Search results for: evasion attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 641

Search results for: evasion attack

401 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 305
400 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 401
399 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 246
398 Pioneer Synthesis and Characterization of Boron Containing Hard Materials

Authors: Gülşah Çelik Gül, Figen Kurtuluş

Abstract:

The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).

Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction

Procedia PDF Downloads 570
397 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 347
396 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 37
395 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection

Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi

Abstract:

In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.

Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection

Procedia PDF Downloads 190
394 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review

Authors: M. Cortés, E. Vera, M. Avella

Abstract:

Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.

Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites

Procedia PDF Downloads 416
393 Phone Number Spoofing Attack in VoLTE 4G

Authors: Joo-Hyung Oh

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 408
392 A Review: Role of Chromium in Broiler

Authors: Naveed Zahra, Zahid Kamran, Shakeel Ahmad

Abstract:

Heat stress is one of the most important environmental stressors challenging poultry production worldwide. The detrimental effect of heat stress results in reduction in the productive performance of poultry with high incidences of mortality. Researchers have made efforts to prevent such damage to poultry production through dietary manipulation. Supplementation with Chromium (Cr) might have some positive effects on some aspect of blood parameters and broilers performance. Chromium (Cr) the element whose trivalent Cr (III) organic state is present in trace amounts in animal feed and water is found to be a key element in evading heat stress and thus cutting down the heavy expenditure on air conditioning in broiler sheds. Chromium, along with other essential minerals is lost due to increased excretion during heat stress and thus its inclusion in broiler diet is kind of mandatory in areas of hot climate. Chromium picolinate in broiler diet has shown a hike in growth rate including muscle gain with body fat reduction under environmental stress. Fat reduction is probably linked to the ability of chromium to increase the sensitivity of the insulin receptors on tissues and thus the uptake of sugar from blood increases which decreases the amount of glucose to be converted to amino acids and stored in adipose tissue as triglycerides. Organic chromium has also shown to increase lymphocyte proliferation rate and antioxidant levels. So, the immune competency, muscle gain and fat reduction along with evasion of heat stress are good enough signs that indicate the fruitful inclusion of dietary chromium for broiler. This promising element may bring the much needed break in the local poultry industry. The task is now to set the exact dose of the element in the diet that would be useful enough and still not toxic to broiler. In conclusion there is a growing body of evidence which suggest that chromium may be an essential trace element for livestock and poultry. The nutritional requirement for chromium may vary with different species and physiological state within a species.

Keywords: broiler, chromium, heat stress, performance

Procedia PDF Downloads 240
391 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy

Abstract:

In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.

Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack

Procedia PDF Downloads 363
390 Exploring the Role of Immune-Modulators in Pathogen Recognition Receptor NOD2 Mediated Protection against Visceral Leishmaniasis

Authors: Junaid Jibran Jawed, Prasanta Saini, Subrata Majumdar

Abstract:

Background: Leishmania donovani infection causes severe host immune-suppression through the modulation of pathogen recognition receptors. Apart from TLRs (Toll Like Receptor), recent studies focus on the important contribution of NLR (NOD-Like Receptor) family member NOD1 and NOD2 as these receptors are capable of triggering host innate immunity. The aim of this study was to decipher the role of NOD1/NOD2 receptors during experimental visceral leishmaniasis (VL) and the important link between host failure and parasite evasion strategy. Method: The status of NOD1 and NOD2 receptors were analysed in uninfected and infected cells through western blotting and RT-PCR. The active contributions of these receptors in reducing parasite burden were confirmed by siRNA mediated silencing, and over-expression studies and the parasite numbers were calculated through microscopic examination of the Giemsa-stained slides. In-vivo studies were done by using non-toxic dose of Mw (Mycobacterium indicus pranii), Ara-LAM(Arabinoasylated lipoarabinomannan) along with MDP (Muramyl dipeptide) administration. Result: Leishmania donovani infection of the macrophages reduced the expression of NOD2 receptors whereas NOD1 remain unaffected. MDP, a NOD2-ligand, treatment during over-expression of NOD2, reduced the parasite burden effectively which was associated with increased pro-inflammatory cytokine generation and NO production. In experimental mouse model, Ara-LAM treatment increased the expression of NOD2 and in combination with MDP it showed active therapeutic potential against VL and found to be more effective than Mw which was already reported to be involved in NOD2 modulation. Conclusion: This work explores the essential contribution of NOD2 during experimental VL and mechanistic understanding of Ara-LAM + MDP combination therapy to work against this disease and highlighted NOD2 as an essential therapeutic target.

Keywords: Ara-LAM (Arabinoacylated Lipoarabinomannan), NOD2 (nucleotide binding oligomerization receptor 2), MDP (muramyl di peptide), visceral Leishmaniasis

Procedia PDF Downloads 143
389 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 92
388 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 490
387 Between Buddha and Tsar: Kalmyk Buddhist Sangha in Late Russian Empire

Authors: Elzyata Kuberlinova

Abstract:

This study explores how the Kalmyk Buddhist sangha responded to the Russian empire’s administrative integration and how the Buddhist clerical institutions were shaped in the process of interaction with representatives of the predominantly Orthodox state. The eighteenth-nineteenth century Russian imperial regime adhered to a religion-centred framework to govern its diverse subjects. Within this framework, any form of religious authority was considered a useful tool in the imperial quest for legibility. As such, rather than imposing religious homogeneity, the Russian administration engineered a framework of religious toleration and integrated the non-Orthodox clerical institutions in the empire’s administration. In its attempt to govern the large body of Kalmyk Buddhist sangha, the Russian government had to incorporate the sangha into the imperial institutional establishment. To this end, the Russian government founded the Lamaist Spiritual Governing Board in 1834, which became a part of the civil administration, where the Kalmyk Buddhist affairs were managed under the supervision of the Russian secular authorities. In 1847 the Lamaist Spiritual Board was abolished and Buddhist religious authority was transferred to the Lama of the Kalmyk people. From 1847 until the end of the empire in 1917 the Lama was the manager and intermediary figure between the Russian authorities and the Kalmyks where religious affairs were concerned. Substantial evidence collected in archives in Elista, Astrakhan, Stavropol and St.Petersburg show that despite being on the government’s payroll, first the Lamaist Spiritual Governing Board and later on the Lama did not always serve the interests of the state, and did not always comply with the Russian authorities’ orders. Although being incorporated into the state administrative system the Lama often found ways to manoeuvre the web of the Russian imperial bureaucracy in order to achieve his own goals. The Lama often used ‘every-day forms of resistance’ such as feigned misinterpretation, evasion, false compliance, feigned ignorance, and sabotage in order to resist without directly confronting or challenging the state orders.

Keywords: Buddhist Sangha, intermediary, Kalmyks, Lama, legibility, resistance, reform, Russian empire

Procedia PDF Downloads 195
386 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests

Authors: M. Cortés, E. Vera, O. Rojas

Abstract:

The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.

Keywords: acid sulfuric, concrete, corrosion, biogenic

Procedia PDF Downloads 353
385 Becoming a Warrior: Conspiracy, Dramaturgy, and Follower Charisma on the Far Right

Authors: Anthony Albanese

Abstract:

While much of the literature concerning Max Weber’s concept of charisma has addressed the importance of the follower’s recognition of and devotion to the charismatic leader, very little has been said about the processes that lead to the development of follower charisma. This article examines this largely overlooked aspect of the concept, as doing so (1) exacts the dynamics behind charisma’s transferability by moving beyond follower-centric models that focus on the recognition of the leader and toward one that emphasizes the follower’s generation and exhibition of charisma, (2) bridges a crucial gap between the rather wanting “losers of modernization” thesis and the social actor’s proclivity to produce stories and self-cast in said stories, (3) presents authoritarian dispositions as a reaction to the weakening effects everydayness have on charisma, and (4) complicates Weber’s formulation by reassessing the role of continually demonstrable mastery. To illustrate these dynamics, one should turn to the January 6th Capitol attack in the United States.

Keywords: max weber, extremism, right-wing populism, charisma

Procedia PDF Downloads 58
384 Investigation of the Turbulent Cavitating Flows from the Viewpoint of the Lift Coefficient

Authors: Ping-Ben Liu, Chien-Chou Tseng

Abstract:

The objective of this study is to investigate the relationship between the lift coefficient and dynamic behaviors of cavitating flow around a two-dimensional Clark Y hydrofoil at 8° angle of attack, cavitation number of 0.8, and Reynolds number of 7.10⁵. The flow field is investigated numerically by using a vapor transfer equation and a modified turbulence model which applies the filter and local density correction. The results including time-averaged lift/drag coefficient and shedding frequency agree well with experimental observations, which confirmed the reliability of this simulation. According to the variation of lift coefficient, the cycle which consists of growth and shedding of cavitation can be divided into three stages, and the lift coefficient at each stage behaves similarly due to the formation and shedding of the cavity around the trailing edge.

Keywords: Computational Fluid Dynamics, cavitation, turbulence, lift coefficient

Procedia PDF Downloads 318
383 Theoretical Evaluation of the Effect of Solvent on the Feasibility of the Reaction of 2-Chlorobenzimidazole With Four N,N′-Cyclic Azomethine Imines to Construct Polycyclic Benzimidazoles

Authors: Mohamed Abdoul-Hakim, A. Zeroual, H. Garmes

Abstract:

In this work, we theoretically evaluated the reactivity of four 4-methyl-3-oxo-1,2-pyrazolidinium ylides with 2-Chlorobenzimidazole in MeOH in basic medium using DFT at the B3LYP/6-311+G(d,p) level. The analysis of the results shows that apart from its ability to retain its electrons, the deprotonated 2-Chlorobenzimidazole has a higher nucleophilic character. The reaction requires energy input to initiate the nucleophilic attack of the 2-Chlorobenzimidazole anion, and the inclusion of the solvent effect facilitates the formation of two regioisomers via an intramolecular vinyl nucleophilic substitution (SNVi). The transition states of this latter step are stabilized by charge transfer interactions σ(N-C) →σ*(C-Cl) for the more favorable regioisomer and n(N)→σ*(C-Cl) for the other regioisomer.

Keywords: benzonitrile N-oxide, DFT, intramolecular vinyl nucleophilic substitution (SNVi), 4-methyl-3-OXO-1, 2-pyrazolidinium ylides

Procedia PDF Downloads 110
382 Preservation of Endocrine Function after Central Pancreatectomy without Anastomoses for a Mid Gland Pancreatic Insulinoma: A Case Report

Authors: Karthikeyan M., Paul M. J.

Abstract:

This abstract describes a case of central pancreatectomy (CP) for a 50-year-old woman with a neuroendocrine tumor in the mid-body of the pancreas. CP, a parenchyma-sparing surgical option, preserves the distal pancreas and spleen, reducing the risk of pancreatic endocrine and exocrine insufficiency compared to traditional resections. The patient, initially misdiagnosed with transient ischemic attack, presented with hypoglycemic symptoms and was found to have a pancreatic lesion. Post-operative results were positive, with a reduction in pancreatic drain volume and normalization of blood sugar levels. This case highlights CP's efficacy in treating centrally located pancreatic lesions while maintaining pancreatic function.

Keywords: central pancreatectomy without anastomosis, no endocrine deficiency on follow-op, less post-op hospital stay, less post-op complications

Procedia PDF Downloads 20
381 The Portuguese Legal Instruments to Combat the Improper Use of the Contract Service

Authors: Ana Lambelho

Abstract:

Nowadays is very common that an activity may be performed independently or dependently. In Portugal, the Labour Law exclusively protects the dependent labour relations. The independent work is regulated by civil law, where the autonomy of the will is the main principle. For companies is more advantageous to hire people under a service agreement since, in that case, the relation is not submitted to the limits established in Labour law and collective bargaining. This practice has nothing wrong, if the performance of work is, in fact, made autonomously. The problem is the increased frequency of the celebration of service agreements to hide a legal relation of subordination. Aware of this and regarding the huge difficulty to demonstrate the existence of subordinated work (that often runs against the employee), the Portuguese legislator devoted some legislative rules in order to facilitate the evidence of legal subordination and, on the other hand, to avoid the misuse of the provision of service agreements. This study focuses precisely on the analysis of this solution, namely the so-called presumption of ‘laboralidade’ and on the lawsuit to recognize the existence of a labour contract. The presumption of the existence of a labour contract is present in the Portuguese legal system since 2003, and received, with the 2009 Labour Code, a new redaction that, according to the doctrine and the jurisprudence, finally approached it to a legal presumption, with the consequent reversal of the burden of proof and, in consequence, made easier to proof the legal subordination, because the employee will just have to plead and prove the existence of two of the elements described in the law to use this presumption. Another change in the Portuguese legal framework is related with the competencies of the Authority for Working Conditions (AWC): now, if during an inspection, the Authority finds a situation that seems to be an undeclared employment situation, it may access the company and, if it does not regularize voluntarily the situation, AWC has a duty to communicate to the public prosecutor, who will begin the lawsuit for the recognition of the existence of an employment contract. To defend the public interest, the action to recognize the existence of an employment contract will follow its terms, even against the employee will. Although the existence of these mechanisms does not solve by itself the problem of evasion of labour law and false ‘green receipts’, it is undeniable that it is an important step in combating fraud in this field.

Keywords: independent work, labour contract, Portugal, service agreement

Procedia PDF Downloads 306
380 Antigenic Diversity of Theileria parva Isolates from Cattle and Buffalo at the Wildlife-Livestock Interface in Southern and Eastern Africa

Authors: Mukolwe D. Lubembe, Odongo O. David, Githaka Naftali, Kanduma Esther, Marinda Oosthuizen, Kgomotso P. Sibeko

Abstract:

Theileriosis is a tick-borne disease of cattle caused by an apicomplexan protozoan parasite of the genus Theileria. In eastern and southern Africa, Theileria infections in cattle are caused by the species Theileria parva whose natural reservoir is the African buffalo (Syncerus caffer). Currently, East Coast Fever (ECF) caused by the cattle-derived Theileria parva is still a major problem in eastern Africa and some parts of southern Africa but not in South Africa following its eradication in the 1950s. However, Corridor disease (CD) caused by the buffalo-derived Theileria parva still remains a concern in South Africa. The diversity of Theileria parva in South Africa in comparison to other affected countries is poorly defined yet its known to be the survival strategy of this parasite. We assessed the antigenic diversity of Theileria parva isolates from Buffalo and cattle at the wildlife-livestock interface comparing samples from South Africa, Zimbabwe, Kenya, Tanzania, and Uganda. Antigenic epitopes of eight schizont antigen genes (Tp1, Tp3, Tp4, Tp5, Tp6, Tp7, Tp8 and Tp10) were amplified by PCR from genomic DNA extracted from blood samples collected from cattle and buffalo at the wildlife-livestock interface. Amplicons were purified and then sequenced on NGS platform. Full length open reading frames (ORFs) of two schizont antigen genes (Tp2 and Tp9) and one sporozoite antigen gene, p67 were also amplified from genomic DNA. Amplicons were then purified and cloned for sequencing. Analysis was based on sequence differences in the genes. Preliminary results show an extensively diverse population of Theileria parva circulating in buffalo and cattle populations at the wildlife-livestock interface. Diversity of the antigen genes contributes to the evasion of the immune system of the host by Theileria parva. This possess a concern in that, some of the Theileria parva populations may re-assort and become adapted to cattle to cause a form of theileriosis that is as fatal as ECF in areas where ECF was eradicated or is absent

Keywords: Theileria parva, east coast fever, corridor diseases, antigen genes, diversity

Procedia PDF Downloads 196
379 Application of Co-Flow Jet Concept to Aircraft Lift Increase

Authors: Sai Likitha Siddanathi

Abstract:

Present project is aimed at increasing the amount of lift produced by typical airfoil. This is achieved by its modification into the co-flow jet structure where a new internal flow is created inside the airfoil from well-designed apertures on its surface. The limit where produced excess lift overcomes the weight of pumping system inserted in airfoil upper portion, and drag force is converted into thrust is discussed in terms of airfoil velocity and angle of attack. Two normal and co-flow jet models are numerically designed and experimental results for both fabricated normal airfoil and CFJ model have been tested in low subsonic wind tunnel. Application has been made to subsonic NACA 652-415 airfoil. Produced lift in CFJ airfoil indicates a maximum value up to a factor of 5 above normal airfoil nearby flow separation ie in relatively weak flow distribution.

Keywords: flow Jet, lift coefficient, drag coefficient, airfoil performance

Procedia PDF Downloads 328
378 HelpMeBreathe: A Web-Based System for Asthma Management

Authors: Alia Al Rayssi, Mahra Al Marar, Alyazia Alkhaili, Reem Al Dhaheri, Shayma Alkobaisi, Hoda Amer

Abstract:

We present in this paper a web-based system called “HelpMeBreathe” for managing asthma. The proposed system provides analytical tools, which allow better understanding of environmental triggers of asthma, hence better support of data-driven decision making. The developed system provides warning messages to a specific asthma patient if the weather in his/her area might cause any difficulty in breathing or could trigger an asthma attack. HelpMeBreathe collects, stores, and analyzes individuals’ moving trajectories and health conditions as well as environmental data. It then processes and displays the patients’ data through an analytical tool that leads to an effective decision making by physicians and other decision makers.

Keywords: asthma, environmental triggers, map interface, web-based systems

Procedia PDF Downloads 272
377 Identification and Characterization of Polysaccharide Biosynthesis Protein (CAPD) of Enterococcus faecium

Authors: Liaqat Ali, Hubert E. Blum, Türkân Sakinc

Abstract:

Enterococcus faecium is an emerging multidrug-resistant nosocomial pathogen increased dramatically worldwide and causing bacteremia, endocarditis, urinary tract and surgical site infections in immunocomprised patients. The capsular polysaccharides that contribute to pathogenesis through evasion of the host innate immune system are also involved in hindering leukocyte killing of enterococci. The gene cluster (enterococcal polysaccharide antigen) of E. faecalis encoding homologues of many genes involved in polysaccharide biosynthesis. We identified two putative loci with 22 kb and 19 kb which contained 11 genes encoding for glycosyltransferases (GTFs); this was confirmed by using genome comparison of already sequenced strains that has no homology to known capsule genes and the epa-locus. The polysaccharide-conjugate vaccines have rapidly emerged as a suitable strategy to combat different pathogenic bacteria, therefore, we investigated a polysaccharide biosynthesis CapD protein in E. faecium contains 336 amino acids and had putative function for N-linked glycosylation. The deletion/knock-out capD mutant was constructed and complemented by homologues recombination method and confirmed by using PCR and sequencing. For further characterization and functional analysis, in-vitro cell culture and in-vivo a mouse infection models were used. Our ΔcapD mutant shows a strong hydrophobicity and all strains exhibited biofilm production. Subsequently, the opsonic activity was tested in an opsonophagocytic assay which shows increased in mutant compared complemented and wild type strains but more than two fold decreased in colonization and adherence was seen on surface of uroepithelial cells. However, a significant higher bacterial colonialization was observed in capD mutant during animal bacteremia infection. Unlike other polysaccharides biosynthesis proteins, CapD does not seems to be a major virulence factor in enterococci but further experiments and attention is needed to clarify its function, exact mechanism and involvement in pathogenesis of enteroccocal nosocomial infections eventually to develop a vaccine/ or targeted therapy.

Keywords: E. faecium, pathogenesis, polysaccharides, biofilm formation

Procedia PDF Downloads 295
376 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 306
375 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study

Authors: Maged El-Sayed Mohamed

Abstract:

Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.

Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction

Procedia PDF Downloads 329
374 Communication Strategies of Russian-English Asymmetric Bilinguals Given Insufficient Language Faculty

Authors: Varvara Tyurina

Abstract:

In the age of globalization Internet communication as a new format of interactions have become an integral part of our daily routine. Internet environment allows for new conditions and provides participants to a communication act with extra communication tools which can be used on Internet forums or in chat rooms. As a result communicants tend to alternate their behavior patterns in contrast to those practiced in live communication. It is not yet clear which communication strategies participants to Internet communication abide by and what determines their choices. Given the continually changing environment of a forum or a chat the behavior of a communicant can be interpreted in terms of autopoiesis theory which sees adaptation as the major tool for coexistence between the living system and its niche. Each communication act is seen as interaction between the communicant (i.e. the living system) and the overall environment of the forum (i.e. the niche) rather than one particular interlocutor. When communicating via the Internet participants are believed to aim at reaching a balance between themselves and the environment of a forum or a chat. The research focuses on unveiling the adaptation strategies employed by a communicant in particular cases and looks into the reasons they are employed. There is a correlation between language faculty of the communicants and the strategies they opt for when communicating on Internet forums and in chat rooms. The research included an experiment with a sample of Russian-English asymmetric bilinguals aged 16-25. Respondents were given two texts of equivalent contents, but of different language complexity. They had to respond to the texts as if they were making a reciprocal comment at a forum. It has been revealed that when communicants realize that their language faculty is not sufficient to understand the initial text they tend to amend their communication strategy in order to maintain the balance with the niche (remain involved in the communication). Most common strategies for responding to a difficult-to-understand text were self-presentation, veiling poor language faculty and response evasion. The research has so far focused on a very narrow aspect of correlation between language faculty and communication behavior, namely the syntactic and lexicological complexity of initial texts. It is essential to conduct a series of experiments that dwell on other characteristics of the texts to determine the range of cases when language faculty determines the choice of adaptation strategy.

Keywords: adaptation, communication strategies, internet communication, verbal interaction, autopoiesis theory

Procedia PDF Downloads 334
373 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study

Authors: Michael I. Okereke, Ambrose I. Akpoyomare

Abstract:

This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.

Keywords: blast resistance, blast enhancement, explosives, material behavior

Procedia PDF Downloads 343
372 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 208