Search results for: detecting unknown viruses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1777

Search results for: detecting unknown viruses

1747 Conservativeness of Probabilistic Constrained Optimal Control Method for Unknown Probability Distribution

Authors: Tomoaki Hashimoto

Abstract:

In recent decades, probabilistic constrained optimal control problems have attracted much attention in many research field. Although probabilistic constraints are generally intractable in an optimization problem, several tractable methods haven been proposed to handle probabilistic constraints. In most methods, probabilistic constraints are reduced to deterministic constraints that are tractable in an optimization problem. However, there is a gap between the transformed deterministic constraints in case of known and unknown probability distribution. This paper examines the conservativeness of probabilistic constrained optimization method with the unknown probability distribution. The objective of this paper is to provide a quantitative assessment of the conservatism for tractable constraints in probabilistic constrained optimization with the unknown probability distribution.

Keywords: optimal control, stochastic systems, discrete time systems, probabilistic constraints

Procedia PDF Downloads 553
1746 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 48
1745 Integration of Magnetoresistance Sensor in Microfluidic Chip for Magnetic Particles Detection

Authors: Chao-Ming Su, Pei-Sheng Wu, Yu-Chi Kuo, Yin-Chou Huang, Tan-Yueh Chen, Jefunnie Matahum, Tzong-Rong Ger

Abstract:

Application of magnetic particles (MPs) has been applied in biomedical field for many years. There are lots of advantages through this mediator including high biocompatibility and multi-diversified bio-applications. However, current techniques for evaluating the quantity of the magnetic-labeled sample assays are rare. In this paper, a Wheatstone bridge giant magnetoresistance (GMR) sensor integrated with a homemade detecting system was fabricated and used to quantify the concentration of MPs. The homemade detecting system has shown high detecting sensitivity of 10 μg/μl of MPs with optimized parameter vertical magnetic field 100 G, horizontal magnetic field 2 G and flow rate 0.4 ml/min.

Keywords: magnetic particles, magnetoresistive sensors, microfluidics, biosensor

Procedia PDF Downloads 375
1744 Modeling and Simulation for Infection Processes of Bird Flu within a Poultry Farm

Authors: Tertia Delia Nova, Masaji Watanabge

Abstract:

Infection of bird flu within a poultry farm involves hosts, virus, and medium. Intrusion of bird flu into a poultry farm divides the population into two groups; healthy and susceptible chickens and infected chickens. A healthy and susceptible bird is infected to become an infected bird. Bird flu viruses spread among chickens through medium such as air and droppings, and increase in hosts. A model for an infection process of bird flu within a poultry farm is described, numerical techniques are illustrated, and numerical results are introduced.

Keywords: bird flu, poultry farm, model for an infection process, flu viruses

Procedia PDF Downloads 225
1743 Robust Stabilization against Unknown Consensus Network

Authors: Myung-Gon Yoon, Jung-Ho Moon, Tae Kwon Ha

Abstract:

This paper considers a robust stabilization problem of a single agent in a multi-agent consensus system composed of identical agents, when the network topology of the system is completely unknown. It is shown that the transfer function of an agent in a consensus system can be described as a multiplicative perturbation of the isolated agent transfer function in frequency domain. Applying known robust stabilization results, we present sufficient conditions for a robust stabilization of an agent against unknown network topology.

Keywords: single agent control, multi-agent system, transfer function, graph angle

Procedia PDF Downloads 423
1742 In vitro Antiviral Activity of Ocimum sanctum against Animal Viruses

Authors: Anjana Goel, Ashok Kumar Bhatia

Abstract:

Ocimum sanctum, a well known medicinal plant is used for various alignments in Ayurvedic medicines. It was found to be effective in treating the humans suffering from different viral infections like chicken pox, small pox, measles and influenza. In addition, curative effect of the plant in malignant patients was also reported. In the present study, leaves of this plant were screened against animal viruses i.e. Bovine Herpes Virus-type-1 (BHV-1), Foot and Mouth disease virus (FMDV) and Newcastle Disease Virus (NDV). BHV-1 and FMDV were screened in MDBK and BHK cell lines respectively using cytopathic inhibition test. While NDV was propagated in chick embryo fibroblast culture and tested by haemagglutination inhibition test. Maximum non toxic dose of aqueous extract of Ocimum sanctum leaves was calculated by MTT assay in all the cell cultures and nontoxic doses were used for antiviral activity against viruses. 98.4% and 85.3% protection were recorded against NDV and BHV-1 respectively. However, Ocimum sanctum extract failed to show any inhibitory effect on the cytopathic effect caused by FMD virus. It can be concluded that Ocimum sanctum is a very effective remedy for curing viral infections in animals also.

Keywords: bovine herpes virus-type-1, foot and mouth disease virus, newcastle disease virus, Ocimum sanctum

Procedia PDF Downloads 235
1741 Enteropathogenic Viruses Associated with Acute Gastroenteritis among Under 5-Years Children in Africa: A Systematic Review and Meta-Analysis

Authors: Cornelius Arome Omatola, Ropo Ebenezer Ogunsakin, Anyebe Bernard Onoja, Martin-Luther Oseni Okolo, Joseph Abraham-Oyiguh, Kehinde Charles Mofolorunso, Phoebe Queen Akoh, Omebije Patience Adejo, Joshua Idakwo, Therisa Ojomideju Okeme, Danjuma Muhammed, David Moses Adaji, Sunday Ocholi Samson, Ruth Aminu, Monday Eneojo Akor

Abstract:

Gastroenteritis viruses are the leading etiologic agents of diarrhea in children worldwide. We present data from thirty-three (33) eligible studies published between 2003 and 2023 from African countries bearing the brunt of the virus-associated diarrheal mortality. Random effects meta-analysis with proportion, subgroups, and meta-regression analyses were employed. Overall, rotavirus with estimated pooled prevalence of 31.0% (95% CI 24.0–39.0) predominated in all primary care visits and hospitalizations, followed by norovirus, adenovirus, sapovirus, astrovirus, and aichivirus with pooled prevalence estimated at 15.0% (95% CI 12.0–20.0), 10% (95% CI 6-15), 4.0% (95% CI 2.0–6.0), 4% (95% CI 3-6), and 2.3% (95% CI 1-3), respectively. Predominant rotavirus genotype was G1P[8] (38%), followed by G3P[8] (11.7%), G9P[8] (8.7%), and G2P[4] (7.1%); although, unusual genotypes were also observed, including G3P[6] (2.7%), G8P[6] (1.7%), G1P[6] (1.5%), G10P[8] (0.9%), G8P[4] (0.5%), and G4P[8] (0.4%). The genogroup II norovirus predominated over the genogroup I-associated infections (84.6%, 613/725 vs 14.9%, 108/725), with the GII.4 (79.3%) being the most prevalent circulating genotype. In conclusion, this review showed that rotavirus remains the leading driver of viral diarrhea requiring health care visits and hospitalization among under-five years children in Africa. Thus, improved rotavirus vaccination in the region and surveillance to determine the residual burden of rotavirus and the evolving trend of other enteric viruses are needed for effective control and management of cases.

Keywords: enteric viruses, rotavirus, norovirus, adenovirus, astrovirus, gastroenteritis

Procedia PDF Downloads 51
1740 Selection of Designs in Ordinal Regression Models under Linear Predictor Misspecification

Authors: Ishapathik Das

Abstract:

The purpose of this article is to find a method of comparing designs for ordinal regression models using quantile dispersion graphs in the presence of linear predictor misspecification. The true relationship between response variable and the corresponding control variables are usually unknown. Experimenter assumes certain form of the linear predictor of the ordinal regression models. The assumed form of the linear predictor may not be correct always. Thus, the maximum likelihood estimates (MLE) of the unknown parameters of the model may be biased due to misspecification of the linear predictor. In this article, the uncertainty in the linear predictor is represented by an unknown function. An algorithm is provided to estimate the unknown function at the design points where observations are available. The unknown function is estimated at all points in the design region using multivariate parametric kriging. The comparison of the designs are based on a scalar valued function of the mean squared error of prediction (MSEP) matrix, which incorporates both variance and bias of the prediction caused by the misspecification in the linear predictor. The designs are compared using quantile dispersion graphs approach. The graphs also visually depict the robustness of the designs on the changes in the parameter values. Numerical examples are presented to illustrate the proposed methodology.

Keywords: model misspecification, multivariate kriging, multivariate logistic link, ordinal response models, quantile dispersion graphs

Procedia PDF Downloads 359
1739 Equation to an Unknown (1980): Visibility, Community, and Rendering Queer Utopia

Authors: Ted Silva

Abstract:

Dietrich de Velsa's Équation à un inconnu / Equation to an Unknown hybridizes art cinema style with the sexually explicit aesthetics of pornography to envision a uniquely queer world unmoored by heteronormative influence. This stylization evokes the memory of a queer history that once approximated such a prospect. With this historical and political context in mind, this paper utilizes formal analysis to assess how the film frames queer sexual encounters as tender acts of care, sometimes literally mending physical wounds. However, Equation to Unknown also highlights the transience of these sexual exchanges. By emphasizing the homogeneity of the protagonist’s sexual conquests, the film reveals that these practices have a darker meaning when the men reject the individualized connection to pursue purely visceral gratification. Given the lack of diversity or even recognizable identifying factors, the men become more anonymous to each other the more they pair up. Ultimately, Equation to an Unknown both celebrates and problematizes its vision of a queer utopia, highlighting areas in the community wherein intimacy and care flourish and locating those spots in which they are neglected.

Keywords: pornography studies, queer cinema, French cinema, history

Procedia PDF Downloads 63
1738 Defects Estimation of Embedded Systems Components by a Bond Graph Approach

Authors: I. Gahlouz, A. Chellil

Abstract:

The paper concerns the estimation of system components faults by using an unknown inputs observer. To reach this goal, we used the Bond Graph approach to physical modelling. We showed that this graphical tool is allowing the representation of system components faults as unknown inputs within the state representation of the considered physical system. The study of the causal and structural features of the system (controllability, observability, finite structure, and infinite structure) based on the Bond Graph approach was hence fulfilled in order to design an unknown inputs observer which is used for the system component fault estimation.

Keywords: estimation, bond graph, controllability, observability

Procedia PDF Downloads 389
1737 Detection Characteristics of the Random and Deterministic Signals in Antenna Arrays

Authors: Olesya Bolkhovskaya, Alexey Davydov, Alexander Maltsev

Abstract:

In this paper approach to incoherent signal detection in multi-element antenna array are researched and modeled. Two types of useful signals with unknown wavefront were considered. First one is deterministic (Barker code), the second one is random (Gaussian distribution). The derivation of the sufficient statistics took into account the linearity of the antenna array. The performance characteristics and detecting curves are modeled and compared for different useful signals parameters and for different number of elements of the antenna array. Results of researches in case of some additional conditions can be applied to a digital communications systems.

Keywords: antenna array, detection curves, performance characteristics, quadrature processing, signal detection

Procedia PDF Downloads 368
1736 Identification of Viruses Infecting Garlic Plants in Colombia

Authors: Diana M. Torres, Anngie K. Hernandez, Andrea Villareal, Magda R. Gomez, Sadao Kobayashi

Abstract:

Colombian Garlic crops exhibited mild mosaic, yellow stripes, and deformation. This group of symptoms suggested a viral infection. Several viruses belonging to the genera Potyvirus, Carlavirus and Allexivirus are known to infect garlic and lower their yield worldwide, but in Colombia, there are no studies of viral infections in this crop, only leek yellow stripe virus (LYSV) has been reported to our best knowledge. In Colombia, there are no management strategies for viral diseases in garlic because of the lack of information about viral infections on this crop, which is reflected in (i) high prevalence of viral related symptoms in garlic fields and (ii) high dispersal rate. For these reasons, the purpose of the present study was to evaluate the viral status of garlic in Colombia, which can represent a major threat on garlic yield and quality for this country 55 symptomatic leaf samples were collected for virus detection by RT-PCR and mechanical inoculation. Total RNA isolated from infected samples were subjected to RT-PCR with primers 1-OYDV-G/2-OYDV-G for Onion yellow dwarf virus (OYDV) (expected size 774pb), 1LYSV/2LYSV for LYSV (expected size 1000pb), SLV 7044/SLV 8004 for Shallot latent virus (SLV) (expected size 960pb), GCL-N30/GCL-C40 for Garlic common latent virus (GCLV) (expected size 481pb) and EF1F/EF1R for internal control (expected size 358pb). GCLV, SLV, and LYSV were detected in infected samples; in 95.6% of the analyzed samples was detected at least one of the viruses. GCLV and SLV were detected in single infection with low prevalence (9.3% and 7.4%, respectively). Garlic generally becomes coinfected with several types of viruses. Four viral complexes were identified: three double infection (64% of analyzed samples) and one triple infection (15%). The most frequent viral complex was SLV + GCLV infecting 48.1% of the samples. The other double complexes identified had a prevalence of 7% (GCLV + LYSV and SLV + LYSV) and 5.6% of the samples were free from these viruses. Mechanical transmission experiments were set up using leaf tissues of collected samples from infected fields, different test plants were assessed to know the host range, but it was restricted to C. quinoa, confirming the presence of detected viruses which have limited host range and were detected in C. quinoa by RT-PCR. The results of molecular and biological tests confirm the presence of SLV, LYSV, and GCLV; this is the first report of SLV and LYSV in garlic plants in Colombia, which can represent a serious threat for this crop in this country.

Keywords: SLV, GCLV, LYSV, leek yellow stripe virus, Allium sativum

Procedia PDF Downloads 117
1735 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 55
1734 Deformulation and Comparative Analysis of Apparently Similar Polymers Using Multiple Modes of Pyrolysis-Gc/Ms

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in deformulation, comparative analysis as well as reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro-furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. This presentation demonstrates the study of two similar polymers by performing different mode of operations in the same system: Evolve gas analysis (EGA), Flash pyrolysis, Thermal desorption analysis, and Heart-cutting analysis. Unknown polymer materials and their chemical compositions are identified.

Keywords: gas chromatography/mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 233
1733 Establishment of a Test Bed for Integrated Map of Underground Space and Verification of GPR Exploration Equipment

Authors: Jisong Ryu, Woosik Lee, Yonggu Jang

Abstract:

The paper discusses the process of establishing a reliable test bed for verifying the usability of Ground Penetrating Radar (GPR) exploration equipment based on an integrated underground spatial map in Korea. The aim of this study is to construct a test bed consisting of metal and non-metal pipelines to verify the performance of GPR equipment and improve the accuracy of the underground spatial integrated map. The study involved the design and construction of a test bed for metal and non-metal pipe detecting tests. The test bed was built in the SOC Demonstration Research Center (Yeoncheon) of the Korea Institute of Civil Engineering and Building Technology, burying metal and non-metal pipelines up to a depth of 5m. The test bed was designed in both vehicle-type and cart-type GPR-mounted equipment. The study collected data through the construction of the test bed and conducting metal and non-metal pipe detecting tests. The study analyzed the reliability of GPR detecting results by comparing them with the basic drawings, such as the underground space integrated map. The study contributes to the improvement of GPR equipment performance evaluation and the accuracy of the underground spatial integrated map, which is essential for urban planning and construction. The study addressed the question of how to verify the usability of GPR exploration equipment based on an integrated underground spatial map and improve its performance. The study found that the test bed is reliable for verifying the performance of GPR exploration equipment and accurately detecting metal and non-metal pipelines using an integrated underground spatial map. The study concludes that the establishment of a test bed for verifying the usability of GPR exploration equipment based on an integrated underground spatial map is essential. The proposed Korean-style test bed can be used for the evaluation of GPR equipment performance and support the construction of a national non-metal pipeline exploration equipment performance evaluation center in Korea.

Keywords: Korea-style GPR testbed, GPR, metal pipe detecting, non-metal pipe detecting

Procedia PDF Downloads 72
1732 Molecular Detection of Acute Virus Infection in Children Hospitalized with Diarrhea in North India during 2014-2016

Authors: Ali Ilter Akdag, Pratima Ray

Abstract:

Background:This acute gastroenteritis viruses such as rotavirus, astrovirus, and adenovirus are mainly responsible for diarrhea in children below < 5 years old. Molecular detection of these viruses is crucially important to the understand development of the effective cure. This study aimed to determine the prevalence of common these viruses in children < 5 years old presented with diarrhea from Lala Lajpat Rai Memorial Medical College (LLRM) centre (Meerut) North India, India Methods: Total 312 fecal samples were collected from diarrheal children duration 3 years: in year 2014 (n = 118), 2015 (n = 128) and 2016 (n = 66) ,< 5 years of age who presented with acute diarrhea at the Lala Lajpat Rai Memorial Medical College (LLRM) centre(Meerut) North India, India. All samples were the first detection by EIA/RT-PCR for rotaviruses, adenovirus and astrovirus. Results: In 312 samples from children with acute diarrhea in sample viral agent was found, rotavirus A was the most frequent virus identified (57 cases; 18.2%), followed by Astrovirus in 28 cases (8.9%), adenovirus in 21 cases (6.7%). Mixed infections were found in 14 cases, all of which presented with acute diarrhea (14/312; 4.48%). Conclusions: These viruses are a major cause of diarrhea in children <5 years old in North India. Rotavirus A is the most common etiological agent, follow by astrovirus. This surveillance is important to vaccine development of the entire population. There is variation detection of virus year wise due to differences in the season of sampling, method of sampling, hygiene condition, socioeconomic level of the entire people, enrolment criteria, and virus detection methods. It was found Astrovirus higher then Rotavirus in 2015, but overall three years study Rotavirus A is mainly responsible for causing severe diarrhea in children <5 years old in North India. It emphasizes the required for cost-effective diagnostic assays for Rotaviruses which would help to determine the disease burden.

Keywords: adenovirus, Astrovirus, hospitalized children, Rotavirus

Procedia PDF Downloads 114
1731 Anterior Uveitis Caused by Infection with Cytomegalovirus and Herpes Simplex Virus Type I at Cicendo Eye Hospital Bandung

Authors: Shinta Stri Ayuda Nur Setyaningsih

Abstract:

Anterior uveitis is often triggered by viral infections such as herpes simplex virus (HSV) and cytomegalovirus (CMV). This study aims to provide an overview of the demographic and clinical characteristics of patients with anterior uveitis caused by CMV and HSV infection at PMN Cicendo Eye Hospital Bandung. This study used a retrospective observational method. Data were collected from the medical records of patients who visited the PMN Infection and Immunology Polyclinic at Cicendo Eye Hospital between February and July 2023. The results showed that anterior uveitis associated with HSV and CMV viruses often occurs in the elderly and more in women. The most common clinical symptoms are red eyes and decreased visual acuity, with a gradual onset of symptoms. Complications that often arise are cataracts and glaucoma. This study provides a deeper understanding of anterior uveitis caused by infection with HSV and CMV viruses.

Keywords: uveitis anterior, cytomegavirus, herpes simplex virus type I ELISA

Procedia PDF Downloads 48
1730 Teicoplanin Derivatives with Antiviral Activity: Synthesis and Biological Evaluation

Authors: Zsolt Szucs, Viktor Kelemen, Son Le Thai, Magdolna Csavas, Erzsebet Roth, Gyula Batta, Annelies Stevaert, Evelien Vanderlinden, Aniko Borbas, Lieve Naesens, Pal Herczegh

Abstract:

The approval of modern glycopeptide antibiotics such as dalbavancin and oritavancin which have excellent activity against Gram-positive bacteria, encouraged our research group to prepare semisynthetic compounds from several members of glycopeptides by various chemical methods. Derivatives from the aglycone of ristocetin, eremomycin, vancomycin and a pseudoaglycon of teicoplanin have been synthesized in a systematic manner. Interestingly, some of the aglycoristocetin derivatives displayed noteworthy anti-influenza activity. More recently our group has been focusing on the modifications of one of the pseudoaglycons of teicoplanin. The reaction of N-ethoxycarbonyl maleimide derivatives with the primary amino function, the copper-catalysed azide-alkyne click reaction and the sulfonylation of the N-terminus were utilized to obtain systematic series of compounds. All substituents provide a more lipophilic character to the new molecules compared to the parent antibiotics, which is known to be favourable for activity against resistant bacteria. Lipoglycopeptides are also known to have antiviral properties, which has been predominantly studied on HIV by others. The structure-activity relationship study of our compounds revealed the influence of a few structural elements on biological activity. In many cases, minimal changes in lipophilicity and structure produced great differences in efficacy and cytotoxicity. In vitro experiments showed that these compounds are not only active against glycopeptide resistant Gram-positive bacteria but in several cases they prevent the infection of cell cultures by different strains of influenza viruses. This is probably related to the inhibition of the viral entry into the host cell nucleus, of which the exact mechanism is unknown. In some instances, reasonably low concentrations were sufficient to observe this effect. Several derivatives were highly cytotoxic at the same time, but some of them displayed a good selectivity index. The antiviral properties of the compounds are not restricted to influenza viruses e.g., some of them showed good activity against Human Coronavirus 229E. This work could potentially lead to the development of antiviral drugs which possess the crucial structural motifs that are needed for antiviral activity, while missing those which contribute to the antibacterial effect.

Keywords: antiviral, glycopeptide, semisynthetic, teicoplanin

Procedia PDF Downloads 126
1729 Distributed Coverage Control by Robot Networks in Unknown Environments Using a Modified EM Algorithm

Authors: Mohammadhosein Hasanbeig, Lacra Pavel

Abstract:

In this paper, we study a distributed control algorithm for the problem of unknown area coverage by a network of robots. The coverage objective is to locate a set of targets in the area and to minimize the robots’ energy consumption. The robots have no prior knowledge about the location and also about the number of the targets in the area. One efficient approach that can be used to relax the robots’ lack of knowledge is to incorporate an auxiliary learning algorithm into the control scheme. A learning algorithm actually allows the robots to explore and study the unknown environment and to eventually overcome their lack of knowledge. The control algorithm itself is modeled based on game theory where the network of the robots use their collective information to play a non-cooperative potential game. The algorithm is tested via simulations to verify its performance and adaptability.

Keywords: distributed control, game theory, multi-agent learning, reinforcement learning

Procedia PDF Downloads 429
1728 Diagnostic Evaluation of Micro Rna (miRNA-21, miRNA-215 and miRNA-378) in Patients with Colorectal Cancer

Authors: Ossama Abdelmotaal, Olfat Shaker, Tarek Salman, Lamiaa Nabeel, Mostafa Shabayek

Abstract:

Colorectal Cancer (CRC) is an important worldwide health problem. Colonoscopy is used in detecting CRC suffer from drawbacks where colonoscopy is an invasive method. This study validates easier and less time-consuming techniques to evaluate the usefulness of detecting miRNA-21, miRNA-215 and miRNA-378 in the sera of colorectal cancer patients as new diagnostic tools. This study includes malignant (Colo Rectal Cancer patients, n= 64)) and healthy (n=27) groups. The studied groups were subjected to colonoscopic examination and estimation of miRNA-21, miRNA-215 and miRNA-378 in sera by RT-PCR. miRNA-21 showed the statistically significantly highest median fold change. miRNA-378 showed statistically significantly lower value (Both showed over-expression). miRNA-215 showed the statistically significantly lowest median fold change (It showed down-regulation). Overall the miRNA (21-215 and 378) appear to be promising method of detecting CRC and evaluating its stages.

Keywords: colorectal cancer, miRNA-21, miRNA-215, miRNA-378

Procedia PDF Downloads 278
1727 Optimal Linear Quadratic Digital Tracker for the Discrete-Time Proper System with an Unknown Disturbance

Authors: Jason Sheng-Hong Tsai, Faezeh Ebrahimzadeh, Min-Ching Chung, Shu-Mei Guo, Leang-San Shieh, Tzong-Jiy Tsai, Li Wang

Abstract:

In this paper, we first construct a new state and disturbance estimator using discrete-time proportional plus integral observer to estimate the system state and the unknown external disturbance for the discrete-time system with an input-to-output direct-feedthrough term. Then, the generalized optimal linear quadratic digital tracker design is applied to construct a proportional plus integral observer-based tracker for the system with an unknown external disturbance to have a desired tracking performance. Finally, a numerical simulation is given to demonstrate the effectiveness of the new application of our proposed approach.

Keywords: non-minimum phase system, optimal linear quadratic tracker, proportional plus integral observer, state and disturbance estimator

Procedia PDF Downloads 482
1726 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 362
1725 Earnings-Related Information, Cognitive Bias, and the Disposition Effect

Authors: Chih-Hsiang Chang, Pei-Shan Kao

Abstract:

This paper discusses the reaction of investors in the Taiwan stock market to the most probable unknown earnings-related information and the most probable known earnings-related information. As compared with the previous literature regarding the effect of an official announcement of earnings forecast revision, this paper further analyzes investors’ cognitive bias toward the unknown and known earnings-related information, and the role of media during the investors' reactions to the foresaid information shocks. The empirical results show that both the unknown and known earnings-related information provides useful information content for a stock market. In addition, cognitive bias and disposition effect are the behavioral pitfalls that commonly occur in the process of the investors' reactions to the earnings-related information. Finally, media coverage has a remarkable influence upon the investors' trading decisions.

Keywords: cognitive bias, role of media, disposition effect, earnings-related information, behavioral pitfall

Procedia PDF Downloads 200
1724 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 325
1723 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 344
1722 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 123
1721 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 613
1720 Household Low Temperature MS2 (ATCC15597-B1) Virus Inactivation Using a Hot Bubble Column Evaporator

Authors: Adrian Garrido Sanchis, Richard Pashley

Abstract:

The MS2 (ATCC15597-B1) virus was used as a surrogate to estimate the inactivation rates for enteric viruses when using a hot air bubble column evaporator (HBCE) system in the treatment of household wastewater. In this study, we have combined MS2 virus surface charging properties with thermal inactivation rates, using an improved double layer plaque assay technique, in order to assess the efficiency of the HBCE process for virus removal in water. When bubbling a continuous flow of dry air, at 200°C, only heats the aqueous solution in the bubble column to about 50°C. Viruses are not inactivated by this solution temperature, as confirmed separately from water bath heating experiments. Hence, the efficiency of the HBCE process for virus removal in water appeared to be caused entirely by collisions between the hot air bubbles and the virus organisms. This new energy efficient treatment for water reuse applications can reduce the thermal energy required to only 25% (about 113.7 kJ/L) of that required for boiling (about 450 kJ/L).

Keywords: MS2 virus inactivation, water reuse, hot bubble column evaporator, water treatment

Procedia PDF Downloads 181
1719 Prevalence, Awareness, and Risk Factors of Diabetes in Ahvaz: South West of Iran

Authors: Leila Yazdanpanah, Hajieh Shahbazian, Seyed Mahmoud Latifi, Armaghan Moravej Aleali, Saeed Ghanbari

Abstract:

Introduction: This study was designed to determine the prevalence of diabetes in people aged over 20 years in Ahvaz, Iran. Material and Methods: The study population selected by cluster sampling. Fasting blood sugar (FBS) assessed after minimum 8 hours night fasting. A questionnaire included: age, sex, weight, height, blood pressure, waist circumference and previous history of diabetes were completed for each patient. FBS≥126mg/dl and/or oral hypoglycemic treatment and/or insulin was defined as diabetes, FBS=100-125 mg/dl as impaired fasting glucose (IFG) and FBS<100mg/dl as normal. Results: Study population was 936 persons (47.2 % male and 52.8% female). The mean age of a population was 42.2±14 years. Diabetes was detected in 15.1 % of population. Only 57cases(6.1%) were aware of their disease and 9% had unknown diabetes. Diabetes was detected in 14.5% of male (11.3% unknown and 3.2 % known diabetes) and in 11.7% of female (7% unknown and 4.7% known diabetes). Prevalence of diabetes had no significant difference (P=0.21) in male and female but unknown diabetes was significantly higher in male (P=0.025). Prevalence of diabetes was increased with rising of age between 20-60 years old but decreasing after 60 years old. Diabetes was related to age, waist circumference and systolic and diastolic blood pressure, TG level and BMI in both sex (P=0.0001). Conclusion: More than half of female and three-fourth of male diabetic patients are unaware of their disease in South of Iran. Diabetes screening should be intensified in this population.

Keywords: diabetes, prevalence, risk factor, awareness

Procedia PDF Downloads 441
1718 Metagenomics-Based Molecular Epidemiology of Viral Diseases

Authors: Vyacheslav Furtak, Merja Roivainen, Olga Mirochnichenko, Majid Laassri, Bella Bidzhieva, Tatiana Zagorodnyaya, Vladimir Chizhikov, Konstantin Chumakov

Abstract:

Molecular epidemiology and environmental surveillance are parts of a rational strategy to control infectious diseases. They have been widely used in the worldwide campaign to eradicate poliomyelitis, which otherwise would be complicated by the inability to rapidly respond to outbreaks and determine sources of the infection. The conventional scheme involves isolation of viruses from patients and the environment, followed by their identification by nucleotide sequences analysis to determine phylogenetic relationships. This is a tedious and time-consuming process that yields definitive results when it may be too late to implement countermeasures. Because of the difficulty of high-throughput full-genome sequencing, most such studies are conducted by sequencing only capsid genes or their parts. Therefore the important information about the contribution of other parts of the genome and inter- and intra-species recombination to viral evolution is not captured. Here we propose a new approach based on the rapid concentration of sewage samples with tangential flow filtration followed by deep sequencing and reconstruction of nucleotide sequences of viruses present in the samples. The entire nucleic acids content of each sample is sequenced, thus preserving in digital format the complete spectrum of viruses. A set of rapid algorithms was developed to separate deep sequence reads into discrete populations corresponding to each virus and assemble them into full-length consensus contigs, as well as to generate a complete profile of sequence heterogeneities in each of them. This provides an effective approach to study molecular epidemiology and evolution of natural viral populations.

Keywords: poliovirus, eradication, environmental surveillance, laboratory diagnosis

Procedia PDF Downloads 250