Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4446

Search results for: security safe

2496 Influenza Vaccination Acceptance and Refusal Reasons among Tunisian Elderly

Authors: Ghassen Kharroubi, Ines Cherif, Leila Bouabid, Adel Gharbi, Aicha Boukthir, Margaret McCarron, Nissaf Ben Alaya, Afif Ben Salah, Jihene Bettaieb

Abstract:

Influenza vaccination (IV) is recommended for elderly persons, especially those with underlying conditions. In countries where IV rates in the elderly remain unsatisfactory, exploring attitudes of older persons toward the flu vaccine could be useful to identify barriers and facilitators to IV. The aim of this study was to determine the reasons for IV acceptance or decline in the Tunisian elderly. A national cross-sectional study was conducted in 2019, among persons aged 60 years and over with chronic disease. Data were collected using a standard administered questionnaire. Of the 1191 older persons included, 19.4% received the influenza vaccine in the 2018-2019 flu season. The two main reasons that may lead to refusal of vaccination were concerns that the vaccine could cause side effects (71.5%) and a belief that the vaccine was ineffective (33.9%). The main reason that may lead to accepting vaccination was a doctor’s recommendation (41.1%). Doctors were by far the most trusted source for information regarding influenza vaccine (91.5%) followed by pharmacists (17.6%). Our results highlighted the important role that doctors could play in promoting IV among the Tunisian elderly. Physicians should correct misconceptions about adverse events and the efficiency of the vaccine. In fact, influenza vaccines are generally effective and safe among older persons.

Keywords: attitudes, influenza vaccination, older persons, Tunisia

Procedia PDF Downloads 158
2495 Phytochemial Screening, Anti-Microbial and Mineral Determination of Brysocarpus coccineus Root

Authors: I. L. Ibrahim, A. Mann, A. Ndanaimi

Abstract:

The research involved phytochemical screening, antibacterial activities and mineral determination by flame photometry of the crude extract of Brysocarpus coccineus schum indeed were carried out. The result of Phytochemical screening reveal tha saponins, alkaloids, cardiac glycosides, and anthraquinones were present. This suggests that the plant extract could be used as anti-inflammatory and anti-bleeding agents. Estimation of mineral content shows that the crude extract of B. coccineus contains 0.73 (Na+), 1.06 (K+) and 1.98 (Ca+) which justifies its use to be safe for hypertensive patients and could be used to lower blood pressure. The antibacterial properties of aqueous and ethanol extract were studied against some bacteria; pseudomonas aeruginosa, Escherichia coli, Bacilus subtilis, Klebsilla penmuoniae by disc diffusion method. The aqueous extract showed significant activity against the organisms while the ethanol at concentrations 5-10mg/ml ethanol extract showed significant zone of inhibition against the organisms, E. coli, (19 mm), B. cereus (12 mm), P. aeruginosa (11 mm), K. pnemuoniae (11 mm). Minimum inhibitory concentration (MIC) was carried with considerable effect of inhibition on the organisms. The MIC values observed were 1, 24, 16 and 19 mm against E. coli, B. cereus, P. aeruginosa and K. pnemuoniae respectively. Therefore, the plant could be a potential source of antibacterial agent although more pharmacological and clinical study may be recommended.

Keywords: phytochemicals, microorganisms, screenings, mineral ions

Procedia PDF Downloads 419
2494 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 167
2493 Single Pole-To-Earth Fault Detection and Location on the Tehran Railway System Using ICA and PSO Trained Neural Network

Authors: Masoud Safarishaal

Abstract:

Detecting the location of pole-to-earth faults is essential for the safe operation of the electrical system of the railroad. This paper aims to use a combination of evolutionary algorithms and neural networks to increase the accuracy of single pole-to-earth fault detection and location on the Tehran railroad power supply system. As a result, the Imperialist Competitive Algorithm (ICA) and Particle Swarm Optimization (PSO) are used to train the neural network to improve the accuracy and convergence of the learning process. Due to the system's nonlinearity, fault detection is an ideal application for the proposed method, where the 600 Hz harmonic ripple method is used in this paper for fault detection. The substations were simulated by considering various situations in feeding the circuit, the transformer, and typical Tehran metro parameters that have developed the silicon rectifier. Required data for the network learning process has been gathered from simulation results. The 600Hz component value will change with the change of the location of a single pole to the earth's fault. Therefore, 600Hz components are used as inputs of the neural network when fault location is the output of the network system. The simulation results show that the proposed methods can accurately predict the fault location.

Keywords: single pole-to-pole fault, Tehran railway, ICA, PSO, artificial neural network

Procedia PDF Downloads 133
2492 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System

Authors: A. S. Walkey, N. P. Patidar

Abstract:

It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.

Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices

Procedia PDF Downloads 510
2491 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java

Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah

Abstract:

Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.

Keywords: exploitation, home batik industry, occupational health and safety, putting-out system

Procedia PDF Downloads 324
2490 Restriction on the Freedom of Economic Activity in the Polish Energy Law

Authors: Zofia Romanowska

Abstract:

Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.

Keywords: license, energy law, energy market, public goods, regulator

Procedia PDF Downloads 248
2489 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 488
2488 Secure Data Sharing of Electronic Health Records With Blockchain

Authors: Kenneth Harper

Abstract:

The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.

Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,

Procedia PDF Downloads 27
2487 The Interventional, Prospective, Real-World Post-Marketing Clinical Follow-Up Trial of a Polycarbophil Vaginal Moisturising Gel in Women Affected by Vaginal Dryness in Late Menopausal Transition and Postmenopause: A Triple Investigation

Authors: A. Cagnacci, D. F. Barattini, E. Casolati, M. Mangrella, E. Piccolo, S. Rosu, L. C. Pătrașcu

Abstract:

This Triple study aimed to evaluate the efficacy of polycarbophil vaginal gel (PCV) in treating symptoms of vaginal atrophy (VA) in peri- and post-menopausal women. Women in peri- (n=29) and postmenopause (n=54) diagnosed with VA were progressively enrolled and treated once a day for 30 days. Thereafter, those wishing to continue (n=73) received the PCV treatment for an additional 180 days. The vaginal health index (VHI) and vaginal dryness, irritation, and pain at intercourse, along with treatment safety, were evaluated at baseline, 30 days of treatment, and after additional 180 days. At baseline, the VHI (p<0.056) and VAS of vaginal dryness (p=0.0001,) irritation (p=0.002), and pain at intercourse (p=0.0001) were worse in postmenopausal women than in perimenopausal women. VHI and VA symptoms improved in all women, and after 30 days of PCV administration, they were similar between peri-and postmenopausal women. After an additional 180 days of treatment, VHI further increased (p=0.0001), VAS of all symptoms (P=0.0001) and the Global Symptom Score (P=0.0001) further decreased. The treatment was safe. Treatment with PCV improves VA symptoms in both peri- and post-menopausal women. Prolongation of treatment up to 6 months increases the efficacy of treatment with no side effects.

Keywords: late menopausal transition, postmenopause, polycarbophil, sexuality, vaginal dryness

Procedia PDF Downloads 57
2486 Analyzing the Effectiveness of a Bank of Parallel Resistors, as a Burden Compensation Technique for Current Transformer's Burden, Using LabVIEW™ Data Acquisition Tool

Authors: Dilson Subedi

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However, due to upgradation of electromechanical relays to numerical relays and electromechanical energy meters to digital meters, the connected burden, which defines some of the CT characteristics, has drastically reduced. This has led to the system experiencing high currents damaging the connected relays and meters. Since the protection and metering equipment's are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore, during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and on the reliability of the protection and metering system. This paper shows the effectiveness of a bank of parallel connected resistors, as a burden compensation technique, in compensating the burden of under-burdened CT’s. The response of the CT in the case of failure of one or more resistors at different levels of overcurrent will be captured using the LabVIEWTM data acquisition hardware (DAQ). The analysis is done on the real-time data gathered using LabVIEWTM. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, burden compensation, current transformer

Procedia PDF Downloads 248
2485 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances

Authors: Tydra Preyear, Victor Clincy

Abstract:

Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.

Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy

Procedia PDF Downloads 32
2484 Understanding the Experience of the Visually Impaired towards a Multi-Sensorial Architectural Design

Authors: Sarah M. Oteifa, Lobna A. Sherif, Yasser M. Mostafa

Abstract:

Visually impaired people, in their daily lives, face struggles and spatial barriers because the built environment is often designed with an extreme focus on the visual element, causing what is called architectural visual bias or ocularcentrism. The aim of the study is to holistically understand the world of the visually impaired as an attempt to extract the qualities of space that accommodate their needs, and to show the importance of multi-sensory, holistic designs for the blind. Within the framework of existential phenomenology, common themes are reached through "intersubjectivity": experience descriptions by blind people and blind architects, observation of how blind children learn to perceive their surrounding environment, and a personal lived blind-folded experience are analyzed. The extracted themes show how visually impaired people filter out and prioritize tactile (active, passive and dynamic touch), acoustic and olfactory spatial qualities respectively, and how this happened during the personal lived blind folded experience. The themes clarify that haptic and aural inclusive designs are essential to create environments suitable for the visually impaired to empower them towards an independent, safe and efficient life.

Keywords: architecture, architectural ocularcentrism, multi-sensory design, visually impaired

Procedia PDF Downloads 204
2483 Nanosilver Loaded Biomaterial for Wound Healing Applications: In Vitro Studies

Authors: Sathish Sundar Dhilip Kumar, Nicolette Houreld, Heidi Abrahamse

Abstract:

Silver nanoparticles (AgNPs) are classified as metal-based nanomaterials and have received considerable attention globally for wound healing and tissue engineering applications. Naturally available materials are a significant source of medicinal products to treat numerous diseases; polysaccharides are among them. Polysaccharides are non-toxic, safe, and inexpensive, and it has good biocompatibility and biodegradability. Most polysaccharides are shown to have a positive effect on wound healing processes, including chitosan and gum tragacanth. The present study evaluated the improvement of cellular wound healing by nanosilver-loaded polysaccharide-based biomaterial (CGT-NS) in WS1 cells. The physicochemical properties of prepared CGT-NS were studied using different characterization techniques, and it exhibited better stability and swelling properties in various pH conditions. Surface morphology was studied using scanning electron microscopy, and it revealed the porous morphology of the synthesized CGT-NS. The synthesized biomaterial displayed acceptable antibacterial properties against Gram-positive and Gram-negative bacterial strains, and it may prevent infection. The biocompatibility of the synthesized CGT-NS biomaterial was studied in WS1 cells, where it may lead to promote increased cell adhesion and proliferation properties. Thus, the CGT-NS biomaterial has good potential as a biomaterial in wound healing applications.

Keywords: biomaterial, wound healing, nano, silver nanoparticles

Procedia PDF Downloads 190
2482 Intraosseous Urography by Iodixanol in Persian Squirrels

Authors: Mehdi Tavana, Seyedeh Zeinab Peighambarzadeh

Abstract:

Excretory urography is used for morphologic and especially functional studies of the urinary tracts. There are many indications for excretory urography in humans and animals. Intravenous urography is the most practical method, other urography techniques were manipulated because of difficulties for finding veins in small size of the patients. At the best of times, the combination of small veins and abundant subcutaneous tissue make vascular access difficult or impossible, therefore, another methods of administration of contrast media is desired. This study was performed to evaluate the feasibility of intraosseous injection of iodixanol in providing a safe and diagnostic urogram in Persian squirrel. Fourteen hundreds mg iodine per kilogram body weight of iodixanol were injected subcutaneously over tibial tuberosity on ten clinically healthy adult Persian squirrels with no signs of urinary system disorder. Lateral and ventrodorsal radiographs were taken every 2 minutes until the pyelogram was finished. Intraosseous injection of iodixanol was successful to show nephrogram, pyelogram, uretrogram and cystogram clearly. There were no abnormal clinical signs after one week of experiments. Biochemical and hematological profiles were in normal ranges. It is concluded that intraosseous urography is an effective and reliable method for urography studies in squirrel. Microscopic examinations of the kidneys and the site of injection after one week were normal.

Keywords: intraosseous urography, iodixanol, Persian squirrel, morphologic

Procedia PDF Downloads 401
2481 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 92
2480 Phytochemial Screening, Anti-Microbial, and Minerals Determination of Leptadenia Hastata

Authors: I. L. Ibrahim, A. Mann, B. A. Adam

Abstract:

This project involved screening for antibacterial activity, phytochemical and mineral properties of Leptadenia hastata by flame photometry. The result of phytochemical screening reveals that the presence of flavonoids, tannins, saponins, alkaloids, steroidal, and anthraquinones while the cardiac glycoside was absent. This justifies the plant been used as anti-bleeding and anti-inflammatory agents. The result of flame photometry revealed that 1.85 % (Na), 0.65% (K) and 1.85 % (Ca) which indicates the safe nature of the plant extract as such could be used to lower high blood pressure. The antibacterial properties of both the aqueous and ethanolic extract were studied against some bacteria, Escherichia coli, Bacillus Cercus, Pseudomonas aeruginas, and Enterobacter aerogegens, by disc diffusion method and the result reveals that there are very good activities against the organism while the ethanolic extract at concentration 1.0 – 1.2 mg/ml. the ethanolic extract showed in considerable zone inhibition against bacteria’s; Escherichia coli, Bacillus Cercus, pseudomonas aeruginosa andklebsellapnemuoniae. Minimum inhibitory concentration (MIC) and minimum Bacterial concentration (MBC) were conducted with fairly good significant effect of inhibition on the organism, therefore, plant extract could be a potential source of antibacterial agent.

Keywords: antibacterial activity, Leptadenia hastata, infectious diseases, phytochemical screening

Procedia PDF Downloads 590
2479 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 703
2478 Cuckoo Search Optimization for Black Scholes Option Pricing

Authors: Manas Shah

Abstract:

Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).

Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm

Procedia PDF Downloads 457
2477 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 261
2476 An E-Retailing System Architecture Based on Cloud Computing

Authors: Chanchai Supaartagorn

Abstract:

E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.

Keywords: architecture, cloud computing, e-retailing, internet-based

Procedia PDF Downloads 399
2475 Laparoscopic Management of Small Bowel Obstruction: An Unusual Case of Mechanical Obstruction Due to Appendiceal Adhesions

Authors: Veera J. Allu, Shreya Pal, Anang Pangeni

Abstract:

Introduction: Adhesive small bowel obstruction (ASBO) is usually managed conservatively. Failed conservative management leads to operative intervention by an open approach. However, laparoscopic management of ASBO is increasingly being reported in the literature. We report an unusual case of ASBO secondary to a band from the appendicular tip which was managed laparoscopically. Case Description: This patient was a 61-year-old female, otherwise fit and healthy, presenting with abdominal pain and mild distension with vomiting of 3 days duration. She had undergone ultrasound-guided drainage of an appendicular abscess three months ago and laparoscopic right inguinal hernia repair (TEP) in the past. CTAP showed small bowel obstruction with a transition point in the pelvis and the possible cause being adhesions. She was initially managed conservatively; however, as she was not improving for two days, she was consented to diagnostic laparoscopy. Intraoperatively, an adhesive band was found between the appendicular tip and distal ileum around 100cm proximal to the ileocolic junction, resulting in mechanical bowel obstruction. Laparoscopic division of band was performed, followed by appendicectomy, and the patient had an uneventful recovery and was discharged on postoperative day 1. Conclusion: In highly selected patients and with appropriate expertise, laparoscopic management of ASBO is feasible and safe.

Keywords: bowel obstruction, adhesions, laparoscopy, open procedure

Procedia PDF Downloads 90
2474 Exploring Social Impact of Emerging Technologies from Futuristic Data

Authors: Heeyeul Kwon, Yongtae Park

Abstract:

Despite the highly touted benefits, emerging technologies have unleashed pervasive concerns regarding unintended and unforeseen social impacts. Thus, those wishing to create safe and socially acceptable products need to identify such side effects and mitigate them prior to the market proliferation. Various methodologies in the field of technology assessment (TA), namely Delphi, impact assessment, and scenario planning, have been widely incorporated in such a circumstance. However, literatures face a major limitation in terms of sole reliance on participatory workshop activities. They unfortunately missed out the availability of a massive untapped data source of futuristic information flooding through the Internet. This research thus seeks to gain insights into utilization of futuristic data, future-oriented documents from the Internet, as a supplementary method to generate social impact scenarios whilst capturing perspectives of experts from a wide variety of disciplines. To this end, network analysis is conducted based on the social keywords extracted from the futuristic documents by text mining, which is then used as a guide to produce a comprehensive set of detailed scenarios. Our proposed approach facilitates harmonized depictions of possible hazardous consequences of emerging technologies and thereby makes decision makers more aware of, and responsive to, broad qualitative uncertainties.

Keywords: emerging technologies, futuristic data, scenario, text mining

Procedia PDF Downloads 495
2473 Genetic-Environment Influences on the Cognitive Abilities of 6-to-8 Years Old Twins

Authors: Annu Panghal, Bimla Dhanda

Abstract:

This research paper aims to determine the genetic-environment influences on the cognitive abilities of twins. Using the 100 pairs of twins from two districts, namely: Bhiwani (N = 90) and Hisar (N = 110) of Haryana State, genetic and environmental influences were assessed in twin study design. The cognitive abilities of twins were measured using the Wechsler Intelligence Scale for Children (WISC-R). Home Observation for Measurement of the Environment (HOME) Inventory was taken to examine the home environment of twins. Heritability estimate was used to analyze the genes contributing to shape the cognitive abilities of twins. The heritability estimates for cognitive abilities of 6-7 years old twins in Hisar district were 74% and in Bhiwani District 76%. Further the heritability estimates were 64% in the twins of Hisar district and 60 in Bhiwani district % in the age group of 7-8 years. The remaining variations in the cognitive abilities of twins were due to environmental factors namely: provision for Active Stimulation, paternal involvement, safe physical environment. The findings provide robust evidence that the cognitive abilities were more influenced by genes than the environmental factors and also revealed that the influence of genetic was more in the age group 6-7 years than the age group 7-8 years. The conclusion of the heritability estimates indicates that the genetic influence was more in the age group of 6-7 years than the age group of 7-8 years. As the age increases the genetic influence decreases and environment influence increases. Mother education was strongly associated with the cognitive abilities of twins.

Keywords: genetics, heritability, twins, environment, cognitive abilities

Procedia PDF Downloads 143
2472 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 246
2471 Learn Better to Earn Better: Importance of CPD in Dentistry

Authors: Junaid Ahmed, Nandita Shenoy

Abstract:

Maintaining lifelong knowledge and skills is essential for safe clinical practice. Continuing Professional Development (CPD) is an established method that can facilitate lifelong learning. It focuses on maintaining or developing knowledge, skills and relationships to ensure competent practice.To date, relatively little has been done to comprehensively and systematically synthesize evidence to identify subjects of interest among practising dentist. Hence the aim of our study was to identify areas in clinical practice that would be favourable for continuing professional dental education amongst practicing dentists. Participants of this study consisted of the practicing dental surgeons of Mangalore, a city in Dakshina Kannada, Karnataka. 95% of our practitioners felt that regular updating as a one day program once in 3-6 months is required, to keep them abreast in clinical practice. 60% of subjects feel that CPD programs enrich their theoretical knowledge and helps in patient care. 27% of them felt that CPD programs should be related to general dentistry. Most of them felt that CPD programs should not be charged nominally between one to two thousand rupees. The acronym ‘CPD’ should be seen in a broader view in which professionals continuously enhance not only their knowledge and skills, but also their thinking,understanding and maturity; they grow not only as professionals, but also as persons; their development is not restricted to their work roles, but may also extend to new roles and responsibilities.

Keywords: continuing professional development, competent practice, dental education, practising dentist

Procedia PDF Downloads 264
2470 High Frequency Rotary Transformer Used in Synchronous Motor/Generator of Flywheel Energy Storage System

Authors: J. Lu, H. Li, F. Cole

Abstract:

This paper proposes a high-frequency rotary transformer (HFRT) for a separately excited synchronous machine (SESM) used in a flywheel energy storage system. The SESM can eliminate and reduce rare earth permanent magnet (REPM) usage and provide a better performance in renewable energy systems. However, the major drawback of such SESM is the necessity of brushes and slip rings to supply the field current, which increases the maintenance cost and operation reliability. To overcome these problems, an HFRT integrated with SiC semiconductor devices can replace brushes and slip rings in the SESM. The proposed HFRT features a high-frequency magnetic ferrite for both the stationary part as the transformer primary and the rotating part as the transformer secondary, as well as an air gap, allowing safe operation at high rotational speeds. Hence, this rotary transformer can enable the adoption of a wound rotor synchronous machine (WRSM). The HFRT, working at over 100kHz operating frequency, exhibits excellent performance of power efficiency and significant size reduction. The experimental validations to support the theoretical findings have been provided.

Keywords: brushes and slip rings, flywheel energy storage, high frequency rotary transformer, separately excited synchronous machine

Procedia PDF Downloads 51
2469 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 528
2468 Additional Usage of Remdesivir with the Standard of Care in Patients with Moderate And Severe COVID-19: A Tertiary Hospital’s Experience

Authors: Pugazhenthan Thangaraju

Abstract:

Background: Since the pandemic began, more than millions of people have become infected with COVID-19. Globally, researchers are working for safe and effective treatments for this disease. Remdesivir is a drug that has been approved for the treatment of COVID-19. Many aspects are still being considered that may influence the future use of remdesivir. Aim: To assess the safety and efficacy of Remdesivir in hospitalized adult patients diagnosed with moderate and severe COVID-19. Methods: It was a record-based retrospective cohort study conducted between April 1st, 2020 and June 30th, 2021 at the tertiary care teaching hospital All India Institutes of Medical Sciences (AIIMS), Raipur Results: There were a total of 10,559 medical records of COVID-19 patients of which 1034 records were included in this study. Overall, irrespective of the survival status, there was statistical significant difference observed between the WHO score at the time of admission and discharge. Clinical improvement among the survivors was found to be statistically significant. Conclusion: Remdesivir's potential efficacy against coronaviruses has so far been limited to in vitro studies and animal models. However, information about COVID-19 is rapidly expanding. Several clinical trials for the treatment of COVID-19 with remdesivir are now underway. However, the findings of this study support remdesivir as a promising agent in the fight against SARS-CoV-2.

Keywords: Remdesivir, COVID-19, SARS-CoV-2, antiviral, RNA-dependent RNA polymerase, viral pneumonia

Procedia PDF Downloads 68
2467 Craniopharyngiomas: Surgical Techniques: The Combined Interhemispheric Sub-Commissural Translaminaterminalis Approach to Tumors in and Around the Third Ventricle: Neurological and Functional Outcome

Authors: Pietro Mortini, Marco Losa

Abstract:

Objective: Resection of large lesions growing into the third ventricle remains a demanding surgery, sometimes at risk of severe post-operative complications. Transcallosal and transcortical routes were considered as approaches of choice to access the third ventricle, however neurological consequences like memory loss have been reported. We report clinical results of the previously described combined interhemispheric sub-commissural translaminaterminalis approach (CISTA) for the resection of large lesions located in the third ventricle. Methods: Authors conducted a retrospective analysis on 10 patients, who were operated through the CISTA, for the resection of lesions growing into the third ventricle. Results: Total resection was achieved in all cases. Cognitive worsening occurred only in one case. No perioperative deaths were recorded and, at last follow-up, all patients were alive. One year after surgery 80% of patients had an excellent outcome with a KPS 100 and Glasgow Outcome score (GOS) Conclusion: The CISTA represents a safe and effective alternative to transcallosal and transcortical routes to resect lesions growing into the third ventricle. It allows for a multiangle trajectory to access the third ventricle with a wide working area free from critical neurovascular structures, without any section of the corpus callosum, the anterior commissure and the fornix.

Keywords: craniopharingioma, surgery, sub-commissural translaminaterminalis approach (CISTA),

Procedia PDF Downloads 293