Search results for: attacks and controls
1344 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 3371343 The Crossroads of Corruption and Terrorism in the Global South
Authors: Stephen M. Magu
Abstract:
The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.Keywords: corruption, global south, identification, passports, terrorism
Procedia PDF Downloads 4221342 Combination between Intrusion Systems and Honeypots
Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal
Abstract:
Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor
Procedia PDF Downloads 3821341 Headache Masquerading as Common Psychiatric Disorders in Patients of Low Economic Class in a Tertiary Care Setting
Authors: Seema Singh Parmar, Shweta Chauhan
Abstract:
Aims & Objectives: To evaluate the presence of various psychiatric disorders in patients reporting with a headache as the only symptom. Methodology: 200 patients with the chief complain of a headache who visited the psychiatric OPD of a tertiary care were investigated. Out of them 50 who had pure psychiatric illness without any other neurological disease were investigated, and their diagnosis was made. Independent sample t-tests were applied to generate results. Results: The most common psychiatric diagnosis seen in the sample was Depression (64%) out of which 47% showed features of Depression with anxious distress. Other psychiatric disorders seen were Generalized Anxiety Disorder, Panic Attacks, Somatic Symptom Disorder and Obsessive Compulsive Disorder. For pure psychiatry, headache related illnesses female to male ratio was 1.64. Conclusion: The increasing frequency of psychiatric disorders among patients who only visit the doctor seeking treat a headache shows the need for better identification of psychiatric disorders because proper diagnosis and target of psychiatric treatment shall give complete relief to the patient’s symptomatology.Keywords: anxiety disorders, depression, headache, panic attacks
Procedia PDF Downloads 3761340 Haptic Robotic Glove for Tele-Exploration of Explosive Devices
Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes
Abstract:
ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation
Procedia PDF Downloads 1761339 Genetic Polymorphism in the Vitamin D Receptor Gene and 25-Hydroxyvitamin D Serum Levels in East Indian Women with Polycystic Ovary Syndrome
Authors: Dipanshu Sur, Ratnabali Chakravorty
Abstract:
Background: Polycystic ovary syndrome (PCOS) is the most common metabolic abnormality such as changes in lipid profile, diabetes, hypertension and metabolic syndrome occurring in young women of reproductive age. Low vitamin D levels were found to be associated with the development of obesity and insulin resistance in women with PCOS. Variants on vitamin D receptor (VDR) gene have also been related to metabolic comorbidities in general population. Aim: The aim of this case-control study was to investigate whether the VDR gene polymorphisms are associated with susceptibility to PCOS. Methods: Women with PCOS and a control group, all aged 16-40 years, were enrolled. Genotyping of VDR Fok-I (rs2228570), VDR Apa-I (rs7975232) as well as GC (rs2282679), DHCR7 (rs12785878) SNPs between groups were determined by using direct sequencing. Serum 25-hydroxyvitamin D [25(OH)] levels were measured by ELISA. Results: Mean serum 25(OH)D in the PCOS and control samples were 19.08±7 and 23.27±6.03 (p=0.048) which were significantly lower in PCOS patients compared with controls. CC genotype of the VDR Apa-I SNP was same frequent in PCOS (25.6%) and controls (25.6%) (OR: 0.9995; 95%CI: 0.528 to 1.8921; p= 0.9987). The CC genotype was also significantly associated with both lower E2 (p=0.031) and Androstenedione levels (p=0.062). We observed a significant association of GC polymorphism with 25(OH)D levels. PCOS women carrying the GG genotype (in GC genes) had significantly higher risk for vitamin D deficiency than women carrying the TT genotype. Conclusions: In conclusion, data from this study indicate that vitamin D levels are lower, and vitamin D deficiency more frequent, in PCOS than in controls. The present findings suggest that the Apa-I, Fok-I polymorphism of the VDR gene is associated with PCOS and seems to modulate ovarian steroid secretion. Further studies are needed to better clarify the biological mechanisms by which the polymorphism influences PCOS risk.Keywords: vitamin D receptor, polymorphism, vitamin D, polycystic ovary syndrome
Procedia PDF Downloads 3051338 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment
Authors: Manas Tripathi, Arunabha Mukhopadhyay
Abstract:
In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security
Procedia PDF Downloads 2781337 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2681336 Inflammatory Changes in Postmenopausal Women including Th17 and Treg
Authors: Ae Ra Han, Seoung Eun Huh, Ji Yeon Kim, Joanne Kwak-Kim, Sung Ki Lee
Abstract:
Objective: Prevalence of osteoporosis, cardiovascular disorders, and Alzheimer's disease rapidly increase after menopause. Immune activation and inflammation are suggested as an important pathogenesis of these serious diseases. Several pro-inflammatory cytokines are increased in women with surgical or natural menopause. However, the little is known about IL-17 producing T cells and Foxp3+ regulatory T (Treg) cells in post-menopause. Methods: A total of 34 postmenopausal women, who had no active cardiovascular, endocrine and infectious disorders were recruited as study group and healthy premenopausal women participated as controls. Peripheral blood mononuclear cells were isolated. Immuno-morphologic (CD3, CD4, CD8, CD19, CD56/CD16), intracellular cytokine (TNF-alpha, IFN-gamma, IL-10, IL-17), and Treg cell (Foxp3) studies were carried out using flow cytometry. The proportion of peripheral lymphocytes, including IL-17 producing and Foxp3+ Treg cells immune cell in each group were statistically analyzed. Results: The proportion of NK cells was significantly increased in menopausal women as compared to that of controls (P=.005). The ratios of TNF-alpha/IL-10 producing CD3+CD4+ T cells were increased in postmenopausal women. CD3+IL-17+ T cell level was higher in postmenopausal women and CD4+ Foxp3+ Treg cells was lower than that of controls. The ratios of CD3+IL-17+ T cell to CD3+Foxp3+ and to CD4+Foxp3+ Treg cells were significantly increased in postmenopausal women (P=.001). Conclusions: We found enhanced innate immunity and Th1- and Th17-mediated adaptive immunity in postmenopausal women. This may explain increasing prevalence of chronic inflammatory diseases after menopause. Further studies are needed to elucidate what factors contribute to this inflammatory shift in the postmenopause.Keywords: inflammation, immune cell, menopause, Th17, regulatory T cell
Procedia PDF Downloads 3231335 An Analytical Study on the Effect of Chronic Liver Disease Severity and Etiology on Lipid Profiles
Authors: Thinakar Mani Balusamy, Venkateswaran A. R., Bharat Narasimhan, Ratnakar Kini S., Kani Sheikh M., Prem Kumar K., Pugazhendi Thangavelu, Arun Murugan, Sibi Thooran Karmegam, Radhakrishnan N., Mohammed Noufal, Amit Soni
Abstract:
Background and Aims: The liver is integral to lipid metabolism, and a compromise in its function leads to perturbations in these pathways. In this study, we hope to determine the correlation between CLD severity and its effect on lipid parameters. We also look at the etiology-specific effects on lipid levels. Materials and Methods: This is a retrospective cross-sectional analysis of 250 patients with cirrhosis compared to 250 healthy age and sex-matched controls. Severity assessment of CLD using MELD and Child-Pugh scores was performed and etiological details collected. A questionnaire was used to obtain patient demographic details and lastly, a fasting lipid profile (Total, LDL, HDL cholesterol, Triglycerides and VLDL) was obtained. Results: All components of the lipid profile declined linearly with increasing severity of CLD as determined by MELD and Child-Pugh scores. Lipid levels were clearly lower in CLD patients as compared to healthy controls. Interestingly, preliminary analysis indicated that CLD of different etiologies had differential effects on Lipid profiles. This aspect is under further analysis. Conclusion: All components of the lipid profile were definitely lower in CLD patients as compared to controls and demonstrated an inverse correlation with increasing severity. The utilization of this parameter as a prognosticating aid requires further study. Additionally, preliminary analysis indicates that various CLD etiologies appear to have specific effects on the lipid profile – a finding under further analysis.Keywords: CLD, cholesterol, HDL, LDL, lipid profile, triglycerides, VLDL
Procedia PDF Downloads 2201334 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward
Authors: Ahmad Almaududy Amri
Abstract:
Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.Keywords: piracy, Southeast Asia, maritime security, legal frameworks
Procedia PDF Downloads 5031333 Polymorphisms of Macrophage Migration Inhibitory Factor (MIF) and Susceptibility to Endometriosis
Authors: Z. Chekini, P. Afsharian, F. Ramezanali, A. A. Akhlaghi, R. Aflatoonian
Abstract:
Macrophage migration inhibitory factor (MIF) is a key pro-inflammatory cytokine that involves in pathophysiological events of endometriosis. We aimed to evaluate the association between mRNA expression levels and polymorphisms of MIF in endometriosis. Seventy endometriosis patients and 70 volunteer fertile women were recruited. RFLP was applied to determine -173G/C polymorphism. ORF polymorphisms and -794(CATT)5-8 were detected by sequencing. Q-PCR was used for expression study of 14 ectopic tissues of patients. Homozygote of CATT5 was observed only in controls. The CATT5/G haplotype related to controls (p=0.094, OR=0.61). Expression level of MIF with -794(CATT)6,7/-173GC was significantly more than the other haplotypes (p=0.00). We identified four SNPs including: +254rs2096525 (p=0.843), +626rs33958703 (p=0.029), +656rs2070766 (p=0.703) and +509rs182012324 (p=1.00). In conclusion, increased repeat of CATT and presence of C allele in promoter of MIF were significantly associated with mRNA level in patients. It seems that +509rs182012324 and +626rs33958703 SNPs were significantly correlated with susceptibility to endometriosis.Keywords: endometriosis, haplotype, macrophage migration inhibitory factor, polymorphism
Procedia PDF Downloads 4571332 The Effects of Therapy on Oxidative Stress, Ghrelin and Nesfatin-1 Levels in Iron Deficiency Anemia
Authors: Emrah Caylak
Abstract:
The aim of this study is to investigate the effect of iron therapy on oxidative stress, ghrelin, and nesfatin-1 levels in patients with iron deficiency anemia (IDA). Thirty patients who applied to Internal Medicine Clinic and were diagnosed with IDA and also 30 healthy individuals as a control were included in the study. The samples were collected from IDA patients before and after treatment. Differences in serum MDA, TAC, and plasma ghrelin, nesfatin-1 were analyzed among the three groups. Serum MDA and TAC levels were found higher and lower in IDA patients before the treatment group compared to the controls (p < 0.05). After the iron therapy, plasma acylated ghrelin and nesfatin-1 levels in IDA patients were found higher in IDA patients before the treatment group and controls (p < 0.05). Plasma ghrelin and nesfatin-1 levels increase with iron treatment in IDA patients. The iron therapy induces the synthesis of ghrelin and nesfatin-1 in human body, thus causes increased appetite and food intake.Keywords: anemia, oxidative stress, ghrelin, nesfatin-1
Procedia PDF Downloads 1441331 Change of Taste Preference after Bariatric Surgery
Authors: Piotr Tylec, Julia Wierzbicka, Natalia Gajewska, Krzysztof Przeczek, Grzegorz Torbicz, Alicja Dudek, Magdalena Pisarska-Adamczyk, Mateusz Wierdak, Michal Pedziwiatr
Abstract:
Introduction: Many patients have described changes in taste perception after weight loss surgery. However, little data is available about short term changes in taste after surgery. Aim: We aimed to evaluate short-term changes in taste preference after bariatric surgeries in comparison to colorectal surgeries. Material and Methods: Between April 2018 and April 2019, a total of 121 bariatric patients and 63 controls participated. Bariatric patients underwent laparoscopic sleeve gastrectomy or Roux-en-Y gastric by-pass. Controls underwent oncological colorectal surgeries. Patients who developed clinical complications requiring restriction of oral intake after surgery or withdraw their consent were excluded from the study. In the end, 85 bariatric patients and 44 controls were included. In all of them, the 16-item ERAS Protocol was applied. Using 10-points Numeric Rating Scale (1-10) patients completed questionnaire and rated their appetite and thirst (1 - no appetite/not thirsty, 10 – normal appetite/very thirsty) and flavoured standardized liquids' taste (1- horrible, 10-very tasty) and food images for the 6 group of taste (sweet, umami, sour, spicy, bitter and salty) (1 - not appetizing, 10 - very appetizing) preoperatively and on the first postoperative day. Data were analysed with Statistica 13.0 PL. Results: Analysed group consist of 129 patients (85 bariatric, 44 controls). Mean age and BMI in a research group was 44.91 years old, 46.22 kg/m² and in control group 62.09 years old, 25.87 kg/m², respectively. Our analysis revealed significant differences in changes of appetite between both groups (research: -4.55 ± 3.76 vs. control: -0.85 ± 4.37; p < 0.05), ratings bitter (research: 0.60 ± 2.98 vs. control: -0.88 ± 2.58; p < 0.05) and salty (research: 1.20 ± 3.50 vs. control: -0.52 ± 2.90; p < 0.05) flavoured liquids and ratings for sweet (research: 1.62 ± 3.31 vs. control: 0.01 ± 2.63; p < 0.05) and bitter (research: 1.21 ± 3.15 vs. control: -0.09 ± 2.25; p < 0.05) food images. There were statistically significant results in the ratings of other images, but in comparison to the control group, they were not statistically significant. Conclusion: The study showed that bariatric surgeries quickly decreases appetite and desire to eat certain types of food, such as salty. Moreover, the bitter taste was more desirable in the research group in comparison to control group. Nevertheless, the sweet taste was more appetible in the bariatric group than in control.Keywords: bariatric surgery, general surgery, obesity, taste preference
Procedia PDF Downloads 1351330 Association of Overweight and Obesity with Breast Cancer
Authors: Amir Ghasemlouei, Alireza Khalaj
Abstract:
In women, cancer of the breast is one of the most common incident cancer and cause of death from cancer .we reviewed the prevalence of obesity and its association with breast cancer. In this study, a total of 25 articles regarding the subject matter of the article have been presented in which 640 patients were examined that 320 patients with breast cancer and 320 were controls. The distribution of breast cancer patients and controls with respect to their anthropometric indices in patients with higher weight, which was statistically significant (60.2 ± 10.2 kg) compared with control group (56.1 ± 11.3 kg). The body mass index of patients was (26.06+/-3.42) and significantly higher than the control group (24.1+/-1.7). Obesity leads to increased levels of adipose tissue in the body that can be stored toxins and carcinogens to produce a continuous supply. Due to the high level of fat and the role of estrogen in a woman is endogenous estrogen of the tumor and regulate the activities of growth steroids, obesity is a risk factor for breast cancer is confirmed. Our study and other studies show that obesity is a risk factor for breast cancer. And with a weight loss intervention for breast cancer can be prevented in the future.Keywords: breast cancer, review study, obesity, overweight
Procedia PDF Downloads 4531329 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2801328 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2991327 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies
Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell
Abstract:
Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.Keywords: smart farming, Internet of Things, communication layer, cyber-attack
Procedia PDF Downloads 2421326 Dietary Factors Contributing to Osteoporosis among Postmenopausal Women in Riyadh Armed Forces Hospital
Authors: Rabab Makki
Abstract:
Bone mineral density and bone metabolism are affected by various factors such as genetic, endocrine, mechanical and nutritional. Our understanding of nutritional influences on bone health is limited because most studies have focused on calcium. This study investigated the dietary factors which are likely t contribute to Osteoporosis in Saudi post-menopausal women, and correlated it with BMD. This is a case controlled study involved 36 postmenopausal Saudi females selected from the Orthopedics and osteoporosis outpatient clinics, and 25 postmenopausal Saudi females as controls from the primary clinic of Military Hospital in Riyadh. The women were diagnosed as osteoporotic based on the BMD measurement at any site (left femur neck, right femur neck, left total hip or right total hip or spine). Both the controls and the Osteoporotics were over 50 years of age and BMI between 31-34 kg/m2 had 2nd degree obesity, and were not free from other problems such as diabetes, hypertension, etc. Subjects (osteoporotics and controls) were interviewed to called data on demographic characterstics, medical history, dietary intake anthropometry (height and weight) bone mineral density. Blood samples were collected from subjects (Osteoporotics and controls). Analysis of serum calcium, vitamin D, phosphate were done at the main laboratory at Military Hospital Riyadh, by the laboratory technician while BMD was determined at the department of Nuclear Medicine by an expert technician and results were interpreted by radiologist.Data on frequency of consumption of animal food (meat, eggs, poultry and fish) and diary foods (milk, yogurt, cheese) of osteoporotic was less than control. In spite of the low intake there was no association with BMD.In general, the vegetables and fruits were consumed less by the osteoporotics than control. The only fruit which had shown a significant positive correlation is banana with right and left hip BMD total probably due to high potassium and minerals content which likely to prevent bone resorption. Mataziz vegetables combination of wheat showed a significant positive correlation with the same site (total right and left hip). Both osteoporotics abd controls were consuming table sugar. (But the sweet intake showed a significant negative correlation with left neck femur BMD, suggesting sucrose increase urinary calcium loss. Both osteoporotic and controls were consuming Arabic coffee. A negative significant correlation between intake of Arabic coffee and BMD of right neck femur of osteoporosis patient was observed. It could be suggested that increased intake of fruits and vegetables, might promote bone density while high intake of coffee and sugars might affect bone density, no significant correlation was observed between BMD at any site and diary product. We can say the major risk factors are inadequate nutrition. Further studies are needed among Saudi population to confirm these results.Keywords: osteoporosi, Saudia Arabia, Riyadh Armed Forces, postmenopausal women
Procedia PDF Downloads 4081325 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 5151324 Would Intra-Individual Variability in Attention to Be the Indicator of Impending the Senior Adults at Risk of Cognitive Decline: Evidence from Attention Network Test(ANT)
Authors: Hanna Lu, Sandra S. M. Chan, Linda C. W. Lam
Abstract:
Objectives: Intra-individual variability (IIV) has been considered as a biomarker of healthy ageing. However, the composite role of IIV in attention, as an impending indicator for neurocognitive disorders warrants further exploration. This study aims to investigate the IIV, as well as their relationships with attention network functions in adults with neurocognitive disorders (NCD). Methods: 36adults with NCD due to Alzheimer’s disease(NCD-AD), 31adults with NCD due to vascular disease (NCD-vascular), and 137 healthy controls were recruited. Intraindividual standard deviations (iSD) and intraindividual coefficient of variation of reaction time (ICV-RT) were used to evaluate the IIV. Results: NCD groups showed greater IIV (iSD: F= 11.803, p < 0.001; ICV-RT:F= 9.07, p < 0.001). In ROC analyses, the indices of IIV could differentiateNCD-AD (iSD: AUC value = 0.687, p= 0.001; ICV-RT: AUC value = 0.677, p= 0.001) and NCD-vascular (iSD: AUC value = 0.631, p= 0.023;ICV-RT: AUC value = 0.615, p= 0.045) from healthy controls. Moreover, the processing speed could distinguish NCD-AD from NCD-vascular (AUC value = 0.647, p= 0.040). Discussion: Intra-individual variability in attention provides a stable measure of cognitive performance, and seems to help distinguish the senior adults with different cognitive status.Keywords: intra-individual variability, attention network, neurocognitive disorders, ageing
Procedia PDF Downloads 4751323 Level of Reactive Oxygen Species and Inflammatory Cytokines in Rheumatoid Arthritis Patients: Correlation with Disease Severity
Authors: Somaiya Mateen, Shagufta Moin, Mohammad Owais, Abdul Khan, Atif Zafar
Abstract:
In rheumatoid arthritis (RA), impaired oxidative metabolism and imbalance between pro-and anti-inflammatory cytokines are responsible for causing inflammation and the degradation of cartilage and bone. The present study was done to evaluate the level and hence the role of reactive oxygen species (ROS) and inflammatory cytokines in the pathogenesis of RA. The present study was performed in the blood of 80 RA patients and 55 age and sex-matched healthy controls. The level of ROS (in 5% hematocrit) and the plasma level of pro-inflammatory cytokines [TNF-α, interleukin-6 (IL-6), IL-22] and anti-inflammatory cytokines (IL-4 and IL-5) were monitored in healthy subjects and RA patients. For evaluating the role of rheumatoid factor (RF) in the pathogenesis of RA, patients were sub-divided on the basis of presence or absence of RF. Reactive species and inflammatory cytokines were correlated with disease activity measure-Disease Activity Score for 28 joints (DAS28). The level of ROS, TNF-α, IL-6 and IL-22 were found to be significantly higher in RA patients as compared to the healthy controls, with the increase being more significant in patients positive for rheumatoid factor and those having high disease severity. On the other hand, a significant decrease in the level of IL-4 and IL-10 were observed in RA patients compared with healthy controls, with the decrease being more prominent in severe cases of RA. Higher ROS (indicative of impaired anti-oxidant defence system) and pro-inflammatory cytokines level in RA patients may lead to the damage of biomolecules which in turn contributes to tissue damage and hence to the development of more severe RA. The imbalance between pro-and anti-inflammatory cytokines may lead to the development of multi-system immune complications. ROS and inflammatory cytokines may also serve as a potential biomarker for assessing the disease severity.Keywords: rheumatoid arthritis, reactive oxygen species, pro-inflammatory cytokines, anti-inflammatory cytokines
Procedia PDF Downloads 3181322 In vivo Wound Healing Activity and Phytochemical Screening of the Crude Extract and Various Fractions of Kalanchoe petitiana A. Rich (Crassulaceae) Leaves in Mice
Authors: Awol Mekonnen, Temesgen Sidamo, Epherm Engdawork, Kaleab Asresb
Abstract:
Ethnopharmacological Relevance: The leaves of Kalanchoe petitiana A. Rich (Crassulaceae) are used in Ethiopian folk medicine for treatment of evil eye, fractured surface for bone setting and several skin disorders including for the treatment of sores, boils, and malignant wounds. Aim of the Study: In order to scientifically prove the claimed utilization of the plant, the effects of the extracts and the fractions were investigated using in vivo excision, incision and dead space wound models. Materials and Method: Mice were used for wound healing study, while rats and rabbit were used for skin irritation test. For studying healing activity, 80% methanolic extract and the fractions were formulated in strength of 5% and 10%, either as ointment (hydroalcoholic extract, aqueous and methanol fractions) or gel (chloroform fraction). Oral administration of the crude extract was used for dead space model. Negative controls were treated either with simple ointment or sodium carboxyl methyl cellulose xerogel, while positive controls were treated with nitrofurazone (0.2 w/v) skin ointment. Negative controls for dead space model were treated with 1% carboxy methyl cellulose. Parameters, including rate of wound contraction, period of complete epithelializtion, hydroxyproline contents and skin breaking strength were evaluated. Results: Significant wound healing activity was observed with ointment formulated from the crude extract at both 5% and 10% concentration (p<0.01) compared to controls in both excision and incision models. In dead space model, 600 mg/kg (p<0.01), but not 300 mg/kg, significantly increased hydroxyproline content. Fractions showed variable effect, with the chloroform fraction lacking any significant effect. Both 5% and 10% formulations of the aqueous and methanolic fractions significantly increased wound contraction, decreased epithelializtion time and increased hydroxyproline content in excision wound model (p<0.05) as compared to controls. These fractions were also endowed with higher skin breaking strength in incision wound model (p<0.01). Conclusions: The present study provided evidence that the leaves of Kalanchoe petitiana A. Rich possess remarkable wound healing activities supporting the folkloric assertion of the plant. Fractionation revealed that polar or semi-polar compound may play vital role, as both aqueous and methanolic fractions were endowed with wound healing activity.Keywords: wound healing, Kalanchoae petitiana, excision wound, incision wound, dead space model
Procedia PDF Downloads 3091321 Evaluation of Cardiac Rhythm Patterns after Open Surgical Maze-Procedures from Three Years' Experiences in a Single Heart Center
Authors: J. Yan, B. Pieper, B. Bucsky, H. H. Sievers, B. Nasseri, S. A. Mohamed
Abstract:
In order to optimize the efficacy of medications, the regular follow-up with long-term continuous monitoring of heart rhythmic patterns has been facilitated since clinical introduction of cardiac implantable electronic monitoring devices (CIMD). Extensive analysis of rhythmic circadian properties is capable to disclose the distributions of arrhythmic events, which may support appropriate medication according rate-/rhythm-control strategy and minimize consequent afflictions. 348 patients (69 ± 0.5ys, male 61.8%) with predisposed atrial fibrillation (AF), undergoing primary ablating therapies combined to coronary or valve operations and secondary implantation of CIMDs, were involved and divided into 3 groups such as PAAF (paroxysmal AF) (n=99, male 68.7%), PEAF (persistent AF) (n=94, male 62.8%), and LSPEAF (long-standing persistent AF) (n=155, male 56.8%). All patients participated in three-year ambulant follow-up (3, 6, 9, 12, 18, 24, 30 and 36 months). Burdens of atrial fibrillation recurrence were assessed using cardiac monitor devices, whereby attacks frequencies and their circadian patterns were systemically analyzed. Anticoagulants and regular anti-arrhythmic medications were evaluated and the last were listed in terms of anti-rate and anti-rhythm regimens. Patients in the PEAF-group showed the least AF-burden after surgical ablating procedures compared to both of the other subtypes (p < 0.05). The AF-recurrences predominantly performed such attacks’ property as shorter than one hour, namely within 10 minutes (p < 0.05), regardless of AF-subtypes. Concerning circadian distribution of the recurrence attacks, frequent AF-attacks were mostly recorded in the morning in the PAAF-group (p < 0.05), while the patients with predisposed PEAF complained less attack-induced discomforts in the latter half of the night and the ones with LSPEAF only if they were not physically active after primary surgical ablations. Different AF-subtypes presented distinct therapeutic efficacies after appropriate surgical ablating procedures and recurrence properties in sense of circadian distribution. An optimization of medical regimen and drug dosages to maintain the therapeutic success needs more attention to detailed assessment of the long-term follow-up. Rate-control strategy plays a much more important role than rhythm-control in the ongoing follow-up examinations.Keywords: atrial fibrillation, CIMD, MAZE, rate-control, rhythm-control, rhythm patterns
Procedia PDF Downloads 1561320 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment
Authors: Jonathan Heng, Yoong Cheah Huei
Abstract:
A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters
Procedia PDF Downloads 1811319 Assessment of Serum Osteopontin, Osteoprotegerin and Bone-Specific Alp as Markers of Bone Turnover in Patients with Disorders of Thyroid Function in Nigeria, Sub-Saharan Africa
Authors: Oluwabori Emmanuel Olukoyejo, Ogra Victor Ogra, Bosede Amodu, Tewogbade Adeoye Adedeji
Abstract:
Background: Disorders of thyroid function are the second most common endocrine disorders worldwide, with a direct relationship with metabolic bone diseases. These metabolic bone complications are often subtle but manifest as bone pains and an increased risk of fractures. The gold standard for diagnosis, Dual Energy X-ray Absorptiometry (DEXA), is limited in this environment due to unavailability, cumbersomeness and cost. However, bone biomarkers have shown prospects in assessing alterations in bone remodeling, which has not been studied in this environment. Aim: This study evaluates serum levels of bone-specific alkaline phosphatase (bone-specific ALP), osteopontin and osteoprotegerin biomarkers of bone turnover in patients with disorders of thyroid function. Methods: This is a cross-sectional study carried out over a period of one and a half years. Forty patients with thyroid dysfunctions, aged 20 to 50 years, and thirty-eight age and sex-matched healthy euthyroid controls were included in this study. Patients were further stratified into hyperthyroid and hypothyroid groups. Bone-specific ALP, osteopontin, and osteoprotegerin, alongside serum total calcium, ionized calcium and inorganic phosphate, were assayed for all patients and controls. A self-administered questionnaire was used to obtain data on sociodemographic and medical history. Then, 5 ml of blood was collected in a plain bottle and serum was harvested following clotting and centrifugation. Serum samples were assayed for B-ALP, osteopontin, and osteoprotegerin using the ELISA technique. Total calcium and ionized calcium were assayed using an ion-selective electrode, while the inorganic phosphate was assayed with automated photometry. Results: The hyperthyroid and hypothyroid patient groups had significantly increased median serum B-ALP (30.40 and 26.50) ng/ml and significantly lower median OPG (0.80 and 0.80) ng/ml than the controls (10.81 and 1.30) ng/ml respectively, p < 0.05. However, serum osteopontin in the hyperthyroid group was significantly higher and significantly lower in the hypothyroid group when compared with the controls (11.00 and 2.10 vs 3.70) ng/ml, respectively, p < 0.05. Both hyperthyroid and hypothyroid groups had significantly higher mean serum total calcium, ionized calcium and inorganic phosphate than the controls (2.49 ± 0.28, 1.27 ± 0.14 and 1.33 ± 0.33) mmol/l and (2.41 ± 0.04, 1.20 ± 0.04 and 1.15 ± 0.16) mmol/l vs (2.27 ± 0.11, 1.17 ± 0.06 and 1.08 ± 0.16) mmol/l respectively, p < 0.05. Conclusion: Patients with disorders of thyroid function have metabolic imbalances of all the studied bone markers, suggesting a higher bone turnover. The routine bone markers will be an invaluable tool for monitoring bone health in patients with thyroid dysfunctions, while the less readily available markers can be introduced as supplementary tools. Moreover, bone-specific ALP, osteopontin and osteoprotegerin were found to be the strongest independent predictors of metabolic bone markers’ derangements in patients with thyroid dysfunctions.Keywords: metabolic bone diseases, biomarker, bone turnover, hyperthyroid, hypothyroid, euthyroid
Procedia PDF Downloads 361318 Expression of ACSS2 Genes in Peripheral Blood Mononuclear Cells of Patients with Alzheimer’s Disease
Authors: Ali Bayram, Burak Uz, Remzi Yiğiter
Abstract:
The impairment of lipid metabolism in the central nervous system has been suggested as a critical factor of Alzheimer’s disease (AD) pathogenesis. Homo sapiens acyl-coenyme A synthetase short-chain family member 2 (ACSS2) gene encodes the enzyme acetyl-Coenzyme A synthetase (AMP forming; AceCS) providing acetyl-coenzyme A (Ac-CoA) for various physiological processes, such as cholesterol and fatty acid synthesis, as well as the citric acid cycle. We investigated ACSS2, transcript variant 1 (ACSS2*1), mRNA levels in the peripheral blood mononuclear cells (PBMC) of patients with AD and compared them with the controls. The study group comprised 50 patients with the diagnosis of AD who have applied to Gaziantep University Faculty of Medicine, and Department of Neurology. 49 healthy individuals without any neurodegenerative disease are included as controls. ACSS2 mRNA expression in PBMC of AD/control patients was 0.495 (95% confidence interval: 0.410-0.598), p= .000000001902). Further studies are needed to better clarify this association.Keywords: Alzheimer’s disease, ACSS2 Genes, mRNA expression, RT-PCR
Procedia PDF Downloads 3921317 Investigation of the Association of Vitamin D Receptor Gene Polymorphism in Female Genital: Tuberculosis Cases
Authors: Swati Gautam, Amita Jain, Shyampyari Jaiswar
Abstract:
Objective: To elucidate the role of (ApaI&TaqI) VDR gene polymorphism in the pathogenesis of female genital tuberculosis (FGTB) cases. Background: Female genital TB represents about 15-20% of total extra-pulmonary TB (EPTB). Female subjects with vitamin D deficiency have been shown to be at higher risk of pulmonary TB as well as FGTB. In same context few functional polymorphism in vitamin D receptor (VDR) gene has been considered as an important genetic risk factor that modulate the development of FGTB. Therefore we aimed, to elucidate the role of (ApaI&TaqI) VDR gene polymorphism in the pathogenesis of FGTB. Study design: Case-Control study. Sample size: Cases (60) and Controls (60). Study site: Department of Obstetrics & Gynecology & Department of Microbiology, K.G.M.U. Lucknow, (UP). Inclusion criteria: Cases: Women with age group 20-35 years, premenstrual endometrial aspiration collected and included in the study, those were positive with acid-fast bacilli (AFB)/ TB-PCR/ LJ culture/ liquid culture. Controls: Women with age group 20-35 years having no history of ATT and all test negative for TB recruited as control. Exclusion criteria: -Women with endometriosis, polycystic ovaries (PCOD), positive on Chlamydia & gonorrhea, already on anti-tubercular therapy (ATT) excluded. Materials and Methods: Blood samples were collected in EDTA tubes from cases and controls stored at -20ºC. Genomic DNA extraction was carried out by salting-out method. Genotyping of VDR gene (ApaI&TaqI) polymorphism was performed by using single amplification refractory mutation system (ARMS) PCR technique. PCR products were analyzed by electrophoresis on 2% agarose gel. Statistical analysis was done by SPSS16.3 software & computing odds ratio (OR) with 95% CI. Results: Increased risk of female genital tuberculosis was observed in AA genotype (OR =1.1419-6.212 95% CI, P*<0.036) and A allele (OR =1.255-3.518, 95% CI, P* < 0.006) in FGTB as compared to controls. Moreover A allele was found more frequent in FGTB patients. No significant difference was observed in TaqI gene polymorphism of VDR gene. Conclusion: The ApaI polymorphism is significantly associated with etiology of FGTB and plays an important role as a genetic risk factor in FGTB women.Keywords: ARMS, ATT, EPTB, FGTB, VDR
Procedia PDF Downloads 2861316 The Gut Microbiome in Cirrhosis and Hepatocellular Carcinoma: Characterization of Disease-Related Microbial Signature and the Possible Impact of Life Style and Nutrition
Authors: Lena Lapidot, Amir Amnon, Rita Nosenko, Veitsman Ella, Cohen-Ezra Oranit, Davidov Yana, Segev Shlomo, Koren Omry, Safran Michal, Ben-Ari Ziv
Abstract:
Introduction: Hepatocellular carcinoma (HCC) is one of the leading causes of cancer related mortality worldwide. Liver Cirrhosis is the main predisposing risk factor for the development of HCC. The factor(s) influencing disease progression from Cirrhosis to HCC remain unknown. Gut microbiota has recently emerged as a major player in different liver diseases, however its association with HCC is still a mystery. Moreover, there might be an important association between the gut microbiota, nutrition, life style and the progression of Cirrhosis and HCC. The aim of our study was to characterize the gut microbial signature in association with life style and nutrition of patients with Cirrhosis, HCC-Cirrhosis and healthy controls. Design: Stool samples were collected from 95 individuals (30 patients with HCC, 38 patients with Cirrhosis and 27 age, gender and BMI-matched healthy volunteers). All participants answered lifestyle and Food Frequency Questionnaires. 16S rRNA sequencing of fecal DNA was performed (MiSeq Illumina). Results: There was a significant decrease in alpha diversity in patients with Cirrhosis (qvalue=0.033) and in patients with HCC-Cirrhosis (qvalue=0.032) compared to healthy controls. The microbiota of patients with HCC-cirrhosis compared to patients with Cirrhosis, was characterized by a significant overrepresentation of Clostridium (pvalue=0.024) and CF231 (pvalue=0.010) and lower expression of Alphaproteobacteria (pvalue=0.039) and Verrucomicrobia (pvalue=0.036) in several taxonomic levels: Verrucomicrobiae, Verrucomicrobiales, Verrucomicrobiaceae and the genus Akkermansia (pvalue=0.039). Furthermore, we performed an analysis of predicted metabolic pathways (Kegg level 2) that resulted in a significant decrease in the diversity of metabolic pathways in patients with HCC-Cirrhosis (qvalue=0.015) compared to controls, one of which was amino acid metabolism. Furthermore, investigating the life style and nutrition habits of patients with HCC-Cirrhosis, we found significant correlations between intake of artificial sweeteners and Verrucomicrobia (qvalue=0.12), High sugar intake and Synergistetes (qvalue=0.021) and High BMI and the pathogen Campylobacter (qvalue=0.066). Furthermore, overweight in patients with HCC-Cirrhosis modified bacterial diversity (qvalue=0.023) and composition (qvalue=0.033). Conclusions: To the best of the our knowledge, we present the first report of the gut microbial composition in patients with HCC-Cirrhosis, compared with Cirrhotic patients and healthy controls. We have demonstrated in our study that there are significant differences in the gut microbiome of patients with HCC-cirrhosis compared to Cirrhotic patients and healthy controls. Our findings are even more pronounced because the significantly increased bacteria Clostridium and CF231 in HCC-Cirrhosis weren't influenced by diet and lifestyle, implying this change is due to the development of HCC. Further studies are needed to confirm these findings and assess causality.Keywords: Cirrhosis, Hepatocellular carcinoma, life style, liver disease, microbiome, nutrition
Procedia PDF Downloads 1291315 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184