Search results for: Babawale Akin Adeyemi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 100

Search results for: Babawale Akin Adeyemi

10 Validating the Cerebral Palsy Quality of Life for Children (CPQOL-Child) Questionnaire for Use in Sri Lanka

Authors: Shyamani Hettiarachchi, Gopi Kitnasamy

Abstract:

Background: The potentially high level of physical need and dependency experienced by children with cerebral palsy could affect the quality of life (QOL) of the child, the caregiver and his/her family. Poor QOL in children with cerebral palsy is associated with the parent-child relationship, limited opportunities for social participation, limited access to healthcare services, psychological well-being and the child's physical functioning. Given that children experiencing disabilities have little access to remedial support with an inequitable service across districts in Sri Lanka, and given the impact of culture and societal stigma, there may be differing viewpoints across respondents. Objectives: The aim of this study was to evaluate the psychometric properties of the Tamil version of the Cerebral Palsy Quality of Life for Children (CPQOL-Child) Questionnaire. Design: An instrument development and validation study. Methods: Forward and backward translations of the CPQOL-Child were undertaken by a team comprised of a physiotherapist, speech and language therapist and two linguists for the primary caregiver form and the child self-report form. As part of a pilot phase, the Tamil version of the CPQOL was completed by 45 primary caregivers with children with cerebral palsy and 15 children with cerebral palsy (GMFCS level 3-4). In addition, the primary caregivers commented on the process of filling in the questionnaire. The psychometric properties of test-retest reliability, internal consistency and construct validity were undertaken. Results: The test-retest reliability and internal consistency were high. A significant association (p < 0.001) was found between limited motor skills and poor QOL. The Cronbach's alpha for the whole questionnaire was at 0.95.Similarities and divergences were found between the two groups of respondents. The child respondents identified limited motor skills as associated with physical well-being and autonomy. Akin to this, the primary caregivers associated the severity of motor function with limitations of physical well-being and autonomy. The trend observed was that QOL was not related to the level of impairment but connected to environmental factors by the child respondents. In addition to this, the main concern among primary caregivers about the child's future and on the child's lack of independence was not fully captured by the QOL questionnaire employed. Conclusions: Although the initial results of the CPQOL questionnaire show high test-retest reliability and internal consistency of the instrument, it does not fully reflect the socio-cultural realities and primary concerns of the caregivers. The current findings highlight the need to take child and caregiver perceptions of QOL into account in clinical practice and research. It strongly indicates the need for culture-specific measures of QOL.

Keywords: cerebral palsy, CPQOL, culture, quality of life

Procedia PDF Downloads 326
9 Cross Carpeting in Nigerian Politics: Some Legal and Moral Issues Generated

Authors: Agbana Olaseinde Julius, Opadere Olaolu Stephen

Abstract:

The concept of cross carpeting is as old as politics itself. Basically, it entails an individual leaving a political party/group, to join another. The reasons for which cross carpeting is embarked upon are diverse: ideological differences; ethnic and/or religious differences; access to actual or perceived better political opportunities; liberty of association; rancor; etc. The current democratic dispensation in Nigeria has experienced renewed and rather alarming rate of cross carpeting, for reasons including those enumerated above and others. Right to cross carpet is inherent in a democratic setting as well as the political stakeholder; so does it also comprise of the constitutional right of ‘freedom of association’. However, the current species of cross carpeting in Nigeria requires scrutiny, in view of some potential legal and moral challenges it poses for both the present and the future. Cross carpeting is considered both legal and constitutional, but the current spate raises the question of expediency, particularly in a nascent democracy. It is considered to have a propensity of negatively impacting political stability in a polity with fragile nerves. Importantly too, cross carpeting is considered a potential damage to the psyche of posterity with regards to a warped disposition to promises, honour and integrity. The perceived peculiar dimension of cross carpeting in Nigeria raises questions on the quality of leadership presently obtainable in the country, vis-à-vis greed, self-centeredness, disregard for the concern and interest of avowed followers/fans, entrenchment of distrust, etc. Thus, the study made use of primary and secondary sources of information. The primary sources included the Constitutions of the Federal Republic of Nigeria 1999 (as amended); judicial decisions; and the Electoral Act, 2010 (as Amended). The secondary sources comprised of information from books, journals, newspapers, magazines and Internet documents. Data obtained from these sources were subjected to content analysis. Findings of this study show that though the act of cross carpeting may not be in breach of any Statute or Law, it however, in most cases, breaches the morals of expediency. The morality thereof is far from justifiable, and should be condemned in the interest of the present and posterity. There is a great and urgent need to embark on a re-entrenchment of the culture of political ideology in the Nigerian polity, as obtainable in developed democracies. In conclusion, the need to exercise the right of cross carpeting with caution cannot be overemphasized. Membership of a political group/party should be backed by commitment to well defined ideologies and values. Commitment to them should be regarded akin to that found in the family, which is not easily or flippantly jettisoned.

Keywords: cross-carpeting, Nigeria, legal, moral issues, politics

Procedia PDF Downloads 420
8 Acute Neurophysiological Responses to Resistance Training; Evidence of a Shortened Super Compensation Cycle and Early Neural Adaptations

Authors: Christopher Latella, Ashlee M. Hendy, Dan Vander Westhuizen, Wei-Peng Teo

Abstract:

Introduction: Neural adaptations following resistance training interventions have been widely investigated, however the evidence regarding the mechanisms of early adaptation are less clear. Understanding neural responses from an acute resistance training session is pivotal in the prescription of frequency, intensity and volume in applied strength and conditioning practice. Therefore the primary aim of this study was to investigate the time course of neurophysiological mechanisms post training against current super compensation theory, and secondly, to examine whether these responses reflect neural adaptations observed with resistance training interventions. Methods: Participants (N=14) completed a randomised, counterbalanced crossover study comparing; control, strength and hypertrophy conditions. The strength condition involved 3 x 5RM leg extensions with 3min recovery, while the hypertrophy condition involved 3 x 12 RM with 60s recovery. Transcranial magnetic stimulation (TMS) and peripheral nerve stimulation were used to measure excitability of the central and peripheral neural pathways, and maximal voluntary contraction (MVC) to quantify strength changes. Measures were taken pre, immediately post, 10, 20 and 30 mins and 1, 2, 6, 24, 48, 72 and 96 hrs following training. Results: Significant decreases were observed at post, 10, 20, 30 min, 1 and 2 hrs for both training groups compared to control group for force, (p <.05), maximal compound wave; (p < .005), silent period; (p < .05). A significant increase in corticospinal excitability; (p < .005) was observed for both groups. Corticospinal excitability between strength and hypertrophy groups was near significance, with a large effect (η2= .202). All measures returned to baseline within 6 hrs post training. Discussion: Neurophysiological mechanisms appear to be significantly altered in the period 2 hrs post training, returning to homeostasis by 6 hrs. The evidence suggests that the time course of neural recovery post resistance training occurs 18-40 hours shorter than previous super compensation models. Strength and hypertrophy protocols showed similar response profiles with current findings suggesting greater post training corticospinal drive from hypertrophy training, despite previous evidence that strength training requires greater neural input. The increase in corticospinal drive and decrease inl inhibition appear to be a compensatory mechanism for decreases in peripheral nerve excitability and maximal voluntary force output. The changes in corticospinal excitability and inhibition are akin to adaptive processes observed with training interventions of 4 wks or longer. It appears that the 2 hr recovery period post training is the most influential for priming further neural adaptations with resistance training. Secondly, the frequency of prescribed resistance sessions can be scheduled closer than previous super compensation theory for optimal strength gains.

Keywords: neural responses, resistance training, super compensation, transcranial magnetic stimulation

Procedia PDF Downloads 257
7 A Formal Microlectic Framework for Biological Circularchy

Authors: Ellis D. Cooper

Abstract:

“Circularchy” is supposed to be an adjustable formal framework with enough expressive power to articulate biological theory about Earthly Life in the sense of multi-scale biological autonomy constrained by non-equilibrium thermodynamics. “Formal framework” means specifically a multi-sorted first-order-theorywithequality (for each sort). Philosophically, such a theory is one kind of “microlect,” which means a “way of speaking” (or, more generally, a “way of behaving”) for overtly expressing a “mental model” of some “referent.” Other kinds of microlect include “natural microlect,” “diagrammatic microlect,” and “behavioral microlect,” with examples such as “political theory,” “Euclidean geometry,” and “dance choreography,” respectively. These are all describable in terms of a vocabulary conforming to grammar. As aspects of human culture, they are possibly reminiscent of Ernst Cassirer’s idea of “symbolic form;” as vocabularies, they are akin to Richard Rorty’s idea of “final vocabulary” for expressing a mental model of one’s life. A formal microlect is presented by stipulating sorts, variables, calculations, predicates, and postulates. Calculations (a.k.a., “terms”) may be composed to form more complicated calculations; predicates (a.k.a., “relations”) may be logically combined to form more complicated predicates; and statements (a.k.a., “sentences”) are grammatically correct expressions which are true or false. Conclusions are statements derived using logical rules of deduction from postulates, other assumed statements, or previously derived conclusions. A circularchy is a formal microlect constituted by two or more sub-microlects, each with its distinct stipulations of sorts, variables, calculations, predicates, and postulates. Within a sub-microlect some postulates or conclusions are equations which are statements that declare equality of specified calculations. An equational bond between an equation in one sub-microlect and an equation in either the same sub-microlect or in another sub-microlect is a predicate that declares equality of symbols occurring in a side of one equation with symbols occurring in a side of the other equation. Briefly, a circularchy is a network of equational bonds between sub-microlects. A circularchy is solvable if there exist solutions for all equations that satisfy all equational bonds. If a circularchy is not solvable, then a challenge would be to discover the obstruction to solvability and then conjecture what adjustments might remove the obstruction. Adjustment means changes in stipulated ingredients (sorts, etc.) of sub-microlects, or changes in equational bonds between sub-microlects, or introduction of new sub-microlects and new equational bonds. A circularchy is modular insofar as each sub-microlect is a node in a network of equation bonds. Solvability of a circularchy may be conjectured. Efforts to prove solvability may be thwarted by a counter-example or may lead to the construction of a solution. An automated theorem-proof assistant would likely be necessary for investigating a substantial circularchy, such as one purported to represent Earthly Life. Such investigations (chains of statements) would be concurrent with and no substitute for simulations (chains of numbers).

Keywords: autonomy, first-order theory, mathematics, thermodynamics

Procedia PDF Downloads 192
6 Experiences of Youth in Learning About Healthy Intimate Relationships: An Institutional Ethnography

Authors: Anum Rafiq

Abstract:

Adolescence is a vulnerable period for youth across the world. It is a period of new learning with opportunities to understand and develop perspectives on health and well-being. With youth beginning to engage in intimate relationships at an earlier age in the 21st century, concentrating on the learning opportunity they have in school is paramount. The nature of what has been deemed important to teach in schools has changed throughout history, and the focus has shifted from home/family skills to teaching youth how to be competitive in the job market. Amidst this emphasis, opportunities for them exist to learn about building healthy intimate relationships, one of the foundational elements of most people’s lives. Using an Institutional Ethnography (IE), the lived experiences of youth in how they understand intimate relationships and how their learning experience is organized through the high school Health and Physical Education (H&PE) course is explored. An empirical inquiry into how the actual work of teachers and youth are socially organized by a biomedical, employment-related, and efficiency-based discourse is provided. Through thirty-two qualitative interviews with teachers and youth, a control of ruling relations such as institutional accountability circuits, performance reports, and timetabling over the experience of teachers and youth is found. One of the facets of the institutional accountability circuit is through the social organization of teaching and learning about healthy intimate relationships being framed through a biomedical discourse. In addition, the role of a hyper-focus on performance and evaluation is found as paramount in situating healthy intimacy discussions as inferior to neoliberally charged productivity measures such as employment skills. Lastly, due to the nature of institutional policies such as regulatory guidelines, teachers are largely influenced to avoid diving into discussions deemed risky or taboo by society, such as healthy intimacy in adolescence. The findings show how texts such as the H&PE curriculum, the Ontario College of Teachers (OCT) guidelines, Ministry of Education Performance Reports, and the timetable organize the day-to-day activities of teachers and students and reproduce different disjunctures for youth. This disjuncture includes some of their experiences being subordinated, difficulty relating to curriculum, and an experience of healthy living discussions being skimmed over across sites. The findings detail that the experience of youth in learning about healthy intimate relationships is not akin to the espoused vision outlined in policy documents such as the H&PE (2015) curriculum policy. These findings have implications for policymakers, activists, and school administration alike, which call for an investigation into who is in power when it comes to youth’s learning needs, as a pivotal period where youth can be equipped with life-changing knowledge is largely underutilized. A restructuring of existing institutional practices that allow for the social and institutional flexibility required to broach the topic of healthy intimacy in a comprehensive manner is required.

Keywords: health policy, intimate relationships, youth, education, ruling relations, sexual education, violence prevention

Procedia PDF Downloads 41
5 The Porcine Reproductive and Respiratory Syndrome Virus Genotype 2 (PRRSV-2)-derived Oncolytic Protein Reprograms Tumor-Associated Macrophages

Authors: Farrah Putri Salmanida, Mei-Li Wu, Rika Wahyuningtyas, Wen-Bin Chung, Hso-Chi Chaung, Ko-Tung Chang

Abstract:

Within the field of immunotherapy, oncolytic virotherapy (OVT) employs dual approaches that directly eliminate tumor cells while preserving healthy ones and indirectly reprogram the tumor microenvironment (TME) to elicit antitumor responses. Within the TME, tumor associated macrophages (TAMs) manifest characteristics akin to those of anti-inflammatory M2 macrophages, thus earning the designation of M2-like TAMs. In prior research, two antigens denoted as A1 (g6Ld10T) and A3 (ORF6L5), derived from a complete sequence of ORF5 with partial sequence of ORF6 in Porcine Reproductive and Respiratory Syndrome Virus Genotype 2 (PRRSV-2), demonstrated the capacity to repolarize M2-type porcine alveolar macrophages (PAMs) into M1 phenotypes. In this study, we sought for utilizing OVT strategies by introducing A1 or A3 on TAMs to endow them with the anti-tumor traits of M1 macrophages while retaining their capacity to target cancer cells. Upon exposing human THP-1-derived M2 macrophages to a cross-species test with 2 µg/ml of either A1 or A3 for 24 hours, real time PCR revealed that A3, but not A1, treated cells exhibited upregulated gene expressions of M1 markers (CCR7, IL-1ß, CCL2, Cox2, CD80). These cells reacted to virus-derived antigen, as evidenced by increased expression of pattern-recognition receptors TLR3, TLR7, and TLR9, subsequently providing feedback in the form of type I interferon responses like IFNAR1, IFN-ß, IRF3, IRF7, OAS1, Mx1, and ISG15. Through an MTT assay, only after 15 µg/ml of A3 treatment could the cell viability decrease, with a predicted IC50 of 16.96 µg/ml. Interestingly, A3 caused dose-dependent toxicity to a rat C6 glial cancer cell line even at doses as low as 2.5 µg/ml and reached its IC50 at 9.419 µg/ml. Using Annexin V/7AAD staining and PCR test, we deduced that a significant proportion of C6 cells were undergoing the early apoptosis phase predominantly through the intrinsic apoptosis cascade involving Bcl-2 family proteins. Following this stage, we conducted a test on A3’s repolarization ability, which revealed a significant rise in M1 gene expression markers, such as TNF, CD80, and IL-1ß, in M2-like TAMs generated in vitro from murine RAW264.7 macrophages grown with conditioned medium of 4T1 breast cancer cells. This was corroborated by the results of transcriptome analysis, which revealed that the primary subset among the top 10 to top 30 significantly upregulated differentially expressed genes (DEGs) dominantly consisted of M1 macrophages profiles, including Ccl3, Ccl4, Csf3, TNF, Bcl6b, Stc1, and Dusp2. Our findings unveiled the remarkable potential of the PRRSV-derived antigen A3 to repolarize macrophages while also being capable of selectively inducing apoptosis in cancerous cells. While further in vivo study is needed for A3, it holds promise as an adjuvant by its dual effects in cancer therapy modalities.

Keywords: cancer cell apoptosis, interferon responses, macrophage repolarization, recombinant protein

Procedia PDF Downloads 29
4 Consecration from the Margins: El Anatsui in Venice and the Turbine Hall

Authors: Jonathan Adeyemi

Abstract:

Context: This study focuses on El Anatsui and his global acclaim in the art world despite his origins from the global artworld’s margins. It addresses the disparities in the treatment between Western and non-Western artists and questions whether Anatsui’s consecration is a result of exoticism or the growing consensus on decolonization. Research Aim: The aim of this study is to investigate how El Anatsui achieved global acclaim from the margins of the art world and determine if his consecration represents a mark of decolonization or the typical Western desire for exoticism. Methodology: The study utilizes a case study approach, literature analysis, and in-depth interviews. The artist, the organizers of the Venice Biennale, the relevant curators at Tate Modern London, and the October Gallery in London, and other galleries in Nigeria, which represent the artist were interviewed for data collection. Findings: The study seeks to determine the authenticity of the growing consensus on decolonization, inclusion, and diversity in the global artistic field. Preliminary findings show that domestic socio-economic and political factors debilitated the mechanisms for local validation in Nigeria, weakening the domestic foundation for international engagement. However, alternative systems of exhibition, especially in London and the USA contributed critically to providing the initial international visibility, which formed the foundation for his global acclaim. Out of the 21 winners of the Golden Lion for Lifetime Achievement since its inception at the 47th Venice Biennale in 1997, American artists have dominated with 10 recipients, 8 recipients from Europe, 2 recipients from Africa (2007 and 2015) and 1 from Asia. This aligns with Bourdieu’s concept of cultural and economic capital, which prevented Africa countries from participation until recently. Moreover, while the average age of recipients is 76 years, Anatsui received the award at the age of 71, while Malick Sidibé (Mali) was awarded at 72. Thus, the Venice Biennale award for El Anatsui incline more towards a commitment to decolonisation than exoticism. Theoretical Importance: This study contributes to the field by examining the dynamics of the art world's monopoly of legitimation and the role of national, ethnicity and cultural differences in the promotion of artists. It aims to challenge the Westernized hierarchy of valorization and consecration in the art world. The research supports Bourdieu’s artistic field theory, which emphasises the importance of cultural, economic and social capital in determining agents’ position and access to the field resources (symbolic capital). Bourdieu also established that dominated agents can change their position in the field’s hierarchy either by establishing or navigating alternative systems. Data Collection and Analysis Procedures: The opacity of art world’s operations places the required information within the purview of the insiders (agents). Thus, the study collects data through in-depth interviews with relevant and purposively selected individuals and organizations. The data was/will be analyzed using qualitative methods, such as thematic analysis and content analysis. The interpretive analytical approach adopted facilitated the construction of meanings that may not be apparent in the data or responses. Questions Addressed: The study addresses how El Anatsui achieved global acclaim despite being from the margins, whether his consecration represents decolonization or exoticism, and the extent to which the global artistic field embraces decolonization, inclusion, and diversity. Conclusion: The study will contribute to knowledge by providing insights into the extent of commitment to decolonization, inclusion, and diversity in the global artistic field. It also shed light on the mechanisms behind El Anatsui's rise to global acclaim and challenge Western-dominated artistic hierarchies.

Keywords: decolonisation, exorticism, artistic field, culture game

Procedia PDF Downloads 30
3 Accountability of Artificial Intelligence: An Analysis Using Edgar Morin’s Complex Thought

Authors: Sylvie Michel, Sylvie Gerbaix, Marc Bidan

Abstract:

Artificial intelligence (AI) can be held accountable for its detrimental impacts. This question gains heightened relevance given AI's pervasive reach across various domains, magnifying its power and potential. The expanding influence of AI raises fundamental ethical inquiries, primarily centering on biases, responsibility, and transparency. This encompasses discriminatory biases arising from algorithmic criteria or data, accidents attributed to autonomous vehicles or other systems, and the imperative of transparent decision-making. This article aims to stimulate reflection on AI accountability, denoting the necessity to elucidate the effects it generates. Accountability comprises two integral aspects: adherence to legal and ethical standards and the imperative to elucidate the underlying operational rationale. The objective is to initiate a reflection on the obstacles to this "accountability," facing the challenges of the complexity of artificial intelligence's system and its effects. Then, this article proposes to mobilize Edgar Morin's complex thought to encompass and face the challenges of this complexity. The first contribution is to point out the challenges posed by the complexity of A.I., with fractional accountability between a myriad of human and non-human actors, such as software and equipment, which ultimately contribute to the decisions taken and are multiplied in the case of AI. Accountability faces three challenges resulting from the complexity of the ethical issues combined with the complexity of AI. The challenge of the non-neutrality of algorithmic systems as fully ethically non-neutral actors is put forward by a revealing ethics approach that calls for assigning responsibilities to these systems. The challenge of the dilution of responsibility is induced by the multiplicity and distancing between the actors. Thus, a dilution of responsibility is induced by a split in decision-making between developers, who feel they fulfill their duty by strictly respecting the requests they receive, and management, which does not consider itself responsible for technology-related flaws. Accountability is confronted with the challenge of transparency of complex and scalable algorithmic systems, non-human actors self-learning via big data. A second contribution involves leveraging E. Morin's principles, providing a framework to grasp the multifaceted ethical dilemmas and subsequently paving the way for establishing accountability in AI. When addressing the ethical challenge of biases, the "hologrammatic" principle underscores the imperative of acknowledging the non-ethical neutrality of algorithmic systems inherently imbued with the values and biases of their creators and society. The "dialogic" principle advocates for the responsible consideration of ethical dilemmas, encouraging the integration of complementary and contradictory elements in solutions from the very inception of the design phase. Aligning with the principle of organizing recursiveness, akin to the "transparency" of the system, it promotes a systemic analysis to account for the induced effects and guides the incorporation of modifications into the system to rectify deviations and reintroduce modifications into the system to rectify its drifts. In conclusion, this contribution serves as an inception for contemplating the accountability of "artificial intelligence" systems despite the evident ethical implications and potential deviations. Edgar Morin's principles, providing a lens to contemplate this complexity, offer valuable perspectives to address these challenges concerning accountability.

Keywords: accountability, artificial intelligence, complexity, ethics, explainability, transparency, Edgar Morin

Procedia PDF Downloads 33
2 Evidence Based Dietary Pattern in South Asian Patients: Setting Goals

Authors: Ananya Pappu, Sneha Mishra

Abstract:

Introduction: The South Asian population experiences unique health challenges that predisposes this demographic to cardiometabolic diseases at lower BMIs. South Asians may therefore benefit from recommendations specific to their cultural needs. Here, we focus on current BMI guidelines for Asians with a discussion of South Asian dietary practices and culturally tailored interventions. By integrating traditional dietary practices with modern nutritional recommendations, this manuscript aims to highlight effective strategies to improving health outcomes among South Asians. Background: The South Asian community, including individuals from India, Pakistan, Bangladesh, and Sri Lanka, experiences high rates of cardiovascular diseases, cancers, diabetes, and strokes. Notably, the prevalence of diabetes and cardiovascular disease among Asians is elevated at BMIs below the WHO's standard overweight threshold. As it stands, a BMI of 25-30 kg/m² is considered overweight in non-Asians, while this cutoff is reduced to 23-27.4 kg/m² in Asians. This discrepancy can be attributed to studies which have shown different associations between BMI and health risks in Asians compared to other populations. Given these significant challenges, optimizing lifestyle management for cardiometabolic risk factors is crucial. Tailored interventions that consider cultural context seem to be the best approach for ensuring the success of both dietary and physical activity interventions in South Asian patients. Adopting a whole food, plant-based diet (WFPD) is one such strategy. The WFPD suggests that half of one meal should consist of non-starchy vegetables. In the South Asian diet, this includes traditional vegetables such as okra, tindora, eggplant, and leafy greens including amaranth, collards, chard, and mustards. A quarter of the meal should include plant-based protein sources like cooked beans, lentils, and paneer, with the remaining quarter comprising healthy grains or starches such as whole wheat breads, millets, tapioca, and barley. Adherence to the WFPD has been shown to improve cardiometabolic risk factors including weight, BMI, total cholesterol, HbA1c, and reduces the risk of developing non-alcoholic fatty liver disease (NAFLD). Another approach to improving dietary habits is timing meals. Many of the major cultures and religions in the Indian subcontinent incorporate religious fasting. Time-restricted eating (TRE), also known as intermittent fasting, is a practice akin to traditional fasting, which involves consuming all daily calories within a specific window. TRE has been shown to improve insulin resistance in prediabetic and diabetic patients. Common regimens include completing all meals within an 8-hour window, consuming a low-calorie diet every other day, and the 5:2 diet, which involves fasting twice weekly. These fasting practices align with the natural circadian rhythm, potentially enhancing metabolic health and reducing obesity and diabetes risks. Conclusion: South Asians develop cardiometabolic disease at lower BMIs; hence, it is important to counsel patients about lifestyle interventions that decrease their risk. Traditional South Asian diets can be made more nutrient-rich by incorporating vegetables, plant proteins like lentils and beans, and substituting refined grains for whole grains. Ultimately, the best diet is one to which a patient can adhere. It is therefore important to find a regimen that aligns with a patient’s cultural and traditional food practices.

Keywords: BMI, diet, obesity, South Asian, time-restricted eating

Procedia PDF Downloads 5
1 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 49