Search results for: securing graves
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 160

Search results for: securing graves

160 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Mohamed Saeed Ahmed Salman

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: Egyptian kingdom, ancient Egyptian, securing graves, Means of securing graves, Egypt, archaeology

Procedia PDF Downloads 42
159 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Mohamed Ahmed Madkour, Haitham Magdy Hamad

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: archaeology, Egyptian kingdom era, graves, tombs, ancient Egyptian

Procedia PDF Downloads 43
158 Means of Securing Graves in the Egyptian Kingdom Era

Authors: Haitham Nabil Zaghlol Hasan

Abstract:

This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.

Keywords: Egypt, archaeology, civilization, Egyptian

Procedia PDF Downloads 40
157 A C/T Polymorphism at the 5’ Untranslated Region of CD40 Gene in Patients Associated with Graves’ Disease in Kumaon Region

Authors: Sanjeev Kumar Shukla, Govind Singh, Prabhat Pant Shahzad Ahmad

Abstract:

Background: Graves’ disease is an autoimmune disorder with a genetic predisposition, and CD40 plays a pathogenic role in various autoimmune diseases. A single nucleotide polymorphism at position –1 of the Kozak sequence of the 5 untranslated regions of the CD40 gene of exon 1 has been reported to be associated with the development of Graves’ Disease. Objective: The aim of the present study was to investigate whether CD40 gene polymorphism confers susceptibility to Graves’ disease in the Kumaon region. CD40 gene polymorphisms were studied in Graves’ Disease patients (n=50) and healthy control subjects without anti-thyroid autoantibodies or a family history of autoimmune disorders (n=50). Material and Method: CD40 gene polymorphisms were studied in fifty Graves’ Disease patients and fifty healthy control subjects. All samples were collected from STG Hospital, Haldwani, Nainital. A C/T polymorphism at position –1 of the CD40 gene was measured using the polymerase chain reaction-restriction fragment length polymorphism. Results: There was no significant difference in allele or genotype frequency of the CD40 SNP between Graves’ Disease and control subjects. There was a significant decrease in the TT genotype frequency in the Graves’ Disease patients who developed Graves’ Disease after 40 years old than those under 40 years of age. These data suggest that the SNP of the CD40 gene is associated with susceptibility to the later onset of Graves’ Disease. Conclusion: The CD40 gene was a different susceptibility gene for Graves’ Disease within certain families because it was both linked and associated with Graves’ Disease.

Keywords: autoimmune diseases, pathogenesis, diagnosis, therapy

Procedia PDF Downloads 14
156 Assessment of Platelet and Lymphocyte Interaction in Autoimmune Hyperthyroidism

Authors: Małgorzata Tomczyńska, Joanna Saluk-Bijak

Abstract:

Background: Graves’ disease is a frequent organ-specific autoimmune thyroid disease, which characterized by the presence of different kind autoantibodies, that, in most cases, act as agonists of the thyrotropin receptor, leading to hyperthyroidism. Role of platelets and lymphocytes can be modulated in the pathophysiology of thyroid autoimmune diseases. Interference in the physiology of platelets can lead to enhanced activity of these cells. Activated platelets can bind to circulating lymphocytes and to affect lymphocyte adhesion. Platelets and lymphocytes can regulate mutual functions. Therefore, the activation of T lymphocytes, as well as blood platelets, is associated with the development of inflammation and oxidative stress within the target tissue. The present study was performed to investigate a platelet-lymphocyte relation by assessing the degree of their mutual aggregation in whole blood of patients with Graves’ disease. Also, the purpose of this study was to examine the impact of platelet interaction on lymphocyte migration capacity. Methods: 30 patients with Graves’ disease were recruited in the study. The matched 30 healthy subjects were served as the control group. Immunophenotyping of lymphocytes was carried out by flow cytometry method. A CytoSelect™ Cell Migration Assay Kit was used to evaluate lymphocyte migration and adhesion to blood platelets. Visual assessment of lymphocyte-platelet aggregate morphology was done using confocal microscope after magnetic cell isolation by Miltenyi Biotec. Results: The migration and functional responses of lymphocytes to blood platelets were greater in the group of Graves’ disease patients compared with healthy controls. The group of Graves’ disease patients exhibited a reduced T lymphocyte and a higher B cell count compared with controls. Based on microscopic analysis, more platelet-lymphocyte aggregates were found in patients than in control. Conclusions: Studies have shown that in Graves' disease, lymphocytes show increased platelet affinity, more strongly migrating toward them, and forming mutual cellular conglomerates. This may be due to the increased activation of blood platelets in this disease.

Keywords: blood platelets, cell migration, Graves’ disease, lymphocytes, lymphocyte-platelet aggregates

Procedia PDF Downloads 199
155 Outcome of Using Penpat Pinyowattanasilp Equation for Prediction of 24-Hour Uptake, First and Second Therapeutic Doses Calculation in Graves’ Disease Patient

Authors: Piyarat Parklug, Busaba Supawattanaobodee, Penpat Pinyowattanasilp

Abstract:

The radioactive iodine thyroid uptake (RAIU) has been widely used to differentiate the cause of thyrotoxicosis and treatment. Twenty-four hours RAIU is routinely used to calculate the dose of radioactive iodine (RAI) therapy; however, 2 days protocol is required. This study aims to evaluate the modification of Penpat Pinyowattanasilp equation application by the exclusion of outlier data, 3 hours RAIU less than 20% and more than 80%, to improve prediction of 24-hour uptake. The equation is predicted 24 hours RAIU (P24RAIU) = 32.5+0.702 (3 hours RAIU). Then calculating separation first and second therapeutic doses in Graves’ disease patients. Methods; This study was a retrospective study at Faculty of Medicine Vajira Hospital in Bangkok, Thailand. Inclusion were Graves’ disease patients who visited RAI clinic between January 2014-March 2019. We divided subjects into 2 groups according to first and second therapeutic doses. Results; Our study had a total of 151 patients. The study was done in 115 patients with first RAI dose and 36 patients with second RAI dose. The P24RAIU are highly correlated with actual 24-hour RAIU in first and second therapeutic doses (r = 0.913, 95% CI = 0.876 to 0.939 and r = 0.806, 95% CI = 0.649 to 0.897). Bland-Altman plot shows that mean differences between predictive and actual 24 hours RAI in the first dose and second dose were 2.14% (95%CI 0.83-3.46) and 1.37% (95%CI -1.41-4.14). The mean first actual and predictive therapeutic doses are 8.33 ± 4.93 and 7.38 ± 3.43 milliCuries (mCi) respectively. The mean second actual and predictive therapeutic doses are 6.51 ± 3.96 and 6.01 ± 3.11 mCi respectively. The predictive therapeutic doses are highly correlated with the actual dose in first and second therapeutic doses (r = 0.907, 95% CI = 0.868 to 0.935 and r = 0.953, 95% CI = 0.909 to 0.976). Bland-Altman plot shows that mean difference between predictive and actual P24RAIU in the first dose and second dose were less than 1 mCi (-0.94 and -0.5 mCi). This modification equation application is simply used in clinical practice especially patient with 3 hours RAIU in range of 20-80% in a Thai population. Before use, this equation for other population should be tested for the correlation.

Keywords: equation, Graves’disease, prediction, 24-hour uptake

Procedia PDF Downloads 114
154 Morphological Transformations and Variations in Architectural Language from Tombs to Mausoleums: From Ottoman Empire to the Turkish Republic

Authors: Uğur Tuztaşi, Mehmet Uysal, Yavuz Arat

Abstract:

The tomb (grave) structures that have influenced the architectural culture from the Seljuk times to the Ottoman throughout Anatolia are members of a continuing building tradition in terms of monumental expression and styles. This building typology which has religious and cultural permeability in view of spatial traces and structural formations follows the entire trajectory of the respect to death and the deceased from the Seljuks to the Ottomans and also the changing burial traditions epitomised in the form of mausoleums in the Turkish Republic. Although the cultural layers have the same contents with regards to the cult of monument this architectural tradition which evolved from tombs to mausoleums changed in both typological formation and structural size. In short, the tomb tradition with unique examples of architectural functions and typological formations has been encountered from 13th century onwards and continued during the Ottoman period with changes in form and has transformed to mausoleums during the 20th century. This study analyses the process of transformation from complex structures to simple structures and then to monumental graves in terms of architectural expression. Moreover, the study interrogates the architectural language of Anatolian Seljuk tombs to Ottoman tombs and monumental graves built during the republican period in terms of spatial and structural contexts.

Keywords: death and space in Turks, monumental graves, language of architectural style, morphological transformations

Procedia PDF Downloads 330
153 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 384
152 Role of Pro-Inflammatory and Regulatory Cytokines in Pathogenesis of Graves’ Disease in Association with Autoantibody Thyroid and Regulatory FoxP3 T-Cells

Authors: Dwitya Elvira, Eryati Darwin

Abstract:

Background: Graves’ disease (GD) is an autoimmune thyroid disease. Imbalance of Th1/Th2 cells and T-regulatory (Treg)/Th17 cells was thought to play pivotal role in the pathogenesis of GD. Treg FoxP3 produced TGF-β to maintain regulatory function, and Th17 cells produced IL-17 as cytokines that were thought in mediating several autoimmune diseases. The aim of this study is to assess the role of IL-17 and TGF-β in the pathogenesis of GD and to investigate its correlation with Thyroid Stimulating Hormone Receptor Antibody (TRAb) and Treg FoxP3 expression. Method: 30 GD patients and 27 age and sex-matched controls were enrolled in this study. Diagnosis of GD was based on clinical and biochemical of GD. Serum IL-17, TGF-β, TRAb, and FoxP3 were measured by enzyme-linked immunosorbent assay (ELISA). Data were analyzed by using SPSS 21.0 (SPSS Inc.). Spearman rank correlation test was used for assessment of correlation. The statistical significance was accepted as P<0.05. Result: There was no significant correlation between IL-17 and TGF-β serum with expression of FoxP3 level in GD, but there was significant correlation between TGF-β and TRAb serum level (P<0.05). Serum levels of IL-17 and TGF-β were found to be elevated in patient group compared to control, where mean values of IL-17 were 14.43±2.15 pg/mL and TGF-β were 10.44±3.19 pg/mL in patients group; and in control group, level of IL-17 were 7.1±1.45 pg/mL and TGF-β were 4.95±1.35 pg/mL. Conclusion: Serum Il-17 and TGF-β were elevated in GD patients that reflect the role of inflammatory and regulatory cytokines activation in pathogenesis of GD. There was significant correlation between TGF-β and TRAb, revealing that Treg cytokines may play a role in pathogenesis of GD.

Keywords: IL-17, TGF-B, FoxP3, TRAb, Graves’ disease

Procedia PDF Downloads 246
151 Late Neolithic Cemeteries Funerary and Their Indications of Societies Changes and Religion Emergences of Sudan: Qalaat Shanan Site Case Study

Authors: Ahmed Hamid Nassr

Abstract:

The significant of the old stone ages in the Sudan, seems from the longest times and the large differentiation in antiquities, so many Neolithic cemeteries have been discovered in the Sudan, which the studies revealed costumes’ funerary from the Form of grave and the contents has been contrasted in some elements and constant in the others. Many interpretations of the late Neolithic cemeteries tradition written from the earlier studies, most of them focus of the development and change in the burial from society’s development and ideas of afterlife beginnings. Another emphasis undertaken is the relationship between societies cultural aspects and the environmental conditions of the period; it has been considered that it hyper-affected the development of farming in one way or another. The site of Qalaat Shanan noted in earlier 1990 and excavated by the Author from 2011-2013, the site located north of Khartoum about 170 km in Shendi town. Site setting lies amongst a group of Neolithic sites in the Shendi area, it reflected a succession of various Neolithic activities from the early to the late horizons. Excavation revealed many late Neolithic graves, the adult and child graves show large funerary content, different in quality and quantity, which indicates of societies development and related to religion and ideas about the afterlife. This presentation discusses the variations of the Late Neolithic cemeteries in Galaat Shanan site from the grave form, content and differentiation of the sex and age and compared with other late Neolithic discoveries in Sudan and the Nile valley. The study shows many changes in the graves related to the societies changes in late Neolithic in Sudan, climate and economic subsistence's are well reasons, but also the idea change is the main reason for the changes. That is clear from the variations of grave shape and content in age and sex and might be society’s status and levels.

Keywords: Sudan, Shendi town, Qalaat Shanan, late neolithic, cemeteries, funerary, tradition

Procedia PDF Downloads 251
150 Securing Mobile Ad-Hoc Network Utilizing OPNET Simulator

Authors: Tariq A. El Shheibia, Halima Mohamed Belhamad

Abstract:

This paper is considered securing data based on multi-path protocol (SDMP) in mobile ad hoc network utilizing OPNET simulator modular 14.5, including the AODV routing protocol at the network as based multi-path algorithm for message security in MANETs. The main idea of this work is to present a way that is able to detect the attacker inside the MANETs. The detection for this attacker will be performed by adding some effective parameters to the network.

Keywords: MANET, AODV, malicious node, OPNET

Procedia PDF Downloads 262
149 Relations between Human Capital Investments and Business Excellence in Croatian Companies

Authors: Ivana Tadić, Željana Aljinović Barać, Nikolina Plazonić

Abstract:

Living today in turbulent business environment forces companies to distinguish from each other, securing sustainable competitive growth and competitive advantage. The best possible solution is to invest (effort and financial resources) within companies’ different practices of human resource management (HRM), more specifically in employees’ knowledge, skills and abilities. Applying this approach companies will create enviable level of human capital securing its economic growth. Employees become human capital for their employers at the moment when they contribute with their own knowledge and abilities in creating material and non-material value of the company. The main aim of this research is to explore the relations between human capital investments and business excellence of Croatian companies. Furthermore, the differences in the level of human capital investments with regard to several companies’ characteristics (e.g. size of the company, ownership and type of the industry) are investigated.

Keywords: business excellence, Croatian industries, human capital investments, human resource management

Procedia PDF Downloads 335
148 Self-Organizing Map Network for Wheeled Robot Movement Optimization

Authors: Boguslaw Schreyer

Abstract:

The paper investigates the application of the Kohonen’s Self-Organizing Map (SOM) to the wheeled robot starting and braking dynamic states. In securing wheeled robot stability as well as minimum starting and braking time, it is important to ensure correct torque distribution as well as proper slope of braking and driving moments. In this paper, a correct movement distribution has been formulated, securing optimum adhesion coefficient and good transversal stability of a wheeled robot. A neural tuner has been proposed to secure the above properties, although most of the attention is attached to the SOM network application. If the delay of the torque application or torque release is not negligible, it is important to change the rising and falling slopes of the torque. The road/surface condition is also paramount in robot dynamic states control. As the road conditions may randomly change in time, application of the SOM network has been suggested in order to classify the actual road conditions.

Keywords: slip control, SOM network, torque distribution, wheeled Robot

Procedia PDF Downloads 102
147 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 446
146 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 42
145 Effects of Land Certification in Securing Women’s Land Rights: The Case of Oromia Regional State, Central Ethiopia

Authors: Mesfin Nigussie Ibido

Abstract:

The study is designed to explore the effects of land certification in securing women’s land rights of two rural villages in Robe district at Arsi Zone of Oromia regional state. The land is very critical assets for human life survival and the backbone for rural women livelihood. Equal access and control power to the land have given a chance for rural women to participate in different economic activities and improve their bargaining ability for decision making on their rights. Unfortunately, women were discriminated and marginalized from access and control of land for centuries through customary practices. However, in many countries, legal reform is used as a powerful tool for eliminating discriminatory provisions in property rights. Among other equity and efficiency concerns, the land certification program in Ethiopia attempts to address gender bias concerns of the current land-tenure system. The existed rural land policy was recognizing a women land rights and benefited by strengthened wives awareness of their land rights and contribute to the strong involvement of wives in decision making. However, harmful practices and policy implementation problems still against women do not fully exercise a provision of land rights in a different area of the country. Thus, this study is carried out to examine the effect of land certification in securing women’s land rights by eliminating the discriminatory nature of cultural abuses of study areas. Probability and non-probability sampling types were used, and the sample size was determined by using the sampling distribution of the proportion method. Systematic random sampling method was applied by taking the nth element of the sample frame. Both quantitative and qualitative research methods were applied, and survey respondents of 192 households were conducted and administering questionnaires in the quantitative method. The qualitative method was applied by interviews with focus group discussions with rural women, case stories, Village, and relevant district offices. Triangulation method was applied in data collection, data presentation and in the analysis of findings. Study finding revealed that the existence of land certification is affected by rural women positively by advancing their land rights, but still, some women are challenged by unsolved problems in the study areas. The study forwards recommendation on the existed problems or gaps to ensure women’s equal access to and control over land in the study areas.

Keywords: decision making, effects, land certification, land right, tenure security

Procedia PDF Downloads 176
144 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 112
143 Burial Findings in Prehistory Qatar: Archaeological Perspective

Authors: Sherine El-Menshawy

Abstract:

Death, funerary beliefs and customs form an essential feature of belief systems and practices in many cultures. It is evident that during the pre-historical periods, various techniques of corpses burial and funerary rituals were conducted. Occasionally, corpses were merely buried in the sand, or in a grave where the body is placed in a contracted position- with knees drawn up under the chin and hands normally lying before the face- with mounds of sand, marking the grave or the bodies were burnt. However, common practice, that was demonstrable in the archaeological record, was burial. The earliest graves were very simple consisting of a shallow circular or oval pits in the ground. The current study focuses on the material culture at Qatar during the pre-historical period, specifically their funerary architecture and burial practices. Since information about burial customs and funerary practices in Qatar prehistory is both scarce and fragmentary, the importance of such study is to answer research questions related to funerary believes and burial habits during the early stages of civilization transformations at prehistory Qatar compared with Mesopotamia, since chronologically, the earliest pottery discovered in Qatar belongs to prehistoric Ubaid culture of Mesopotamia, that was collected from the excavations. This will lead to deep understanding of life and social status in pre-historical period at Qatar. The research also explores the relationship between pre-history Qatar funerary traditions and those of neighboring cultures in the Mesopotamia and Ancient Egypt, with the aim of ascertaining the distinctive aspects of pre-history Qatar culture, the reception of classical culture and the role it played in the creation of local cultural identities in the Near East. Methodologies of this study based on published books and articles in addition to unpublished reports of the Danish excavation team that excavated in and around Doha, Qatar archaeological sites from the 50th. The study is also constructed on compared material related to burial customs found in Mesopotamia. Therefore this current research: (i) Advances knowledge of the burial customs of the ancient people who inhabited Qatar, a study which is unknown recently to scholars, the study though will apply deep understanding of the history of ancient Qatar and its culture and values with an aim to share this invaluable human heritage. (ii) The study is of special significance for the field of studies, since evidence derived from the current study has great value for the study of living conditions, social structure, religious beliefs and ritual practices. (iii) Excavations brought to light burials of different categories. The graves date to the bronze and Iron ages. Their structure varies between mounds above the ground or burials below the ground level. Evidence comes from sites such as Al-Da’asa, Ras Abruk, and Al-Khor. Painted Ubaid sherds of Mesopotamian culture have been discovered in Qatar from sites such as Al-Da’asa, Ras Abruk, and Bir Zekrit. In conclusion, there is no comprehensive study which has been done and lack of general synthesis of information about funerary practices is problematic. Therefore, the study will fill in the gaps in the area.

Keywords: archaeological, burial, findings, prehistory, Qatar

Procedia PDF Downloads 109
142 Assessment of Waste Management Practices in Bahrain

Authors: T. Radu, R. Sreenivas, H. Albuflasa, A. Mustafa Khan, W. Aloqab

Abstract:

The Kingdom of Bahrain, a small island country in the Gulf region, is experiencing fast economic growth resulting in a sharp increase in population and greater than ever amounts of waste being produced. However, waste management in the country is still very basic, with landfilling being the most popular option. Recycling is still a scarce practice, with small recycling businesses and initiatives emerging in recent years. This scenario is typical for other countries in the region, with similar amounts of per capita waste being produced. In this paper, we are reviewing current waste management practices in Bahrain by collecting data published by the Government and various authors, and by visiting the country’s only landfill site, Askar. In addition, we have performed a survey of the residents to learn more about the awareness and attitudes towards sustainable waste management strategies. A review of the available data on waste management indicates that the Askar landfill site is nearing its capacity. The site uses open tipping as the method of disposal. The highest percentage of disposed waste comes from the building sector (38.4%), followed by domestic (27.5%) and commercial waste (17.9%). Disposal monitoring and recording are often based on estimates of weight and without proper characterization/classification of received waste. Besides, there is a need for assessment of the environmental impact of the site with systematic monitoring of pollutants in the area and their potential spreading to the surrounding land, groundwater, and air. The results of the survey indicate low awareness of what happens with the collected waste in the country. However, the respondents have shown support for future waste reduction and recycling initiatives. This implies that the education of local communities would be very beneficial for such governmental initiatives, securing greater participation. Raising awareness of issues surrounding recycling and waste management and systematic effort to divert waste from landfills are the first steps towards securing sustainable waste management in the Kingdom of Bahrain.

Keywords: landfill, municipal solid waste, survey, waste management

Procedia PDF Downloads 124
141 SME Internationalisation and Its Financing: An Exploratory Study That Analyses Government Support and Funding Mechanisms for Irish and Scottish International SMEs

Authors: L. Spencer, S. O’ Donohoe

Abstract:

Much of the research to date on internationalisation relates to large firms with much less known about how small and medium-sized enterprises (SMEs) engage in internationalisation. Given the crucial role of SMEs in contributing to economic growth, there is now an emphasis on the need for SMEs internationalise. Yet little is known about how SMEs undertake and finance such expansion and whether or not internationalisation actually hinders or helps them in securing finance. The purpose of this research is to explore the internationalisation process for SMEs, the sources of funding used in financing this expansion and support received from the state agencies in assisting their overseas expansion. A conceptual framework has been devised which marries the two strands of literature together (internationalisation and financing the firm). The exploratory nature of this research dictates that the most appropriate methodology was to use semi-structured interviews with SME owners; bank representatives and support agencies. In essence, a triangulated approach to the research problem facilitates assessment of the perceptions and experiences from firms, the state and the financial institutions. Our sample is drawn from SMEs operating in Ireland and Scotland, two small but very open economies where SMEs are the dominant form of organisation. The sample includes a range of industry sectors. Key findings to date suggest some SMEs are born global; others are born again global whilst a significant cohort can be classed as traditional internationalisers. Unsurprisingly there is a strong industry effect with firms in the high tech sector more likely to be faster internationalisers in contrast to those in the traditional manufacturing sectors. Owner manager’s own funds are deemed key to financing initial internationalisation lending support for the financial growth life cycle model albeit more important for the faster internationalisers in contrast to the slower cohort who are more likely to deploy external sources especially bank finance. Retained earnings remain the predominant source of on-going financing for internationalising firms but trade credit is often used and invoice discounting is utilised quite frequently. In terms of lending, asset based lending backed by personal guarantees appears paramount for securing bank finance. Whilst the lack of diversified sources of funding for internationalising SMEs was found in both jurisdictions there appears no evidence to suggest that internationalisation impedes firms in securing finance. Finally state supports were cited as important to the internationalisation process, in particular those provided by Enterprise Ireland were deemed very valuable. Considering the paucity of studies to date on SME internationalisation and in particular the funding mechanisms deployed by them; this study seeks to contribute to the body of knowledge in both the international business and finance disciplines.

Keywords: funding, government support, international pathways, modes of entry

Procedia PDF Downloads 219
140 Optimization of Ultrasound-Assisted Extraction and Microwave-Assisted Acid Digestion for the Determination of Heavy Metals in Tea Samples

Authors: Abu Harera Nadeem, Kingsley Donkor

Abstract:

Tea is a popular beverage due to its flavour, aroma and antioxidant properties—with the most consumed varieties being green and black tea. Antioxidants in tea can lower the risk of Alzheimer’s and heart disease and obesity. However, these teas contain heavy metals such as Hg, Cd, or Pb, which can cause autoimmune diseases like Graves disease. In this study, 11 heavy metals in various commercial green, black, and oolong tea samples were determined using inductively coupled plasma-mass spectrometry (ICP-MS). Two methods of sample preparation were compared for accuracy and precision, which were microwave-assisted digestion and ultrasonic-assisted extraction. The developed method was further validated by detection limit, precision, and accuracy. Results showed that the proposed method was highly sensitive with detection limits within parts-per-billion levels. Reasonable method accuracy was obtained by spiked experiments. The findings of this study can be used to delve into the link between tea consumption and disease and to provide information for future studies on metal determination in tea.

Keywords: ICP-MS, green tea, black tea, microwave-assisted acid digestion, ultrasound-assisted extraction

Procedia PDF Downloads 87
139 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 333
138 An as-If Ritual and Its Discontents: Everyday Life of North Korean Migrant Women in South Korea

Authors: Sojung Kim

Abstract:

This paper explores how the Partition of Korea is absorbed into everyday life through North Korean migrant women’s rituals for traditional holidays in Korea. In national holidays called myungjul, Koreans traditionally visit their paternal ancestor’s hometowns to hold jesa, the rites for the ancestors, at the graves and home. Due to the physical gaps in the kinship networks, marked by the kin left behind in North Korea, North Korean migrants gather among themselves in the neighborhood in South Korea as if they make the myungjul ritual of the family gatherings. This impossibility of the proper practice of the rites insinuates the violence of the Partition refracted into the family relations between those in the South and those in the North. Yet, the myungjul gathering creates a kind of collective hometown, beside one’s genealogical hometown, where they can express lamentation and guilt over not being able to visit their parents and ancestors in their hometowns, which they are traditionally required to do. In this as-if ritual, myungjul is re-created for and by the women and for others in the community. Yet, the texture of this ritual is marked by discontent and dissatisfaction. Attending to fostering discontents that seep into the collective events, this paper aims to seek ways to study the violence that permeated in everyday life in partitioned Korea.

Keywords: as-if ritual, everyday life, kinship, migration

Procedia PDF Downloads 102
137 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 279
136 THRAP2 Gene Identified as a Candidate Susceptibility Gene of Thyroid Autoimmune Diseases Pedigree in Tunisian Population

Authors: Ghazi Chabchoub, Mouna Feki, Mohamed Abid, Hammadi Ayadi

Abstract:

Autoimmune thyroid diseases (AITDs), including Graves’ disease (GD) and Hashimoto’s thyroiditis (HT), are inherited as complex traits. Genetic factors associated with AITDs have been tentatively identified by candidate gene and genome scanning approaches. We analysed three intragenic microsatellite markers in the thyroid hormone receptor associated protein 2 gene (THRAP2), mapped near D12S79 marker, which have a potential role in immune function and inflammation [THRAP2-1(TG)n, THRAP2-2 (AC)n and THRAP2-3 (AC)n]. Our study population concerned 12 patients affected with AITDs belonging to a multiplex Tunisian family with high prevalence of AITDs. Fluorescent genotyping was carried out on ABI 3100 sequencers (Applied Biosystems USA) with the use of GENESCAN for semi-automated fragment sizing and GENOTYPER peak-calling software. Statistical analysis was performed using the non parametric Lod score (NPL) by Merlin software. Merlin outputs non-parametric NPLall (Z) and LOD scores and their corresponding asymptotic P values. The analysis for three intragenic markers in the THRAP2 gene revealed strong evidence for linkage (NPL=3.68, P=0.00012). Our results suggested the possible role of THRAP2 gene in AITDs susceptibility in this family.

Keywords: autoimmunity, autoimmune disease, genetic, linkage analysis

Procedia PDF Downloads 95
135 Graphene-Reinforced Silicon Oxycarbide Composite with Lamellar Structures Prepared by the Phase Transfer Method

Authors: Min Yu, Olivier T. Picot, Theo Graves Saunders, Ivo Dlouhy, Amit Mahajan, Michael J. Reece

Abstract:

Graphene was successfully introduced into a polymer-derived silicon oxycarbide (SiOC) matrix by phase transfer of graphene oxide (GO) from an aqueous (GO dispersed in water) to an organic phase (copolymer as SiOC precursor in diethyl ether). With GO concentrations increasing up to 2 vol%, graphene-containing flakes self-assembled into a lamellar structure in the matrix leading to composite with the anisotropic property. Spark plasma sintering (SPS) was applied to densify the composites with four different GO concentrations (0, 0.5, 1 and 2 vol%) up to ~2.3 g/cm3. The fracture toughness of SiOC-2 vol% GO composites was significantly increased by ~91% (from 0.70 to 1.34 MPa·m¹/²), at the expense of a decrease in the flexural strength (from 85MPa to 55MPa), compared to SiOC-0 vol% GO composites. Moreover, the electrical conductivity in the perpendicular direction (σ┴=3×10⁻¹ S/cm) in SiOC-2 vol% GO composite was two orders of magnitude higher than the parallel direction (σ║=4.7×10⁻³ S/cm) owing to the self-assembled lamellar structure of graphene in the SiOC matrix. The composites exhibited increased electrical conductivity (σ┴) from 8.4×10⁻³ to 3×10⁻¹ S/cm, with the increasing GO content from 0.5 to 2 vol%. The SiOC-2 vol% GO composites further showed the better electrochemical performance of oxygen reduction reaction (ORR) than pure graphene, exhibiting a similar onset potential (~0.75V vs. RHE) and more positive half-wave potential (~0.6V vs. RHE).

Keywords: composite, fracture toughness, flexural strength, electrical conductivity, electrochemical performance

Procedia PDF Downloads 142
134 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 349
133 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 85
132 Cadaver Free Fatty Acid Distribution Associated with Burial in Mangrove and Oil Palm Plantation Soils under Tropical Climate

Authors: Siti Sofo Ismail, Siti Noraina Wahida Mohd Alwi, Mohamad Hafiz Ameran, Masrudin M. Yusoff

Abstract:

Locating clandestine cadaver is crucially important in forensic investigations. However, it requires a lot of man power, costly and time consuming. Therefore, the development of a new method to locate the clandestine graves is urgently needed as the cases involve burial of cadaver in different types of soils under tropical climates are still not well explored. This study focused on the burial in mangrove and oil palm plantation soils, comparing the fatty acid distributions in different soil acidities. A stimulated burial experiment was conducted using domestic pig (Sus scrofa) to substitute human tissues. Approximately 20g of pig fatty flesh was allowed to decompose in mangrove and oil palm plantation soils, mimicking burial in a shallow grave. The associated soils were collected at different designated sampling points, corresponding different decomposition stages. Modified Bligh-Dyer Extraction method was applied to extract the soil free fatty acids. Then, the obtained free fatty acids were analyzed with gas chromatography-flame ionization (GC-FID). A similar fatty acid distribution was observed for both mangrove and oil palm plantations soils. Palmitic acid (C₁₆) was the most abundance of free fatty acid, followed by stearic acid (C₁₈). However, the concentration of palmitic acid (C₁₆) higher in oil palm plantation compare to mangrove soils. Conclusion, the decomposition rate of cadaver can be affected by different type of soils.

Keywords: clandestine grave, burial, soils, free fatty acid

Procedia PDF Downloads 364
131 Smart Speed Bump

Authors: Mohammad Rahmani Rezaiyeh, Mojtaba Rahmani Rezaiyeh, Mehrdad Rahmani Rezaiyeh

Abstract:

Smart speed bump is a new invention and I am invented it. Smart speed bump is a system that can change the position of speed bumps either active or passive in necessary situations. The basic system of smart speed bumps is based on a robotic system which includes mechanic, electronic and artificial intelligence. The smart speed bump is capable of smart decision making and can change its position by anticipating the peak of terrific hours. It can be noted to the advantages of this system such as preventing the waste of petrol while crossing speed bumps, traffic management, accelerating, flowing and securing traffic, reducing accidents and judicial records.

Keywords: invention, smart, robotic system, speed bump, traffic, management

Procedia PDF Downloads 387