Search results for: security risk
6211 A Shift in Approach from Cereal Based Diet to Dietary Diversity in India: A Case Study of Aligarh District
Authors: Abha Gupta, Deepak K. Mishra
Abstract:
Food security issue in India has surrounded over availability and accessibility of cereal which is regarded as the only food group to check hunger and improve nutrition. Significance of fruits, vegetables, meat and other food products have totally been neglected given the fact that they provide essential nutrients to the body. There is a need to shift the emphasis from cereal-based approach to a more diverse diet so that aim of achieving food security may change from just reducing hunger to an overall health. This paper attempts to analyse how far dietary diversity level has been achieved across different socio-economic groups in India. For this purpose, present paper sets objectives to determine (a) percentage share of different food groups to total food expenditure and consumption by background characteristics (b) source of and preference for all food items and, (c) diversity of diet across socio-economic groups. A cross sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of Uttar Pradesh, India. Information on amount of food consumed, source of consumption and expenditure on food (74 food items grouped into 10 major food groups) was collected with a recall period of seven days. Per capita per day food consumption/expenditure was calculated through dividing consumption/expenditure by household size and number seven. Food variety score was estimated by giving 0 values to those food groups/items which had not been eaten and 1 to those which had been taken by households in last seven days. Addition of all food group/item score gave result of food variety score. Diversity of diet was computed using Herfindahl-Hirschman index. Findings of the paper show that cereal, milk, roots and tuber food groups contribute a major share in total consumption/expenditure. Consumption of these food groups vary across socio-economic groups whereas fruit, vegetables, meat and other food consumption remain low and same. Estimation of dietary diversity show higher concentration of diet due to higher consumption of cereals, milk, root and tuber products and dietary diversity slightly varies across background groups. Muslims, Scheduled caste, small farmers, lower income class, food insecure, below poverty line and labour families show higher concentration of diet as compared to their counterpart groups. These groups also evince lower mean intake of number of food item in a week due to poor economic constraints and resultant lower accessibility to number of expensive food items. Results advocate to make a shift from cereal based diet to dietary diversity which not only includes cereal and milk products but also nutrition rich food items such as fruits, vegetables, meat and other products. Integrating a dietary diversity approach in food security programmes of the country would help to achieve nutrition security as hidden hunger is widespread among the Indian population.Keywords: dietary diversity, food Security, India, socio-economic groups
Procedia PDF Downloads 3386210 Examining the Investment Behavior of Arab Women in the Stock Market
Authors: Razan Salem
Abstract:
Gender plays a vital role in the stock markets because men and women differ in their behavior when investing in stocks. Accordingly, the role of gender differences in investment behavior is an increasingly important strand in the field of behavioral finance research. The investment behaviors of women relative to men have been examined in the behavioral finance literature, mainly for comparison purposes. Women's roles in the stock market have not been examined in the behavioral finance literature, however, particularly with respect to the Arab region. This study aims to contribute towards a better understanding of the investment behavior of Arab women (in regards to their risk tolerance, investment confidence, and investment literacy levels) relative to Arab men; using a sample from Arab women and men investors living in Saudi Arabia and Jordan. In order to achieve the study's main aim, the researcher used non-parametric tests, as Mann-Whitney U test, along with frequency distribution analysis to analyze the study’s primary data. The researcher distributed close-ended online questionnaires to a sample of 550 Arab male and female individuals investing in stocks in both Saudi Arabia and Jordan. The results confirm that the sample Arab women invest less in stocks compared to Arab men due to their risk-averse behaviors and limited confidence levels. The results also reveal that due to Arab women’s very low investment literacy levels, they fear from taking the risk and invest often in stocks relative to Arab men. Overall, the study’s main variables (risk tolerance, investment confidence, and investment literacy levels) have a combined effect on the investment behavior of Arab women and their limited participation in the stock market. Hence, this study is one of the very first studies that indicate the combined effect of the three main variables (which are usually studied separately in the existing literature) on the investment behavior of women, particularly Arab women. This study makes three important contributions to the growing literature on gender differences in investment behavior. First, while the behavioral finance literature documents evidence on gender differences in investment behaviors in many developed countries, there are very limited studies that investigate such differences in Arab countries. Arab women investors, generally, are ignored from the behavioral finance literature due probably to cultural barriers and data collection difficulties. Thus, this study extends the literature to include Arab women and their investment behaviors when trading stock relative to Arab men. Moreover, the study associates women investment literacy and confidence levels with their financial risk behaviors and participation in the stock market. This study provides direct evidence on Arab women's investment behaviors when trading stocks. Overall, studying Arab women investors is important to investigate whether the investment behavior identified for Western women investors are also found in Arab women investors.Keywords: Arab women, gender differences, investment behavior, stock markets
Procedia PDF Downloads 1796209 European Drug Serialization: Securing the Pharmaceutical Drug Supply Chain from Counterfeiters
Authors: Vikram Chowdhary, Marek Vins
Abstract:
The profitability of the pharmaceutical drug business has attracted considerable interest, but it also faces significant challenges. Counterfeiters take advantage of the industry's vulnerabilities, which are further exacerbated by the globalization of the market, online trading, and complex supply chains. Governments and organizations worldwide are dedicated to creating a secure environment that ensures a consistent and genuine supply of pharmaceutical products. In 2019, the European authorities implemented regulation EU 2016/161 to strengthen traceability and transparency throughout the entire drug supply chain. This regulation requires the addition of enhanced security features, such as serializing items to the saleable unit level or individual packs. Despite these efforts, the incidents of pharmaceutical counterfeiting continue to rise globally, with regulated territories being particularly affected. This paper examines the effectiveness of the drug serialization system implemented by European authorities. By conducting a systematic literature review, we assess the implementation of drug serialization and explore the potential benefits of integrating emerging digital technologies, such as RFID and Blockchain, to improve traceability and management. The objective is to fortify pharmaceutical supply chains against counterfeiters and manipulators and ensure their security.Keywords: blockchain, counterfeit drugs, EU drug serialization, pharmaceutical industry, RFID
Procedia PDF Downloads 1096208 The Risk of In-work Poverty and Family Coping Strategies
Authors: A. Banovcinova, M. Zakova
Abstract:
Labor market activity and paid employment should be a key factor in protecting individuals and families from falling into poverty and providing them with sufficient resources to meet the needs of their members. However, due to various processes in the labor market as well as the influence of individual factors and often insufficient social capital, there is a relatively large group of households that cannot eliminate paid employment and find themselves in a state of so-called working poverty. The aim of the research was to find out what strategies families use in managing poverty and meeting their needs and which of these strategies prevail in the Slovak population. A quantitative research strategy was chosen. The method of data collection was a structured interview focused on finding out the use of individual management strategies and also selected demographic indicators. The research sample consisted of members of families in which at least one member has a paid job. The condition for inclusion in the research was that the family's income did not exceed 60% of the national median equalized disposable income. The analysis of the results showed 5 basic areas to which management strategies are related - work, financial security, needs, social contacts and perception of the current situation. The prevailing strategies were strategies aimed at increasing and streamlining labor market activity and the planned and effective management of the family budget. Strategies that were rejected were mainly related to debt creation. The results make it possible to identify the preferred ways of managing poverty in individual areas of life, as well as the factors that influence this behavior. This information is important for working with families living in a state of working poverty and can help professionals develop positive ways of coping for families.Keywords: copying strategies, family, in-work poverty, quantitative research
Procedia PDF Downloads 1166207 Entrepreneurship in Pakistan: Opportunities and Challenges
Authors: Bushra Jamil, Nudrat Baqri, Muhammad Hassan Saeed
Abstract:
Entrepreneurship is creating or setting up a business not only for the purpose of generating profit but also for providing job opportunities. Entrepreneurs are problem solvers and product developers. They use their financial asset for hiring a professional team and combine the innovation, knowledge, and leadership leads to a successful startup or a business. To be a successful entrepreneur, one should be people-oriented and have perseverance. One must have the ability to take risk, believe in his/her potential, and have the courage to move forward in all circumstances. Most importantly, have the ability to take risk and can assess the risk. For STEM students, entrepreneurship is of specific importance and relevance as it helps them not just to be able to solve real life existing complications but to be able to recognize and identify emerging needs and glitches. It is becoming increasingly apparent that in today’s world, there is a need as well as a desire for STEM and entrepreneurship to work together. In Pakistan, entrepreneurship is slowly emerging, yet we are far behind. It is high time that we should introduce modern teaching methods and inculcate entrepreneurial initiative in students. A course on entrepreneurship can be included in the syllabus, and we must invite businessmen and policy makers to motivate young minds for entrepreneurship. This must be pitching competitions, opportunities to win seed funding, and facilities of incubation centers. In Pakistan, there are many good public sector research institutes, yet there is a void gap in the private sector. Only few research institute are meant for research and development. BJ Micro Lab is one of them. It is SECP registered company and is working in academia to promote and facilitate research in STEM. BJ Micro Lab is a women led initiative, and we are trying to promote research as a passion, not as an arduous burden. For this, we are continuously arranging training workshops and sessions. More than 100 students have been trained in ten different workshops arranged at BJ Micro Lab.Keywords: entrepreneurship, STEM, challenges, oppurtunties
Procedia PDF Downloads 1296206 The Big Five Personality Traits and Environmental Factors as Predictors of the Antisocial Behaviours among Juveniles
Authors: Karol Konaszewski
Abstract:
Background: The article is an analysis of the results of the studies conducted among juveniles (boys and girls) in the case of whom the family court applied the educational means of placing them in the youth educational centers. The aim of the study was to find out the correlations between antisocial behaviors, personality traits and the environmental determinants (support factors and risk factors) among juveniles (boys and girls). Methods: The total of 481 juveniles staying in youth educational centers participated in the study. Applied research tools: The Antisocial Behaviors Scale by L. Pytka, NEO-FFI by P. T. Costa and R. R. McCrae was used to diagnose personality traits included in a popular five-factor model (it has been adapted into Polish by B. Zawadzki, J. Strelau, P. Szczepaniak, and M. Śliwińska) and a questionnaire concerning support factors and risk factors was constructed to measure environmental determinants. The data was analysed in a regression model. Findings: The analysis model showed that the significant predictors of antisocial behaviors were neuroticism, extraversion, conscientiousness and negative relations at school. In girls group, the significant predictors of antisocial behaviors were neuroticism, conscientiousness, family support and negative relations at school, while in boys group the significant predictors of antisocial behaviors were neuroticism, extraversion and negative relations at family. Discussion: The results of this study have important implications. They allow for a better understanding of the factors that contribute to antisocial behaviors among juveniles. Future interventions could be based on the creation of personality traits, strengthening of support factors and correction of risk factors.Keywords: antisocial behaviours, juveniles, personality, youth
Procedia PDF Downloads 2596205 Challenges of Climate Change on Agricultural Productivity in Sub-Saharan Africa
Authors: Mohammed Sale Abubakar, Kabir Omar, Mohammed Umar Abba
Abstract:
The effects of climate change continue to ravage globe upsetting or even overturning the entire communities in its wake. It is therefore on the front burner of most global issues affecting the world today. Hardly any field of endeavor has escaped the manifestation of its effects. The effects of climate change on agricultural productivity calls for intense study because of the nexus between agriculture, global food security and provision of employment for the teaming population in sub-saharan Africa. This paper examines current challenges of climate change on agricultural productivity in this region. This challenge indicated that both long and short-term change in climate bring unpleasant repercussion on agricultural productivity as they manifest in the vulnerability of industrial work force. The paper also focused on the impact of agriculture and bio-environmental engineering as a separate entity that will help to fight these major challenges facing humanity currently associated with negative effects of climate change such as scarcity of water, declining agricultural yields, desert encroachment, and damage of coastal structures. Finally, a suggestion was put forward as an effort that should be directed towards mitigating the negative effects of climate change on our environment.Keywords: climate change mitigation, desert encroachment, environment, global food security, greenhouse gases (GHGs)
Procedia PDF Downloads 3536204 Streamlining .NET Data Access: Leveraging JSON for Data Operations in .NET
Authors: Tyler T. Procko, Steve Collins
Abstract:
New features in .NET (6 and above) permit streamlined access to information residing in JSON-capable relational databases, such as SQL Server (2016 and above). Traditional methods of data access now comparatively involve unnecessary steps which compromise system performance. This work posits that the established ORM (Object Relational Mapping) based methods of data access in applications and APIs result in common issues, e.g., object-relational impedance mismatch. Recent developments in C# and .NET Core combined with a framework of modern SQL Server coding conventions have allowed better technical solutions to the problem. As an amelioration, this work details the language features and coding conventions which enable this streamlined approach, resulting in an open-source .NET library implementation called Codeless Data Access (CODA). Canonical approaches rely on ad-hoc mapping code to perform type conversions between the client and back-end database; with CODA, no mapping code is needed, as JSON is freely mapped to SQL and vice versa. CODA streamlines API data access by improving on three aspects of immediate concern to web developers, database engineers and cybersecurity professionals: Simplicity, Speed and Security. Simplicity is engendered by cutting out the “middleman” steps, effectively making API data access a whitebox, whereas traditional methods are blackbox. Speed is improved because of the fewer translational steps taken, and security is improved as attack surfaces are minimized. An empirical evaluation of the speed of the CODA approach in comparison to ORM approaches ] is provided and demonstrates that the CODA approach is significantly faster. CODA presents substantial benefits for API developer workflows by simplifying data access, resulting in better speed and security and allowing developers to focus on productive development rather than being mired in data access code. Future considerations include a generalization of the CODA method and extension outside of the .NET ecosystem to other programming languages.Keywords: API data access, database, JSON, .NET core, SQL server
Procedia PDF Downloads 656203 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads
Authors: Gaurav Kumar Sinha
Abstract:
In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies
Procedia PDF Downloads 666202 The Effectiveness of an Educational Program on Awareness of Cancer Signs, Symptoms, and Risk Factors among School Students in Oman
Authors: Khadija Al-Hosni, Moon Fai Chan, Mohammed Al-Azri
Abstract:
Background: Several studies suggest that most school-age adolescents are poorly informed on cancer warning signs and risk factors. Providing adolescents with sufficient knowledge would increase their awareness in adulthood and improve seeking behaviors later. Significant: The results will provide a clear vision in assisting key decision-makers in formulating policies on the students' awareness programs towards cancer. So, the likelihood of avoiding cancer in the future will be increased or even promote early diagnosis. Objectives: to evaluate the effectiveness of an education program designed to increase awareness of cancer signs and symptoms risk factors, improve the behavior of seeking help among school students in Oman, and address the barriers to obtaining medical help. Methods: A randomized controlled trial with two groups was conducted in Oman. A total of 1716 students (n=886/control, n= 830/education), aged 15-17 years, at 10th and 11th grade from 12 governmental schools 3 in governorates from 20-February-2022 to 12-May-2022. Basic demographic data were collected, and the Cancer Awareness Measure (CAM) was used as the primary outcome. Data were collected at baseline (T0) and 4 weeks after (T1). The intervention group received an education program about cancer's cause and its signs and symptoms. In contrast, the control group did not receive any education related to this issue during the study period. Non-parametric tests were used to compare the outcomes between groups. Results: At T0, the lamp was the most recognized cancer warning sign in control (55.0%) and intervention (55.2%) groups. However, there were no significant changes at T1 for all signs in the control group. In contrast, all sign outcomes were improved significantly (p<0.001) in the intervention group, the highest response was unexplained pain (93.3%). Smoking was the most recognized risk factor in both groups: (82.8% for control; 84.1% for intervention) at T0. However, there was no significant change in T1 for the control group, but there was for the intervention group (p<0.001), the highest identification was smoking cigarettes (96.5%). Too scared was the largest barrier to seeking medical help by students in the control group at T0 (63.0%) and T1 (62.8%). However, there were no significant changes in all barriers in this group. Otherwise, being too embarrassed (60.2%) was the largest barrier to seeking medical help for students in the intervention group at T0 and too scared (58.6%) at T1. Although there were reductions in all barriers, significant differences were found in six of ten only (p<0.001). Conclusion: The intervention was effective in improving students' awareness of cancer symptoms, warning signs (p<0.001), and risk factors (p<0.001 reduced the most addressed barriers to seeking medical help (p<0.001) in comparison to the control group. The Ministry of Education in Oman could integrate awareness of cancer within the curriculum, and more interventions are needed on the sociological part to overcome the barriers that interfere with seeking medical help.Keywords: adolescents, awareness, cancer, education, intervention, student
Procedia PDF Downloads 856201 The Use of Metformin in Treatment of Polycystic Ovary Syndrome (PCOS) and Glucose Control in Pregnant Women with Gestational Diabetes Mellitus (GDM) at Tripoli Medical Center
Authors: Ebtisam A. Benomran, Abdurrauf M. Gusbi, Malak S. Elazarg, M. Sultan, Layla M. Kafu, Arwa M. Matoug, Esra E. Benamara
Abstract:
Normal pregnancy is associated with metabolic changes leading to decreased insulin sensitivity and reduced glucose tolerance, however, 3-5% of pregnant women proceed to develop gestational diabetes mellitus (GDM). Researcher studied the use of metformin in many fields and the benefit to risk balance of using metformin during pregnancy and the risk of fetotoxic. In this study we examined the use of Metformin to control Glucose in pregnant Women with gestational diabetes mellitus (GDM) and evaluate its safety use during the first trimester of pregnancy.A group of pregnant patients with gestational diabetes mellitus from the first trimester of pregnancy, non smoking with no family history of congenital malformation disease, aged between (20-45 years) and have no liver diseases and who had indicating good compliance at more than one visit over several month until delivery put on Metformin were participated in this trial. Our study shown that all the studied group of pregnant women using metformin 500 mg daily delivered a healthy babies. Meta-analysis by mother risk program showed no increase in incidence of malformations by use Metformin during the first trimester of pregnancy. A hundred outpatients were participated in the survey on the general knowledge and awareness of diabetic patients to their illness and medication used their aged between 20-40 years old. In this survey we realize that 90% of the doctors are not giving the patient full information about their illness and the use of metformin during pregnancy, also about 65% of the patients did not know about the nutritionist in the hospital and the right control diet for diabetes. Courses on first aid, rapid diagnosis of poisoning and follow the written procedures to dealing with such cases.Keywords: gestational diabetes, malformations, metformin, pregnancy
Procedia PDF Downloads 4896200 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 296199 CFD Analysis of the Blood Flow in Left Coronary Bifurcation with Variable Angulation
Authors: Midiya Khademi, Ali Nikoo, Shabnam Rahimnezhad Baghche Jooghi
Abstract:
Cardiovascular diseases (CVDs) are the main cause of death globally. Most CVDs can be prevented by avoiding habitual risk factors. Separate from the habitual risk factors, there are some inherent factors in each individual that can increase the risk potential of CVDs. Vessel shapes and geometry are influential factors, having great impact on the blood flow and the hemodynamic behavior of the vessels. In the present study, the influence of bifurcation angle on blood flow characteristics is studied. In order to approach this topic, by simplifying the details of the bifurcation, three models with angles 30°, 45°, and 60° were created, then by using CFD analysis, the response of these models for stable flow and pulsatile flow was studied. In the conducted simulation in order to eliminate the influence of other geometrical factors, only the angle of the bifurcation was changed and other parameters remained constant during the research. Simulations are conducted under dynamic and stable condition. In the stable flow simulation, a steady velocity of 0.17 m/s at the inlet plug was maintained and in dynamic simulations, a typical LAD flow waveform is implemented. The results show that the bifurcation angle has an influence on the maximum speed of the flow. In the stable flow condition, increasing the angle lead to decrease the maximum flow velocity. In the dynamic flow simulations, increasing the bifurcation angle lead to an increase in the maximum velocity. Since blood flow has pulsatile characteristics, using a uniform velocity during the simulations can lead to a discrepancy between the actual results and the calculated results.Keywords: coronary artery, cardiovascular disease, bifurcation, atherosclerosis, CFD, artery wall shear stress
Procedia PDF Downloads 1636198 ACL Tear Prevention Program
Authors: Ervin Meqikukiqi
Abstract:
It is difficult to assess how athletes can best modify their movements to prevent non contact ACL injuries. Speaking with an athletic trainer, physical therapist, or sports medicine specialist is a good place to start. Recent research has allowed therapists and clinicians to easily identify and target weak muscle areas (e.g., weak hips, which leads to knock-kneed landing positions) and identify ways to improve strength and thus help prevent injury. In addition, other risk factors such as reduced hamstring strength and increased joint range of motion can be further assessed by a physical therapist or athletic trainer to improve performance-or rehabilitation efforts after an injury has occurred. Current studies also demonstrate that specific types of training, such as jump routines and learning to pivot properly, help athletes prevent ACL injuries. These types of exercises and training programs are more beneficial if athletes start when they are young. It may be optimal to integrate prevention programs during early adolescence, prior to when young athletes develop certain habits that increase the risk of an ACL injury. This is a 20 minute program designed to reduce the risk of tears of the Anterior Cruciate Ligament. It should be started at least four and preferably six weeks prior to start of competition.Ideally it is done five times per week preseason and three times per week in season.The coach or trainer must constantly observe athletes during these exercises to correct and maintain proper technique. Once the athletes understand the principles, they can monitor and coach each other. Four phases: Warm-up, Strengthening, Plyometrics, Agility and Balance.Keywords: athletes, acl, prevention, injuries, plyoemtric, proprioception, agillity
Procedia PDF Downloads 4216197 Considerations When Using the Beach Chair Position for Surgery
Authors: Aniko Babits, Ahmad Daoud
Abstract:
Introduction: The beach chair position (BCP) is a good approach to almost all types of shoulder procedures. However, moving an anaesthetized patient from the supine to sitting position may pose a risk of cerebral hypoperfusion and potential cerebral ischaemia as a result of significant reductions in blood pressure and cardiac output. Hypocapnia in ventilated patients and impaired blood flow to the vertebral artery due to hyperextension, rotation, or tilt of the head may have an impact too. Co-morbidities that may increase the risk of cerebral ischaemia in the BCP include diabetes with autonomic neuropathy, cerebrovascular disease, cardiac disease, severe hypertension, generalized vascular disease, history of fainting, and febrile conditions. Beach chair surgery requires a careful anaesthetic and surgical management to optimize patient safety and minimize the risk of adverse outcomes. Methods: We describe the necessary steps for optimal patient positioning and the aims of intraoperative management, including anaesthetic techniques to ensure patient safety in the BCP. Results: Regardless of the anaesthetic technique, adequate patient positioning is paramount in the BCP. The key steps to BCP are aimed at optimizing surgical success and minimizing the risk of severe neurovascular complications. The primary aim of anaesthetic management is to maintain cardiac output and mean arterial pressure (MAP) to protect cerebral perfusion. Blood pressure management includes treating a fall in MAP of more than 25% from baseline or a MAP less than 70 mmHg. This can be achieved by using intravenous fluids or vasopressors. A number of anaesthetic techniques could also improve cerebral oxygenation, including avoidance of intermittent positive pressure ventilation (IPPV) with general anaesthesia (GA), using regional anaesthesia, maintaining normocapnia and normothermia, and the application of compression stockings. Conclusions: In summary, BCP is a reliable and effective position to perform shoulder procedures. Simple steps to patient positioning and careful anaesthetic management could maximize patient safety and avoid unwanted adverse outcomes in patients undergoing surgery in BCP.Keywords: beach chair position, cerebral oxygenation, cerebral perfusion, sitting position
Procedia PDF Downloads 896196 Sickle Cell Disease: Review of Managements in Pregnancy and the Outcome in Ampang Hospital, Selangor
Authors: Z. Nurzaireena, K. Azalea, T. Azirawaty, S. Jameela, G. Muralitharan
Abstract:
The aim of this study is the review of the management practices of sickle cell disease patients during pregnancy, as well as the maternal and neonatal outcome at Ampang Hospital, Selangor. The study consisted of a review of pregnant patients with sickle cell disease under follow up at the Hematology Clinic, Ampang Hospital over the last seven years to assess their management and maternal-fetal outcome. The results of the review show that Ampang Hospital is considered the public hematology centre for sickle cell disease and had successfully managed three pregnancies throughout the last seven years. Patients’ presentations, managements and maternal-fetal outcome were compared and reviewed for academic improvements. All three patients were seen very early in their pregnancy and had been given a regime of folic acid, antibiotics and thrombo-prophylactic drugs. Close monitoring of maternal and fetal well being was done by the hematologists and obstetricians. Among the patients, there were multiple admissions during the pregnancy for either a painful sickle cell bone crisis, haemolysis following an infection and anemia requiring phenotype- matched blood and exchange transfusions. Broad spectrum antibiotics coverage during and infection, hydration, pain management and venous-thrombolism prophylaxis were mandatory. The pregnancies managed to reach near term in the third trimester but all required emergency caesarean section for obstetric indications. All pregnancies resulted in live births with good fetal outcome. During post partum all were nursed closely in the high dependency units for further complications and were discharged well. Post partum follow up and contraception counseling was comprehensively given for future pregnancies. Sickle cell disease is uncommonly seen in the East, especially in the South East Asian region, yet more cases are seen in the current decade due to improved medical expertise and advance medical laboratory technologies. Pregnancy itself is a risk factor for sickle cell patients as increased thrombosis event and risk of infections can lead to multiple crisis, haemolysis, anemia and vaso-occlusive complications including eclampsia, cerebrovasular accidents and acute bone pain. Patients mostly require multiple blood product transfusions thus phenotype-matched blood is required to reduce the risk of alloimmunozation. Emphasizing the risks and complications in preconception counseling and establishing an ultimate pregnancy plan would probably reduce the risk of morbidity and mortality to the mother and unborn child. Early management for risk of infection, thromboembolic events and adequate hydration is mandatory. A holistic approach involving multidisciplinary team care between the hematologist, obstetricians, anesthetist, neonatologist and close nursing care for both mother and baby would ensure the best outcome. In conclusion, sickle cell disease by itself is a high risk medical condition and pregnancy would further amplify the risk. Thus, close monitoring with combine multidisciplinary care, counseling and educating the patients are crucial in achieving the safe outcome.Keywords: anaemia, haemoglobinopathies, pregnancy, sickle cell disease
Procedia PDF Downloads 2576195 Epidemiology, Clinical, Immune, and Molecular Profiles of Microsporidiosis and Cryptosporidiosis among HIV/AIDS patients
Authors: Roger WUMBA
Abstract:
The objective of this study was to determine the prevalence of intestinal parasites, with special emphasis on microsporidia and Cryptosporidium, as well as their association with human immunodeficiency virus (HIV) symptoms, risk factors, and other digestive parasites. We also wish to determine the molecular biology definitions of the species and genotypes of microsporidia and Cryptosporidium in HIV patients. In this cross-sectional study, carried out in Kinshasa, Democratic Republic of the Congo, stool samples were collected from 242 HIV patients (87 men and 155 women) with referred symptoms and risk factors for opportunistic intestinal parasites. The analysis of feces specimen were performed using Ziehl–Neelsen stainings, real-time polymerase chain reaction (PCR), immunofluorescence indirect monoclonal antibody, nested PCR-restriction fragment length polymorphism, and PCR amplification and sequencing. Odds ratio (OR) and 95% confidence intervals were used to quantify the risk. Of the 242 HIV patients, 7.8%, 0.4%, 5.4%, 0.4%, 2%, 10.6%, and 2.8% had Enterocytozoon bieneusi, Encephalitozoon intestinalis, Cryptosporidium spp., Isospora belli, pathogenic intestinal protozoa, nonpathogenic intestinal protozoa, and helminths, respectively. We found five genotypes of E. bieneusi: two older, NIA1 and D, and three new, KIN1, KIN2, and KIN3. Only 0.4% and 1.6% had Cryptosporidium parvum and Cryptosporidium hominis, respectively. Of the patients, 36.4%, 34.3%, 31%, and 39% had asthenia, diarrhea, a CD4 count of ,100 cells/mm³, and no antiretroviral therapy (ART), respectively. The majority of those with opportunistic intestinal parasites and C. hominis, and all with C. parvum and new E. bieneusi genotypes, had diarrhea, low CD4+ counts of ,100 cells/mm³, and no ART. There was a significant association between Entamoeba coli, Kaposi sarcoma, herpes zoster, chronic diarrhea, and asthenia, and the presence of 28 cases with opportunistic intestinal parasites. Rural areas, public toilets, and exposure to farm pigs were the univariate risk factors present in the 28 cases with opportunistic intestinal parasites. In logistic regression analysis, a CD4 count of ,100 cells/mm³ (OR = 4.60; 95% CI 1.70–12.20; P = 0.002), no ART (OR = 5.00; 95% CI 1.90–13.20; P , 0.001), and exposure to surface water (OR = 2.90; 95% CI 1.01–8.40; P = 0.048) were identified as the significant and independent determinants for the presence of opportunistic intestinal parasites. E. bieneusi and Cryptosporidium are becoming more prevalent in Kinshasa, Congo. Based on the findings, we recommend epidemiology surveillance and prevention by means of hygiene, the emphasis of sensitive PCR methods, and treating opportunistic intestinal parasites that may be acquired through fecal–oral transmission, surface water, normal immunity, rural area-based person–person and animal–human nfection, and transmission of HIV. Therapy, including ART and treatment with fumagillin, is needed.Keywords: diarrhea, enterocytozoon bieneusi, cryptosporidium hominis, cryptosporidium parvum, risk factors, africans
Procedia PDF Downloads 1246194 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 2666193 Anticipating Asthma with Control Environmental Factors and Food
Authors: Destin Kurniawati
Abstract:
Asthma is one of the deadly diseases in the world. According to the World Health Organization in 2012, 300 million people suffer from asthma of different races and classes. An estimated 250,000 people die because of asthma annually.As well as more than 57% of children and 51% of adults with asthma. There two risk factors for asthma. That risk factors are the host and environmental. One of the environmental factors that can bring asthma is allergens. When an allergen enters the body, the allergen binds to IgE and cause cell granulat- issued several mediators such as histamine, leukotrienes, bradykinin or something like that. This will cause localized edema effect on bronchial walls of small, thick mucous secretions in the bronchioles, and bronchial smooth muscle spasm. Then there will be inflammation of the airways. Methodology this research is by literature. Therefore, to anticipate and cope with asthma is to control environmental factors that serve to minimize allergens and controlling one's intake in the form of antioxidant-rich foods. Foods rich in antioxidants serve to improve lung function and decrease symptoms of the disease of the respiratory tract.Keywords: asthma, deadly disease, allergen, environmental and food control
Procedia PDF Downloads 2616192 Physical Activity, Exercise and Physical Fitness in Different Generation
Authors: Carl J. Caspersen, Kenneth E. Powell, Gregory M. Christenson, Kirupa V. Patel
Abstract:
‘Physical activity’, ‘exercise’, and ‘physical fitness’ are terms that describe different concepts. However, they are often confused with one another, and the terms are sometimes used interchangeably. This paper proposes definitions to distinguish them. Physical activity is defined as any bodily movement produced by skeletal muscles that result in energy expenditure. The energy expenditure can be measured in kilocalories. Physical activity in daily life can be categorized into occupational, sports, Conditioning, household, or other activities. Exercise is a subset of physical activity that is planned, structured, and repetitive and has as a final or an intermediate objective the improvement or maintenance of physical fitness. Physical fitness is a set of attributes that are either health- or skill-related. The degree to which people have these attributes can be measured with specific tests. These definitions are offered as an interpretational framework for comparing studies that relate physical activity, exercise, and physical fitness to health. Physical activity is defined as any bodily movement produced by skeletal muscles that require energy expenditure. Physical inactivity has been identified as the fourth leading risk factor for global mortality causing an estimated 3.2 million deaths globally. Regular moderate intensity physical activity – such as walking, cycling, or participating in sports – has significant benefits for health. For instance, it can reduce the risk of cardiovascular diseases, diabetes, colon and breast cancer, and depression. Moreover, adequate levels of physical activity will decrease the risk of a hip or vertebral fracture and help control weight. Any bodily movement produced by the contraction of skeletal muscle that increases energy expenditure above a basal level. In these guidelines, physical activity generally refers to the subset of physical activity that enhances health.Keywords: physical activity, exercise, physical fitness, sports
Procedia PDF Downloads 3606191 Risk and Reliability Based Probabilistic Structural Analysis of Railroad Subgrade Using Finite Element Analysis
Authors: Asif Arshid, Ying Huang, Denver Tolliver
Abstract:
Finite Element (FE) method coupled with ever-increasing computational powers has substantially advanced the reliability of deterministic three dimensional structural analyses of a structure with uniform material properties. However, railways trackbed is made up of diverse group of materials including steel, wood, rock and soil, while each material has its own varying levels of heterogeneity and imperfections. It is observed that the application of probabilistic methods for trackbed structural analysis while incorporating the material and geometric variabilities is deeply underworked. The authors developed and validated a 3-dimensional FE based numerical trackbed model and in this study, they investigated the influence of variability in Young modulus and thicknesses of granular layers (Ballast and Subgrade) on the reliability index (-index) of the subgrade layer. The influence of these factors is accounted for by changing their Coefficients of Variance (COV) while keeping their means constant. These variations are formulated using Gaussian Normal distribution. Two failure mechanisms in subgrade namely Progressive Shear Failure and Excessive Plastic Deformation are examined. Preliminary results of risk-based probabilistic analysis for Progressive Shear Failure revealed that the variations in Ballast depth are the most influential factor for vertical stress at the top of subgrade surface. Whereas, in case of Excessive Plastic Deformations in subgrade layer, the variations in its own depth and Young modulus proved to be most important while ballast properties remained almost indifferent. For both these failure moods, it is also observed that the reliability index for subgrade failure increases with the increase in COV of ballast depth and subgrade Young modulus. The findings of this work is of particular significance in studying the combined effect of construction imperfections and variations in ground conditions on the structural performance of railroad trackbed and evaluating the associated risk involved. In addition, it also provides an additional tool to supplement the deterministic analysis procedures and decision making for railroad maintenance.Keywords: finite element analysis, numerical modeling, probabilistic methods, risk and reliability analysis, subgrade
Procedia PDF Downloads 1386190 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 3386189 Flood Risk Assessment for Agricultural Production in a Tropical River Delta Considering Climate Change
Authors: Chandranath Chatterjee, Amina Khatun, Bhabagrahi Sahoo
Abstract:
With the changing climate, precipitation events are intensified in the tropical river basins. Since these river basins are significantly influenced by the monsoonal rainfall pattern, critical impacts are observed on the agricultural practices in the downstream river reaches. This study analyses the crop damage and associated flood risk in terms of net benefit in the paddy-dominated tropical Indian delta of the Mahanadi River. The Mahanadi River basin lies in eastern part of the Indian sub-continent and is greatly affected by the southwest monsoon rainfall extending from the month of June to September. This river delta is highly flood-prone and has suffered from recurring high floods, especially after the 2000s. In this study, the lumped conceptual model, Nedbør Afstrømnings Model (NAM) from the suite of MIKE models, is used for rainfall-runoff modeling. The NAM model is laterally integrated with the MIKE11-Hydrodynamic (HD) model to route the runoffs up to the head of the delta region. To obtain the precipitation-derived future projected discharges at the head of the delta, nine Global Climate Models (GCMs), namely, BCC-CSM1.1(m), GFDL-CM3, GFDL-ESM2G, HadGEM2-AO, IPSL-CM5A-LR, IPSL-CM5A-MR, MIROC5, MIROC-ESM-CHEM and NorESM1-M, available in the Coupled Model Intercomparison Project-Phase 5 (CMIP5) archive are considered. These nine GCMs are previously found to best-capture the Indian Summer Monsoon rainfall. Based on the performance of the nine GCMs in reproducing the historical discharge pattern, three GCMs (HadGEM2-AO, IPSL-CM5A-MR and MIROC-ESM-CHEM) are selected. A higher Taylor Skill Score is considered as the GCM selection criteria. Thereafter, the 10-year return period design flood is estimated using L-moments based flood frequency analysis for the historical and three future projected periods (2010-2039, 2040-2069 and 2070-2099) under Representative Concentration Pathways (RCP) 4.5 and 8.5. A non-dimensional hydrograph analysis is performed to obtain the hydrographs for the historical/projected 10-year return period design floods. These hydrographs are forced into the calibrated and validated coupled 1D-2D hydrodynamic model, MIKE FLOOD, to simulate the flood inundation in the delta region. Historical and projected flood risk is defined based on the information about the flood inundation simulated by the MIKE FLOOD model and the inundation depth-damage-duration relationship of a normal rice variety cultivated in the river delta. In general, flood risk is expected to increase in all the future projected time periods as compared to the historical episode. Further, in comparison to the 2010s (2010-2039), an increased flood risk in the 2040s (2040-2069) is shown by all the three selected GCMs. However, the flood risk then declines in the 2070s as we move towards the end of the century (2070-2099). The methodology adopted herein for flood risk assessment is one of its kind and may be implemented in any world-river basin. The results obtained from this study can help in future flood preparedness by implementing suitable flood adaptation strategies.Keywords: flood frequency analysis, flood risk, global climate models (GCMs), paddy cultivation
Procedia PDF Downloads 736188 Do Patients with Neck of Femur Fractures Receive Adequate Anticoagulation? A West Midlands Study
Authors: U. N. Bhatty, A. Bhatia, A. George, F. Fiaz
Abstract:
Post-operatively, patients with the neck of femur fractures are the high-risk of venous thromboembolic events (VTE). NICE have issued guidelines in this regard. We investigated whether these guidelines were being followed. 124 patients undergoing neck of femur fracture surgery were retrospectively analysed at a major orthopaedic centre in England. 9% of patients received adequate anticoagulation (16.5% mortality). An education campaign subsequently took place, circular emails were sent to junior doctors and posters advertised. A reaudit 4 months later showed only 12% of the 68 patients received adequate anticoagulation (11.8% mortality). The education campaign failed to improve prescribing behaviours. Furthermore, as morbidity was not measured, the consequence of poor prescription is underestimated. Perhaps, poor prescribing is because of the silent nature of effective thromboprophylaxis; reducing its perceived effectiveness. Simple interventions are insufficient to change these habits and more intense work is needed; such as compulsory proformas for all high-risk patients.Keywords: fracture, hip, orthopaedics, thromboembolism
Procedia PDF Downloads 3376187 Investigation Two Polymorphism of hTERT Gene (Rs 2736098 and Rs 2736100) and miR- 146a rs2910164 Polymorphism in Cervical Cancer
Authors: Hossein Rassi, Alaheh Gholami Roud-Majany, Zahra Razavi, Massoud Hoshmand
Abstract:
Cervical cancer is multi step disease that is thought to result from an interaction between genetic background and environmental factors. Human papillomavirus (HPV) infection is the leading risk factor for cervical intraepithelial neoplasia (CIN)and cervical cancer. In other hand, some of hTERT and miRNA polymorphism may plays an important role in carcinogenesis. This study attempts to clarify the relation of hTERT genotypes and miR-146a genotypes in cervical cancer. Forty two archival samples with cervical lesion retired from Khatam hospital and 40 sample from healthy persons used as control group. A simple and rapid method was used to detect the simultaneous amplification of the HPV consensus L1 region and HPV-16,-18, -11, -31, 33 and -35 along with the b-globin gene as an internal control. We use Multiplex PCR for detection of hTERT and miR-146a rs2910164 genotypes in our lab. Finally, data analysis was performed using the 7 version of the Epi Info(TM) 2012 software and test chi-square(x2) for trend. Cervix lesions were collected from 42 patients with Squamous metaplasia, cervical intraepithelial neoplasia, and cervical carcinoma. Successful DNA extraction was assessed by PCR amplification of b-actin gene (99bp). According to the results, hTERT ( rs 2736098) GG genotype and miR-146a rs2910164 CC genotype was significantly associated with increased risk of cervical cancer in the study population. In this study, we detected 13 HPV 18 from 42 cervical cancer. The connection between several SNP polymorphism and human virus papilloma in rare researches were seen. The reason of these differences in researches' findings can result in different kinds of races and geographic situations and also differences in life grooves in every region. The present study provided preliminary evidence that a p53 GG genotype and miR-146a rs2910164 CC genotype may effect cervical cancer risk in the study population, interacting synergistically with HPV 18 genotype. Our results demonstrate that the testing of hTERT rs 2736098 genotypes and miR-146a rs2910164 genotypes in combination with HPV18 can serve as major risk factors in the early identification of cervical cancers. Furthermore, the results indicate the possibility of primary prevention of cervical cancer by vaccination against HPV18 in Iran.Keywords: polymorphism of hTERT gene, miR-146a rs2910164 polymorphism, cervical cancer, virus
Procedia PDF Downloads 3206186 Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning
Authors: M. D. D. Chathurangi, M. G. K. Nayanathara, K. M. H. M. M. Gunapala, G. M. R. G. Dayananda, Kavinga Yapa Abeywardena, Deemantha Siriwardana
Abstract:
Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM.Keywords: cyberbullying, spam behavior, bot accounts, fake news, machine learning
Procedia PDF Downloads 356185 Digitalization and High Audit Fees: An Empirical Study Applied to US Firms
Authors: Arpine Maghakyan
Abstract:
The purpose of this paper is to study the relationship between the level of industry digitalization and audit fees, especially, the relationship between Big 4 auditor fees and industry digitalization level. On the one hand, automation of business processes decreases internal control weakness and manual mistakes; increases work effectiveness and integrations. On the other hand, it may cause serious misstatements, high business risks or even bankruptcy, typically in early stages of automation. Incomplete automation can bring high audit risk especially if the auditor does not fully understand client’s business automation model. Higher audit risk consequently will cause higher audit fees. Higher audit fees for clients with high automation level are more highlighted in Big 4 auditor’s behavior. Using data of US firms from 2005-2015, we found that industry level digitalization is an interaction for the auditor quality on audit fees. Moreover, the choice of Big4 or non-Big4 is correlated with client’s industry digitalization level. Big4 client, which has higher digitalization level, pays more than one with low digitalization level. In addition, a high-digitalized firm that has Big 4 auditor pays higher audit fee than non-Big 4 client. We use audit fees and firm-specific variables from Audit Analytics and Compustat databases. We analyze collected data by using fixed effects regression methods and Wald tests for sensitivity check. We use fixed effects regression models for firms for determination of the connections between technology use in business and audit fees. We control for firm size, complexity, inherent risk, profitability and auditor quality. We chose fixed effects model as it makes possible to control for variables that have not or cannot be measured.Keywords: audit fees, auditor quality, digitalization, Big4
Procedia PDF Downloads 3006184 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 3176183 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 3856182 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle
Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang
Abstract:
The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids
Procedia PDF Downloads 266