Search results for: attacks and controls
1375 Experimental Investigation of Cup Anemometer under Static and Dynamic Wind Direction Changes: Evaluation of Directional Sensitivity
Authors: Vaibhav Rana, Nicholas Balaresque
Abstract:
The 3-cup anemometer is the most commonly used instrument for wind speed measurement and, consequently, for the wind resource assessment. Though the cup anemometer shows accurate measurement under quasi-static conditions, there is uncertainty in the measurement when subjected to field measurement. Sensitivity to the angle of attacks with respect to horizontal plane, dynamic response, and non-linear behavior in calibration due to friction. The presented work aimed to identify the sensitivity of anemometer to non-horizontal flow. The cup anemometer was investigated under low wind speed wind tunnel, first under the static flow direction changes and second under the dynamic direction changes, at a different angle of attacks, under the similar conditions of reference wind tunnel speeds. The cup anemometer response under both conditions was evaluated and compared. The results showed the anemometer under dynamic wind direction changes is highly sensitive compared to static conditions.Keywords: wind energy, cup anemometer, directional sensitivity, dynamic behavior, wind tunnel
Procedia PDF Downloads 1481374 Prevalence of Complement Factor H (Y402H) Gene Polymorphism and Its Impact on the Predisposition of Syrians to Age-Related Macular Degeneration (AMD) and Response to Bevacizumab Intravitreal Injection
Authors: Loubna Safar, Lama Youssef, Majd Aljamali
Abstract:
Age-related macular degeneration (AMD) is one of the leading causes of blindness worldwide. Complement factor H polymorphism (Y402H) is thought to play a potential role in the predisposition to AMD and response of patients with exudative AMD to treatment with anti-Vascular Endothelial Growth Factor (anti-VEGF). This study aimed to investigate the frequency of Y402H among Syrians, its impact on their susceptibility to AMD, and the hypothesized role of Y402H in patients' response to intravitreal anti-VEGF (i.e.,, bevacizumab). Our case-control study encompassed unrelated 54 AMD cases and 44 controls. Genotyping was determined by standard sequencing of PCR products. Frequency was compared between patients and controls, and correlation between genotype and response to treatment was assessed in 20 patients with wet AMD who received a therapeutic course of three intravitreal bevacizumab injections (once monthly). Our results revealed a significantly higher prevalence of the risk allele C among AMD cases (51.9%) in comparison with controls (37.5%) (P= 0.04, OR= 1.386, CI= 0.999- 1.923). Patients with the TT genotype (no risk allele) exhibited a significantly better primary response rate, reached 87.5% compared to only 41.7% in patients carrying the risk allele C (TC + CC), (P= 0.04, OR= 9.8, CI=0.899- 106.84). The findings of this study prove the importance of investigating Y402H polymorphism as a prognostic marker for predicting response to bevacizumab in AMD patients.Keywords: age-related macular degeneration, bevacizumab, complement factor H gene, polymorphism, Y402H
Procedia PDF Downloads 1561373 The Risk of Hyperglycemia Associated with Use of Dolutegravir among Adults Living with HIV in Kampala, Uganda: A Case Control Study
Authors: Daphine Namara, Jeremy I. Schwartz, Andrew K. Tusubira, Willi McFarland, Caroline Birungi, Fred C. Semitala, Martin Muddu
Abstract:
Emerging evidence suggests a possible association between hyperglycemia and dolutegravir (DTG), a preferred first-line antiretroviral agent in sub-Saharan Africa (SSA). There is a need for rigorous studies to validate this association in the face of increasing DTG use and the burden of non-communicable diseases among people living with HIV (PLHIV). We conducted a case-control study to assess the risk of hyperglycemia associated with the use of DTG among PLHIV attending Mulago ISS Clinic in Kampala. Cases had hyperglycemia, while controls had no hyperglycemia, as confirmed by fasting plasma glucose and oral glucose tolerance tests. Demographic, laboratory, and clinical data were collected using interviewer-administered questionnaires and medical record abstraction. The analysis compared cases and controls on DTG use prior to diagnosis of hyperglycemia while controlling for potential confounders using multivariable logistic regression. We included 204 cases and 231 controls. In multivariable analysis, patients with prior DTG use had seven times greater odds of subsequent diagnosis of hyperglycemia compared to those who had non-DTG-based regimens (adjusted odds ratio [aOR] 7.01, 95% CI 1.96-25.09). The odds of hyperglycemia also increased with age (56 years and above vs. 18-35, aOR 12.38, 95% CI 3.79-40.50) and hypertension (aOR 5.78, 95% CI 2.53-13.21). Our study demonstrates a strong association between prior DTG exposure and subsequent diagnosis of hyperglycemia. Given the benefits of DTG, wide-scale use, and the growing burden of diabetes mellitus (DM) in SSA, there is a need for systematic screening for hyperglycemia and consideration of alternate regimens for those at risk for DM.Keywords: HIV, hyperglycemia, doluteravir, diabetes
Procedia PDF Downloads 861372 The Effect of Parameter Controls for Manure Composting in Waste Recycling Process
Authors: Junyoung Kim, Shangwha Cha, Soomee Kang, Jake S. Byun
Abstract:
This study shows the effect of parameter controls for livestock manure composting in waste recycling process for the development of a new design of a microorganism-oriented- composting system. Based on the preliminary studies, only the temperature control by changing mechanical mixing can reduce microorganisms’ biodegradability from 3 to 6 months to 15 days, saving the consumption of energy and manual labor. The final degree of fermentation in just 5 days of composting increased to ‘3’ comparing the compost standard level ‘4’ in Korea, others standards were all satisfied. This result shows that the controlling the optimum microorganism parameter using an ICT device connected to mixing condition can increase the effectiveness of fermentation system and reduce odor to nearly zero, and lead to upgrade the composting method than the conventionalKeywords: manure composting, odor removal, parameter control, waste recycling
Procedia PDF Downloads 3101371 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security
Procedia PDF Downloads 1681370 Anterior Segment Optical Coherence Tomography Study of Cornea and Tear Film Parameters in Juvenile Systemic Lupus Erythematous Patients
Authors: Mohamed Salah El-Din Mahmoud, Ahmed Hamed, Asmaa Anwar Mohamed
Abstract:
Purpose: To study the tear film parameters, total corneal thickness (CT), corneal epithelial thickness and, corneal power in Juvenile systemic lupus erythematosus (JSLE) patients compared to age-matched controls using anterior segment optical coherence tomography (AS-OCT). Methods: This was a cross-sectional study. Study participants were divided into 2 groups: Group A: 75 eyes of JSLE patients, Group B: 75 eyes of healthy controls. Tear meniscus height (TMH), tear meniscus depth (TMD), and tear meniscus area (TMA) were the lower tear meniscus parameters that were measured. The corneal power, CT, and epithelial thickness were all determined automatically. Results: In the JSLE group, the range of age was 10 to 15 years while the control group was 11 to 16 years. TMH, TMA, and TMD were 527.7±46.8, 0.059±0.015 and 343.3±59.9 respectively in JSLE group while 525.4±44.6, 0.058±0.011 and 340.6±58.0 respectively in control group without significant difference (p-value<0.001). The corneal power was 43.3±0.55 in the JSLE while 43.2±0.54 in the control group without significant difference (p-value= 0.407). CT was 551.1±13.5 in JSLE group while 551.2±15.3 in control group without significant difference (p-value= 0.982). Epithelial thickness was 52.66±1.35 in the JSLE group while 52.60±1.36 in the control group without significant difference (p-value= 0.765). Conclusion: We demonstrated no significant difference in tear meniscus dimensions, CT, epithelial thickness, and corneal power in the JSLE patients compared to age-matched controls using AS-OCT.Keywords: tear film, ASOCT, JSLE, pachymetry, corneal thickness
Procedia PDF Downloads 1721369 Monocytic Paraoxonase 2 (PON 2) Lactonase Activity Is Related to Myocardial Infarction
Authors: Mukund Ramchandra Mogarekar, Pankaj Kumar, Shraddha V. More
Abstract:
Background: Total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), very low-density lipoprotein cholesterol (VLDL-C), Apo B, and lipoprotein(a) was found as atherogenic factors while high-density lipoprotein cholesterol (HDL-C) was anti-atherogenic. Methods and Results: The study group consists of 40 MI subjects as cases and 40 healthy as controls. Monocytic PON 2 Lactonase (LACT) activity was measured by using Dihydrocoumarine (DHC) as substrate. Phenotyping was done by method of Mogarekar MR et al, serum AOPP by modified method of Witko-Sarsat V et al and Apo B by Turbidimetric immunoassay. PON 2 LACT activities were significantly lower (p< 0.05) and AOPPs & Apo B were higher in MI subjects (p> 0.05). Trimodal distribution of QQ, QR & RR phenotypes of study population showed no significant difference among cases and controls (p> 0.05). Univariate binary logistic regression analysis showed independent association of TC, HDL, LDL, AOPP, Apo B, and PON 2 LACT activity with MI and multiple forward binary logistic regression showed PON 2 LACT activity and serum Apo B as an independent predictor of MI. Conclusions- Decrease in PON 2 LACT activity in MI subjects than in controls suggests increased oxidative stress in MI which is reflected by significantly increased AOPP and Apo B. PON 1 polymorphism of QQ, QR and RR showed no significant difference in protection against MI. Univariate and multiple forward binary logistic regression showed PON 2 LACT activity and serum Apo B as an independent predictor of MI.Keywords: advanced oxidation protein products, apolipoprotein-B, myocardial infarction, paraoxonase 2 lactonase
Procedia PDF Downloads 2391368 Literature Review: Adversarial Machine Learning Defense in Malware Detection
Authors: Leidy M. Aldana, Jorge E. Camargo
Abstract:
Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.Keywords: Malware, adversarial, machine learning, defense, attack
Procedia PDF Downloads 631367 Identification of the Expression of Top Deregulated MiRNAs in Rheumatoid Arthritis and Osteoarthritis
Authors: Hala Raslan, Noha Eltaweel, Hanaa Rasmi, Solaf Kamel, May Magdy, Sherif Ismail, Khalda Amr
Abstract:
Introduction: Rheumatoid arthritis (RA) is an inflammatory, autoimmune disorder with progressive joint damage. Osteoarthritis (OA) is a degenerative disease of the articular cartilage that shows multiple clinical manifestations or symptoms resembling those of RA. Genetic predisposition is believed to be a principal etiological factor for RA and OA. In this study, we aimed to measure the expression of the top deregulated miRNAs that might be the cause of pathogenesis in both diseases, according to our latest NGS analysis. Six of the deregulated miRNAs were selected as they had multiple target genes in the RA pathway, so they are more likely to affect the RA pathogenesis.Methods: Eighty cases were recruited in this study; 45 rheumatoid arthiritis (RA), 30 osteoarthiritis (OA) patients, as well as 20 healthy controls. The selection of the miRNAs from our latest NGS study was done using miRwalk according to the number of their target genes that are members in the KEGG RA pathway. Total RNA was isolated from plasma of all recruited cases. The cDNA was generated by the miRcury RT Kit then used as a template for real-time PCR with miRcury Primer Assays and the miRcury SYBR Green PCR Kit. Fold changes were calculated from CT values using the ΔΔCT method of relative quantification. Results were compared RA vs Controls and OA vs Controls. Target gene prediction and functional annotation of the deregulated miRNAs was done using Mienturnet. Results: Six miRNAs were selected. They were miR-15b-3p, -128-3p, -194-3p, -328-3p, -542-3p and -3180-5p. In RA samples, three of the measured miRNAs were upregulated (miR-194, -542, and -3180; mean Rq= 2.6, 3.8 and 8.05; P-value= 0.07, 0.05 and 0.01; respectively) while the remaining 3 were downregulated (miR-15b, -128 and -328; mean Rq= 0.21, 0.39 and 0.6; P-value= <0.0001, <0.0001 and 0.02; respectively) all with high statistical significance except miR-194. While in OA samples, two of the measured miRNAs were upregulated (miR-194 and -3180; mean Rq= 2.6 and 7.7; P-value= 0.1 and 0.03; respectively) while the remaining 4 were downregulated (miR-15b, -128, -328 and -542; mean Rq= 0.5, 0.03, 0.08 and 0.5; P-value= 0.0008, 0.003, 0.006 and 0.4; respectively) with statistical significance compared to controls except miR-194 and miR-542. The functional enrichment of the selected top deregulated miRNAs revealed the highly enriched KEGG pathways and GO terms. Conclusion: Five of the studied miRNAs were greatly deregulated in RA and OA, they might be highly involved in the disease pathogenesis and so might be future therapeutic targets. Further functional studies are crucial to assess their roles and actual target genes.Keywords: MiRNAs, expression, rheumatoid arthritis, osteoarthritis
Procedia PDF Downloads 791366 Apolipoprotein A1 -75 G to a Substitution and Its Relationship with Serum ApoA1 Levels among Indian Punjabi Population
Authors: Savjot Kaur, Mridula Mahajan, AJS Bhanwer, Santokh Singh, Kawaljit Matharoo
Abstract:
Background: Disorders of lipid metabolism and genetic predisposition are CAD risk factors. ApoA1 is the apolipoprotein component of anti-atherogenic high density lipoprotein (HDL) particles. The protective action of HDL and ApoA1 is attributed to their central role in reverse cholesterol transport (RCT). Aim: This study was aimed at identifying sequence variations in ApoA1 (-75G>A) and its association with serum ApoA1 levels. Methods: A total of 300 CAD patients and 300 Normal individuals (controls) were analyzed. PCR-RFLP method was used to determine the DNA polymorphism in the ApoA1 gene, PCR products digested with restriction enzyme MspI, followed by Agarose Gel Electrophoresis. Serum apolipoprotein A1 concentration was estimated with immunoturbidimetric method. Results: Deviation from Hardy- Weinberg Equilibrium (HWE) was observed for this gene variant. The A- allele frequency was higher among Coronary Artery disease patients (53.8) compared to controls (45.5), p= 0.004, O.R= 1.38(1.11-1.75). Under recessive model analysis (AA vs. GG+GA) AA genotype of ApoA1 G>A substitution conferred ~1 fold increased risk towards CAD susceptibility (p= 0.002, OR= 1.72(1.2-2.43). With serum ApoA1 levels < 107 A allele frequency was higher among CAD cases (50) as compared to controls (43.4) [p=0.23, OR= 1.2(0.84-2)] and there was zero % occurrence of A allele frequency in individuals with ApoA1 levels > 177. Conclusion: Serum ApoA1 levels were associated with ApoA1 promoter region variation and influence CAD risk. The individuals with the APOA1 -75 A allele confer excess hazard of developing CAD as a result of its effect on low serum concentrations of ApoA1.Keywords: apolipoprotein A1 (G>A) gene polymorphism, coronary artery disease (CAD), reverse cholesterol transport (RCT)
Procedia PDF Downloads 3161365 Blockchain in Saudi E-Government: A Systematic Literature Review
Authors: Haitham Assiri, Priyadarsi Nanda
Abstract:
The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.Keywords: blockchain, data integrity, e-government, security threats
Procedia PDF Downloads 2501364 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 1391363 Association of Human Immunodeficiency Virus with Incident Autoimmune Hemolytic Anemia: A Population-Based Cohort Study in Taiwan
Authors: Yung-Feng Yen, I-an Jen, Yi-Ming Arthur Chen
Abstract:
The molecular mimicry between human immunodeficiency virus (HIV) protein and red blood cell (RBC) antigens could induce the production of anti-RBC autoantibodies. However, the association between HIV infection and subsequent development of autoimmune hemolytic anemia (AIHA) remains unclear. This nationwide population-based cohort study aimed to determine the association between incident AIHA and HIV in Taiwan. From 2000–2012, we identified adult people living with HIV/AIDS (PLWHA) from the Taiwan centers for disease control HIV Surveillance System. HIV-infected individuals were defined by positive HIV-1 western blot. Age- and sex-matched controls without HIV infection were selected from the Taiwan National Health Insurance Research Database for comparison. All patients were followed until Dec. 31, 2012, and observed for occurrence of AIHA. Of 171,468 subjects (19,052 PLWHA, 152,416 controls), 30 (0.02%) had incident AIHA during a mean follow-up of 5.45 years, including 23 (0.12%) PLWHA and 7 (0.01%) controls. After adjusting for potential confounders, HIV infection was found to be an independent risk factor of incident AIHA (adjusted hazard ratio [AHR], 20.9; 95% confidence interval [CI], 8.34-52.3). Moreover, PLWHA receiving HAART were more likely to develop AIHA than those not receiving HAART (AHR, 10.8; 95% CI, 2.90-40.1). Additionally, the risk of AIHA was significantly increased in those taking efavirenz (AHR, 3.15; 95% CI, 1.18-8.43) or atazanavir (AHR, 6.58; 95% CI, 1.88-22.9) component of the HAART. In conclusion, HIV infection is an independent risk factor for incident AIHA. Clinicians need to be aware of the higher risk of AIHA in PLWHA.Keywords: autoimmune disease , hemolytic anemia, HIV, highly active antiretroviral treatment
Procedia PDF Downloads 2351362 Combining Transcriptomics, Bioinformatics, Biosynthesis Networks and Chromatographic Analyses for Cotton Gossypium hirsutum L. Defense Volatiles Study
Authors: Ronald Villamar-Torres, Michael Staudt, Christopher Viot
Abstract:
Cotton Gossypium hirsutum L. is one of the most important industrial crops, producing the world leading natural textile fiber, but is very prone to arthropod attacks that reduce crop yield and quality. Cotton cultivation, therefore, makes an outstanding use of chemical pesticides. In reaction to herbivorous arthropods, cotton plants nevertheless show natural defense reactions, in particular through volatile organic compounds (VOCs) emissions. These natural defense mechanisms are nowadays underutilized but have a very high potential for cotton cultivation, and elucidating their genetic bases will help to improve their use. Simulating herbivory attacks by mechanical wounding of cotton plants in greenhouse, we studied by qPCR the changes in gene expression for genes of the terpenoids biosynthesis pathway. Differentially expressed genes corresponded to higher levels of the terpenoids biosynthesis pathway and not to enzymes synthesizing particular terpenoids. The genes were mapped on the G. hirsutum L. reference genome; their global relationships inside the general metabolic pathways and the biosynthesis of secondary metabolites were visualized with iPath2. The chromatographic profiles of VOCs emissions indicated first monoterpenes and sesquiterpenes emissions, dominantly four molecules known to be involved in plant reactions to arthropod attacks. As a result, the study permitted to identify potential key genes for the emission of volatile terpenoids by cotton plants in reaction to an arthropod attack, opening possibilities for molecular-assisted cotton breeding in benefit of smallholder cotton growers.Keywords: biosynthesis pathways, cotton, mechanisms of plant defense, terpenoids, volatile organic compounds
Procedia PDF Downloads 3741361 Comparative Study of Mechanical and Physiological Gait Efficiency Following Anterior Cruciate Ligament Reconstruction
Authors: Radwa E. Sweif, Amira A. A. Abdallah
Abstract:
Background: Evaluation of gait efficiency is used to examine energy consumption especially in patients with movement disorders. Hypothesis/Purpose: This study compared the physiological and mechanical measures of gait efficiency between patients with ACL reconstruction (ACLR) and healthy controls and correlated among these measures. Methods: Seventeen patients with ACLR and sixteen healthy controls with mean ± SD age 23.06±4.76 vs 24.85±6.47 years, height 173.93±6.54 vs 175.64±7.37cm, and weight 74.25±12.1 vs 76.52±10.14 kg, respectively, participated in the study. The patients were operated on six months prior to testing. They should have completed their accelerated rehabilitation program during this period. A 3D motion analysis system was used for collecting the mechanical measures (Biomechanical Efficiency Quotient (BEQ), the maximum degree of knee internal rotation during stance phase and speed of walking). The physiological measures (Physiological Cost Index (PCI) and Rate of Perceived Exertion (RPE)) were collected after performing the 6- minute walking test. Results: MANOVA showed that the maximum degree of knee internal rotation, PCI, and RPE increased and the speed decreased significantly (p<0.05) in the patients compared with the controls with no significant difference for the BEQ. Finally, there were significant (p<0.05) positive correlations between each of the PCI & RPE and each of the BEQ, speed of walking and the maximum degree of knee internal rotation in each group. Conclusion: It was concluded that there are alterations in both mechanical and physiological measures of gait efficiency in patients with ACLR after being rehabilitated, clarifying the need for performing additional endurance as well as knee stability training programs. Moreover, the positive correlations indicate that using either of the mechanical or physiological measures for evaluating gait efficiency is acceptable.Keywords: ACL reconstruction, mechanical, physiological, gait efficiency
Procedia PDF Downloads 4381360 Dietary Habits and Cardiovascular Risk factors Among the Patients of the Coronary Artery Disease: A Case Control Study
Authors: Muhammad Kamran Hanif Khan, Fahad Mushtaq
Abstract:
Globally, the death rate from cardiovascular disease has risen over the past 20 years, but especially in low and middle-income countries (LMICS), reports the World Health Organization (WHO). Around 17.5 million deaths, or 31% of all deaths worldwide in 2012, were attributed to CVD, 80% of which occurred in low- and middle-income nations, and eighty five percent of all worldwide disability is attributable to cardiovascular disease. This study assessed the dietary habit and Cardiovascular Risk factors among the patients of coronary artery disease against matched controls. The research was a case-control study. Sample size for this case-control study was 410 CAD cases and 410 healthy controls. The case-control ratio was 1:1. Patients diagnosed with coronary artery disease were recruited from the outpatient departments and emergency rooms of four hospitals in Pakistan. The ages of people who were diagnosed with coronary artery disease were not significantly different from (mean 57.97 7.39 years) the healthy controls (mean 57.12 6.73 years). In order to determine the relationship between food consumption and the two binary outcomes, logistic regression analysis was carried out. Chicken (0.340 (0.245-0.47), p-value 0.0001), beef (0.38 (0.254-0.56), p-value 0.0001), eggs (0.297 (0.208-0.426), p-value 0.0001), and junk food (0.249 (0.167-0.372), p-value 0.0001)) were protective, while yogurt consumption more than twice weekly was risk. Conclusion: In conclusion, poor dietary habits are closely linked to the risk of CAD. Investigations based on dietary trends offer vital and practical knowledge about societal patterns.Keywords: dietary habbits, cardiovasculardisease, CVD risk factors, hypercholesterolemia
Procedia PDF Downloads 821359 Numerical Analysis of Dynamic Responses of the Plate Subjected to Impulsive Loads
Authors: Behzad Mohammadzadeh, Huyk Chun Noh
Abstract:
The plate is one of the popular structural elements used in a wide range of industries and structures. They may be subjected to blast loads during explosion events, missile attacks or aircraft attacks. This study is to investigate dynamic responses of the rectangular plate subjected to explosive loads. The effects of material properties and plate thickness on responses of the plate are to be investigated. The compressive pressure is applied to the surface of the plate. Different amounts of thickness in the range from 10mm to 30mm are considered for the plate to evaluate the changes in responses of the plate with respect to the plate thickness. Two different properties are considered for the steel. First, the analysis is performed by considering only the elastic-plastic properties for the steel plate. Later on damping is considered to investigate its effects on the responses of the plate. To do analysis, the numerical method using a finite element based package ABAQUS is applied. Finally, dynamic responses and graphs showing the relation between maximum displacement of the plate and aim parameters are provided.Keywords: impulsive loaded plates, dynamic analysis, ABAQUS, material nonlinearity
Procedia PDF Downloads 5231358 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy
Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides
Abstract:
The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams
Procedia PDF Downloads 981357 Nitric Oxide and Blood Based Ratios as Promising Immuno-Markers in Patients with Complicated Crohn’s Disease: Benefits for Predicting Therapy Response
Authors: Imene Soufli, Abdelkrim Hablal, Manel Amri, Moussa Labsi, Rania Sihem Boussa, Nassim Sid Idris, Chafia Touil-Boukoffa
Abstract:
Crohn’s Disease (CD) is a relapsing–remitting inflammatory bowel disease with a progressive course. The aim of our study was to evaluate the relationship between the immunomarkers: Nitric Oxide (NO), pro-inflammatory cytokines, and blood count-based ratios and the outcome of corticosteroid or anti-TNF-α therapy in patients with complicated Crohn’s Disease. In this context, we evaluated the NLR as the ratio of neutrophil count to lymphocyte count, PLR as the ratio of platelet counts to lymphocyte count, and MLR as the ratio of monocyte count to lymphocyte count in patients and controls. Furthermore, we assessed NO production by the Griess method in plasma along with iNOS and NF-κB expression by immunofluorescence method in intestinal tissues of patients and controls. In the same way, we evaluated plasma TNF-α, IL-17A, and IL-10 levels using ELISA. Our results indicate that blood count-based ratios NLR, PLR, and MLR were significantly higher in patients compared to controls. In addition, increased systemic levels of NO, TNF-α, and IL-17A and colonic expression of iNOS and NF-κB were observed in the same patients. Interestingly, the high ratio of NLR and MLR, as well as NO production, was significantly decreased in treated patients. Collectively, our findings suggest that Nitric Oxide, as well as the blood count-based ratios (NLR, PLR, MLR), could constitute useful immuno-markers in complicated Crohn’s Disease, predicting the response to treatmentKeywords: complicated crohn’s disease, nitric oxide, blood count-based ratios, treatments, pro-inflammatory cytokines
Procedia PDF Downloads 791356 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4361355 A Model Approach of Good Practice Based on the Project Management Body of Knowledge® Guide in the Project Owner
Authors: Claudia Marcela Munoz Gonzalez, Diego Fernando Hernandez Losada, Hugo Alberto Herrera Fonseca
Abstract:
The project owner's role in the public-private investment consists of controlling and verifying the correct execution of the project's objectives and resources. Likewise, it is a discipline little explored in the academic field, whereby this work wishes to contribute with a model of good practices based on the project management methodology proposed by the Project Management Body of Knowledge® Guide. In the same way, highlight what are the controls that an integral project owner should take into account in its exercise and application, through the stages in which its contract runs. This proposal aims to structure its practice and integrate its functions according to a project management methodology. In addition, these practices will be applied in a case study of projects in the agricultural sector, particularly in the construction of irrigation district in Cundinamarca, Colombia.Keywords: controls, construction of irrigation district, PMBOK®, project owner
Procedia PDF Downloads 4581354 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1471353 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4971352 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms
Authors: Volkan Kaya, Ersin Elbasi
Abstract:
Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.Keywords: watermarking, medical image, frequency domain, least significant bits, security
Procedia PDF Downloads 2881351 Genetic Analysis of CYP11A1 Gene with Polycystic Ovary Syndrome from North India
Authors: Ratneev Kaur, Tajinder Kaur, Anupam Kaur
Abstract:
Introduction: Polycystic Ovary Syndrome (PCOS) is a heterogenous disorder of endocrine system among women of reproductive age. PCOS is characterized by hyperandrogenism, anovulation, polycystic ovaries, hirsutism, obesity, and hyperinsulinemia. Several pathways are implicated in its etiology including the metabolic pathway of steroid hormone synthesis regulatory pathways. PCOS is an androgen excess disorder, genes operating in steroidogenesis may alter pathogenesis of PCOS. The cytochrome P450scc is a cholesterol side chain cleavage enzyme coded by CYP11A1 gene and catalyzes conversion of cholesterol to pregnenolone, the initial and rate-limiting step in steroid hormone synthesis. It is postulated that polymorphisms in this gene may play an important role in the regulation of CYP11A1 expression and leading to increased or decreased androgen production. The present study will be the first study from north India to best of our knowledge, to analyse the association of CYP11A1 (rs11632698) polymorphism in women suffering from PCOS. Methodology: The present study was approved by ethical committee of Guru Nanak Dev University in consistent with declaration of Helsinki. A total of 300 samples (150 PCOS cases and 150 controls) were recruited from Hartej hospital, for the present study. Venous blood sample (3ml) was withdrawn from women diagnosed with PCOS by doctor, according to Rotterdam 2003 criteria and from healthy age matched controls only after informed consent and detailed filled proforma. For molecular genetics analysis, blood was stored in EDTA vials. After DNA isolation by organic method, PCR-RFLP approach was used for genotyping and association analysis of rs11632698 polymorphism. Statistical analysis was done to check for significance of selected polymorphism with PCOS. Results: In 150 PCOS cases, the frequency of AA, AG and GG genotype was found to be 48%, 35%, and 13% compared to 62%, 27% and 8% in 150 controls. The major allele (A) and minor allele (G) frequency was 68% and 32% in cases and 78% and 22% in controls. Minor allele frequency was higher in cases as compared to controls, as well as the distribution of genotype was observed to be statistically significant (ᵡ²=6.525, p=0.038). Odds ratio in dominant, co-dominant and recessive models observed was 1.81 (p=0.013), 1.54 (p=0.012) and 1.77 (p=0.132) respectively. Conclusion: The present study showed statistically significant association of rs11632698 with PCOS (p=0.038) in North Indian women.Keywords: polycystic ovary syndrome, CYP11A1, rs11632698, hyperandrogenism
Procedia PDF Downloads 1421350 Ramadan as a Model of Intermittent Fasting: Effects on Gut Hormones, Appetite and Body Composition in Diabetes vs. Controls
Authors: Turki J. Alharbi, Jencia Wong, Dennis Yue, Tania P. Markovic, Julie Hetherington, Ted Wu, Belinda Brooks, Radhika Seimon, Alice Gibson, Stephanie L. Silviera, Amanda Sainsbury, Tanya J. Little
Abstract:
Fasting has been practiced for centuries and is incorporated into the practices of different religions including Islam, whose followers intermittently fast throughout the month of Ramadan. Thus, Ramadan presents a unique model of prolonged intermittent fasting (IF). Despite a growing body of evidence for a cardio-metabolic and endocrine benefit of IF, detailed studies of the effects of IF on these indices in type 2 diabetes are scarce. We studied 5 subjects with type 2 diabetes (T2DM) and 7 healthy controls (C) at baseline (pre), and in the last week of Ramadan (post). Fasting circulating levels of glucose, HbA1c and lipids, as well as body composition (with DXA) and resting energy expenditure (REE) were measured. Plasma gut hormone levels and appetite responses to a mixed meal were also studied. Data are means±SEM. Ramadan decreased total fat mass (-907±92 g, p=0.001) and trunk fat (-778±190 g, p=0.014) in T2DM but not in controls, without any reductions in lean mass or REE. There was a trend towards a decline in plasma FFA in both groups. Ramadan had no effect on body weight, glycemia, blood pressure, or plasma lipids in either group. In T2DM only, the area under the curve for post-meal plasma ghrelin concentrations increased after Ramadan (pre:6632±1737 vs. post:9025±2518 pg/ml.min-1, p=0.045). Despite this increase in orexigenic ghrelin, subjective appetite scores were not altered by Ramadan. Meal-induced plasma concentrations of the satiety hormone pancreatic polypeptide did not change during Ramadan, but were higher in T2DM compared to controls (post: C: 23486±6677 vs. T2DM: 62193±6880 pg/ml.min-1, p=0.003. In conclusion, Ramadan, as a model for IF appears to have more favourable effects on body composition in T2DM, without adverse effects on metabolic control or subjective appetite. These data suggest that IF may be particularly beneficial in T2DM as a nutritional intervention. Larger studies are warranted.Keywords: type 2 diabetes, obesity, intermittent fasting, appetite regulating hormones
Procedia PDF Downloads 3121349 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 3731348 Evolution of Bombings against Transportation Infrastructure
Authors: Jonathan K. Hill
Abstract:
The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.Keywords: Africa, bombings, critical infrastructure protection, transportation security
Procedia PDF Downloads 4251347 Geochemical Controls of Salinity in a Typical Acid Mine Drainage Neutralized Groundwater System
Authors: Modreck Gomo
Abstract:
Although the dolomite and calcite carbonates can neutralize Acid Mine Drainage (AMD) and prevent leaching of metals, salinity still remains a huge problem. The study presents a conceptual discussion of geochemical controls of salinity in a typical calcite and dolomite AMD neutralised groundwater systems. Thereafter field evidence is presented to support the conceptual discussions. 1020 field data sets of from a groundwater system reported to be under circumneutral conditions from the neutralization effect of calcite and dolomite is analysed using correlation analysis and bivariate plots. Field evidence indicates that sulphate, calcium and magnesium are strongly and positively correlated to Total Dissolved Solids (TDS) which is used as measure of salinity. In this, a hydrogeochemical system, the dissolution of sulphate, calcium and magnesium form AMD neutralization process contributed 50%, 10% and 5% of the salinity.Keywords: acid mine drainage, carbonates, neutralization, salinity
Procedia PDF Downloads 1441346 Compliance Of Dialysis patients With Nutrition Guidelines: Insights From A Questionnaire
Authors: Zeiler M., Stadler D., Schmaderer C.
Abstract:
Over the years of dialysis treatment, most patients experience significant weight loss. The primary emphasis in earlier research was the underlying mechanism of protein energy wasting and the subsequent malnutrition inflammation syndrome. In the interest to provide an effective and rapid solution for the patients, the aim of this study is identifying individual influences of their assumed reduced dietary intake, such as nausea, appetite loss and taste changes, and to determine whether the patients adhere to their nutrition guidelines. A prospective, controlled study with 38 end-stage renal disease patients was performed using a questionnaire to reflect their diet within the last 12 months. Thereby, the daily intake for the most important macro-and micronutrients was calculated to be compared with the individual KDQOI-guideline value, as well as controls matched in age and gender. The majority of the study population did not report symptoms commonly associated with dialysis, such as nausea or inappetence, and denied any change in dietary behavior since receiving renal replacement therapy. The patients’ daily intake of energy (3080kcal ± 1266) and protein (89,9g [53,4-142,0]) did not differ significantly from the controls (energy intake: 3233kcal ± 1046, p=0,597; protein intake: 103,7g [90,1-125,5], p=0,120). The average difference to the individual calculated KDQOI-guideline was +176,0kcal ± 1156 (p=0,357) for energy intake and -1,75g ± 45,9 (p=0,491) for protein intake. However, there was an observed imbalance in the distribution of macronutrients, with a preference for fats over proteins. The patients’ daily intake of sodium (5,4g [ 2,95-10,1]) was higher than in the controls (4,1g [2,04-5,99], p= 0,058) whereas both values for potassium (3,7g ± 1,84) and phosphorous (1,79g ± 0,91) went significantly below the controls’ values (potassium intake: 4,89g ± 1,74, p=0,014; phosphorous intake: 2,04g ± 0,64, p=0,038). Thus, the values exceeded the calculated KDQOI-recommendation by + 3,3g [0,63-7,90] (p<0,001) for sodium, +1,49g ± 1,84 (p<0,001) for potassium and +0,89g ± 0,91 (p<0,001) for phosphorous. Contrary to the assumption, the patients did not under-eat. Nevertheless, their diets did not align with the recommended values. These findings highlight the need for intervention and education among patients and that regular dietary monitoring could prevent unhealthy nutrition habits. The elaboration of individual references instead of standardized guidelines could increase the compliance to the advised diet so that interdisciplinary comorbidities do not develop or worsen.Keywords: compliance, dialysis, end-stage renal disease, KDQOI, malnutrition, nutrition guidelines, questionnaire, salt intake
Procedia PDF Downloads 68