Search results for: human factor in security
13123 Soft Exoskeleton Elastomer Pre-Tension Drive Control System
Authors: Andrey Yatsun, Andrei Malchikov
Abstract:
Exoskeletons are used to support and compensate for the load on the human musculoskeletal system. Elastomers are an important component of exoskeletons, providing additional support and compensating for the load. The algorithm of the active elastomer tension system provides the required auxiliary force depending on the angle of rotation and the tilt speed of the operator's torso. Feedback for the drive is provided by a force sensor integrated into the attachment of the exoskeleton vest. The use of direct force measurement ensures the required accuracy in all settings of the man-machine system. Non-adjustable elastic elements make it difficult to move without load, tilt forward and walk. A strategy for the organization of the auxiliary forces management system is proposed based on the allocation of 4 operating modes of the human-machine system.Keywords: soft exoskeleton, mathematical modeling, pre-tension elastomer, human-machine interaction
Procedia PDF Downloads 6613122 Co-Existence of Central Serous Retinopathy and Diabetic Retinopathy: A Diagnostic Dilemma
Authors: Avantika Verma
Abstract:
Diabetic retinopathy (DR) and Central serous retinopathy (CSR) are 2 distinct entities, with difference in age of presentation, eitiopathogenesis and clinical features, but when occurring together, can be a diagnostic dilemma and requires careful evaluation. Case study of 3 patients with long standing diabetes (>15yrs) and features of Central serous retinopathy was done at Bangalore West Lions Superspeciality Eye Hospital, Bangalore, India in 2013. Even though diabetic retinopathy and CSR have different pathologies, they can coexist. The reason for coexistence could be the following: A patient with CSR as a young adult could develop DR in later years. Stress could be the contributing factor in older patient with diabetes.Stress could be a common factor for both, as it is one of the important factors in the pathogenesis of Maturity Onset Diabetes Miletus (MODY). In any situation, a careful evaluation is necessary to differentiate the cause of fundus picture, as treatment differs for the two diseases.Keywords: central serous retinopathy, diabetic retinopathy, existence, stress
Procedia PDF Downloads 22813121 Understanding Health Behavior Using Social Network Analysis
Authors: Namrata Mishra
Abstract:
Health of a person plays a vital role in the collective health of his community and hence the well-being of the society as a whole. But, in today’s fast paced technology driven world, health issues are increasingly being associated with human behaviors – their lifestyle. Social networks have tremendous impact on the health behavior of individuals. Many researchers have used social network analysis to understand human behavior that implicates their social and economic environments. It would be interesting to use a similar analysis to understand human behaviors that have health implications. This paper focuses on concepts of those behavioural analyses that have health implications using social networks analysis and provides possible algorithmic approaches. The results of these approaches can be used by the governing authorities for rolling out health plans, benefits and take preventive measures, while the pharmaceutical companies can target specific markets, helping health insurance companies to better model their insurance plans.Keywords: breadth first search, directed graph, health behaviors, social network analysis
Procedia PDF Downloads 47113120 Automatic Speech Recognition Systems Performance Evaluation Using Word Error Rate Method
Authors: João Rato, Nuno Costa
Abstract:
The human verbal communication is a two-way process which requires a mutual understanding that will result in some considerations. This kind of communication, also called dialogue, besides the supposed human agents it can also be performed between human agents and machines. The interaction between Men and Machines, by means of a natural language, has an important role concerning the improvement of the communication between each other. Aiming at knowing the performance of some speech recognition systems, this document shows the results of the accomplished tests according to the Word Error Rate evaluation method. Besides that, it is also given a set of information linked to the systems of Man-Machine communication. After this work has been made, conclusions were drawn regarding the Speech Recognition Systems, among which it can be mentioned their poor performance concerning the voice interpretation in noisy environments.Keywords: automatic speech recognition, man-machine conversation, speech recognition, spoken dialogue systems, word error rate
Procedia PDF Downloads 32213119 Human Computer Interaction Using Computer Vision and Speech Processing
Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas
Abstract:
Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android
Procedia PDF Downloads 36213118 Prevalence and Associated Factors of Chronic Energy Malnutrition among Human Immune Deficiency Virus Infected Pregnant Women in Health Centers of Addis Ababa, Ethiopia
Authors: Getachew Adugna
Abstract:
Background: Chronic energy malnutrition and human immune deficiency virus among pregnant women are highly prevalent in Sub-Saharan Africa, and they are interrelated in a vicious cycle. However, the prevalence of chronic energy malnutrition and its determinant factors among human immune deficiency virus-positive pregnant women is not well studied in Ethiopia and Addis Ababa in particular. Objective: To determine the prevalence & associated factors of chronic energy malnutrition among human immune deficiency virus-positive pregnant women in health centres of Addis Ababa Ethiopia. Methods: An institution-based cross-sectional study was conducted and a systematic random sampling technique was used to select study subjects. A total of 253 study subjects were enrolled in the study—a structured and pre-tested questionnaire collected sociodemographic, maternal health-related, and nutritional-related variables. MUAC measurements were taken and medical charts were reviewed. Bi-variable and multi-variable logistic regression analyses were used to assess the effect of different factors on chronic energy malnutrition. Result: The overall prevalence of chronic energy malnutrition was 32.0%. It was significantly associated with dietary counselling (AOR: 0.062; 95%CI: 0.007, 0.549), CD4 level (AOR: 0.219; 95%CI: 0.025, 1.908), and clinical stage (AOR: 0.127; 95%CI: 0.053, 0.305). Conclusions: The prevalence of chronic energy malnutrition among Human Immune deficiency virus-infected pregnant women in Addis Ababa was high and Nutritional Intervention should be an integral part of the HIV care program.Keywords: chronic energy malnutrition, HIV, MUAC, Addis Ababa
Procedia PDF Downloads 7713117 The Impact of Online Advertising on Consumer Purchase Behaviour Based on Malaysian Organizations
Authors: Naser Zourikalatehsamad, Seyed Abdorreza Payambarpour, Ibrahim Alwashali, Zahra Abdolkarimi
Abstract:
The paper aims to evaluate the effect of online advertising on consumer purchase behavior in Malaysian organizations. The paper has potential to extend and refine theory. A survey was distributed among Students of UTM university during the winter 2014 and 160 responses were collected. Regression analysis was used to test the hypothesized relationships of the model. Result shows that the predictors (cost saving factor, convenience factor and customized product or services) have positive impact on intention to continue seeking online advertising.Keywords: consumer purchase, convenience, customized product, cost saving, customization, flow theory, mass communication, online advertising ads, online advertising measurement, online advertising mechanism, online intelligence system, self-confidence, willingness to purchase
Procedia PDF Downloads 48113116 The Effect of Artificial Intelligence on Autism Attitudes and Laws
Authors: Nermin Noshi Esraeil Abdalla
Abstract:
Inclusive schooling offerings for college kids with Autism stays in its early developmental levels in Thailand. despite many greater youngsters with autism are attending schools since the Thai authorities brought the training Provision for human beings with Disabilities Act in 2008, the services students with autism and their families obtain are typically missing. This quantitative examine used attitude and Preparedness to educate college students with Autism Scale (APTSAS) to investigate 110 number one faculty teachers’ attitude and preparedness to educate college students with autism inside the widespread training school room. Descriptive statistical evaluation of the records discovered that scholar behavior changed into the most good sized factor in constructing teachers’ terrible attitudes students with autism. the majority of teachers additionally indicated that their pre-service schooling did not put together them to fulfill the mastering needs of children with autism especially, folks who are non-verbal. The take a look at is substantial and offers path for enhancing trainer education for inclusivity in Thailand.Keywords: attitude, autism, teachers, sports activities, movement skills, motor skills
Procedia PDF Downloads 2213115 Analysis of Developments in the Understanding of In-Service Training in Turkish Public Administration: Personnel Management to Human Resource Management
Authors: Sema Müge Özdemiray
Abstract:
In line with the new public management approach to provide effective and efficient services necessary to achieve the social goals of public institutions, employees must have the knowledge and skills required by the age. In conjunction with the transition from personnel management to human resources management, it is seen that there is a change in the understanding of in-service training, the understanding of "required in-service training" has switched to the understanding of "continuous in-service training". However, in terms of in-service training in Turkey, it seems to be trouble at the point of adopting to change. The main purpose of this study is to primarily create a conceptual framework of in-service training and subsequently determine, analyze and discuss the developments and problems faced by in-service training in Turkey in the transition from personnel management to human resources management. In accordance with this purpose, the necessary data of this study were collected using qualitative approaches. Observation and document analysis was used and content analysis was performed on the data gathered in the study. The results of this study, according to data such as the number of institutions requesting in-service training, allocated budget of in-service training, the number of people participating in such training, transition of personnel management to human resources management should not lead to a paradigm shift in Turkey’s understanding of in-service training, although this is compulsory for public institutions in accordance with the law in Turkey. In-service training in Turkish public administration is still not implemented effectively and is seen as a social activity for employees and a formality for institutions.Keywords: Human resources management, in service training, personnel management, public institutions
Procedia PDF Downloads 31913114 Paucity of Trauma Literature from a Highly Burdened Developing Country
Authors: Rizwan Sultan, Hasnain Zafar
Abstract:
Trauma is the leading cause of death among young population not only in USA but Pakistan as well. The high prevalence of disease should result in larger amount of data and larger number of publications resulting in exploring room for improvement in the field. We aimed to review trauma literature generated from Pakistan in journals indexed with PubMed from January 2010 to December 2014. Search using term “Trauma AND Pakistan” filtering for relevant dates and species human was done on Pubmed. The abstracts and articles were reviewed by the authors to collect data on a preformed performa. 114 articles were published from Pakistan during these 5 years. 64% articles were published in international journals. 63% articles were published in journals with impact factor less than 1. 54% articles were published from one of the four provinces of Pakistan. 64% of articles provided level 4 while 14% articles provided level 5 evidence on the topic. 55% articles discussed epidemiology in non-representative populations. Trauma literature from Pakistan is not only lacking significantly but is also of poor quality and is unable to offer conclusions on this particular subject. There is a lot of space for improvement in the upcoming years.Keywords: trauma, literature, Pakistan, level of evidence
Procedia PDF Downloads 33113113 Key Factors Influencing Individual Knowledge Capability in KIFs
Authors: Salman Iqbal
Abstract:
Knowledge management (KM) literature has mainly focused on the antecedents of KM. The purpose of this study is to investigate the effect of specific human resource management (HRM) practices on employee knowledge sharing and its outcome as individual knowledge capability. Based on previous literature, a model is proposed for the study and hypotheses are formulated. The cross-sectional dataset comes from a sample of 19 knowledge intensive firms (KIFs). This study has run an item parceling technique followed by Confirmatory Factor Analysis (CFA) on the latent constructs of the research model. Employees’ collaboration and their interpersonal trust can help to improve their knowledge sharing behaviour and knowledge capability within organisations. This study suggests that in future, by using a larger sample, better statistical insight is possible. The findings of this study are beneficial for scholars, policy makers and practitioners. The empirical results of this study are entirely based on employees’ perceptions and make a significant research contribution, given there is a dearth of empirical research focusing on the subcontinent.Keywords: employees’ collaboration, individual knowledge capability, knowledge sharing, monetary rewards, structural equation modelling
Procedia PDF Downloads 27513112 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 14513111 Evaluating and Prioritizing the Effective Management Factors of Human Resources Empowerment and Efficiency in Manufacturing Companies: A Case Study on Fars’ Livestock and Poultry Manufacturing Companies
Authors: Mohsen Yaghmor, Sima Radmanesh
Abstract:
Rapid environmental changes have been threatening the life of many organizations. Enabling and productivity of human resource should be considered as the most important issue in order to increase performance and ensure survival of the organizations. In this research, the effectiveness of management factory in productivity and inability of human resource have been identified and reviewed at glance. Afterwards, answers were sought to questions "What are the factors effecting productivity and enabling of human resource?" and "What are the priority order based on effective management of human resource in Fars Poultry Complex?". A specified questionnaire has been designed regarding the priorities and effectiveness of the identified factors. Six factors were specified consisting of: individual characteristics, teaching, motivation, partnership management, authority or power submission and job development that have most effect on organization. Then a questionnaire was specified for priority and effect measurement of specified factors that were reached after collecting information and using statistical tests of Keronchbakh alpha coefficient r = 0.792, so that we can say the questionnaire has sufficient reliability. After information analysis of specified six factors by Friedman test their effects were categorized. Measurement on organization respectively consists of individual characteristics, job development or enrichment, authority submission, partnership management, teaching and motivation. Lastly, approaches has been introduced to increase productivity of manpower.Keywords: productivity, empowerment, enrichment, authority submission, partnership management, teaching, motivation
Procedia PDF Downloads 26513110 The Impact of the General Data Protection Regulation on Human Resources Management in Schools
Authors: Alexandra Aslanidou
Abstract:
The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.Keywords: general data protection regulation, human resource management, educational system
Procedia PDF Downloads 10013109 Characterization of the Catalytic and Structural Roles of the Human Hexokinase 2 in Cancer Progression
Authors: Mir Hussain Nawaz, Lyudmila Nedyalkova, Haizhong Zhu, Wael M. Rabeh
Abstract:
In this study, we aim to biochemically and structurally characterize the interactions of human HK2 with the mitochondria in addition to the role of its N-terminal domain in catalysis and stability of the full-length enzyme. Here, we solved the crystal structure of human HK2 in complex with glucose and glucose-6-phosphate (PDB code: 2NZT), where it is a homodimer with catalytically active N- and C-terminal domains linked by a seven-turn α-helix. Different from the inactive N-terminal domains of isozymes 1 and 3, the N- domain of HK2 not only capable to catalyze a reaction but it is responsible for the thermodynamic stabilizes of the full-length enzyme. Deletion of first α-helix of the N-domain that binds to the mitochondria altered the stability and catalytic activity of the full-length HK2. In addition, we found the linker helix between the N- and C-terminal domains to play an important role in controlling the catalytic activity of the N-terminal domain. HK2 is a major step in the regulation of glucose metabolism in cancer making it an ideal target for the development of new anticancer therapeutics. Characterizing the structural and molecular mechanisms of human HK2 and its role in cancer metabolism will accelerate the design and development of new cancer therapeutics that are safe and cancer specific.Keywords: cancer metabolism, enzymology, drug discovery, protein stability
Procedia PDF Downloads 26313108 Provisional Settlements and Urban Resilience: The Transformation of Refugee Camps into Cities
Authors: Hind Alshoubaki
Abstract:
The world is now confronting a widespread urban phenomenon: refugee camps, which have mostly been established in ‘rushing mode,’ pointing toward affording temporary settlements for refugees that provide them with minimum levels of safety, security and protection from harsh weather conditions within a very short time period. In fact, those emergency settlements are transforming into permanent ones since time is a decisive factor in terms of construction and camps’ age. These play an essential role in transforming their temporary character into a permanent one that generates deep modifications to the city’s territorial structure, shaping a new identity and creating a contentious change in the city’s form and history. To achieve a better understanding for the transformation of refugee camps, this study is based on a mixed-methods approach: the qualitative approach explores different refugee camps and analyzes their transformation process in terms of population density and the changes to the city’s territorial structure and urban features. The quantitative approach employs a statistical regression analysis as a reliable prediction of refugees’ satisfaction within the Zaatari camp in order to predict its future transformation. Obviously, refugees’ perceptions of their current conditions will affect their satisfaction, which plays an essential role in transforming emergency settlements into permanent cities over time. The test basically discusses five main themes: the access and readiness of schools, the dispersion of clinics and shopping centers; the camp infrastructure, the construction materials, and the street networks. The statistical analysis showed that Syrian refugees were not satisfied with their current conditions inside the Zaatari refugee camp and that they had started implementing changes according to their needs, desires, and aspirations because they are conscious about the fact of their prolonged stay in this settlement. Also, the case study analyses showed that neglecting the fact that construction takes time leads settlements being created with below-minimum standards that are deteriorating and creating ‘slums,’ which lead to increased crime rates, suicide, drug use and diseases and deeply affect cities’ urban tissues. For this reason, recognizing the ‘temporary-eternal’ character of those settlements is the fundamental concept to consider refugee camps from the beginning as definite permanent cities. This is the key factor to minimize the trauma of displacement on both refugees and the hosting countries. Since providing emergency settlements within a short time period does not mean using temporary materials, having a provisional character or creating ‘makeshift cities.’Keywords: refugee, refugee camp, temporary, Zaatari
Procedia PDF Downloads 13313107 Human Rights as Part of the Core Values System of International Organisations: A Comparative Study
Authors: Ayyoub Jamali, Jennie Edlund, Alena Kozlová
Abstract:
This paper evaluates the monitoring, prevention, and enforcing mechanisms of the core values of international organisations (IOs) in a comparative human rights perspective. The IOs in focus are the European Union, the Council of Europe, the African Union, and the Organization of American States. The paper will take the founding treaties of these IOs and their relevant protocols as a starting point to identify the values and the mechanisms used for their implementation. It will explore the scope of violations, the procedures in place and evaluate what type of response to those breaches seems to work best in terms of achieving its declared objectives. The study will identify and compare the weaknesses and strengths of each mechanism used by the IOs and recognize common challenges and means, thereby drawing inter-organizational comparisons. Consequently, the findings of this paper can be used among the IOs to improve their system and thus enhance their effectiveness.Keywords: international organizations, core values, human rights, enforcement mechanism, compliance
Procedia PDF Downloads 18013106 From Protector to Violator: Assessing State's Role in Protecting Freedom of Religion in Indonesia
Authors: Manotar Tampubolon
Abstract:
Indonesia is a country that upholds the law, human rights and religious freedom. The freedom that implied in various laws and constitution (Undang-undang 1945) is not necessarily applicable in practice of religious life. In one side, the state has a duty as protector and guarantor of freedom, on the other side, however, it turns into one of the actors of freedom violations of religion minority. State action that interferes freedom of religion is done in various ways both intentionally or negligently or not to perform its obligations in the enforcement of human rights (human rights due diligence). Besides the state, non-state actors such as religious organizations, individuals also become violators of the rights of religious freedom. This article will discuss two fundamental issues that interfere freedom of religion in Indonesia after democratic era. In addition, this article also discusses a comprehensive state policy that discriminates minority religions to manifest their faith.Keywords: religious freedom, constitution, minority faith, state actor
Procedia PDF Downloads 40313105 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 16213104 Urgent Need for E -Waste Management in Mongolia
Authors: Enkhjargal Bat-Ochir
Abstract:
The global market of electrical and electronic equipment (EEE) has increasing rapidly while the lifespan of these products has become increasingly shorter. So, e-waste is becoming the world’s fastest growing waste stream. E-waste is a huge problem when it’s not properly disposed of, as these devices contain substances that are harmful to the environment and to human health as they contaminate the land, water, and air. This paper tends to highlight e-waste problem and harmful effects and can grasp the extent of the problem and take the necessary measures to solve it in Mongolia and to improve standards and human health.Keywords: e -waste, recycle, electrical, Mongolia
Procedia PDF Downloads 41913103 Copper Chelation by 3-(Bromoacetyl) Coumarin Derivative Induced Apoptosis in Cancer Cells: Influence of Copper Chelation Strategy in Cancer Treatment
Authors: Saman Khan, Imrana Naseem
Abstract:
Copper is an essential trace element required for pro-angiogenic co-factors including vascular endothelial growth factor (VEGF). Elevated levels of copper are found in various types of cancer including prostrate, colon, breast, lung and liver for angiogensis and metastasis. Therefore, targeting copper via copper-specific chelators in cancer cells can be developed as effective anticancer treatment strategy. In continuation of our pursuit to design and synthesize copper chelators, herein we opted for a reaction to incorporate di-(2-picolyl) amine in 3-(bromoacetyl) coumarin (parent backbone) for the synthesis of complex 1. We evaluated lipid peroxidation, protein carbonylation, ROS generation, DNA damage and consequent apoptosis by complex 1 in exogenously added Cu(II) in human peripheral lymphocytes (simulate malignancy condition). Results showed that Cu(II)-complex 1 interaction leads to cell proliferation inhibition, apoptosis, ROS generation and DNA damage in human lymphocytes, and these effects were abrogated by cuprous chelator neocuproine and ROS scavengers (thiourea, catalase, SOD). This indicates that complex 1 cytotoxicity is due to redox cycling of copper to generate ROS which leads to pro-oxidant cell death in cancer cells. To further confirm our hypothesis, using the rat model of diethylnitrosamine (DEN) induced hepatocellular carcinoma; we showed that complex 1 mediates DNA breakage and cell death in isolated carcinoma cells. Membrane permeant copper chelator, neocuproine, and ROS scavengers inhibited the complex 1-mediated cellular DNA degradation and apoptosis. In summary, complex 1 anticancer activity is due to its copper chelation capability. These results will provide copper chelation as an effective targeted cancer treatment strategy for selective cytotoxic action against malignant cells without affecting normal cells.Keywords: cancer treatment, copper chelation, ROS generation, DNA damage, redox cycling, apoptosis
Procedia PDF Downloads 29213102 Analysis of Matching Pursuit Features of EEG Signal for Mental Tasks Classification
Authors: Zin Mar Lwin
Abstract:
Brain Computer Interface (BCI) Systems have developed for people who suffer from severe motor disabilities and challenging to communicate with their environment. BCI allows them for communication by a non-muscular way. For communication between human and computer, BCI uses a type of signal called Electroencephalogram (EEG) signal which is recorded from the human„s brain by means of an electrode. The electroencephalogram (EEG) signal is an important information source for knowing brain processes for the non-invasive BCI. Translating human‟s thought, it needs to classify acquired EEG signal accurately. This paper proposed a typical EEG signal classification system which experiments the Dataset from “Purdue University.” Independent Component Analysis (ICA) method via EEGLab Tools for removing artifacts which are caused by eye blinks. For features extraction, the Time and Frequency features of non-stationary EEG signals are extracted by Matching Pursuit (MP) algorithm. The classification of one of five mental tasks is performed by Multi_Class Support Vector Machine (SVM). For SVMs, the comparisons have been carried out for both 1-against-1 and 1-against-all methods. Procedia PDF Downloads 27813101 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 14113100 Biomolecules Based Microarray for Screening Human Endothelial Cells Behavior
Authors: Adel Dalilottojari, Bahman Delalat, Frances J. Harding, Michaelia P. Cockshell, Claudine S. Bonder, Nicolas H. Voelcker
Abstract:
Endothelial Progenitor Cell (EPC) based therapies continue to be of interest to treat ischemic events based on their proven role to promote blood vessel formation and thus tissue re-vascularisation. Current strategies for the production of clinical-grade EPCs requires the in vitro isolation of EPCs from peripheral blood followed by cell expansion to provide sufficient quantities EPCs for cell therapy. This study aims to examine the use of different biomolecules to significantly improve the current strategy of EPC capture and expansion on collagen type I (Col I). In this study, four different biomolecules were immobilised on a surface and then investigated for their capacity to support EPC capture and proliferation. First, a cell microarray platform was fabricated by coating a glass surface with epoxy functional allyl glycidyl ether plasma polymer (AGEpp) to mediate biomolecule binding. The four candidate biomolecules tested were Col I, collagen type II (Col II), collagen type IV (Col IV) and vascular endothelial growth factor A (VEGF-A), which were arrayed on the epoxy-functionalised surface using a non-contact printer. The surrounding area between the printed biomolecules was passivated with polyethylene glycol-bisamine (A-PEG) to prevent non-specific cell attachment. EPCs were seeded onto the microarray platform and cell numbers quantified after 1 h (to determine capture) and 72 h (to determine proliferation). All of the extracellular matrix (ECM) biomolecules printed demonstrated an ability to capture EPCs within 1 h of cell seeding with Col II exhibiting the highest level of attachment when compared to the other biomolecules. Interestingly, Col IV exhibited the highest increase in EPC expansion after 72 h when compared to Col I, Col II and VEGF-A. These results provide information for significant improvement in the capture and expansion of human EPC for further application.Keywords: biomolecules, cell microarray platform, cell therapy, endothelial progenitor cells, high throughput screening
Procedia PDF Downloads 29113099 Identification of Disease Causing DNA Motifs in Human DNA Using Clustering Approach
Authors: G. Tamilpavai, C. Vishnuppriya
Abstract:
Studying DNA (deoxyribonucleic acid) sequence is useful in biological processes and it is applied in the fields such as diagnostic and forensic research. DNA is the hereditary information in human and almost all other organisms. It is passed to their generations. Earlier stage detection of defective DNA sequence may lead to many developments in the field of Bioinformatics. Nowadays various tedious techniques are used to identify defective DNA. The proposed work is to analyze and identify the cancer-causing DNA motif in a given sequence. Initially the human DNA sequence is separated as k-mers using k-mer separation rule. The separated k-mers are clustered using Self Organizing Map (SOM). Using Levenshtein distance measure, cancer associated DNA motif is identified from the k-mer clusters. Experimental results of this work indicate the presence or absence of cancer causing DNA motif. If the cancer associated DNA motif is found in DNA, it is declared as the cancer disease causing DNA sequence. Otherwise the input human DNA is declared as normal sequence. Finally, elapsed time is calculated for finding the presence of cancer causing DNA motif using clustering formation. It is compared with normal process of finding cancer causing DNA motif. Locating cancer associated motif is easier in cluster formation process than the other one. The proposed work will be an initiative aid for finding genetic disease related research.Keywords: bioinformatics, cancer motif, DNA, k-mers, Levenshtein distance, SOM
Procedia PDF Downloads 18813098 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 40413097 HLA-G, a Neglected Immunosuppressive Checkpoint for Breast Cancer Immunotherapy
Authors: Xian-Peng Jiang, Catherine C. Baucom, Toby Jiang, Robert L. Elliott
Abstract:
HLA-G binds to the inhibitory receptors of uterine NK cells and plays an important role in protection of fetal cells from maternal NK lysis. HLA-G also mediates tumor escape, but the immunosuppressive role is often neglected. These studies have focused on the examination of HLA-G expression in human breast carcinoma and HLA-G immunosuppressive role in NK cytolysis. We examined HLA-G expression in breast cell lines by real time PCR, ELISA and immunofluorescent staining. We treated the breast cancer cell lines with anti-human HLA-G antibody or progesterone. Then, NK cytolysis was measured by using MTT assay. We find that breast carcinoma cell lines increase the expression of HLA-G mRNA and protein, compared to normal cells. Blocking HLA-G of the breast cancer cells by the antibody increases NK cytolysis. Progesterone upregulates HLA-G mRNA and protein of human breast cancer cell lines. The increased HLA-G expression suppresses NK cytolysis. In summary, human breast carcinoma overexpress HLA-G immunosuppressive molecules. Blocking HLA-G protein by antibody improves NK cytolysis. In contrast, upregulation of HLA-G expression by progesterone impairs NK cytolytic function. Thus, HLA-G is a new immunosuppressive checkpoint and potential cancer immunotherapeutic target.Keywords: HLA-G, Breast carcinoma, NK cells, Immunosuppressive checkpoint
Procedia PDF Downloads 8813096 The Effect of Smartphones on Human Health Relative to User’s Addiction: A Study on a Wide Range of Audiences in Jordan
Authors: T. Qasim, M. Obeidat, S. Al-Sharairi
Abstract:
The objective of this study is to investigate the effect of the excessive use of smartphones. Smartphones have enormous effects on the human body in that some musculoskeletal disorders (MSDs) and health problems might evolve. These days, there is a wide use of the smartphones among all age groups of society, thus, the focus on smartphone effects on human behavior and health, especially on the young and elderly people, becomes a crucial issue. This study was conducted in Jordan on smartphone users for different genders and ages, by conducting a survey to collect data related to the symptoms and MSDs that are resulted from the excessive use of smartphones. A total of 357 responses were used in the analysis. The main related symptoms were numbness, fingers pain, and pain in arm, all linked to age and gender for comparative reasons. A statistical analysis was performed to find the effects of extensive usage of a smartphone for long periods of time on the human body. Results show that the significant variables were the vision problems and the time spent when using the smartphone that cause vision problems. Other variables including age of user and ear problems due to the use of the headsets were found to be a border line significant.Keywords: smart phone, age group, musculoskeletal disorders (MSDs), health problems
Procedia PDF Downloads 25313095 EU Policies in Determining Refugee Status
Authors: Adriano Mortada
Abstract:
Human history is rife with conflict, and the question of refugee status determination and their rehabilitation has been up for debate since. Refugee Status Determination is the administrative or legal process by which UNHCR or governments determine whether a person seeking international protection or asylum can be identified as a refugee under international, regional, or national law. Refugee Status Determination is considered to be a vital process in aiding refugees’ realization of their rights under international law. One of the major reasons why the refugee status determination is considered an “issue”, and is one that is much debated upon annually, is the fact that the national bureaucratic systems are rigid and unbending. This is particularly concerning in the 21st century despite human advancement in policy and diplomacy, working in tandem with the United Nations and their charters and resolutions on human rights and dignity. The paper seeks to criticize the European member states' response to the refugee crisis and their inflexible and prejudiced bureaucratic systems when it comes to refugee status determination. The paper looks at multiple case studies as primary evidence and the alternate case studies where the system helped refugees, like those in Jordan, Pakistan, Turkey, and Lebanon. The main concern of the paper is to highlight the bias in the selected European systems, which do not stem from the Human Rights Charter but rather on the basis of geographical backgrounds, cultural and religious affiliations of those seeking refugee status or asylum in their respective countries. The paper hopes to not only create awareness about this issue but also provide a research background to advocacy programs to bring a change in the systems.Keywords: refugee status determination, human rights, bureaucracy, United Nations, European Union
Procedia PDF Downloads 9613094 FEM Based Numerical Simulation and Analysis of a Landslide Triggered by the Fluctuations of Ground-Water Levels
Authors: Deepak Raj Bhat, Akihiko Wakai, Shigeru Ogita, Yorihiro Tanaka, Kazushige Hayashi, Shinro Abe
Abstract:
In this study, the newly developed finite element methods are used for numerical analysis ofa landslide triggered by the fluctuations of ground-water levels in different cases I-IV. In case I, the ground-water level is fixed in such a way that the overall factor of safety (Fs) would be greater or equal to 1 (i.e., stable condition). Then, the ground-water level is gradually increased up to 1.0 m for, making the overall factor of safety (Fs) less than one (i.e., stable or moving condition). Then, the newly developed finite element model is applied for numerical simulation of the slope for each case. Based on the numerical analysis results of each Cases I-IV, the details of the deformation pattern and shear strain pattern are compared to each other. Moreover, the change in mobilized shear strength and local factor of safety along the slip surface of the landslide for each case are discussed to understand the triggering behaviors of a landslide due to the increased in ground water level. It is expected that this study will help to better understand the role of groundwater fluctuation for triggering of a landslide or slope failure disasters, and it would be also helpful for the judgment of the countermeasure works for the prevention and mitigation of landslide and slope failure disasters in near future.Keywords: finite element method, ground water fluctuations, constitutive model, landslides, long-term disaster management system
Procedia PDF Downloads 140