolates was the most effective to control Fusarium wilt and followed by the combination of Par1-Cv and Gl2BuA6 and Par2-Jt1 and Gl1P3.

Keywords: pseudomonad fluorescens (Pf), arbuscular mychorrhizae fungi (AM Fungi) indigenous isolates, fusarium oxysporum f. sp. cubense, soil rhizosphere

Procedia PDF Downloads 307
1395 Transnational Higher Education: Developing a Transnational Student Success Signature for Clinical Medical Students an Action Research Project

Authors: Wendy Maddison

Abstract:

This paper describes an Action Research project which was undertaken to inform professional practice in order to develop a newly created Centre for Student Success in the specific context of transnational medical and nursing education in the Middle East. The objectives were to enhance the academic performance, persistence, integration and personal and professional development of a multinational study body, in particular in relation to preclinical medical students, and to establish a comfortable, friendly and student-driven environment within an Irish medical university recently established in Bahrain. Expatriating a new part of itself into a corner of the world and within a context which could be perceived as the antithesis of itself, in particular in terms of traditional cultural and organisational values, the university has had to innovate in the range of services, programmes and other offerings which engages and supports the academic success of medical and nursing students as they “encounter the world in the classroom” in the context of an Arab Islamic culture but within a European institution of transnational education, engaging with a global learning environment locally. The outcomes of the project resulted in the development of a specific student success ‘signature’ for this particular transnational higher education context.

Keywords: transnational higher education, medical education, action research, student success, Middle Eastern context, student persistence in the global-local, student support mechanisms

Procedia PDF Downloads 696
1394 In vitro Antioxidant Scavenging of Root Fraction of Bryonia dioica

Authors: Yamani Amal, Lazaae Jamila, Elachouri Mostafa

Abstract:

Plants and their active agents – especially polyphenols – may have a principal role in the treatment of diseases that result from the defect of physiological antioxidant mechanisms. Bryonia dioica is well known in Moroccan traditional medicine for alleviatin pain and traiting many diseases. We have focused on plant belonging to Cucurbitaceae Family from around the world to understand their therapeutic uses and their potential antioxidant activities Although several biological activities and Chemical composition of Bryonia dioica are well characterized, no direct, in vitro study, of this natural product examined the antioxydant effect of the extract from the roots of Bryonia dioica. The aim of this study was to determine in vitro antioxidant activity of the B.dioica root, using antioxidant analysis methods based on determination of Hydroxyradical Scavenging, 1,1-diphenyl-2-picrylhydrazine (DPPH) radical scavenging, Hydrogenperoxide Scavenging and Nitric Oxide Scavenging. In this study, it was demonstrated, that, B. dioica root extract showed excellent antioxidant properties. This investigation showed that the roots of this plant contain potent natural scavengers R. It may represent an interesting source of antioxidant phenolics that may favour the extension of their cultivation as new source of natural antioxidants in addition to containing high quality proteins for human or animal nutrition. Therefore, there is need for all stakeholders on the Morocco to strive towards taking advantage of our enormous biodiversity resources to free our people from diseases, abject poverty and stagnation.

Keywords: Morocco, bryoniadioica, in vitro, antioxydant

Procedia PDF Downloads 384
1393 A Numerical Investigation of Total Temperature Probes Measurement Performance

Authors: Erdem Meriç

Abstract:

Measuring total temperature of air flow accurately is a very important requirement in the development phases of many industrial products, including gas turbines and rockets. Thermocouples are very practical devices to measure temperature in such cases, but in high speed and high temperature flows, the temperature of thermocouple junction may deviate considerably from real flow total temperature due to the effects of heat transfer mechanisms of convection, conduction, and radiation. To avoid errors in total temperature measurement, special probe designs which are experimentally characterized are used. In this study, a validation case which is an experimental characterization of a specific class of total temperature probes is selected from the literature to develop a numerical conjugate heat transfer analysis methodology to study the total temperature probe flow field and solid temperature distribution. Validated conjugate heat transfer methodology is used to investigate flow structures inside and around the probe and effects of probe design parameters like the ratio between inlet and outlet hole areas and prob tip geometry on measurement accuracy. Lastly, a thermal model is constructed to account for errors in total temperature measurement for a specific class of probes in different operating conditions. Outcomes of this work can guide experimentalists to design a very accurate total temperature probe and quantify the possible error for their specific case.

Keywords: conjugate heat transfer, recovery factor, thermocouples, total temperature probes

Procedia PDF Downloads 134
1392 Graphene Reinforced Magnesium Metal Matrix Composites for Biomedical Applications

Authors: Khurram Munir, Cuie Wen, Yuncang Li

Abstract:

Magnesium (Mg) metal matrix composites (MMCs) reinforced with graphene nanoplatelets (GNPs) have been developed by powder metallurgy (PM). In this study, GNPs with different concentrations (0.1-0.3 wt.%) were dispersed into Mg powders by high-energy ball-milling processes. The microstructure and resultant mechanical properties of the fabricated nanocomposites were characterized using transmission electron microscopy (TEM), scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDX), X-ray diffraction (XRD), Raman spectroscopy (RS), compression and nano-wear tests. The corrosion resistance of the fabricated composites was evaluated by electrochemical tests and hydrogen evolution measurements. Finally, the biological response of Mg-GNPs composites was assessed using osteoblast-like SaOS2 cells. The results indicate that GNPs are excellent candidates as reinforcements in Mg matrices for the manufacture of biodegradable Mg-based composite implants. GNP addition improved the mechanical properties of Mg via synergetic strengthening modes. Moreover, retaining the structural integrity of GNPs during PM processing improved the ductility, compressive strength, and corrosion resistance of the Mg-GNP composites as compared to monolithic Mg. Cytotoxicity assessments did not reveal any significant toxicity with the addition of GNPs to Mg matrices. This study demonstrates that Mg-xGNPs with x < 0.3 wt.%, may constitute novel biodegradable implant materials for load-bearing applications.

Keywords: magnesium-graphene composites, strengthening mechanisms, In vitro cytotoxicity, biocorrosion

Procedia PDF Downloads 158
1391 Protection of Victims’ Rights in International Criminal Proceedings

Authors: Irina Belozerova

Abstract:

In the recent years, the number of crimes against peace and humanity has constantly been increasing. The development of the international community is inseparably connected to the compliance with the law which protects the rights and interests of citizens in all of their manifestations. The provisions of the law of criminal procedure are no exception. The rights of the victims of genocide, of the war crimes and the crimes against humanity, require particular attention. These crimes fall within the jurisdiction of the International Criminal Court governed by the Rome Statute of the International Criminal Court. These crimes have the following features. First, any such crime has a mass character and therefore requires specific regulation in the international criminal law and procedure and the national criminal law and procedure of different countries. Second, the victims of such crimes are usually children, women and old people; the entire national, ethnic, racial or religious groups are destroyed. These features influence the classification of victims by the age criterion. Article 68 of the Rome Statute provides for protection of the safety, physical and psychological well-being, dignity and privacy of victims and witnesses and thus determines the procedural status of these persons. However, not all the persons whose rights have been violated by the commission of these crimes acquire the status of victims. This is due to the fact that such crimes affect a huge number of persons and it is impossible to mention them all by name. It is also difficult to assess the entire damage suffered by the victims. While assessing the amount of damages it is essential to take into account physical and moral harm, as well as property damage. The procedural status of victims thus gains an exclusive character. In order to determine the full extent of the damage suffered by the victims it is necessary to collect sufficient evidence. However, it is extremely difficult to collect the evidence that would ensure the full and objective protection of the victims’ rights. While making requests for the collection of evidence, the International Criminal Court faces the problem of protection of national security information. Religious beliefs and the family life of victims are of great importance. In some Islamic countries, it is impossible to question a woman without her husband’s consent which affects the objectivity of her testimony. Finally, the number of victims is quantified by hundreds and thousands. The assessment of these elements demands time and highly qualified work. These factors justify the creation of a mechanism that would help to collect the evidence and establish the truth in the international criminal proceedings. This mechanism will help to impose a just and appropriate punishment for the persons accused of having committed a crime, since, committing the crime, criminals could not misunderstand the outcome of their criminal intent.

Keywords: crimes against humanity, evidence in international criminal proceedings, international criminal proceedings, protection of victims

Procedia PDF Downloads 249
1390 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 236
1389 VHL, PBRM1, and SETD2 Genes in Kidney Cancer: A Molecular Investigation

Authors: Rozhgar A. Khailany, Mehri Igci, Emine Bayraktar, Sakip Erturhan, Metin Karakok, Ahmet Arslan

Abstract:

Kidney cancer is the most lethal urological cancer accounting for 3% of adult malignancies. VHL, a tumor-suppressor gene, is best known to be associated with renal cell carcinoma (RCC). The VHL functions as negative regulator of hypoxia inducible factors. Recent sequencing efforts have identified several novel frequent mutations of histone modifying and chromatin remodeling genes in ccRCC (clear cell RCC) including PBRM1 and SETD2. The PBRM1 gene encodes the BAF180 protein, which involved in transcriptional activation and repression of selected genes. SETD2 encodes a histone methyltransferase, which may play a role in suppressing tumor development. In this study, RNAs of 30 paired tumor and normal samples that were grouped according to the types of kidney cancer and clinical characteristics of patients, including gender and average age were examined by RT-PCR, SSCP and sequencing techniques. VHL, PBRM1 and SETD2 expressions were relatively down-regulated. However, statistically no significance was found (Wilcoxon signed rank test, p > 0.05). Interestingly, no mutation was observed on the contrary of previous studies. Understanding the molecular mechanisms involved in the pathogenesis of RCC has aided the development of molecular-targeted drugs for kidney cancer. Further analysis is required to identify the responsible genes rather than VHL, PBRM1 and SETD2 in kidney cancer.

Keywords: kidney cancer, molecular biomarker, expression analysis, mutation screening

Procedia PDF Downloads 459
1388 Shape Evolution of CdSe Quantum Dots during the Synthesis in the Presence of Silver Halides

Authors: Pavel Kotin, Sergey Dotofeev, Daniil Kozlov, Alexey Garshev

Abstract:

We propose the investigation of CdSe quantum dots which were synthesized in the presence of silver halides. To understand a process of nanoparticle formation in more detail, we varied the silver halide amount in the synthesis and proposed a sampling during colloidal growth. The attempts were focused on the investigation of shape, structure and optical properties of nanoparticles. We used the colloidal method of synthesis. Cadmium oleate, tri-n-octylphosphine selenide (TOPSe) and AgHal in TOP were precursors of cadmium, selenium and silver halides correspondingly. The molar Ag/Cd ratio in synthesis was varied from 1/16 to 1/1. The sampling was basically realized in 20 sec, 5 min, and 30 min after the beginning of quantum dots nucleation. To investigate nanoparticles we used transmission electron microscopy (including high resolution one), X-ray diffraction, and optical spectroscopy. It was established that silver halides lead to obtaining tetrapods with different leg length and large ellipsoidal nanoparticles possessing an intensive near IR photoluminescence. The change of the amount of silver halide in synthesis and the selection of an optimal growth time allows controlling the shape and the share of tetrapods or ellipsoidal nanoparticles in the product. Our main attempts were focused on a detailed investigation of the quantum dots structure and shape evolution and, finally, on mechanisms of such nanoparticle formation.

Keywords: colloidal quantum dots, shape evolution, silver doping, tetrapods

Procedia PDF Downloads 290