Search results for: exploit kits
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 378

Search results for: exploit kits

258 Obesity, Leptin Levels and Leptin Receptor Gene Polymorphisms in Afro-Caribbean Subjects

Authors: Lydia Foucan, Christine Rambhojan, Rachel Billy, Christophe Armand, Carl-Thony Michel, Jean-Marc Lacorte, Laurent Larifla

Abstract:

Leptin, an adipocyte-derived hormone, modulates insulin secretion and action via the leptin receptor (LEPR) that is expressed in pancreatic beta cells, adipose tissue, and muscle. Several polymorphisms have been described in the human LEPR gene including p.K109R (rs1137100), p.Q223R (rs1137101) and p.K656N (rs1805094) polymorphisms. The role of these polymorphisms is not yet studied in Guadeloupian population. Our aim was to explore the association of LEPR polymorphisms (K109R, Q223R and K656N) with leptin levels and obesity in non-diabetic Afro-Caribbean subjects. Genotypic analysis of the three polymorphisms was performed in 425 subjects using TaqMan and KASPar Assays. Serum leptin was measured with ELISA kits Biovendor® (RD191001100). Logistic regressions were used for assessment of statistical associations. Mean age was 47.6 ± 12.7 years. Among the participants, 238 (56 %) were women, 124 (30%) were obese and 155 (36.5%) had abdominal obesity. Carriers of LEPR K656N rs1805094 rare allele had significant higher frequencies of obesity (P = 0.007), abdominal obesity (P = 0.004) and metabolic syndrome (P = 0.021) but mean leptin level was not significantly different between both groups (P = 0.075). Odds ratios, adjusted for age and sex associated with presence of rs1805094 rare allele were 1.8 (1.1-2.9), P = 0.012 for obesity, 2.0 (1.2-3.3), P = 0.008 for abdominal obesity and 1.8 (1.1-3.0), P = 0.031 for MetS. No significant association was found with K109R, Q223R. These findings suggest that the K656N polymorphism (but not the K109R or Q223R polymorphism) of LEPR is associated with obesity, abdominal obesity and metabolic syndrome in this Afro-Caribbean non-diabetic population.

Keywords: Afro-Caribbean, leptin levels, leptin receptor gene polymorphisms, obesity

Procedia PDF Downloads 347
257 Seroprevalence and Associated Factors of Hepatitis B and Hepatitis C Viral Infections Among Prisoners in Tigray, Northern Ethiopia

Authors: Belaynesh Tsegay, Teklay Gebrecherkos, Atsebaha Gebrekidan Kahsay, Mahmud Abdulkader

Abstract:

Background: Hepatitis B and C viruses are important health and socioeconomic problem across the globe, with a remarkable number of diseases and deaths in sub-Saharan African countries. The burden of hepatitis is unknown in the prison settings of Tigray. Therefore, we aimed to describe the seroprevalence and associated factors of hepatitis B and C viruses among prisoners in Tigray, Ethiopia. Methods: A cross-sectional study was carried out from February 2020 to May 2020 at the prison facilities of Tigray. Demographics and associated factors were collected from 315 prisoners prospectively. Five milliliters of blood were collected and tested using rapid tests kits of HBsAg (Zhejiang orient Gene Biotech Co., Ltd., China) and HCV antibodies (Volkan Kozmetik Sanayi Ve Ticaret Ltd. STI, Turkey). Positive samples were confirmed using ELISA (Beijing Wantai Biological Pharmacy Enterprise Co. Ltd). Data were analyzed using the SPSS version 20, and p<0.05 was considered statistically significant. Results: The overall seroprevalence of HBV and HCV were 25 (7.9%) and 1 (0.3%), respectively. The majority of hepatitis B viral infections were identified from the age groups of 18–25 years (10.7%) and unmarried prisoners (11.8%). Prisoners greater than 100 per cell (AOR=3.95, 95% CI=1.15–13.6, p=0.029) and with a history of alcohol consumption (AOR=3.01, 95% CI=1.17–7.74, p=0.022) were significantly associated with HBV infections. Conclusion: The seroprevalence of HBV among prisoners was nearly high or borderline, with a very low HCV prevalence. HBV was most prevalent among young adults, those housed with a large number of prisoners per cell, and those who had a history of alcohol consumption. This study recommends that there should be prison-focused intervention, including regular health education, with the emphasis on the mode of transmission and introducing HBV screening policy for prisoners, especially when they enter the prison.

Keywords: seroprevalence, HBV, HCV, prisoners, tigray

Procedia PDF Downloads 53
256 Development of Column-Filters of Sulfur Limonene Polysulfide to Mercury Removal from Contaminated Effluents

Authors: Galo D. Soria, Jenny S. Casame, Eddy F. Pazmino

Abstract:

In Ecuador, mining operations have significantly impacted water sources. Artisanal mining extensively relies in mercury amalgamation. Mercury is a neurotoxic substance even at low concentrations. The objective of this investigation is to exploit Hg-removal capacity of sulfur-limonene polysulfide (SLP), which is a low-cost polymer, in order to prepare granular media (sand) coated with SLP to be used in laboratory scale column-filtration systems. Preliminary results achieved 85% removal of Hg⁺⁺ from synthetic effluents using 20-cm length and 5-cm diameter columns at 119m/day average pore water velocity. During elution of the column, the SLP-coated sand indicated that Hg⁺⁺ is permanently fixed to the collector surface, in contrast, uncoated sand showed reversible retention in Hg⁺⁺ in the solid phase. Injection of 50 pore volumes decreased Hg⁺⁺ removal to 46%. Ongoing work has been focused in optimizing the synthesis of SLP and the polymer content in the porous media coating process to improve Hg⁺⁺ removal and extend the lifetime of the column-filter.

Keywords: column-filter, mercury, mining, polysulfide, water treatment

Procedia PDF Downloads 116
255 Layout Optimization of a Start-up COVID-19 Testing Kit Manufacturing Facility

Authors: Poojan Vora, Hardik Pancholi, Sanket Tajane, Harsh Shah, Elias Keedy

Abstract:

The global COVID-19 pandemic has affected the industry drastically in many ways. Even though the vaccine is being distributed quickly and despite the decreasing number of positive cases, testing is projected to remain a key aspect of the ‘new normal’. Improving existing plant layout and improving safety within the facility are of great importance in today’s industries because of the need to ensure productivity optimization and reduce safety risks. In practice, it is essential for any manufacturing plant to reduce nonvalue adding steps such as the movement of materials and rearrange similar processes. In the current pandemic situation, optimized layouts will not only increase safety measures but also decrease the fixed cost per unit manufactured. In our case study, we carefully studied the existing layout and the manufacturing steps of a new Texas start-up company that manufactures COVID testing kits. The effects of production rate are incorporated with the computerized relative allocation of facilities technique (CRAFT) algorithm to improve the plant layout and estimate the optimization parameters. Our work reduces the company’s material handling time and increases their daily production. Real data from the company are used in the case study to highlight the importance of colleges in fostering small business needs and improving the collaboration between college researchers and industries by using existing models to advance best practices.

Keywords: computerized relative allocation of facilities technique, facilities planning, optimization, start-up business

Procedia PDF Downloads 115
254 Human Centred Design Approach for Public Transportation

Authors: Jo Kuys, Kirsten Day

Abstract:

Improving urban transportation systems requires an emphasis on users’ end-to-end journey experience, from the moment the user steps out of their home to when they arrive at their destination. In considering such end-to-end experiences, human centred design (HCD) must be integrated from the very beginning to generate viable outcomes for the public. An HCD approach will encourage innovative outcomes while acknowledging all factors that need to be understood along the journey. We provide evidence to show that when designing for public transportation, it is not just about the physical manifestation of a particular outcome; moreover, it’s about the context and human behaviours that need to be considered throughout the design process. Humans and their behavioural factors are vitally important to successful implementation of sustainable public transport systems. Through an in-depth literature review of HCD approaches for urban transportation systems, we provide a base to exploit the benefits and highlight the importance of including HCD in public transportation projects for greater patronage, resulting in more sustainable cities. An HCD approach is critical to all public transportation projects to understand different levels of transportation design, from the setting of transport policy to implementation to infrastructure, vehicle, and interface design.

Keywords: human centred design, public transportation, urban planning, user experience

Procedia PDF Downloads 154
253 Study of Electrical Properties of An-Fl Based Organic Semiconducting Thin Film

Authors: A.G. S. Aldajani, N. Smida, M. G. Althobaiti, B. Zaidi

Abstract:

In order to exploit the good electrical properties of anthracene and the excellent properties of fluorescein, new hybrid material has been synthesized (An-Fl). Current-voltage measurements were done on a new single-layer ITO/An-FL/Al device of typically 100 nm thickness. Atypical diode behavior is observed with a turn-on voltage of 4.4 V, a dynamic resistance of 74.07 KΩ and a rectification ratio of 2.02 due to unbalanced transport. Results show also that the current-voltage characteristics present three different regimes of the power-law (J~Vᵐ) for which the conduction mechanism is well described with space-charge-limited current conduction mechanism (SCLC) with a charge carrier mobility of 2.38.10⁻⁵cm2V⁻¹S⁻¹. Moreover, the electrical transport properties of this device have been carried out using a dependent frequency study in the range (50 Hz–1.4 MHz) for different applied biases (from 0 to 6 V). At lower frequency, the σdc values increase with bias voltage rising, supporting that the mobile ion can hop successfully to its nearest vacant site. From σac and impedance measurements, the equivalent electrical circuit is evidenced, where the conductivity process is coherent with an exponential trap distribution caused by structural defects and/or chemical impurities.

Keywords: semiconducting polymer, conductivity, SCLC, impedance spectroscopy

Procedia PDF Downloads 151
252 Design of Microwave Building Block by Using Numerical Search Algorithm

Authors: Haifeng Zhou, Tsungyang Liow, Xiaoguang Tu, Eujin Lim, Chao Li, Junfeng Song, Xianshu Luo, Ying Huang, Lianxi Jia, Lianwee Luo, Qing Fang, Mingbin Yu, Guoqiang Lo

Abstract:

With the development of technology, countries gradually allocated more and more frequency spectrums for civilization and commercial usage, especially those high radio frequency bands indicating high information capacity. The field effect becomes more and more prominent in microwave components as frequency increases, which invalidates the transmission line theory and complicate the design of microwave components. Here a modeling approach based on numerical search algorithm is proposed to design various building blocks for microwave circuits to avoid complicated impedance matching and equivalent electrical circuit approximation. Concretely, a microwave component is discretized to a set of segments along the microwave propagation path. Each of the segment is initialized with random dimensions, which constructs a multiple-dimension parameter space. Then numerical searching algorithms (e.g. Pattern search algorithm) are used to find out the ideal geometrical parameters. The optimal parameter set is achieved by evaluating the fitness of S parameters after a number of iterations. We had adopted this approach in our current projects and designed many microwave components including sharp bends, T-branches, Y-branches, microstrip-to-stripline converters and etc. For example, a stripline 90° bend was designed in 2.54 mm x 2.54 mm space for dual-band operation (Ka band and Ku band) with < 0.18 dB insertion loss and < -55 dB reflection. We expect that this approach can enrich the tool kits for microwave designers.

Keywords: microwave component, microstrip and stripline, bend, power division, the numerical search algorithm.

Procedia PDF Downloads 354
251 Serological Screening of Barrier Maintained Rodent Colony

Authors: R. Posia, J. Mistry, K. Kamani

Abstract:

The health screening of laboratory rodents is essential for ensuring animal health and the validity of biomedical research data. Routine health monitoring is necessary to verify the effectiveness of biosecurity and the specific pathogen free (SPF) status of the colony. The present screening was performed in barrier maintained rat (Rattus norvegicus) colony. Rats were maintained under a controlled environment and strict biosecurity in the facility. The screening was performed on quarterly bases from randomly selected animals from breeding and or maintenance colonies. Selected animals were subject to blood collection under isoflurane anaesthesia. Serum was separated from the collected blood and stored samples at -60 ± 10 °C until further use. A total of 88 samples were collected quarterly bases from animals in a year. In the serological test, enzyme-linked immunosorbent assay (ELISA) was used for screening of serum samples against sialodacryoadenitis virus (SDAV), Sendai virus (SV), and Kilham’s rat virus (KRV). ELISA kits were procured from XpressBio, USA. Test serum samples were run along with positive control, negative control serum in 96 well ELISA plates as per the procedure recommended by the vendor. Test ELISA plate reading was taken in the microplate reader. This screening observed that none of the samples was observed positive for the sialodacryoadenitis virus (SDAV), Sendai virus (SV), and Kilham’s rat virus (KRV), indicating that effectiveness of biosecurity practices followed in the rodent colony. The result of serological screening helps us to declare that our rodent colony is specifically pathogen free for these pathogens.

Keywords: biosecurity, ELISA, specific pathogen free, serological screening, serum

Procedia PDF Downloads 47
250 EGFR Signal Induced-Nuclear Translocation of Beta-catenin and PKM2 Promotes HCC Malignancy and Indicates Early Recurrence After Curative Resection

Authors: Fangtian Fan, Zhaoguo Liu, Yin Lu

Abstract:

Early recurrence (ER) (< 1 year) after liver resection is one of the most important factors that impacts the prognosis of patients with hepatocellular carcinoma (HCC). However, the molecular mechanisms and predictive indexes of ER after curative resection remain largely unknown. The present study aimed to exploit the role of EGFR signaling in EMT and early recurrence of HCC after curative resection and elucidate the molecular mechanisms. Our results showed that nuclear beta-catenin / PKM2 was a independent predictor of early recurrence after curative resection in EGFR-overexpressed HCC. Mechanistic investigation indicated that nuclear accumulation of beta-catenin and PKM2 induced by EGFR signal promoted HCC cell invasion and proliferation, which were required for early recurrence of HCC. These effects were mediated by PI3K/AKT and ERK pathways rather than the canonical Wnt signaling. In conclusions, EGFR signal induced-nuclear translocation of beta-catenin and PKM2 promotes HCC malignancy and indicates early recurrence after curative resection.

Keywords: beta-catenin, early recurrence, hepatocellular carcinoma, malignancy, PKM2

Procedia PDF Downloads 328
249 Towards an Intelligent Ontology Construction Cost Estimation System: Using BIM and New Rules of Measurement Techniques

Authors: F. H. Abanda, B. Kamsu-Foguem, J. H. M. Tah

Abstract:

Construction cost estimation is one of the most important aspects of construction project design. For generations, the process of cost estimating has been manual, time-consuming and error-prone. This has partly led to most cost estimates to be unclear and riddled with inaccuracies that at times lead to over- or under-estimation of construction cost. The development of standard set of measurement rules that are understandable by all those involved in a construction project, have not totally solved the challenges. Emerging Building Information Modelling (BIM) technologies can exploit standard measurement methods to automate cost estimation process and improves accuracies. This requires standard measurement methods to be structured in ontologically and machine readable format; so that BIM software packages can easily read them. Most standard measurement methods are still text-based in textbooks and require manual editing into tables or Spreadsheet during cost estimation. The aim of this study is to explore the development of an ontology based on New Rules of Measurement (NRM) commonly used in the UK for cost estimation. The methodology adopted is Methontology, one of the most widely used ontology engineering methodologies. The challenges in this exploratory study are also reported and recommendations for future studies proposed.

Keywords: BIM, construction projects, cost estimation, NRM, ontology

Procedia PDF Downloads 513
248 A Bio-Inspired Approach for Self-Managing Wireless Sensor and Actor Networks

Authors: Lyamine Guezouli, Kamel Barka, Zineb Seghir

Abstract:

Wireless sensor and actor networks (WSANs) present a research challenge for different practice areas. Researchers are trying to optimize the use of such networks through their research work. This optimization is done on certain criteria, such as improving energy efficiency, exploiting node heterogeneity, self-adaptability and self-configuration. In this article, we present our proposal for BIFSA (Biologically-Inspired Framework for Wireless Sensor and Actor networks). Indeed, BIFSA is a middleware that addresses the key issues of wireless sensor and actor networks. BIFSA consists of two types of agents: sensor agents (SA) that operate at the sensor level to collect and transport data to actors and actor agents (AA) that operate at the actor level to transport data to base stations. Once the sensor agent arrives at the actor, it becomes an actor agent, which can exploit the resources of the actors and vice versa. BIFSA allows agents to evolve their genetic structures and adapt to the current network conditions. The simulation results show that BIFSA allows the agents to make better use of all the resources available in each type of node, which improves the performance of the network.

Keywords: wireless sensor and actor networks, self-management, genetic algorithm, agent.

Procedia PDF Downloads 58
247 Improved Performance in Content-Based Image Retrieval Using Machine Learning Approach

Authors: B. Ramesh Naik, T. Venugopal

Abstract:

This paper presents a novel approach which improves the high-level semantics of images based on machine learning approach. The contemporary approaches for image retrieval and object recognition includes Fourier transforms, Wavelets, SIFT and HoG. Though these descriptors helpful in a wide range of applications, they exploit zero order statistics, and this lacks high descriptiveness of image features. These descriptors usually take benefit of primitive visual features such as shape, color, texture and spatial locations to describe images. These features do not adequate to describe high-level semantics of the images. This leads to a gap in semantic content caused to unacceptable performance in image retrieval system. A novel method has been proposed referred as discriminative learning which is derived from machine learning approach that efficiently discriminates image features. The analysis and results of proposed approach were validated thoroughly on WANG and Caltech-101 Databases. The results proved that this approach is very competitive in content-based image retrieval.

Keywords: CBIR, discriminative learning, region weight learning, scale invariant feature transforms

Procedia PDF Downloads 147
246 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 219
245 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 353
244 The Viability of Islamic Finance and Its Impact on Global Financial Stability: Evidence from Practical Implications

Authors: Malik Shahzad Shabbir, Muhammad Saarim Ghazi, Amir Khalil ur Rehman

Abstract:

This study examines the factors which influence and contribute towards the financial viability of Islamic finance and its impact on global financial stability. However, the purpose of this paper is to differentiate the practical implications of both Islamic and conventional finance on global financial stability. The Islamic finance is asset backed financing which creates wealth through trade, commerce and believes in risk and return sharing. Islamic banking is asset driven as against to conventional banking which is liability driven. In order to introduce new financial products for market, financial innovation in Islamic finance must be within the Shari’ah parameters that are tested against the ‘Maqasid al-Shari’ah’. Interest-based system leads to income and wealth inequalities and mis-allocation of resources. Moreover, this system has absence of just and equitable aspect of distribution that may exploit either the debt holder or the financier. Such implications are reached to a tipping point that leaves only one choice: change or face continued decline and misery.

Keywords: viability, global financial stability, practical implications, asset driven, tipping point

Procedia PDF Downloads 271
243 Trends and Priorities for the Fishing Sector in the Republic of Moldova

Authors: Mihaela Munteanu Pila

Abstract:

Abstract The Republic of Moldova has a high potential for commercial growth of fish, due to its rich natural resources. Every year, national actions are implemented for the development and improvement of wetlands through acclimatization of hydrobionts, cleaning of adjacent waste areas and repopulation with valuable fish species. Due to aggressive environmental factors, anthropogenic factors, poaching or insufficient financial resources allocated to the authorities, there is a strong degradation of aquatic resources in the area. The main issue of the study is to identify priority areas for the development of fish farming in the area and maintain potential reserves to increase the efficiency of fish production in the pond. The rational operation of pond-type reservoirs will make it possible to maintain the breeding base of many fish species and will in future become a valuable source of local marketable products, in order to increase the productivity of fish in ponds and exploit the region's resources. The research looked at the problems that led to a decline in local fish production and identified a number of long-term measures needed to develop aquaculture.

Keywords: Development, , Republic of Moldova, , fisheries, , productivity

Procedia PDF Downloads 82
242 Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux

Authors: Senesh Wijayarathne

Abstract:

This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability.

Keywords: slmail server, extended instruction pointer, jump to the esp register, bad characters, virtual machine, windows 7, kali Linux, buffer overflow, Seattle lab, vulnerability

Procedia PDF Downloads 125
241 Seroprevalence and Associated Factors of Hepatitis B and Hepatitis C Viral Infections among Prisoners in Tigrai, Northern Ethiopia

Authors: Belaynesh Tsegay Beyene, Teklay Gebrecherkos, Atsebaha Gebrekidan Kahsay, Mahmud Abdulkader

Abstract:

Background: Hepatitis B and C viruses are of important health and socioeconomic problem of the globe with remarkable diseases and deaths in Sub-Saharan African countries. The burden of hepatitis is unknown in the prison settings of Tigrai. Therefore, we aimed to describe the seroprevalence and associated factors of hepatitis B and C viruses among prisoners of Tigrai, Ethiopia. Methods: A cross-sectional study was carried out from February 2020 to May 2020 at the prison facilities of Tigrai. Demographics and associated factors were collected from 315 prisoners prospectively. Five milliliter of blood was collected and tested using rapid tests kits of HBsAg (Zhejiang orient Gene Biotech Co., Ltd., China) and HCV antibodies (Volkan Kozmetik Sanayi Ve Ticaret Ltd. STI, Turkey). Positive samples were confirmed using enzyme-linked immunosorbent assay (ELISA) (Beijing Wantai Biological Pharmacy Enterprise Co. Ltd). Data were analyzed using Statistical Package for Social Sciences (SPSS) version 20 and p < 0.05 was considered statistically significant. Results: The overall seroprevalence of HBV and HCV were 25 (7.9%) and 1(0.3%), respectively. The majority of hepatitis B viral infections were identified from the age groups of 18-25 years (10.7%) and unmarried prisoners (11.8%). Prisoners greater than 100 per cell [AOR =3.95, 95% CI= (1.15, 13.6, p =0.029)] and having history of alcohol consumption [AOR =3.01, 95% CI= (1.17, 7.74, p =0.022)] were significantly associated with HBV infections. Conclusions: The seroprevalence of HBV among prisoners was nearly high or borderline (7.9%) with a very low HCV prevalence (0.3%). HBV was most prevalent among young adults, large number of prisoners per cell and those who had history of alcohol consumption. This study recommends that there should be prison-focused intervention including regular health education by emphasis on the mode of transmission and introducing HBV screening policy for prisoners especially when they enter to the prison.

Keywords: seroprevalence, HBV, HCV, prisoners, Tigrai

Procedia PDF Downloads 40
240 Review of Hydrologic Applications of Conceptual Models for Precipitation-Runoff Process

Authors: Oluwatosin Olofintoye, Josiah Adeyemo, Gbemileke Shomade

Abstract:

The relationship between rainfall and runoff is an important issue in surface water hydrology therefore the understanding and development of accurate rainfall-runoff models and their applications in water resources planning, management and operation are of paramount importance in hydrological studies. This paper reviews some of the previous works on the rainfall-runoff process modeling. The hydrologic applications of conceptual models and artificial neural networks (ANNs) for the precipitation-runoff process modeling were studied. Gradient training methods such as error back-propagation (BP) and evolutionary algorithms (EAs) are discussed in relation to the training of artificial neural networks and it is shown that application of EAs to artificial neural networks training could be an alternative to other training methods. Therefore, further research interest to exploit the abundant expert knowledge in the area of artificial intelligence for the solution of hydrologic and water resources planning and management problems is needed.

Keywords: artificial intelligence, artificial neural networks, evolutionary algorithms, gradient training method, rainfall-runoff model

Procedia PDF Downloads 418
239 Using Data-Driven Model on Online Customer Journey

Authors: Ing-Jen Hung, Tzu-Chien Wang

Abstract:

Nowadays, customers can interact with firms through miscellaneous online ads on different channels easily. In other words, customer now has innumerable options and limitless time to accomplish their commercial activities with firms, individualizing their own online customer journey. This kind of convenience emphasizes the importance of online advertisement allocation on different channels. Therefore, profound understanding of customer behavior can make considerable benefit from optimizing fund allocation on diverse ad channels. To achieve this objective, multiple firms utilize numerical methodology to create data-driven advertisement policy. In our research, we aim to exploit online customer click data to discover the correlations between each channel and their sequential relations. We use LSTM to deal with sequential property of our data and compare its accuracy with other non-sequential methods, such as CART decision tree, logistic regression, etc. Besides, we also classify our customers into several groups by their behavioral characteristics to perceive the differences between all groups as customer portrait. As a result, we discover distinct customer journey under each customer portrait. Our article provides some insights into marketing research and can help firm to formulate online advertising criteria.

Keywords: LSTM, customer journey, marketing, channel ads

Procedia PDF Downloads 97
238 Fu Hao From the East: Between Chinese Traditions and Western Pop Cultures

Authors: Yi Meng, YunGao

Abstract:

Having been studied and worked in North America and Europe, we, two Chinese art educators, have been enormously influenced by eastern and western cultures. Thus, we aim to enhance students’ learning experiences by exploring and amalgamating both cultures for art creating. This text draws on our action research study of students’ visual literacy practices in a foundation sketching course in a major Chinese university, exploring art forms by cross-utilizing various cultural aspects. Instead of relying on the predominant western observational drawing skills in our classroom, we taught students about ancient Chinese art in the provincial museum, using Fu Hao owl-shaped vessel, a Shang Dynasty national treasure, as the final sketch project of this course. We took up multimodal literacy, which emphasized students’ critical use of creativity to exploit the semiotic potentials of communicative modes to address diverse cultural issues through their multimodal design. We used the Hong Kong-based artist Tik Ka’s artworks to demonstrate the cultural amalgamation of Chinese traditions and western pop cultures. Collectively, these approaches create a dialogical space for students to experience, analyze, and negotiate with complex modes and potentially transform their understanding of both cultures by redesigning Fu Hao.

Keywords: Chinese traditions, western pop cultures, Fu Hao, arts education, design sketch

Procedia PDF Downloads 69
237 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 135
236 Market Competition and the Adoption of Clean Technology: Evidence from the Taxi Industry

Authors: Raúl Bajo-Buenestado

Abstract:

This paper studies the impact of the intensity of market competition on firms' willingness to adopt green technologies —which has become particularly relevant in the light of the debate on whether competition policies should be relaxed to achieve certain environmental targets. We exploit the staggered rollout of different rail-hailing platforms (most notably, Uber) across different metropolitan areas in Spain as a natural experiment that provides time and city-specific exogenous variation in the intensity of competition to study the impact on taxi drivers' decisions to purchase “green” or “dirty” vehicles. It was shown that the entry of these platforms significantly increased the takeout of green vehicles among professional drivers in incumbent (dominant) conventional taxi companies and decreased that of dirty vehicles. The exact opposite effect is observed in the cities where these platforms were extremely unlikely to enter. Back of the envelope calculations suggest that the entry of Uber is associated with an extra green vehicle purchase in every four among taxi drivers, resulting in a substantial drop in the level of emissions from the taxi fleet —still mostly dominated diesel vehicles.

Keywords: technological change, green technology adoption, market competition, diffusion of technology, environmental externalities

Procedia PDF Downloads 116
235 Gendered Violence Against Female Students Who Drink Alcohol: Perspectives Of South African Male University Students

Authors: Shakila Singh

Abstract:

Research on gender, sexual risk, and gender violence at universities has found alcohol to be a significant contributor. Studies from universities around the world suggest that drinking at universities is characterised by excess. However, not much attention has been given to the connections that students make between alcohol and violence. In this qualitative study, alcohol-fuelled violence against female students from the perspectives of male students themselves is analysed. In-depth individual interviews were conducted with ten volunteer undergraduate male students who reside in university residences. The findings reveal that alcohol continues to be seen as a masculine privilege. Male students explain that they use alcohol to give them the courage to perform hegemonic heterosexual masculinities. They use alcohol to enhance their capacity to control women. At the same time, they hold alcohol responsible for their loss of control when drunk. Male students also exploit alcohol as currency to coerce women into submission of sexual favours. By blaming alcohol for any deviant behaviour, they relinquish themselves from the responsibility of violating female students. The paper argues that violence prevention efforts in educational contexts must address the ways in which alcohol shapes the experience of gender, sexuality, and violence.

Keywords: alcohol-related violence, gender, and alcohol, hegemonic masculinities, university students

Procedia PDF Downloads 120
234 A Handheld Light Meter Device for Methamphetamine Detection in Oral Fluid

Authors: Anindita Sen

Abstract:

Oral fluid is a promising diagnostic matrix for drugs of abuse compared to urine and serum. Detection of methamphetamine in oral fluid would pave way for the easy evaluation of impairment in drivers during roadside drug testing as well as ensure safe working environments by facilitating evaluation of impairment in employees at workplaces. A membrane-based point-of-care (POC) friendly pre-treatment technique has been developed which aided elimination of interferences caused by salivary proteins and facilitated the demonstration of methamphetamine detection in saliva using a gold nanoparticle based colorimetric aptasensor platform. It was found that the colorimetric response in saliva was always suppressed owing to the matrix effects. By navigating the challenging interfering issues in saliva, we were successfully able to detect methamphetamine at nanomolar levels in saliva offering immense promise for the translation of these platforms for on-site diagnostic systems. This subsequently motivated the development of a handheld portable light meter device that can reliably transduce the aptasensors colorimetric response into absorbance, facilitating quantitative detection of analyte concentrations on-site. This is crucial due to the prevalent unreliability and sensitivity problems of the conventional drug testing kits. The fabricated light meter device response was validated against a standard UV-Vis spectrometer to confirm reliability. The portable and cost-effective handheld detector device features sensitivity comparable to the well-established UV-Vis benchtop instrument and the easy-to-use device could potentially serve as a prototype for a commercial device in the future.

Keywords: aptasensors, colorimetric gold nanoparticle assay, point-of-care, oral fluid

Procedia PDF Downloads 9
233 Small Molecule Inhibitors of PD1-PDL1 Interaction

Authors: K. Żak, S. Przetocka, R. Kitel, K. Guzik, B. Musielak, S. Malicki, G. Dubin, T. A. Holak

Abstract:

Studies on tumor genesis revealed a number of factors that may potentially serve as molecular targets for immunotherapies. One of such promising targets are PD1 and PDL1 proteins. PD1 (Programmed cell death protein 1) is expressed by activated T cells and plays a critical role in modulation of the host's immune response. One of the PD1 ligands -PDL1- is expressed by macrophages, monocytes and cancer cells which exploit it to avoid immune attack. The notion of the mechanisms used by cancer cells to block the immune system response was utilized in the development of therapies blocking PD1-PDL1 interaction. Up to date, human PD1-PDL1 complex has not been crystallized and structure of the mouse-human complex does not provide a complete view of the molecular basis of PD1-PDL1 interactions. The purpose of this study is to obtain crystal structure of the human PD1-PDL1 complex which shall allow rational design of small molecule inhibitors of the interaction. In addition, the study presents results of binding small-molecules to PD1 and fragment docking towards PD1 protein which will facilitate the design and development of small–molecule inhibitors of PD1-PDL1 interaction.

Keywords: PD1, PDL1, cancer, small molecule, drug discovery

Procedia PDF Downloads 366
232 A Wearable Fluorescence Imaging Device for Intraoperative Identification of Human Brain Tumors

Authors: Guoqiang Yu, Mehrana Mohtasebi, Jinghong Sun, Thomas Pittman

Abstract:

Malignant glioma (MG) is the most common type of primary malignant brain tumor. Surgical resection of MG remains the cornerstone of therapy, and the extent of resection correlates with patient survival. A limiting factor for resection, however, is the difficulty in differentiating the tumor from normal tissue during surgery. Fluorescence imaging is an emerging technique for real-time intraoperative visualization of MGs and their boundaries. However, most clinical-grade neurosurgical operative microscopes with fluorescence imaging ability are hampered by low adoption rates due to high cost, limited portability, limited operation flexibility, and lack of skilled professionals with technical knowledge. To overcome the limitations, we innovatively integrated miniaturized light sources, flippable filters, and a recording camera to the surgical eye loupes to generate a wearable fluorescence eye loupe (FLoupe) device for intraoperative imaging of fluorescent MGs. Two FLoupe prototypes were constructed for imaging of Fluorescein and 5-aminolevulinic acid (5-ALA), respectively. The wearable FLoupe devices were tested on tumor-simulating phantoms and patients with MGs. Comparable results were observed against the standard neurosurgical operative microscope (PENTERO® 900) with fluorescence kits. The affordable and wearable FLoupe devices enable visualization of both color and fluorescence images with the same quality as the large and expensive stationary operative microscopes. The wearable FLoupe device allows for a greater range of movement, less obstruction, and faster/easier operation. Thus, it reduces surgery time and is more easily adapted to the surgical environment than unwieldy neurosurgical operative microscopes.

Keywords: fluorescence guided surgery, malignant glioma, neurosurgical operative microscope, wearable fluorescence imaging device

Procedia PDF Downloads 26
231 Water Saving in Electricity Generation System Considering Natural Gas Limitation

Authors: Mehdi Ganjkhani, Sobhan Badakhshan, Seyedvahid Hosseini

Abstract:

Power plants exploit striking proportion of underground water consumption. Correspondingly, natural gas-fired power plants need less water than the other conventional power plants. Therefore, shifting unit commitment planning toward these power plants would help to save water consumption. This paper discusses the impacts of water consumption limitation on natural gas consumption and vice versa as a short-term water consumption management solution. To do so, conventional unit commitment problem is extended by adding water consumption and natural gas constraints to the previous constrains. The paper presents the impact of water saving on natural gas demands as well as natural gas shortage on water demand. Correspondingly, the additional cost of electricity production according to the aforementioned constraints is evaluated. Finally, a test system is applied to investigate potentials and impacts of water saving and natural gas shortage. Different scenarios are conducted and the results are presented. The results of the study illustrate that in order to use less water for power production it needs to use more natural gas. Meanwhile, natural gas shortage causes to utilize more amount of water in aggregate.

Keywords: electric energy generation system, underground water sources, unit commitment, water consumption saving, natural gas

Procedia PDF Downloads 151
230 Levels of Microcystin in the Coastal Waters of Nigeria

Authors: Medina Kadiri

Abstract:

Blue-green otherwise called cyanobacteria, produce an array of biotoxins grouped into five categories notably hapatotoxins, neurotoxins, cytotoxins, dermatotoxins, and irritant toxins. Microcystins which are examples of hepatotoxins produced by blue-green algae Microcystins comprise the most common group of the cyanobacterial toxins. Blue-green algae flourish in aquatic environments, whether marine, brackish or freshwater, producing blooms in different forms such as microscopic, mats, or unsightly odoriferous scums. Microcystins biotoxins cause a plethora of animal and human hazards such as liver damage/cirrhosis and cancer, kidney damage, dermatitis, tinnitus, gastroenteritis, sore throat, nausea, myalgia, neurological problems, respiratory irritation and death. Water samples were collected from coastal regions of Nigeria in March 2014, June 2014, October 2014 and January 2015 and analyzed with Enzyme Linked Immunosorbent Assay (ELISA) kits. Microcystin biotoxin was recorded in all sites both during dry and wet seasons. The range of microcystins found was 0.000041-There was a seasonal trend of increasing microcystin concentrations from March till Octobers and a decrease thereafter. Generally in the oceanic waters, microcystin levels were highest at Cross Rivers in March and January, Barbeach in June and Lekki in October. In the adjoining riverine ecosystems, on the other hand, the highest concentrations of microcystin were observed at Akwa Ibom in March, June and October and in Bayelsa in January. Continuous monitoring and screening of coastal water bodies is suggested to minimize the health risks of cyanobacterial biotoxins to coastal communities of Nigeria.

Keywords: biotoxins, harmful algae, marine, microcystin, Nigeria

Procedia PDF Downloads 256
229 Synthetic Coumarin Derivatives and Their Anticancer Properties

Authors: Kabange Kasumbwe, Viresh Mohanlall, Bharti Odhav, Venu Narayanaswamy

Abstract:

Coumarins are naturally occurring plant metabolites known for their pharmacological properties such as anticoagulant, antimicrobial, anticancer, antioxidant, anti-inflammatory and antiviral properties. The pharmacological and biochemical properties and curative applications of coumarins depend on the substitution around the coumarin core structure. In the present study, seven halogenated coumarins CMRN1-CMRN7 were synthesized and evaluated for their anticancer activity. The cytotoxicity potential of the test compounds was evaluated against UACC62 (Melanoma), MCF-7 (Breast cancer) and PBM (Peripheral Blood Mononuclear) cell lines using MTT assay keeping doxorubicin as standard drug. The apoptotic potential of the coumarin compounds was evaluated against UACC62 (Melanoma) cell by assessing their morphological changes, membrane change, mitochondria membrane potential; pro-apoptotic changes were investigated using the AnnexinV-PI staining, JC-1, caspase-3 enzyme kits respectively on flow cytometer. The synthetic coumarin has strongly suppressed the cell proliferation of UACC-62 (Melanoma) and MCF-7 (Breast) Cancer cells, the higher toxicity of these compounds against UACC-62 (Melanoma) and MCF-7 (Breast) were CMRN3, CMRN4, CMRN5, CMRN6. However, compounds CMRN1, CMRN2, and CMRN7 had no significant inhibitory effect. Furthermore the active compounds CMRN3, CMRN4, CMRN5, CMRN6 exerted antiproliferative effects through apoptosis induction against UACC-62 (Melanoma), suggesting their potential could be considered as attractive lead molecules in the future for the development of potential anticancer agents since one of the important criteria in the development of therapeutic drugs for cancer treatment is to have high selectivity and less or no side-effects on normal cells and these compounds had no inhibitory effect against the PBMC cells.

Keywords: coumarin, MTT, apoptosis, cytotoxicity

Procedia PDF Downloads 214