Search results for: security risk
6570 Dietary Pattern and Risk of Breast Cancer Among Women:a Case Control Study
Authors: Huma Naqeeb
Abstract:
Epidemiological studies have shown the robust link between breast cancer and dietary pattern. There has been no previous study conducted in Pakistan, which specifically focuses on dietary patterns among breast cancer women. This study aims to examine the association of breast cancer with dietary patterns among Pakistani women. This case-control research was carried in multiple tertiary care facilities. Newly diagnosed primary breast cancer patients were recruited as cases (n = 408); age matched controls (n = 408) were randomly selected from the general population. Data on required parameters were systematically collected using subjective and objective tools. Factor and Principal Component Analysis (PCA) techniques were used to extract women’s dietary patterns. Four dietary patterns were identified based on eigenvalue >1; (i) veg-ovo-fish, (ii) meat-fat-sweet, (iii) mix (milk and its products, and gourds vegetables) and (iv) lentils - spices. Results of the multiple regressions were displayed as adjusted odds ratio (Adj. OR) and their respective confidence intervals (95% CI). After adjusted for potential confounders, veg-ovo-fish dietary pattern was found to be robustly associated with a lower risk of breast cancer among women (Adj. OR: 0.68, 95%CI: (0.46-0.99, p<0.01). The study findings concluded that attachment to the diets majorly composed of fresh vegetables, and high quality protein sources may contribute in lowering the risk of breast cancer among women.Keywords: breast cancer, dietary pattern, women, principal component analysis
Procedia PDF Downloads 1216569 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 1446568 The Risk and Prevention of Peer-To-Peer Network Lending in China
Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang
Abstract:
How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision
Procedia PDF Downloads 1666567 Economic Assessment of the Fish Solar Tent Dryers
Authors: Collen Kawiya
Abstract:
In an effort of reducing post-harvest losses and improving the supply of quality fish products in Malawi, the fish solar tent dryers have been designed in the southern part of Lake Malawi for processing small fish species under the project of Cultivate Africa’s Future (CultiAF). This study was done to promote the adoption of the fish solar tent dryers by the many small scale fish processors in Malawi through the assessment of the economic viability of these dryers. With the use of the project’s baseline survey data, a business model for a constructed ‘ready for use’ solar tent dryer was developed where investment appraisal techniques were calculated in addition with the sensitivity analysis. The study also conducted a risk analysis through the use of the Monte Carlo simulation technique and a probabilistic net present value was found. The investment appraisal results showed that the net present value was US$8,756.85, the internal rate of return was 62% higher than the 16.32% cost of capital and the payback period was 1.64 years. The sensitivity analysis results showed that only two input variables influenced the fish solar dryer investment’s net present value. These are the dried fish selling prices that were correlating positively with the net present value and the fresh fish buying prices that were negatively correlating with the net present value. Risk analysis results showed that the chances that fish processors will make a loss from this type of investment are 17.56%. It was also observed that there exist only a 0.20 probability of experiencing a negative net present value from this type of investment. Lastly, the study found that the net present value of the fish solar tent dryer’s investment is still robust in spite of any changes in the levels of investors risk preferences. With these results, it is concluded that the fish solar tent dryers in Malawi are an economically viable investment because they are able to improve the returns in the fish processing activity. As such, fish processors need to adopt them by investing their money to construct and use them.Keywords: investment appraisal, risk analysis, sensitivity analysis, solar tent drying
Procedia PDF Downloads 2766566 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 1626565 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 1386564 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 4046563 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 3026562 Design of Dry Chemical Fire Extinguisher Inspection Equipment in Order to Reduce Ergonomic Risks for Fire Extinguisher Inspectors
Authors: Sitrapee Changmuenwai, Sudaratana Wongweragiat
Abstract:
It is important that a dry chemical fire extinguisher must be inspected for its readiness. For each inspection, the inspectors need to turn the fire extinguisher tank upside down to let the chemical inside the tank move and prevent solidification, which would make the tank not ready for usage when needed. Each tank weighs approximately 16 kg. The inspectors have to turn each tank upside down twice (2 minutes/round). They need to put the tanks over their shoulder close to their ear in order to hear the chemical flow inside the tank or use their hands to feel it. The survey and questionnaire 'The Questionnaire Know Body', which includes neck, left shoulder, upper and lower right arms suggest that all 12 security staffs have the same fatigues. The current dry chemical fire extinguisher inspection affects various ergonomic health problems. Rapid Entire Body Assessment (REBA) is used for evaluation of posture risks so that the working postures may be redesigned or corrected. The dry chemical fire extinguisher inspection equipment has been developed to reduce ergonomic health risks for the inspectors. A REBA analysis has been performed again, and the risk score has been decreased from 13 to 3. In addition, feedbacks from the first trial of the developed equipment show that there are demands to increase the installation in order to reduce the ergonomic health risks.Keywords: dry chemical fire extinguisher inspection equipment, ergonomic, REBA, rapid entire body assessment
Procedia PDF Downloads 1206561 Breast Cancer and BRCA Gene: A Study on Genetic and Environmental Interaction
Authors: Abhishikta Ghosh Roy
Abstract:
Breast cancer is the most common malignancy among women globally, including India. Human breast cancer results from the genetic and environmental interaction. The present study attempts to understand the molecular heterogeneity of BRCA1 and BRCA2 genes, as well as to understand the association of various lifestyle and reproductive variables for the Breast Cancer risk. The study was conducted amongst 110 patients and 128 controls with total DNA sequencing of flanking and coding regions of BRCA1 BRCA2 genes that revealed ten Single Nucleotide Polymorphisms (SNPs) (6 novels). The controls selected for the study were age, sex and ethnic group matched. After written and informed consent biological samples were collected from the subjects. After detailed molecular analysis, significant (p < 0.005) molecular heterogeneity is revealed in terms of SNPs in BRCA1 (4 Exonic & 1 Intronic) and BRCA2 (2exonic and 3 Intronic) genes. The augmentation study investigated significant (p < 0.05) association with positive family history, early age at menarche, irregular menstrual periods, menopause, prolong contraceptive use, nulliparity, history of abortions, consumption of alcohol and smoking for breast cancer risk. To the best of authors knowledge, this study is the first of its kind, envisaged that the identification of the SNPs and modification of the lifestyle factors might aid to minimize the risk among the Bengalee Hindu females.Keywords: breast cancer, BRCA, lifestyle, India
Procedia PDF Downloads 1136560 Genetic Association and Functional Significance of Matrix Metalloproteinase-14 Promoter Variants rs1004030 and rs1003349 in Gallbladder Cancer Pathogenesis
Authors: J. Vinay , Kusumbati Besra, Niharika Pattnaik, Shivaram Prasad Singh, Manjusha Dixit
Abstract:
Gallbladder cancer (GBC) is rare but highly malignant cancer; its prevalence is more in certain geographical regions and ethnic groups, which include the Northern and Eastern states of India. Previous studies in India have reported genetic predisposition as one of the risk factors in GBC pathogenesis. Although the matrix metalloproteinase-14 (MMP14) is a well-known modulator of the tumor microenvironment and tumorigenesis and TCGA data also suggests its upregulation yet, its role in the genetic predisposition for GBC is completely unknown. We elucidated the role of MMP14 promoter variants as genetic risk factors and their implications in expression modulation. We screened MMP14 promoter variants association with GBC using Sanger’s sequencing in approximately 300 GBC and 300 control subjects and 26 GBC tissue samples of Indian ethnicity. The immunohistochemistry was used to check the MMP14 protein expression in GBC tissue samples. The role of promoter variants on expression levels was elucidated using a luciferase reporter assay. The variants rs1004030 (p-value = 0.0001) and rs1003349 (p-value = 0.0008) were significantly associated with gallbladder cancer. The luciferase assay in two different cell lines, HEK-293 (p = 0.0006) and TGBC1TKB (p = 0.0036) showed a significant increase in relative luciferase activity in the presence of risk alleles for both the single nucleotide polymorphisms (SNPs). Similarly, genotype-phenotype correlation in patients samples confirmed that the presence of risk alleles at rs1004030 and rs1003349 increased MMP14 expression. Overall, this study unravels the genetic association of MMP14 promoter variants with gallbladder cancer, which may contribute to pathogenesis by increasing its expression.Keywords: gallbladder cancer, matrix metalloproteinase-14, single nucleotide polymorphism, case control study, genetic association study
Procedia PDF Downloads 1796559 ZBTB17 Gene rs10927875 Polymorphism in Slovak Patients with Dilated Cardiomyopathy
Authors: I. Boroňová, J. Bernasovská, J. Kmec, E. Petrejčíková
Abstract:
Dilated cardiomyopathy (DCM) is a severe cardiovascular disorder characterized by progressive systolic dysfunction due to cardiac chamber dilatation and inefficient myocardial contractility often leading to chronic heart failure. Recently, a genome-wide association studies (GWASs) on DCM indicate that the ZBTB17 gene rs10927875 single nucleotide polymorphism is associated with DCM. The aim of the study was to identify the distribution of ZBTB17 gene rs10927875 polymorphism in 50 Slovak patients with DCM and 80 healthy control subjects using the Custom Taqman®SNP Genotyping assays. Risk factors detected at baseline in each group included age, sex, body mass index, smoking status, diabetes and blood pressure. The mean age of patients with DCM was 52.9±6.3 years; the mean age of individuals in control group was 50.3±8.9 years. The distribution of investigated genotypes of rs10927875 polymorphism within ZBTB17 gene in the cohort of Slovak patients with DCM was as follows: CC (38.8%), CT (55.1%), TT (6.1%), in controls: CC (43.8%), CT (51.2%), TT (5.0%). The risk allele T was more common among the patients with dilated cardiomyopathy than in normal controls (33.7% versus 30.6%). The differences in genotype or allele frequencies of ZBTB17 gene rs10927875 polymorphism were not statistically significant (p=0.6908; p=0.6098). The results of this study suggest that ZBTB17 gene rs10927875 polymorphism may be a risk factor for susceptibility to DCM in Slovak patients with DCM. Studies of numerous files and additional functional investigations are needed to fully understand the roles of genetic associations.Keywords: ZBTB17 gene, rs10927875 polymorphism, dilated cardiomyopathy, cardiovascular disorder
Procedia PDF Downloads 4036558 Comparing Groundwater Fluoride Level with WHO Guidelines and Classifying At-Risk Age Groups; Based on Health Risk Assessment
Authors: Samaneh Abolli, Kamyar Yaghmaeian, Ali Arab Aradani, Mahmood Alimohammadi
Abstract:
The main route of fluoride uptake is drinking water. Fluoride absorption in the acceptable range (0.5-1.5 mg L-¹) is suitable for the body, but it's too much consumption can have irreversible health effects. To compare fluoride concentration with the WHO guidelines, 112 water samples were taken from groundwater aquifers in 22 villages of Garmsar County, the central part of Iran, during 2018 to 2019.Fluoride concentration was measured by the SPANDS method, and its non-carcinogenic impacts were calculated using EDI and HQ. The statistical population was divided into four categories of infant, children, teenagers, and adults. Linear regression and Spearman rank correlation coefficient tests were used to investigate the relationships between the well's depth and fluoride concentration in the water samples. The annual mean concentrations of fluoride in 2018 and2019 were 0.75 and 0.64 mg -¹ and, the fluoride mean concentration in the samples classifying the cold and hot seasons of the studied years was 0.709 and 0.689 mg L-¹, respectively. The amount of fluoride in 27% of the samples in both years was less than the acceptable minimum (0.5 mg L-¹). Also, 11% of the samples in2018 (6 samples) had fluoride levels higher than 1.5 mg L-¹. The HQ showed that the children were vulnerable; teenagers and adults were in the next ranks, respectively. Statistical tests showed a reverse and significant correlation (R2 = 0.02, < 0.0001) between well depth and fluoride content. The border between the usefulness/harmfulness of fluoride is very narrow and requires extensive studies.Keywords: fluoride, groundwater, health risk assessment, hazard quotient, Garmsar
Procedia PDF Downloads 696557 Causes and Effects of the 2012 Flood Disaster on Affected Communities in Nigeria
Authors: Abdulquadri Ade Bilau, Richard Ajayi Jimoh, Adejoh Amodu Adaji
Abstract:
The increasing exposures to natural hazards have continued to severely impair on the built environment causing huge fatalities, mass damage and destruction of housing and civil infrastructure while leaving psychosocial impacts on affected communities. The 2012 flood disaster in Nigeria which affected over 7 million inhabitants in 30 of the 36 states resulted in 363 recorded fatalities with about 600,000 houses and a number of civil infrastructure damaged or destroyed. In Kogi State, over 500 thousand people were displaced in 9 out of the 21 local government affected while Ibaji and Lokoja local governments were worst hit. This study identifies the causes and 2012 flood disasters and its effect on housing and livelihood. Personal observation and questionnaire survey were instruments used in carrying out the study and data collected were analysed using descriptive statistical tool. Findings show that the 2012 flood disaster was aided by the gap in hydrological data, sudden dam failure, and inadequate drainage capacity to reduce flood risk. The study recommends that communities residing along the river banks in Lokoja and Ibaji LGAs must be adequately educated on their exposure to flood hazard and mitigation and risk reduction measures such as construction of adequate drainage channel are constructed in affected communities.Keywords: flood, hazards, housing, risk reduction, vulnerability
Procedia PDF Downloads 2616556 A Case-Control Study on Dietary Heme/Nonheme Iron and Colorectal Cancer Risk
Authors: Alvaro L. Ronco
Abstract:
Background and purpose: Although our country is a developing one, it has a typical Western meat-rich dietary style. Based on estimates of heme and nonheme iron contents in representative foods, we carried out the present epidemiologic study, with the aim of accurately analyzing dietary iron and its role on CRC risk. Subjects/methods: Patients (611 CRC incident cases and 2394 controls, all belonging to public hospitals of our capital city) were interviewed through a questionnaire including socio-demographic, reproductive and lifestyle variables, and a food frequency questionnaire of 64 items, which asked about food intake 5 years before the interview. The sample included 1937 men and 1068 women. Controls were matched by sex and age (± 5 years) to cases. Food-derived nutrients were calculated from available databases. Total dietary iron was calculated and classified by heme or nonheme source, following data of specific Dutch and Canadian studies, and additionally adjusted by energy. Odds Ratios (OR) and 95% confidence intervals were calculated through unconditional logistic regression, adjusting for relevant potential confounders (education, body mass index, family history of cancer, energy, infusions, and others). A heme/nonheme (H/NH) ratio was created and the interest variables were categorized into tertiles, for analysis purposes. Results: The following risk estimations correspond to the highest tertiles. Total iron intake showed no association with CRC risk neither among men (OR=0.83, ptrend =.18) nor among women (OR=1.48, ptrend =.09). Heme iron was positively associated among men (OR=1.88, ptrend < .001) and for the overall sample (OR=1.44, ptrend =.002), however, it was not associated among women (OR=0.91, ptrend =.83). Nonheme iron showed an inverse association among men (OR=0.53, ptrend < .001) and the overall sample (OR=0.78, ptrend =.04), but was not associated among women (OR=1.46, ptrend =.14). Regarding H/NH ratio, risks increased only among men (OR=2.12, ptrend < .001) but lacked of association among women (OR=0.81, ptrend =.29). Conclusions. We have observed different types of associations between CRC risk and high dietary heme, nonheme and H/NH iron ratio. Therefore, the source of the available iron might be of importance as a link to colorectal carcinogenesis, perhaps pointing to reconsider the animal/plant proportions of this vital mineral within diet. Nevertheless, the different associations observed for each sex, demand further studies in order to clarify these points.Keywords: chelation, colorectal cancer, heme, iron, nonheme
Procedia PDF Downloads 1706555 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3226554 Psycho-social Antecedents of Goal Setting and Self-Control of Thai University Students
Authors: Duchduen Bhanthumnavin
Abstract:
One of the most important characteristics to increase competitive ability in undergraduate students after post COVID-19 era is goal setting and self-control. This correlational study aimes at investigating the influence of psycho-social antecedents on goal setting and self-control in 550 Thai university students. Results from multiple regression analysis revealed that the important predictors of this characteristic were reasoning ability, psychological immunity, attitudes toward competition, core self-evaluation, and family nurture, which yielded 54.28 predictive percentage in the total sample. Moreover, the analysis identified three at-risk groups, namely, male students, low GPA students, and students with siblings. Discussion and implications in general and for specific purposes for the at-risk groups were offered.Keywords: antecedents, plan and self-control, predictors, university students
Procedia PDF Downloads 626553 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 916552 The Cost and Benefit on the Investment in Safety and Health of the Enterprises in Thailand
Authors: Charawee Butbumrung
Abstract:
The purpose of this study is to evaluate the monetary worthiness of investment and the usefulness of risk estimation as a tool employed by a production section of an electronic factory. This study employed the case study of accidents occurring in production areas. Data is collected from interviews with six production of safety coordinators and collect the information from the relevant section. The study will present the ratio of benefits compared with the operation costs for investment. The result showed that it is worthwhile for investment with the safety measures. In addition, the organizations must be able to analyze the causes of accidents about the benefits of investing in protective working process. They also need to quickly provide the manual for the staff to learn how to protect themselves from accidents and how to use all of the safety equipment.Keywords: cost and benefit, enterprises in Thailand, investment in safety and health, risk estimation
Procedia PDF Downloads 2636551 The Risk of Deaths from Viral Hepatitis among the Female Workers in the Beauty Service Industry
Authors: Byeongju Choi, Sanggil Lee, Kyung-Eun Lee
Abstract:
Introduction: In the republic of Korea, the number of workers in the beauty industry has been increasing. Because the prevalence of hepatitis B carriers in Korea is higher than in other countries, the risk of blood-borne infection including viral hepatitis B and C, among the workers by using the sharp and contaminated instruments during procedure can be expected among beauty salon workers. However, the health care policies for the workers to prevent the blood-borne infection are not established due to the lack of evidences. Moreover, the workers in hair and nail salon were mostly employed at small businesses, where national mandatory systems or policies for workers’ health management are not applied. In this study, the risk of the viral hepatitis B and C from the job experiencing the hair and nail procedures in the mortality was assessed. Method: We conducted a retrospective review of the job histories and causes of death in the female deaths from 2006-2016. 132,744 of female deaths who had one more job experiences during their lifetime were included in this study. Job histories were assessed using the employment insurance database in Korea Employment Information Service (KEIS) and the causes of death were in death statistics produced by Statistics Korea. Case group (n= 666) who died from viral hepatitis was classified the death having record involved in ‘B15-B19’ as a cause of deaths based on Korean Standard Classification of Diseases(KCD) with the deaths from other causes, control group (n=132,078). The group of the workers in the beauty service industry were defined as the employees who had ever worked in the industry coded as ‘9611’ based on Korea Standard Industry Classification (KSIC) and others were others. Other than job histories, birth year, marital status, education level were investigated from the death statistics. Multiple logistic regression analysis were used to assess the risk of deaths from viral hepatitis in the case and control group. Result: The number of the deaths having ever job experiences at the hair and nail salon was 255. After adjusting confounders of age, marital status and education, the odds ratio(OR) for deaths from viral hepatitis was quite high in the group having experiences with working in the beauty service industry with 3.14(95% confidence interval(CI) 1.00-9.87). Other associated factors with increasing the risk of deaths from viral hepatitis were low education level(OR=1.34, 95% CI 1.04-1.73), married women (OR=1.42, 95% CI 1.02-1.97). Conclusion: The risk of deaths from viral hepatitis were high in the workers in the beauty service industry but not statistically significant, which might attributed from the small number of workers in beauty service industry. It was likely that the number of workers in beauty service industry could be underestimated due to their temporary job position. Further studies evaluating the status and the incidence of viral infection among the workers with consideration of the vertical transmission would be required.Keywords: beauty service, viral hepatitis, blood-borne infection, viral infection
Procedia PDF Downloads 1376550 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2486549 Kidnapping of Migrants by Drug Cartels in Mexico as a New Trend in Contemporary Slavery
Authors: Itze Coronel Salomon
Abstract:
The rise of organized crime and violence related to drug cartels in Mexico has created serious challenges for the authorities to provide security to those who live within its borders. However, to achieve a significant improvement in security is absolute respect for fundamental human rights by the authorities. Irregular migrants in Mexico are at serious risk of abuse. Research by Amnesty International as well as reports of the NHRC (National Human Rights) in Mexico, have indicated the major humanitarian crisis faced by thousands of migrants traveling in the shadows. However, the true extent of the problem remains invisible to the general population. The fact that federal and state governments leave no proper record of abuse and do not publish reliable data contributes to ignorance and misinformation, often spread by the media that portray migrants as the source of crime rather than their victims. Discrimination and intolerance against irregular migrants can generate greater hostility and exclusion. According to the modus operandi that has been recorded criminal organizations and criminal groups linked to drug trafficking structures deprive migrants of their liberty for forced labor and illegal activities related to drug trafficking, even some have been kidnapped for be trained as murderers . If the victim or their family cannot pay the ransom, the kidnapped person may suffer torture, mutilation and amputation of limbs or death. Migrant women are victims of sexual abuse during her abduction as well. In 2011, at least 177 bodies were identified in the largest mass grave found in Mexico, located in the town of San Fernando, in the border state of Tamaulipas, most of the victims were killed by blunt instruments, and most seemed to be immigrants and travelers passing through the country. With dozens of small graves discovered in northern Mexico, this may suggest a change in tactics between organized crime groups to the different means of obtaining revenue and reduce murder profile methods. Competition and conflict over territorial control drug trafficking can provide strong incentives for organized crime groups send signals of violence to the authorities and rival groups. However, as some Mexican organized crime groups are increasingly looking to take advantage of income and vulnerable groups, such as Central American migrants seem less interested in advertising his work to authorities and others, and more interested in evading detection and confrontation. This paper pretends to analyze the introduction of this new trend of kidnapping migrants for forced labors by drug cartels in Mexico into the forms of contemporary slavery and its implications.Keywords: international law, migration, transnational organized crime
Procedia PDF Downloads 4166548 Soluble CD36 and Cardiovascular Risk in Middle-Aged Subjects
Authors: Mohammad Alkhatatbeh, Nehad Ayoub, Nizar Mhaidat, Nesreen Saadeh, Lisa Lincz
Abstract:
CD36 is involved in the development of atherosclerosis by enhancing macrophage endocytosis of oxidized-low density lipoproteins and foam cell formation. Soluble CD36 (sCD36) was found to be elevated in type 2 diabetic patients and was supposed to act as a marker of insulin resistance and atherosclerosis. In young subjects, sCD36 was associated with cardiovascular risk factors including obesity and hypertriglyceridemia. This study was conducted to further investigate the relationship between plasma sCD36 and cardiovascular risk factors among middle-aged patients with metabolic syndrome (MetS) and healthy controls. SCD36 concentrations were determined by enzyme-linked immunosorbent assays (ELISA) for 41 patients with MetS and 36 healthy controls. Data for other variables were obtained from patients' medical records. SCD36 concentrations were relatively low compared to most other studies and were not significantly different between the MetS group and controls (P-value=0.17). SCD36 was also not correlated with age, body mass index, glucose, lipid profile, serum electrolytes and blood counts. SCD36 was not significantly different between subjects with obesity, hyperglycemia, dyslipidemia, hypertension or cardiovascular disease and those without these abnormalities (P-value > 0.05). The inconsistency between results reported in this study and other studies may be unique to the study population or be a result of the lack of a reliable standardized method for determining absolute sCD36 concentrations. However, further investigations are required to assess CD36 tissue expression in the study population and to assess the accuracy of various commercially available sCD36 ELISA kits. Thus, the availability of a standardized simple sCD36 ELISA that could be performed in any basic laboratory would be more favorable to the specialized flow cytometry methods that detect CD36+ microparticles if it was to be used as a biomarker.Keywords: metabolic syndrome, CD36, cardiovascular risk, obesity, type 2 diabetes mellitus
Procedia PDF Downloads 2666547 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 3246546 Intimate Partner Violence and Risk of Obesity among Women
Authors: Fatemeh Abdollahi, Munn-Sann Lye, Jamshid Yazdani Charati, Mehran Zarghami
Abstract:
Both obesity and intimate partner violence (IPV) are growing health threats. This study aimed to assess the prevalence and risk factors of both IPV and obesity and their association. In this cross-sectional study, 530 women aged 16-65 years attending Mazandaran primary health centers were recruited through the stratified random sampling method (2019-2020). Data were collected using the modified World Health Organization Domestic Violence questionnaire, Perceived Stress Scale, and socio-demographic, obstetric, and anthropometric questionnaires. The data were analyzed using descriptive statistics, the chi-square test, and multiple logistic regression. The prevalence of overweight, obesity and psychological, physical, and sexual IPV were 47.6%, 26.7%, 70.4%, 17.9%, and 6.4%, respectively. Increasing women’s educational level and exposure to violence during their lifespan increased the odds of any type of IPV while living in a nuclear family reduced it. In groups of women who were subjected to any type of IPV and only psychological IPV, experiencing violence during the lifespan was significant in predicting obesity. The alarming prevalence of IPV and obesity-overweight in this study points to the need for collaborative socio-political and health intervention. The link between experiencing violence during lifespan and obesity in some subgroups of women highlights the detrimental consequences of chronic violence and the urgent need for effective preventive programs.Keywords: intimate partner violence, body mass index, obesity, risk factor, women
Procedia PDF Downloads 1016545 Dietary Intake and the Risk of Hypertriglyceridemia in Adults: Tehran Lipid and Glucose Study
Authors: Parvin Mirmiran, Zahra Bahadoran, Sahar Mirzae, Fereidoun Azizi
Abstract:
Background and aim: Lifestyle factors, especially dietary intakes play an important role in metabolism of lipids and lipoproteins. In this study, we assessed the association between dietary factors and 3-year changes of serum triglycerides (TG), HDL-C and the atherogenic index of plasma among Iranian adults. This longitudinal study was conducted on 1938 subjects, aged 19-70 years, who participated in the Tehran Lipid and Glucose Study. Demographics, anthropometrics and biochemical measurements including serum TG were assessed at baseline (2006-2008) and after a 3-year follow-up (2009-2011). Dietary data were collected by using a 168-food item, validated semi-quantitative food frequency questionnaire at baseline. The risk of hypertriglyceridemia in the quartiles of dietary factors was evaluated using logistic regression models with adjustment for age, gender, body mass index, smoking, physical activity and energy intakes. Results: Mean age of the participants at baseline was 41.0±13.0 y. Mean TG and HDL-C at baseline was 143±86 and 42.2±10.0 mg/dl, respectively. Three-year change of serum TG were inversely related energy intake from phytochemical rich foods, whole grains, and legumes (P<0.05). Higher intakes compared to lower ones of dietary fiber and phytochemical-rich foods had similar impact on decreased risk of hyper-triglyceridemia (OR=0.58, 95% CI=0.34-1.00). Higher- compared to lower-dietary sodium to potassium ratios (Na/K ratio) increased the risk of hypertriglyceridemia by 63% (OR=0.1.63, 95% CI= 0.34-1.00). Conclusion: Findings showed that higher intakes of fiber and phytochemical rich foods especially whole grain and legumes could have protective effects against lipid disorders; in contrast higher sodium to potassium ratio had undesirable effect on triglycerides.Keywords: lipid disorders, hypertriglyceridemia, diet, food science
Procedia PDF Downloads 4676544 Self-Care and Risk Behaviors in Primary Caregiver of Cancer Patients
Authors: Ivonne N. Pérez-Sánchez. María L. Rascón- Gasca, Angélica Riveros-Rosas, Rebeca Robles García
Abstract:
Introduction: Primary caregivers of cancer patients have health problems related to their lack of time, stress, and fiscal strain. Their health problems could affect their patients’ health and also increase the expenses in public health. Aim: To describe self-care and risk behaviors in a sample of Mexican primary caregiver and the relation of these behaviors with emotional distress (caregiver burden, anxiety and depression symptoms), coping and sociodemographic variables. Method: Participated in this study 173 caregivers of a third level reference medical facility (age: M=49.4, SD=13.5) females 78%, males 22%, 57.5% were caregivers of patients with terminal cancer (CPTC), and 40.5% were caregivers of patients on oncology treatment (CPOT). Results: The 75.7% of caregivers reported to have had health problem in last six months as well as several symptoms which were related to emotional distress, these symptoms were more frequently between CPTC and female caregivers. A half (47.3%) of sample reported have had difficulties in caring their health; these difficulties were related to emotional distress and lower coping, more affected caregivers were who attend male patients and CPTC. The 76.8% of caregivers had health problems in last six months, but 26.5% of them waited to search medical care until they were very sick, and 11% didn't do it. Also, more than a half of sample (56.1%) admitted to have risk behaviors as drink alcohol, smoke or overeating for feeling well, these caregivers showed high emotional distress and lower coping. About caregivers healthy behaviors, 80% of them had a hobby; 27.2% do exercise usually and between 12% to 60% did medical checkups (glucose tests, blood pressure and cholesterol tests, eye exams and watched their weight), these caregivers had lower emotional distress and high coping, some variables related health behaviors were: care only one patient or a female patient and be a CPOT, social support, high educational level and experience as a caregiver in past. The half of caregivers were worrying to develop cancer in the future; this idea was 2.5 times more frequent in caregiver with problems to care their health. Conclusions: The results showed a big proportion of caregivers with medical problems. High emotional distress and low coping were related to physical symptoms, risk behaviors, and low self-care; poor self-care was frequently even in caregiver who have chronic illness.Keywords: cancer, primary caregiver, risk behaviors, self-care
Procedia PDF Downloads 4036543 Changing Trends in the Use of Induction Agents for General Anesthesia for Cesarean Section
Authors: Mahmoud Hassanin, Amita Gupta
Abstract:
Background: During current practice, Thiopentone is not cost-effectively added to resources wastage, risk of drug error with antibiotics, short shelf life, infection risk, and risk of delay while preparing during category one cesarean section. There is no significant difference or preference to the other alternative as per current use. Aims and Objectives: Patient safety, Cost-effective use of trust resources, problem awareness, Consider improvising on the current practice. Methods: In conjunction with the local department survey results, many studies support the change. Results: More than 50%(15 from 29) are already using Propofol, more than 75% of the participant are willing to shift to Propofol if it becomes standard, and the cost analysis also revealed that Thiopentone 10 X500=£60 Propofol 10X200= £5.20, Cost of Thiopentone/year =£2190. Approximately GA in a year =35-40 could cost approximately £20 Propofol, given it is a well-established practice. We could save not only money, but it will be environmentally friendly also to avoid adding any carbon footprints. Recommendation: Thiopentone is rarely used as an induction agent for the category one Caesarean section in our obstetric emergency theatres. Most obstetric anesthetists are using Propofol. Keep both Propofol and thiopentone(powder not withdrawn) in the cat one cesarean section emergency drugs tray ready until the department completely changes the practice protocol. A further retrospective study is required to compare the outcomes for these induction agents through the local database.Keywords: thiopentone, propofol, category 1 caesarean, induction agents
Procedia PDF Downloads 1426542 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 2996541 Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk
Authors: M. C. Arcuri, L. Gai, F. Ielasi
Abstract:
Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions.Keywords: banks, default risk, Italian guarantee fund, mutual guarantee institutions
Procedia PDF Downloads 173