Search results for: exploit kits
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 377

Search results for: exploit kits

197 The Influence of Training on the Special Aerial Gymnastics Instruments on Selected C-Reactive Proteins in Cadets’ Serum

Authors: Z. Wochyński, K. A. Sobiech, Z. Kobos

Abstract:

To C-Reactive Proteins include ferritin, transferrin, and ceruloplasmin- metalloproteins. The study aimed at assessing an effect of training on the Special Aerial Gymnastics Instruments (SAGI) on changes of serum ferritin, transferrin, and ceruloplasmin and cadets’ physical fitness in comparison with a control group. Fifty-five cadets in the mean age 20 years were included into this study. They were divided into two groups: Group A (N=41) trained on SAGI and Group B (N=14) trained according the standard program of physical education (control group). In both groups, blood was a material for assays. Samples were collected twice before and after training at the start of the program (training I), during (training II), and after education program completion (training III). Commercially available kits were used to assay blood serum ferritin, transferrin, and ceruloplasmin. Cadets’ physical fitness was evaluated with exercise tests before and after education program completion. In Group A, serum post-exercise ferritin decreased statistically insignificantly in training I and II and increased in training III in comparison with pre-exercise values. In Group B, post-exercise serum ferritin decreased statistically insignificantly in training I and III and significantly increased in training II in comparison with the pre-exercise values. In Group A, serum transferrin decreased statistically insignificantly in training I, and significantly increased in training II, whereas in training III it increased insignificantly in comparison with pre-exercise values. In Group B, post-exercise serum transferrin increased statistically significantly in training I, II, and III in comparison with pre-exercise values. I n Group A, serum ceruloplasmin decreased in all three series in comparison with pre-exercise values. In Group B, serum ceruloplasmin increased significantly in training II. It was showed that the training on SAGI significantly decreased serum ceruloplasmin in Group A in all three series of assays and did not produce significant changes in serum ferritin also was showed significant increase in serum transferrin.

Keywords: special aerial gymnastics instruments, ferritin, ceruloplasmin, transferrin

Procedia PDF Downloads 439
196 Comparison of Susceptibility to Measles in Preterm Infants versus Term Infants

Authors: Joseph L. Mathew, Shourjendra N. Banerjee, R. K. Ratho, Sourabh Dutta, Vanita Suri

Abstract:

Background: In India and many other developing countries, a single dose of measles vaccine is administered to infants at 9 months of age. This is based on the assumption that maternal transplacentally transferred antibodies will protect infants until that age. However, our previous data showed that most infants lose maternal anti-measles antibodies before 6 months of age, making them susceptible to measles before vaccination at 9 months. Objective: This prospective study was designed to compare susceptibility in pre-term vs term infants, at different time points. Material and Methods: Following Institutional Ethics Committee approval and a formal informed consent process, venous blood was drawn from a cohort of 45 consecutive term infants and 45 consecutive pre-term infants (both groups delivered by the vaginal route); at birth, 3 months, 6 months and 9 months (prior to measles vaccination). Serum was separated and anti-measles IgG antibody levels were measured by quantitative ELISA kits (with sensitivity and specificity > 95%). Susceptibility to measles was defined as antibody titre < 200mIU/ml. The mean antibody levels were compared between the two groups at the four time points. Results: The mean gestation of term babies was 38.5±1.2 weeks; and pre-term babies 34.7±2.8 weeks. The respective mean birth weights were 2655±215g and 1985±175g. Reliable maternal vaccination record was available in only 7 of the 90 mothers. Mean anti-measles IgG antibody (±SD) in terms babies was 3165±533 IU/ml at birth, 1074±272 IU/ml at 3 months, 314±153 IU/ml at 6 months, and 68±21 IU/ml at 9 months. The corresponding levels in pre-term babies were 2875±612 IU/ml, 948±377 IU/ml, 265±98 IU/ml, and 72±33 IU/ml at 9 months (p > 0.05 for all inter-group comparisons). The proportion of susceptible term infants at birth, 3months, 6months and 9months was 0%, 16%, 67% and 96%. The corresponding proportions in the pre-term infants were 0%, 29%, 82%, and 100% (p > 0.05 for all inter-group comparisons). Conclusion: Majority of infants are susceptible to measles before 9 months of age suggesting the need to anticipate measles vaccination, but there was no statistically significant difference between the proportion of susceptible term and pre-term infants, at any of the four-time points. A larger study is required to confirm these findings and compare sero-protection if vaccination is anticipated to be administered between 6 and 9 months.

Keywords: measles, preterm, susceptibility, term infant

Procedia PDF Downloads 240
195 Automatic Tuning for a Systemic Model of Banking Originated Losses (SYMBOL) Tool on Multicore

Authors: Ronal Muresano, Andrea Pagano

Abstract:

Nowadays, the mathematical/statistical applications are developed with more complexity and accuracy. However, these precisions and complexities have brought as result that applications need more computational power in order to be executed faster. In this sense, the multicore environments are playing an important role to improve and to optimize the execution time of these applications. These environments allow us the inclusion of more parallelism inside the node. However, to take advantage of this parallelism is not an easy task, because we have to deal with some problems such as: cores communications, data locality, memory sizes (cache and RAM), synchronizations, data dependencies on the model, etc. These issues are becoming more important when we wish to improve the application’s performance and scalability. Hence, this paper describes an optimization method developed for Systemic Model of Banking Originated Losses (SYMBOL) tool developed by the European Commission, which is based on analyzing the application's weakness in order to exploit the advantages of the multicore. All these improvements are done in an automatic and transparent manner with the aim of improving the performance metrics of our tool. Finally, experimental evaluations show the effectiveness of our new optimized version, in which we have achieved a considerable improvement on the execution time. The time has been reduced around 96% for the best case tested, between the original serial version and the automatic parallel version.

Keywords: algorithm optimization, bank failures, OpenMP, parallel techniques, statistical tool

Procedia PDF Downloads 344
194 Bioremediation of Disposed X-Ray Film for Nanoparticles Production

Authors: Essam A. Makky, Siti H. Mohd Rasdi, J. B. Al-Dabbagh, G. F. Najmuldeen

Abstract:

The synthesis of silver nano particles (SNPs) extensively studied by using chemical and physical methods. Here, the biological methods were used and give benefits in research field in the aspect of very low cost (from waste to wealth) and safe time as well. The study aims to isolate and exploit the microbial power in the production of industrially important by-products in nano-size with high economic value, to extract highly valuable materials from hazardous waste, to quantify nano particle size, and characterization of SNPs by X-Ray Diffraction (XRD) analysis. Disposal X-ray films were used as substrate because it consumes about 1000 tons of total silver chemically produced worldwide annually. This silver is being wasted when these films are used and disposed. Different bacterial isolates were obtained from various sources. Silver was extracted as nano particles by microbial power degradation from disposal X-ray film as the sole carbon source for ten days incubation period in darkness. The protein content was done and all the samples were analyzed using XRD, to characterize of silver (Ag) nano particles size in the form of silver nitrite. Bacterial isolates CL4C showed the average size of SNPs about 19.53 nm, GL7 showed average size about 52.35 nm and JF Outer 2A (PDA) showed 13.52 nm. All bacterial isolates partially identified using Gram’s reaction and the results obtained exhibited that belonging to Bacillus sp.

Keywords: nanotechnology, bioremediation, disposal X-ray film, nanoparticle, waste, XRD

Procedia PDF Downloads 458
193 Overcoming Usability Challenges of Educational Math Apps: Designing and Testing a Mobile Graphing Calculator

Authors: M. Tomaschko

Abstract:

The integration of technology in educational settings has gained a lot of interest. Especially the use of mobile devices and accompanying mobile applications can offer great potentials to complement traditional education with new technologies and enrich students’ learning in various ways. Nevertheless, the usability of the deployed mathematics application is an indicative factor to exploit the full potential of technology enhanced learning because directing cognitive load toward using an application will likely inhibit effective learning. For this reason, the purpose of this research study is the identification of possible usability issues of the mobile GeoGebra Graphing Calculator application. Therefore, eye tracking in combination with task scenarios, think aloud method, and a SUS questionnaire were used. Based on the revealed usability issues, the mobile application was iteratively redesigned and assessed in order to verify the success of the usability improvements. In this paper, the identified usability issues are presented, and recommendations on how to overcome these concerns are provided. The main findings relate to the conception of a mathematics keyboard and the interaction design in relation to an equation editor, as well as the representation of geometrical construction tools. In total, 12 recommendations were formed to improve the usability of a mobile graphing calculator application. The benefit to be gained from this research study is not only the improvement of the usability of the existing GeoGebra Graphing Calculator application but also to provide helpful hints that could be considered from designers and developers of mobile math applications.

Keywords: GeoGebra, graphing calculator, math education, smartphone, usability

Procedia PDF Downloads 106
192 Synthesising Highly Luminescent CdTe Quantum Dots Using Cannula Hot Injection Method

Authors: Erdem Elibol, Musa Cadırcı, Nedim Tutkun

Abstract:

Recently, colloidal quantum dots (CQDs) have drawn increasing attention due to their unique size tunability, which makes them potential candidates for numerous applications including photovoltaic, LEDs, and imaging. However, the main challenge to exploit CQDs properly is that there has not been an effective method to produce them with highly crystalline form and narrow size dispersion. Hot injection method is one of the widely used techniques to produce high-quality nanoparticles. In this method, the key parameter is to reduce the time for injection of the precursors into each other, which yields fast and constant nucleation rate and hence to highly monodisperse QDs. In conventional hot injection method, the injection of precursors is carried out using standard lab syringes with long needles. However, this technique is relatively slow and thus will result in poor optical properties in QDs. In this work, highly luminescent CdTe QDs were synthesised by transferring hot precursors into each other using cannula method. Unlike regular syringe technique, with the help of high pressure difference between two precursors’ flasks and wide cross-section of cannula, the hot cannulation process is too short which yields narrow size distribution and high quantum yield of CdTe QDs. Here QDs with full width half maximum (FWHM) of 28 nm was achieved. In addition, the photoluminescence quantum yield of our samples was measured to be about 21 ± 0.9 which is at least twice the previous record values for CdTe QDs wherein syringe was used to transfer precursors.

Keywords: CdTe, hot injection method, luminescent, quantum dots

Procedia PDF Downloads 291
191 Study of Buried Interfaces in Fe/Si Multilayer by Hard X-Ray Emission Spectroscopy

Authors: Hina Verma, Karine Le Guen, Renaud Dalaunay, Iyas Ismail, Vita Ilakovac, Jean Pascal Rueff, Yunlin Jacques Zheng, Philippe Jonnard

Abstract:

To the extent of our knowledge, X-ray emission spectroscopy (XES) has been applied in the soft x-ray region (photon energy ≤ 2 keV) to study the buried layers and interfaces of stacks of nanometer-thin films. Now we extend the methodology to study the buried interfaces in the hard X-ray region (i.e., ≥ five keV). The emission spectra allow us to study the interactions between elements in the buried layers from the analysis of their valence states, thereby providing sensitive information about the physical-chemical environment of the emitting element in multilayers. We exploit the chemical sensitivity of XES to study the interfaces between Fe and Si layers in the Fe/Si multilayer from the Fe Kβ₂,₅ emission spectra (7108 eV). The Fe Kβ₅ emission line results from the electronic transition from occupied 3d to 1s levels (i.e., valence to core transition) and is hence sensitive to the chemical state of emitting Fe atoms. The comparison of emission spectra recorded for Fe/Si multilayer with Fe and FeSi₂ references reveal the formation of FeSi₂ at the Fe-Si interfaces inside the multilayer stack. The interfacial thickness was calculated to be 1.4 ± 0.2 nm by taking into consideration the intensity of Fe atoms emitted from the interface and the Fe layer. The formation of FeSi₂ at the interface was further confirmed by the X-ray diffraction and X-ray photoelectron spectroscopy done on the Fe/Si multilayer. Hence, we can conclude that the XES in the hard X-ray range could be used to study multilayers and their interfaces and obtain information both qualitatively and quantitatively.

Keywords: buried interfaces, hard X-ray emission spectroscopy, X-ray diffraction, X-ray photoelectron spectroscopy

Procedia PDF Downloads 116
190 The Influence of Characteristics of Waste Water on Properties of Sewage Sludge

Authors: Catalina Iticescu, Lucian P. Georgescu, Mihaela Timofti, Gabriel Murariu, Catalina Topa

Abstract:

In the field of environmental protection in the EU and also in Romania, strict and clear rules are imposed that are respected. Among those, mandatory municipal wastewater treatment is included. Our study involved Municipal Wastewater Treatment Plant (MWWTP) of Galati. MWWTP began its activity by the end of 2011 and technology is one of the most modern used in the EU. Moreover, to our knowledge, it is the first technology of this kind used in the region. Until commissioning, municipal wastewater was discharged directly into the Danube without any treatment. Besides the benefits of depollution, a new problem has arisen: the accumulation of increasingly large sewage sludge. Therefore, it is extremely important to find economically feasible and environmentally friendly solutions. One of the most feasible methods of disposing of sewage sludge is their use on agricultural land. Sewage sludge can be used in agriculture if monitored in terms of physicochemical properties (pH, nutrients, heavy metals, etc.), in order not to contribute to pollution in soils and not to affect chemical and biological balances, which are relatively fragile. In this paper, 16 physico-chemical parameters were monitored. Experimental testings were realised on waste water samples, sewage sludge results and treated water samples. Testing was conducted with electrochemichal methods (pH, conductivity, TDS); parameters N-total (mg/L), P-total (mg/L), N-NH4 (mg/L), N-NO2 (mg/L), N-NO3 (mg/L), Fe-total (mg/L), Cr-total (mg/L), Cu (mg/L), Zn (mg/L), Cd (mg/L), Pb (mg/L), Ni (mg/L) were determined by spectrophotometric methods using a spectrophotometer NOVA 60 and specific kits. Analyzing the results, we concluded that Sewage sludges, although containing heavy metals, are in small quantities and will not affect the land on which they will be deposited. Also, the amount of nutrients contained are appreciable. These features indicate that the sludge can be safely used in agriculture, with the advantage that they represent a cheap fertilizer. Acknowledgement: This work was supported by a grant of the Romanian National Authority for Scientific Research and Innovation – UEFISCDI, PNCDI III project, 79BG/2017, Efficiency of the technological process for obtaining of sewage sludge usable in agriculture, Efficient.

Keywords: municipal wastewater, physico-chemical properties, sewage sludge, technology

Procedia PDF Downloads 174
189 Human Trafficking In North East India

Authors: Neimenuo Kengurusie

Abstract:

Human trafficking is considered a form of slavery in modern day era and a gross violation of human rights and one of the most organized crimes of the day transcending cultures, geography and time. Human trafficking is a highly complex phenomenon involving many actors like victims, survivors, their families, communities and third parties that recruit, transport and exploit the trafficked victims. It takes different forms such as child trafficking, trafficking for labour, trafficking for sexual exploitation, trafficking for organ transplantation etc. and affects virtually every corner of the world. This research draws on a variety of sources, including books, articles, journals, newspaper reports, human rights reports, online materials and interviews. In India, particularly the North East region, the issue of human trafficking has become a concern regionally, nationally and internationally. The focus of this paper is on the North Eastern part of India as it is a socially and economically backward region of the country which makes women and children susceptible to trafficking. Women and children from these regions are trafficked within and outside the state. Therefore, the paper seeks to explore the issue of human trafficking, especially trafficking of women and children in North East India, which receives insufficient attention in literature. The paper seeks to analyze and understand the trend and patterns of trafficking and the mechanisms that reinforces the process and perpetuates the phenomenon of trafficking considering the nature and scope of the problem. The paper also analyzes the anti-trafficking laws initiated by India and the North East states in particular for combating human trafficking in North East India.

Keywords: children, human trafficking, North East India, women

Procedia PDF Downloads 454
188 Allelic Diversity of Productive, Reproductive and Fertility Traits Genes of Buffalo and Cattle

Authors: M. Moaeen-ud-Din, G. Bilal, M. Yaqoob

Abstract:

Identification of genes of importance regarding production traits in buffalo is impaired by a paucity of genomic resources. Choice to fill this gap is to exploit data available for cow. The cross-species application of comparative genomics tools is potential gear to investigate the buffalo genome. However, this is dependent on nucleotide sequences similarity. In this study gene diversity between buffalo and cattle was determined by using 86 gene orthologues. There was about 3% difference in all genes in term of nucleotide diversity; and 0.267±0.134 in amino acids indicating the possibility for successfully using cross-species strategies for genomic studies. There were significantly higher non synonymous substitutions both in cattle and buffalo however, there was similar difference in term of dN – dS (4.414 vs 4.745) in buffalo and cattle respectively. Higher rate of non-synonymous substitutions at similar level in buffalo and cattle indicated a similar positive selection pressure. Results for relative rate test were assessed with the chi-squared test. There was no significance difference on unique mutations between cattle and buffalo lineages at synonymous sites. However, there was a significance difference on unique mutations for non synonymous sites indicating ongoing mutagenic process that generates substitutional mutation at approximately the same rate at silent sites. Moreover, despite of common ancestry, our results indicate a different divergent time among genes of cattle and buffalo. This is the first demonstration that variable rates of molecular evolution may be present within the family Bovidae.

Keywords: buffalo, cattle, gene diversity, molecular evolution

Procedia PDF Downloads 457
187 The Effect of Two Methods of Upper and Lower Resistance Exercise Training on C-Reactive Protein, Interleukin-6 and Intracellular Adhesion Molecule-1 in Healthy Untrained Women

Authors: Leyla Sattarzadeh, Maghsoud Peeri, Mohammadali Azarbaijani, Hasan Matin Homaee

Abstract:

Inflammation by various mechanisms may cause atherosclerosis. Systemic circulating inflammatory markers such as C-reactive protein (CRP), pro-inflammatory cytokines such as Interleukin-6 (IL-6) and adhesion molecules like Intracellular Adhesion Molecule-1 (ICAM-1) are the predictors of cardiovascular diseases. Regarding the conflicting results about the effect of resistance exercise training on these inflammatory markers, the present study aimed to examine the effect of eight week different patterns of resistance exercise training on CRP, IL-6 and ICAM-1 levels in healthy untrained women. 40 volunteered and healthy untrained female university students (aged: 21+ 3 yr., Body Mass Index: 21.5+ 3.5 kg/m2) were selected purposefully and divided into three groups. At the end of training protocol and after subjects drop during the protocol in upper body exercise training (n=11), lower body (n=12) completed the eight week of training period although the control group (n=7) did anything. Blood samples gathered pre and post experimental period and CRP, IL-6 and ICAM-1 levels were evaluated using special laboratory kits, then the difference of pre and post values of each indices analyzed using one way Analysis of Variance (α < 0.05). The results of one way ANOVA for difference of pre and post values of CRP and ICAM-1 showed no significant changes due to the exercise training. But there were significant differences between groups about IL-6. Tukey post- hoc test indicated that there is significant difference between the differences of pre and post values of IL-6 between lower body exercise training group and control group, and eight weeks of lower body exercise training lead to significant changes in IL-6 values. There were no changes in anthropometric indices. The findings show that the different patterns of upper and lower body exercise training by involving the different amount of muscles altered the IL-6 values in lower body exercise training group probably because of engaging the bigger amount of muscles, but showed any significant changes about CRP and ICAM-1 probably due to intensity and duration of exercise or the lower levels of these markers at baseline of healthy people.

Keywords: C-reactive protein, interleukin-6, intracellular adhesion molecule-1, resistance training

Procedia PDF Downloads 224
186 Using Building Information Modeling in Green Building Design and Performance Optimization

Authors: Moataz M. Hamed, Khalid S. M. Al Hagla, Zeyad El Sayad

Abstract:

Thinking in design energy-efficiency and high-performance green buildings require a different design mechanism and design approach than conventional buildings to achieve more sustainable result. By reasoning about specific issues at the correct time in the design process, the design team can minimize negative impacts, maximize building performance and keep both first and operation costs low. This paper attempts to investigate and exploit the sustainable dimension of building information modeling (BIM) in designing high-performance green buildings that require less energy for operation, emit less carbon dioxide and provide a conducive indoor environment for occupants through early phases of the design process. This objective was attained by a critical and extensive literature review that covers the following issues: the value of considering green strategies in the early design stage, green design workflow, and BIM-based performance analysis. Then the research proceeds with a case study that provides an in-depth comparative analysis of building performance evaluation between an office building in Alexandria, Egypt that was designed by the conventional design process with the same building if taking into account sustainability consideration and BIM-based sustainable analysis integration early through the design process. Results prove that using sustainable capabilities of building information modeling (BIM) in early stages of the design process side by side with green design workflow promote buildings performance and sustainability outcome.

Keywords: BIM, building performance analysis, BIM-based sustainable analysis, green building design

Procedia PDF Downloads 308
185 Preliminary Conceptions of 3D Prototyping Model to Experimental Investigation in Hypersonic Shock Tunnels

Authors: Thiago Victor Cordeiro Marcos, Joao Felipe de Araujo Martos, Ronaldo de Lima Cardoso, David Romanelli Pinto, Paulo Gilberto de Paula Toro, Israel da Silveira Rego, Antonio Carlos de Oliveira

Abstract:

Currently, the use of 3D rapid prototyping, also known as 3D printing, has been investigated by some universities around the world as an innovative technique, fast, flexible and cheap for a direct plastic models manufacturing that are lighter and with complex geometries to be tested for hypersonic shock tunnel. Initially, the purpose is integrated prototyped parts with metal models that actually are manufactured through of the conventional machining and hereafter replace them with completely prototyped models. The mechanical design models to be tested in hypersonic shock tunnel are based on conventional manufacturing processes, therefore are limited forms and standard geometries. The use of 3D rapid prototyping offers a range of options that enables geometries innovation and ways to be used for the design new models. The conception and project of a prototyped model for hypersonic shock tunnel should be rethought and adapted when comparing the conventional manufacturing processes, in order to fully exploit the creativity and flexibility that are allowed by the 3D prototyping process. The objective of this paper is to compare the conception and project of a 3D rapid prototyping model and a conventional machining model, while showing the advantages and disadvantages of each process and the benefits that 3D prototyping can bring to the manufacture of models to be tested in hypersonic shock tunnel.

Keywords: 3D printing, 3D prototyping, experimental research, hypersonic shock tunnel

Procedia PDF Downloads 435
184 Ways of Life of Undergraduate Students Based On Sufficiency Economy Philosophy in Suan Sunandha Rajabhat University

Authors: Phusit Phukamchanoad

Abstract:

This study aimed to analyse the application of sufficiency economy in students’ ways of life on campus at Suan Sunandha Rajabhat University. Data was gathered through 394 questionnaires. The study results found that the majority of students were confident that “where there’s a will, there’s a way.” Overall, the students applied the sufficiency economy at a great level, along with being people who do not exploit others, were satisfied with living their lives moderately, according to the sufficiency economy. Importance was also given to kindness and generosity. Importantly, students were happy with living according to their individual circumstances and status at the present. They saw the importance of joint life planning, self-development, and self-dependence, always learning to be satisfied with “adequate”. As for their practices and ways of life, socially relational activities rated highly, especially initiation activities for underclassmen at the university and the seniority system, which are suitable for activities on campus. Furthermore, the students knew how to build a career and find supplemental income, knew how to earnestly work according to convention to finish work, and preferred to study elective subjects which directly benefit career-wise. The students’ application of sufficiency economy philosophy principles depended on their lives in their hometowns. The students from the provinces regularly applied sufficiency economy philosophy to their lives, for example, by being frugal, steadfast, determined, avoiding negligence, and making economical spending plans; more so than the students from the capital.

Keywords: application of sufficiency economy philosophy, way of living, undergraduate students, spending plan

Procedia PDF Downloads 188
183 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis

Authors: Azeem Alphonce

Abstract:

In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.

Keywords: language, skin whitening products, beauty standards, social mental models

Procedia PDF Downloads 40
182 Efficient Credit Card Fraud Detection Based on Multiple ML Algorithms

Authors: Neha Ahirwar

Abstract:

In the contemporary digital era, the rise of credit card fraud poses a significant threat to both financial institutions and consumers. As fraudulent activities become more sophisticated, there is an escalating demand for robust and effective fraud detection mechanisms. Advanced machine learning algorithms have become crucial tools in addressing this challenge. This paper conducts a thorough examination of the design and evaluation of a credit card fraud detection system, utilizing four prominent machine learning algorithms: random forest, logistic regression, decision tree, and XGBoost. The surge in digital transactions has opened avenues for fraudsters to exploit vulnerabilities within payment systems. Consequently, there is an urgent need for proactive and adaptable fraud detection systems. This study addresses this imperative by exploring the efficacy of machine learning algorithms in identifying fraudulent credit card transactions. The selection of random forest, logistic regression, decision tree, and XGBoost for scrutiny in this study is based on their documented effectiveness in diverse domains, particularly in credit card fraud detection. These algorithms are renowned for their capability to model intricate patterns and provide accurate predictions. Each algorithm is implemented and evaluated for its performance in a controlled environment, utilizing a diverse dataset comprising both genuine and fraudulent credit card transactions.

Keywords: efficient credit card fraud detection, random forest, logistic regression, XGBoost, decision tree

Procedia PDF Downloads 25
181 Enhanced Near-Infrared Upconversion Emission Based Lateral Flow Immunoassay for Background-Free Detection of Avian Influenza Viruses

Authors: Jaeyoung Kim, Heeju Lee, Huijin Jung, Heesoo Pyo, Seungki Kim, Joonseok Lee

Abstract:

Avian influenza viruses (AIV) are the primary cause of highly contagious respiratory diseases caused by type A influenza viruses of the Orthomyxoviridae family. AIV are categorized on the basis of types of surface glycoproteins such as hemagglutinin and neuraminidase. Certain H5 and H7 subtypes of AIV have evolved to the high pathogenic avian influenza (HPAI) virus, which has caused considerable economic loss to the poultry industry and led to severe public health crisis. Several commercial kits have been developed for on-site detection of AIV. However, the sensitivity of these methods is too low to detect low virus concentrations in clinical samples and opaque stool samples. Here, we introduced a background-free near-infrared (NIR)-to-NIR upconversion nanoparticle-based lateral flow immunoassay (NNLFA) platform to yield a sensor that detects AIV within 20 minutes. Ca²⁺ ion in the shell was used to enhance the NIR-to-NIR upconversion photoluminescence (PL) emission as a heterogeneous dopant without inducing significant changes in the morphology and size of the UCNPs. In a mixture of opaque stool samples and gold nanoparticles (GNPs), which are components of commercial AIV LFA, the background signal of the stool samples mask the absorption peak of GNPs. However, UCNPs dispersed in the stool samples still show strong emission centered at 800 nm when excited at 980 nm, which enables the NNLFA platform to detect 10-times lower viral load than a commercial GNP-based AIV LFA. The detection limit of NNLFA for low pathogenic avian influenza (LPAI) H5N2 and HPAI H5N6 viruses was 10² EID₅₀/mL and 10³.⁵ EID₅₀/mL, respectively. Moreover, when opaque brown-colored samples were used as the target analytes, strong NIR emission signal from the test line in NNLFA confirmed the presence of AIV, whereas commercial AIV LFA detected AIV with difficulty. Therefore, we propose that this rapid and background-free NNLFA platform has the potential of detecting AIV in the field, which could effectively prevent the spread of these viruses at an early stage.

Keywords: avian influenza viruses, lateral flow immunoassay on-site detection, upconversion nanoparticles

Procedia PDF Downloads 137
180 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 56
179 Fast Approximate Bayesian Contextual Cold Start Learning (FAB-COST)

Authors: Jack R. McKenzie, Peter A. Appleby, Thomas House, Neil Walton

Abstract:

Cold-start is a notoriously difficult problem which can occur in recommendation systems, and arises when there is insufficient information to draw inferences for users or items. To address this challenge, a contextual bandit algorithm – the Fast Approximate Bayesian Contextual Cold Start Learning algorithm (FAB-COST) – is proposed, which is designed to provide improved accuracy compared to the traditionally used Laplace approximation in the logistic contextual bandit, while controlling both algorithmic complexity and computational cost. To this end, FAB-COST uses a combination of two moment projection variational methods: Expectation Propagation (EP), which performs well at the cold start, but becomes slow as the amount of data increases; and Assumed Density Filtering (ADF), which has slower growth of computational cost with data size but requires more data to obtain an acceptable level of accuracy. By switching from EP to ADF when the dataset becomes large, it is able to exploit their complementary strengths. The empirical justification for FAB-COST is presented, and systematically compared to other approaches on simulated data. In a benchmark against the Laplace approximation on real data consisting of over 670, 000 impressions from autotrader.co.uk, FAB-COST demonstrates at one point increase of over 16% in user clicks. On the basis of these results, it is argued that FAB-COST is likely to be an attractive approach to cold-start recommendation systems in a variety of contexts.

Keywords: cold-start learning, expectation propagation, multi-armed bandits, Thompson Sampling, variational inference

Procedia PDF Downloads 81
178 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 230
177 Managing High-Performance Virtual Teams

Authors: Mehdi Rezai, Asghar Zamani

Abstract:

Virtual teams are a reality in today’s fast-paced world. With the possibility of commonly using common resources, an increase of inter-organizational projects, cooperation, outsourcing, and the increase in the number of people who work remotely or flexitime, an extensive and active presence of high-performance teams is a must. Virtual teams are a challenge by themselves. Their members remove the barriers of cultures, time regions and organizations, and they often communicate through electronic devices over considerable distances. Firstly, we examine the management of virtual teams by considering different issues such as cultural and personal diversities, communications and arrangement issues. Then we will examine individuals, processes and the existing tools in a team. The main challenge is managing high-performance virtual teams. First of all, we must examine the concept of performance. Then, we must focus on teams and the best methods of managing them. Constant improvement of performance, together with precisely regulating every individual’s method of working, increases the levels of performance in the course of time. High-performance teams exploit every issue as an opportunity for achieving high performance. And we know that doing projects with high performance is among every organization or team’s objectives. Performance could be measured using many criteria, among which carrying out projects in time, the satisfaction of stakeholders, and not exceeding budgets could be named. Elements such as clear objectives, clearly-defined roles and responsibilities, effective communications, and commitment to collaboration are essential to a team’s effectiveness. Finally, we will examine roles, systems, processes and will carry out a cause-and-effect analysis of different criteria in improving a team’s performance.

Keywords: virtual teams, performance, management, process, improvement, effectiveness

Procedia PDF Downloads 124
176 Synthesis, Structural and Vibrational Studies of a New Lacunar Apatite: LIPB2CA2(PO4)3

Authors: A. Chari, A. El Bouari, B. Orayech, A. Faik, J. M. Igartua

Abstract:

The phosphate is a natural resource of great importance in Morocco. In order to exploit this wealth, synthesis and studies of new a material based phosphate, were carried out. The apatite structure present o lot of characteristics, One of the main characteristics is to allow large and various substitutions for both cations and anions. Beside their biological importance in hard tissue (bone and teeth), apatites have been extensively studied for their potential use as fluorescent lamp phosphors or laser host materials.The apatite have interesting possible application fields such as in medicine as materials of bone filling, coating of dental implants, agro chemicals as artificial fertilizers. The LiPb2Ca2(PO4)3 was synthesized by the solid-state method, its crystal structure was investigated by Rietveld analysis using XRPD data. This material crystallizes with a structure of lacunar apatite anion deficit. The LiPb2Ca2(PO4)3 is hexagonal apatite at room temperature, adopting the space group P63/m (ITA No. 176), Rietveld refinements showed that the site 4f is shared by three cations Ca, Pb and Li. While the 6h is occupied by the Pb and Li cations. The structure can be described as built up from the PO4 tetrahedra and the sixfold coordination cavities, which delimit hexagonal tunnels along the c-axis direction. These tunnels are linked by the cations occupying the 4 f sites. Raman and Infrared spectroscopy analyses were carried out. The observed frequencies were assigned and discussed on the basis of unit-cell group analysis and by comparison to other apatite-type materials.

Keywords: apatite, Lacunar, crystal structure, Rietveldmethod, LiPb2Ca2(PO4)3, Phase transition

Procedia PDF Downloads 365
175 Climate Change and Land Grabbing

Authors: Akachi Odoemene

Abstract:

Climate change and land grabbing are tightly interconnected in ways that are both diverse and complex. They have impacted each other in significant ways too. Both phenomena are not only a political reality, but have diverse dire implications, especially for food and livelihood security of vulnerable populations in developing economies. The critical nexus and interactions of climate change and land grabbing remain one of the challenges of sustainable development in modern times. The nuanced understanding of the nexus, importance and implications of climate change and land grabbing are the primary focus of this chapter. It begins with conceptual clarifications, particularly arguing that the absence of some important principles of engagement underline and define a land grab. It also analyses and notes a good number of contemporary land deals as 'one-sided', in which wealthy entities connive with local elites to exploit and disposes rural poor populations. The paper not only examines both global and local factors that drive land grabbing and, in some cases, their connections with the incidence of climate change, but also explores their crucial links with such sector as agriculture. It is argued and exhibited in the paper why certain societies are susceptible to the incidence of climate change and land grabbing, while the overall consequences of these phenomena on the affected societies are further interrogated. The paper concludes that the lack of political will by global political leaders to effectively combat and resolve critical issues associated with both climate change and land grabbing remains a daunting challenge. It notes that these phenomena – climate change and land grabbing – if not abated, will certainly become another set of global tragic episodes to be regretted in the future.

Keywords: climate change, land grabbing, global governance, developing economies

Procedia PDF Downloads 263
174 DNA Barcoding Application in Study of Icthyo- Biodiversity in Rivers of Pakistan

Authors: Asma Karim

Abstract:

Fish taxonomy plays a fundamental role in the study of biodiversity. However, traditional methods of fish taxonomy rely on morphological features, which can lead to confusion due to great similarities between closely related species. To overcome this limitation, modern taxonomy employs DNA barcoding as a species identification method. This involves using a short standardized mitochondrial DNA region as a barcode, specifically a 658 base pair fragment near the 5′ ends of the mitochondrial cytochrome c oxidase subunit 1 (CO1) gene, to exploit the diversity in this region for identification of species. To test the effectiveness and reliability of DNA barcoding, 25 fish specimens from nine different fish species found in various rivers of Pakistan were identified morphologically using a dichotomous key at the start of the study. Comprising nine freshwater fish species, including Mystus cavasius, Mystus bleekeri, Osteobrama cotio, Labeo rohita, Labeo culbasu, Labeo gonius, Cyprinus carpio, Catla catla and Cirrhinus mrigala from different rivers of Pakistan were used in the present study. DNA was extracted from one of the pectoral fins and a partial sequence of CO1 gene was amplified using the conventional PCR method. Analysis of the barcodes confirmed that genetically identified fishes were the same as those identified morphologically at the beginning of the study. The sequences were also analyzed for biodiversity and phylogenetic studies. Based on the results of the study, it can be concluded that DNA barcoding is an effective and reliable method for studying biodiversity and conducting phylogenetic analysis of different fish species in Pakistan.

Keywords: DNA barcoding, fresh water fishes, taxonomy, biodiversity, Pakistan

Procedia PDF Downloads 61
173 Evaluation of Surface Water and Groundwater Quality in Parts of Umunneochi Southeast, Nigeria

Authors: Joshua Chima Chizoba, Wisdom Izuchukwu Uzoma, Elizabeth Ifeyiwa Okoyeh

Abstract:

Water cannot be optimally used and sustained unless the quality is periodically assessed. The study area Umunneochi and environs are located in south eastern part of Nigeria. It stretches geographically from latitudes 50501N to 60000N and longitudes 70201E to 70301. The major geologic formations in the area include the Asu River group, Nkporo Shale, and Ajali Sandstone. The aim of this study is to evaluate the hydrochemical characteristics of surface and ground water sources in parts of Umunneochi and environs in order to establish portability of the water sources for drinking, domestic and irrigation purposes. A total of 15 samples were collected randomly from streams, springs and wells. The samples were analyzed for physicochemical parameters and heavy metals using handheld digital kits, photometer, titration method and Atomic Absorption Spectrophotometer (AAS) following acceptable standards. The obtained analytical data were interpreted, and results were compared with World Health Organization (WHO) standard. The concentration of pH, SO42-and Cl- range from 5.81 mg/l – 6.07 mg/l, 41.93 mg/l – 142.95 mg/l and 20.00 mg/l – 111 mg/l respectively, while Pb and Zn revealed a relative low mean concentration of 0.14 mg/l and 0.40 mg/l, which are all within (WHO) permissible limits except pH. About 27% of the samples are moderately hard. This is attributed to the mining activities in the areas. The abundance of cations and anions in the area are in the order of K+>Na+>Mg2+>Ca2+ and SO4->Cl->HCO3->NO3-, respectively. Chloride, bicarbonate, and nitrate are all within the permissible limits. 13.33% of the total samples contain Sulphate above the standard permissible limits. The values of calculated Water Quality Index (WQI) are less than 50 indicating excellent water. The predominant water-type in the study area is Na-Cl water type and mixed Ca-Mg-Cl water type based on the sample plots on the Piper diagram. The Sodium Absorption Ratio (SAR) calculations showed excellent water for consumption and also good water for irrigation purpose with low sodium and alkalinity ratio respectively. Government water projects are recommended in the area for sustainable domestic and agricultural water supply to ease the stress of water supply problems.

Keywords: groundwater, hydrochemical, physichochemical, water-type, sodium adsorption ratio

Procedia PDF Downloads 103
172 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 111
171 Preserving Digital Arabic Text Integrity Using Blockchain Technology

Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

Abstract:

With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.

Keywords: arabic text, authentication, blockchain, integrity, quran, verification

Procedia PDF Downloads 129
170 Imputing the Minimum Social Value of Public Healthcare: A General Equilibrium Model of Israel

Authors: Erez Yerushalmi, Sani Ziv

Abstract:

The rising demand for healthcare services, without a corresponding rise in public supply, led to a debate on whether to increase private healthcare provision - especially in hospital services and second-tier healthcare. Proponents for increasing private healthcare highlight gains in efficiency, while opponents its risk to social welfare. None, however, provide a measure of the social value and its impact on the economy in terms of a monetary value. In this paper, we impute a minimum social value of public healthcare that corresponds to indifference between gains in efficiency, with losses to social welfare. Our approach resembles contingent valuation methods that introduce a hypothetical market for non-commodities, but is different from them because we use numerical simulation techniques to exploit certain market failure conditions. In this paper, we develop a general equilibrium model that distinguishes between public-private healthcare services and public-private financing. Furthermore, the social value is modelled as a by product of healthcare services. The model is then calibrated to our unique health focused Social Accounting Matrix of Israel, and simulates the introduction of a hypothetical health-labour market - given that it is heavily regulated in the baseline (i.e., the true situation in Israel today). For baseline parameters, we estimate the minimum social value at around 18% public healthcare financing. The intuition is that the gain in economic welfare from improved efficiency, is offset by the loss in social welfare due to a reduction in available social value. We furthermore simulate a deregulated healthcare scenario that internalizes the imputed value of social value and searches for the optimal weight of public and private healthcare provision.

Keywords: contingent valuation method (CVM), general equilibrium model, hypothetical market, private-public healthcare, social value of public healthcare

Procedia PDF Downloads 117
169 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 404
168 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 8