Search results for: IT security controls
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3589

Search results for: IT security controls

3319 Effect of Yeast Selenium on CD4 T Cell and WAZ of HIV1 Positive Children in Nyamasaria in Kisumu Kenya

Authors: S. B. Otieno1, F. Were, A. Afullo, K. Waza

Abstract:

Background: Multi drug resistance HIV has emerged rendering the current conventional treatment of HIV ineffective. There is a need for new treatment regime which is cheap, effective and not prone to resistance development by HIV. Methods: In randomized clinical study of 68 HIV positive children 3 – 15 years to asses the efficacy of yeast selenium in HIV/AIDS patients, 50μ yeast selenium was administered to 34 children while in matched control of 34 were put on placebo. Blood samples and weight of the both groups which were taken every 3 months intervals up to 6 months, were analyzed by ELIZA for CD4T cells, the data was analyzed by SPSS version 16, WAZ scores were analyzed by Epi Info version 6. Results: No significant difference in age { χ2 (1, 62) =0.03, p =0.853}, cause of morbidity between test and controls {χ2 (1, 65) = 5.87, p= 0.015} and on condition of foster parents {χ2 ( 1,63) = 5.57, p= 0.0172} was observed. Children on selenium showed progressive improvement of WAZ and significant difference at six months {F (5,12) = =5.758, P=0.006}, and weight gain of up to 4.1 kilograms in six months, and significant CD4 T cell count increase t= -2.943, p<0.05 compared to matched controls t = -1.258 p> 0.05. CD4 T cell count increased among all age groups on test 3-5 years (+ 267.1),5-8 years (+200.3) 9-15 years (+71.2) cells/mm3 and in matched controls a decrease 3-5 years (-71), 5-8 years (-125) and 9-13 years (-10.1) cells/mm3 . No significant difference inCD4 T cell count between boys {F (2, 32) = 1.531 p= 0.232} and between boys {F (2, 49) = 1.040, p= 0.361} on test and between boys and girls {F (5, 81) = 1.379, p= 0.241} on test. Similarly no significant difference between boys and girls were observed {F (5, 86) = 1.168, p= 0.332}.In the test group there was significant positive correlation β =252.23 between weight for age (WAZ), and CD4 T Cell Count p=0.007, R2= 0.252, F< 0.05. In matched controls no significant correlation between weight gain and CD4 T cell count change was observed at six months p > 0.05. No positive correlation β =-138.23 was observed between CD4T Cell count, WAZ, p=0.934, R2 =0.0337 F >0.05. Majority (96.78%) of children on test either remained or progressed to WHO immunological stage I. Conclusion: From this study it can be concluded that yeast Selenium is effective in slowing the progress of HIV 1 in children from WHO clinical stage I by improving CD4 T cell count and hence the immunity.

Keywords: selenium, HIV, AIDS, WAZ

Procedia PDF Downloads 448
3318 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 631
3317 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 442
3316 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 109
3315 Association of Hypoxia-Inducible Factor-1α in Patients with Chronic Obstructive Pulmonary Diseases

Authors: Kriti Upadhyay, Ashraf Ali, Puja Sohal, Randeep Guleria

Abstract:

Background: In Chronic Obstructive Pulmonary diseases (COPD) pathogenesis oxidative stress plays an important role. Hypoxia-Inducible factor (HIF-1α) is a dimeric protein complex which Functions as a master transcriptional regulator of the adaptive response to hypoxiaand is a risk factor that increases when oxidative stress triggers. The role ofHIF-1αin COPD due to smoking is lacking. Aim: This study aims to evaluate the role of HIF-1α in smoker COPD patients comparing its association with diseases severity. Method: In this cross-sectional study, we recruited 87 subjects, 57 were smokers with COPD,15 were smokers without COPD and other 15 were non-smoker healthy controls. The mean age was 54.6± 9.32 (cases 57.08±8.15; controls 50.0± 9.8). There were 62%smokers, 25% non-smokers,7% tobacco chewers and 6% ex-smokers. Enzyme-linked immune sorbent assay (ELISA) method was used for analyzing serum samples wherein HIF-1α was analyzed by Sandwich-ELISA. Results: In smoker COPD patients, a significantly higher HIF-1α level showed positive association with hypoxia, smoking status and severity of disease (p=0.03). The mean value of HIF-1α was not significantly different in smokers without COPD and healthy controls. Conclusion: It is found that HIF-1α level was increased in smoker COPD, but not in smokers without COPD. This suggests that development of COPD drive the HIF-1α pathway and it correlates with the severity of diseases.

Keywords: COPD, chronic obstructive pulmonary diseases, smokers, nonsmokers, hypoxia

Procedia PDF Downloads 117
3314 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 502
3313 Association of Glutathione S-transferase M1 and T1 Gene Polymorphisms with Vitiligo in Saudi Population

Authors: Ghaleb Bin Huraib, Fahad Al Harthi, Mohammad Mustafa, Abdulrahman Al-Asmari

Abstract:

Introduction: Vitiligo is an acquired pigmentary skin disorder with the regional disappearance of melanocytes. Vitiligo affects 0.1 to 2% of the global population, and the incidence varies substantially depending on ethnicity. Glutathione S-transferase (GST) is a multigene family of enzymes that detoxify oxidative stress products. The oxidative stress-related GSTM1/GSTT1 genes deletion may cause epidermal melanocytes destruction and the development of vitiligo. Hence, the present study aimed to investigate the association of GST gene polymorphisms with vitiligo in the Saudi population, if any. Materials and Methods: The present study includes 129 vitiligo cases and 130 age-matched healthy controls. The proportion of male and female patients with vitiligo is almost equal. The multiplex polymerase chain reaction (PCR) method was used for polymorphic analysis. Results: Increased odds of generalized vitiligo was observed with the null genotypes of GSTT1- gene (OR = 1.91, 95% CI = 1.07-3.42, p = 0.019). The possible genetic combinations of GSTM1/GSTT1 and their genotypic distribution showed the frequency of GSTM1+/GSTT1+ 62/130 (47.69%) and GSTM1-/GSTT1+ 52/130 (40.00%) were higher in controls than in cases 44/129 (34.11%), 43/129 (33.34%), respectively while GSTM1+/GSTT1- and GSTM1-/GSTT1- null genotypes were higher 22/129 (17.05%) and 20/129 (15.50%) in vitiligo patients as compared to controls 11/130 (8.46%), 5/130 (3.84%), respectively. The strength of association of different genetic combinations with cases have shown GSTM1+/GSTT1- (OR = 2.81, 95% CI = 1.24-6.40, p = 0.009) and GSTM1-/GSTT1- (OR = 5.63, 95% CI = 1.96 - 16.16, p = 0.0004) were significantly higher in vitiligo cases as compared to controls. We did not observe any significant association of age and gender of patients with GST gene polymorphisms. Conclusions: The GSTT1-, GSTM1+/GSTT1- and GSTM1-/GSTT1- null genotypes were significantly associated with vitiligo. These genetic polymorphisms may be the associative genetic risk factor for vitiligo among Saudis. It could be used as a genetic marker for screening vitiligo patients among Saudis. Further studies on GSTs gene polymorphism in larger sample sizes from different geographical areas and ethnicity are needed to strengthen the present findings.

Keywords: vitiligo, GSTM1, GSTT1, gene polymorphism, oxidative stress

Procedia PDF Downloads 95
3312 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis

Authors: Diego Caballero Vélez

Abstract:

In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.

Keywords: cooperation, migration crisis, national responses, threat perception

Procedia PDF Downloads 216
3311 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 376
3310 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 50
3309 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 222
3308 Exhaled Breath Condensate in Lung Cancer: A Non-Invasive Sample for Easier Mutations Detection by Next Generation Sequencing

Authors: Omar Youssef, Aija Knuuttila, Paivi Piirilä, Virinder Sarhadi, Sakari Knuutila

Abstract:

Exhaled breath condensate (EBC) is a unique sample that allows studying different genetic changes in lung carcinoma through a non-invasive way. With the aid of next generation sequencing (NGS) technology, analysis of genetic mutations has been more efficient with increased sensitivity for detection of genetic variants. In order to investigate the possibility of applying this method for cancer diagnostics, mutations in EBC DNA from lung cancer patients and healthy individuals were studied by using NGS. The key aim is to assess the feasibility of using this approach to detect clinically important mutations in EBC. EBC was collected from 20 healthy individuals and 9 lung cancer patients (four lung adenocarcinomas, four 8 squamous cell carcinoma, and one case of mesothelioma). Mutations in hotpot regions of 22 genes were studied by using Ampliseq Colon and Lung cancer panel and sequenced on Ion PGM. Results demonstrated that all nine patients showed a total of 19 cosmic mutations in APC, BRAF, EGFR, ERBB4, FBXW7, FGFR1, KRAS, MAP2K1, NRAS, PIK3CA, PTEN, RET, SMAD4, and TP53. In controls, 15 individuals showed 35 cosmic mutations in BRAF, CTNNB1, DDR2, EGFR, ERBB2, FBXW7, FGFR3, KRAS, MET, NOTCH1, NRAS, PIK3CA, PTEN, SMAD4, and TP53. Additionally, 45 novel mutations not reported previously were also seen in patients’ samples, and 106 novel mutations were seen in controls’ specimens. KRAS exon 2 mutations G12D was identified in one control specimen with mutant allele fraction of 6.8%, while KRAS G13D mutation seen in one patient sample showed mutant allele fraction of 17%. These findings illustrate that hotspot mutations are present in DNA from EBC of both cancer patients and healthy controls. As some of the cosmic mutations were seen in controls too, no firm conclusion can be drawn on the clinical importance of cosmic mutations in patients. Mutations reported in controls could represent early neoplastic changes or normal homeostatic process of apoptosis occurring in lung tissue to get rid of mutant cells. At the same time, mutations detected in patients might represent a non-invasive easily accessible way for early cancer detection. Follow up of individuals with important cancer mutations is necessary to clarify the significance of these mutations in both healthy individuals and cancer patients.

Keywords: exhaled breath condensate, lung cancer, mutations, next generation sequencing

Procedia PDF Downloads 147
3307 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 357
3306 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 358
3305 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 226
3304 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 197
3303 Migration, Food Security, Rapid Urbanization and Population Rise in Nigeria: A Wake-Up Call to Policy-Makers

Authors: A. E. Obayelu, S. O. Olubiyo

Abstract:

Food is different from other commodities because everybody needs food for survival. This has led to a shift in focus to food security in the global policy arena. However, there is paucity of studies on the interactions between food security, migration, urbanization and population rise. This paper therefore look at the linkages between migration and food security in the context of rapid urbanization and population rise of Nigeria. The study obtained data and information from both secondary sources and primary method through the voice of some selected Nigerians through telephone interview. The findings revealed that, the primary factor for the rapid urbanization in Nigeria is migration; most foods are still produced by peasant farmers who are scattered all over the rural areas and not multinational companies who produce on large scale. The country is still characterized with inadequate infrastructural facilities and services to cater for growing population. There are no protective policies enforced by the Nigeria government. In most cases, the migrants are left entirely on mercy of what they can find to due for survival. The most common coping mechanisms by migrants from rural to urban areas are changing food intake in terms of quantity, quality, diversity and frequency and prioritizing children. Policies that address urban food security need to consider the complex relationship between rapid population rise and migration and appropriate transformations that will be able to manage urbanization. With increasing rate of urbanization, the focus of food security should no longer be that of rural only

Keywords: agricultural commercialization, agricultural transformation, food security, urban, urbanization

Procedia PDF Downloads 398
3302 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 313
3301 An Optimal Control Model for the Dynamics of Visceral Leishmaniasis

Authors: Ibrahim M. Elmojtaba, Rayan M. Altayeb

Abstract:

Visceral leishmaniasis (VL) is a vector-borne disease caused by the protozoa parasite of the genus leishmania. The transmission of the parasite to humans and animals occurs via the bite of adult female sandflies previously infected by biting and sucking blood of an infectious humans or animals. In this paper we use a previously proposed model, and then applied two optimal controls, namely treatment and vaccination to that model to investigate optimal strategies for controlling the spread of the disease using treatment and vaccination as the system control variables. The possible impact of using combinations of the two controls, either one at a time or two at a time on the spread of the disease is also examined. Our results provide a framework for vaccination and treatment strategies to reduce susceptible and infection individuals of VL in five years.

Keywords: visceral leishmaniasis, treatment, vaccination, optimal control, numerical simulation

Procedia PDF Downloads 381
3300 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 324
3299 Knowledge of Operation Rooms’ Staff toward Sources, Prevention and Control of Fires at Governmental Hospitals in Sana’a, Yemen

Authors: Abdulnasser Ahmed Haza’a, Marzoq Ali Odhah, Saddam Ahmed Al-Ahdal, Abdulfatah Saleh Al-Jaradi, Gamil Ghaleb Alrubaiee

Abstract:

Patient safety in hospitals is an essential professional indicator that should be noticed. The threat of fires is potentially the most dangerous risk that could harm patients and personnel. The aim of the study is to assess the knowledge of operating room (OR) staff toward prevention and control sources of fires. Between March 1 and March 30, 2022, data collection was done. A descriptive cross-sectional study was conducted. The sample of the study consisted of 89 OR staff from different governmental hospitals. Convenient sampling was applied to select the sample size. Official approvals were obtained from selected settings for start collection data. Data were collected using a close-ended questionnaire and tested for knowledge. This study was conducted in four governmental hospitals in Sana'a, Yemen. Most of the OR staff were male. Of these, 50.6% of them were operation technician professionals. More than two-thirds of OR staff have less than ten years of experience; 93% of OR staff had inadequate knowledge of sources of fires, and inadequate knowledge of them toward controls and prevention of fires (73%, 79.8%), respectively; 77.5% of OR staff had inadequate knowledge of prevention and control sources of fires. The study concluded that most of OR staff had inadequate knowledge of sources, controls, and prevention of fires, while 22.5% of them had adequate knowledge of prevention and control sources of fires. We recommended the implementation of training programs toward sources, controls, and prevention of fires or related workshops in their educational planning for OR staff of hospitals.

Keywords: knowledge, operation rooms staff, fires, prevention

Procedia PDF Downloads 56
3298 Paraoxonase 1 (PON 1) Arylesterase and Lactonase Activities, Polymorphism and Conjugated Dienes in Gastroenteritis in Paediatric Population

Authors: M. R. Mogarekar, Shraddha V. More, Pankaj Kumar

Abstract:

Gastroenteritis, the third leading killer of children in India today is responsible for 13% of all deaths in children <5 years of age and kills an estimated 300,000 children in India each year. We decided to investigate parameters which can help in early disease detection and prompt treatment. Serum paraoxonase is calcium dependent esterase which is widely distributed among tissues such as liver, kidney, and intestine and is located in the chromosomal region 7q21.3 22.1. Studies show the presence of excessive reactive oxygen metabolites and antioxidant imbalance in the gastrointestinal tract leading to oxidative stress in gastroenteritis. To our knowledge, this is the first ever study done. The objective of present study is to investigate the role of paraoxonase 1 (PON 1) status i.e arylesterase and lactonase activities and Q192R polymorphism and conjugated dienes, in gastroenteritis of paediatric population. The study and control group consists of 40 paediatric patients with and without gastroenteritis. Paraoxonase arylesterase and lactonase activities were assessed and phenotyping was determined. Conjugated dienes were also assessed. PON 1 arylesterase activities in cases (61.494±13.220) and controls (70.942±15.385) and lactonase activities in cases (15.702±1.036) and controls (17.434±1.176) were significantly decreased (p<0.05). There is no significant difference of phenotypic distribution in cases and controls. Conjugated dienes were found significantly increased in patients (0.086±0.024) than the control group (0.064±0.019) (p<0.05). Paraoxonase 1 activities (arylesterase and lactonase) and conjugated dienes may be useful in risk assessment and management in gastroenteritis in paediatric population.

Keywords: paraoxonase 1 polymorphism, arylesterase, lactonase, conjugated dienes, p-nitrophenylacetate, DHC

Procedia PDF Downloads 285
3297 Th2 and Th17 Subsets in the Circulation of Psoriasis Patients

Authors: Chakrit Thapphan, Suteeraporn Chaowattanapanit, Sorutsiri Chareonsudjai, Wisitsak Phoksawat, Supranee Phantanawiboon, Kiatichai Faksri, Steve W. Edwards, Kanin Salao

Abstract:

Background: Psoriasis is a chronic inflammatory disease of the skin that is mediated by crosstalk between keratinocytes and immune cells, especially CD4+ T helper (Th) cells. To date, psoriasis is established as a T helper 17 (Th17) cell-mediated inflammatory process driven by the over-expression of Th17. However, the role of other CD4+T helper cells is rather controversial. Objective: Our study, thereby, aimed to characterize and analyze T cell subsets in the circulating blood of psoriasis patients and compare them to healthy controls. Methods: Peripheral blood mononuclear cells were isolated from the participants and stained with fluorescent dye-conjugated monoclonal antibodies specific for intracellular cytokines, including interferon-gamma (IFN- γ), interleukin (IL-4), IL-17 and forkhead box P3 (FOXP3), that can be used to define T helper 1 (Th1) cells, T helper 2 (Th2), T helper 17 (Th17) and regulatory T cells (Treg) respectively. Results: We found that the numbers of Th2 (59.6% ± 17.0) and Th17 (4.0% ± 2.0) cells in the circulating blood of psoriasis patients were significantly higher than those of the healthy controls (p= 0.0007 and 0.0013 respectively). In contrast, the numbers of Th1 and Treg cells were not significantly different between psoriasis patients and healthy controls (p= 0.0593 and 0.8518, respectively). Additionally, when adjusting these numbers of Th cells to Treg, we observed a similar trend that the ratio of Th2/Treg and Th17/Treg also elevated (p = 0.0007 and 0.0047, respectively). Conclusion: Taken together, our results suggest an imbalanced T exhibit toward the Th2 and Th17 skewed-immune responses in psoriasis patients.

Keywords: psoriasis, Th cell subsets, Th2 cells, Th17 cells, Treg cells

Procedia PDF Downloads 49
3296 The Curse of Oil: Unpacking the Challenges to Food Security in the Nigeria's Niger Delta

Authors: Abosede Omowumi Babatunde

Abstract:

While the Niger Delta region satisfies the global thirst for oil, the inhabitants have not been adequately compensated for the use of their ancestral land. Besides, the ruthless exploitation and destruction of the natural environment upon which the inhabitants of the Niger Delta depend for their livelihood and sustenance by the activities of oil multinationals, pose major threats to food security in the region and by implication, Nigeria in general, Africa, and the world, given the present global emphasis on food security. This paper examines the effect of oil exploitation on household food security, identify key gaps in measures put in place to address the changes to livelihoods and food security and explore what should be done to improve the local people access to sufficient, safe and culturally acceptable food in the Niger Delta. Data is derived through interviews with key informants and Focus Group Discussions (FGDs) conducted with respondents in the local communities in the Niger Delta states of Delta, Bayelsa and Rivers as well as relevant extant studies. The threat to food security is one important aspect of the human security challenges in the Niger Delta which has received limited scholarly attention. In addition, successive Nigerian governments have not meaningfully addressed the negative impacts of oil-induced environmental degradation on traditional livelihoods given the significant linkages between environmental sustainability, livelihood security, and food security. The destructive impact of oil pollution on the farmlands, crops, economic trees, creeks, lakes, and fishing equipment is so devastating that the people can no longer engage in productive farming and fishing. Also important is the limited access to modern agricultural methods for fishing and subsistence farming as fishing and farming are done using mostly crude implements and traditional methods. It is imperative and urgent to take stock of the negative implications of the activities of oil multinationals for environmental and livelihood sustainability, and household food security in the Niger Delta.

Keywords: challenges, food security, Nigeria's Niger delta, oil

Procedia PDF Downloads 226
3295 Modern Conditions and Tendencies of Development of Agro-Industrial Complex of the Republic of Kazakhstan

Authors: А. А. Yessekeyeva, А. S. Moldagaliyeva, G. K. Shulanbekova

Abstract:

The purpose of this article is to describe challenges associated with enhancement of government control over agro industrial sector in order to maintain food security. The need for government control over agricultural industry stems from the fact that the State is accountable to its citizens for establishing their standard living conditions, food and other agricultural product supplies. Agro industrial sector is in a special position within the market place preventing its full and equal participation in an interdisciplinary competition. Low-profit agricultural industry that is dependent on the natural and strongly marked seasonal and cyclical production factors is more underdeveloped in terms of technology and relatively static industry as compared to the manufacturing industry. Therefore, agricultural industry development directly affects food security of the country.

Keywords: food security, agro-industry, Kazakhstan, food security

Procedia PDF Downloads 262
3294 Labour Migration in Russia in the Context of Russia’s National Security Problem

Authors: A. V. Dolzhikova

Abstract:

The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.

Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security

Procedia PDF Downloads 337
3293 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 315
3292 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia

Authors: Mas Rahmah

Abstract:

Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.

Keywords: geographical indication, food security, agricultural product, Indonesia

Procedia PDF Downloads 336
3291 Application of Host Factors as Biomarker in Early Diagnosis of Pulmonary Tuberculosis

Authors: Ambrish Tiwari, Sudhasini Panda, Archana Singh, Kalpana Luthra, S. K. Sharma

Abstract:

Introduction: On the basis of available literature we know that various host factors play a role in outcome of Tuberculosis (TB) infection by modulating innate immunity. One such factor is Inducible Nitric Oxide Synthase enzyme (iNOS) which help in the production of Nitric Oxide (NO), an antimicrobial agent. Expression of iNOS is in control of various host factors in which Vitamin D along with its nuclear receptor Vitamin D receptor (VDR) is one of them. Vitamin D along with its receptor also produces cathelicidin (antimicrobicidal agent). With this background, we attempted to investigate the levels of Vitamin D and NO along with their associated molecules in tuberculosis patients and household contacts as compared to healthy controls and assess the implication of these findings in susceptibility to tuberculosis (TB). Study subjects and methods: 100 active TB patients, 75 household contacts, and 70 healthy controls were taken. VDR and iNOS mRNA levels were studied using real-time PCR. Serum VDR, cathelicidin, iNOS levels were measured using ELISA. Serum Vitamin D levels were measured in serum samples using chemiluminescence based immunoassay. NO was measured using colorimetry based kit. Results: VDR and iNOS mRNA levels were found to be lower in active TB group compared to household contacts and healthy controls (P=0.0001 and 0.005 respectively). The serum levels of Vitamin D were also found to be lower in active TB group as compared to healthy controls (P =0.001). Levels of cathelicidin and NO was higher in patient group as compared to other groups (p=0.01 and 0.5 respectively). However, the expression of VDR and iNOS and levels of vitamin D was significantly (P < 0.05) higher in household contacts compared to both active TB and healthy control groups. Inference: Higher levels of Vitamin D along with VDR and iNOS expression in household contacts as compared to patients suggest that vitamin D might have a protective role against TB which prevents activation of the disease. From our data, we can conclude that decreased vitamin D levels could be implicated in disease progression and we can use cathelicidin and NO as a biomarker for early diagnosis of pulmonary tuberculosis.

Keywords: vitamin D, VDR, iNOS, tuberculosis

Procedia PDF Downloads 278
3290 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 295