Search results for: torpedo defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 446

Search results for: torpedo defense

356 Early Diagnosis and Treatment of Cancer Using Synthetic Cationic Peptide

Authors: D. J. Kalita

Abstract:

Cancer is one of the prime causes of early death worldwide. Mutation of the gene involve in DNA repair and damage, like BRCA2 (Breast cancer gene two) genes, can be detected efficiently by PCR-RFLP to early breast cancer diagnosis and adopt the suitable method of treatment. Host Defense Peptide can be used as blueprint for the design and synthesis of novel anticancer drugs to avoid the side effect of conventional chemotherapy and chemo resistance. The change at nucleotide position 392 of a -› c in the cancer sample of dog mammary tumour at BRCA2 (exon 7) gene lead the creation of a new restriction site for SsiI restriction enzyme. This SNP may be a marker for detection of canine mammary tumour. Support vector machine (SVM) algorithm was used to design and predict the anticancer peptide from the mature functional peptide. MTT assay of MCF-7 cell line after 48 hours of post treatment showed an increase in the number of rounded cells when compared with untreated control cells. The ability of the synthesized peptide to induce apoptosis in MCF-7 cells was further investigated by staining the cells with the fluorescent dye Hoechst stain solution, which allows the evaluation of the nuclear morphology. Numerous cells with dense, pyknotic nuclei (the brighter fluorescence) were observed in treated but not in control MCF-7 cells when viewed using an inverted phase-contrast microscope. Thus, PCR-RFLP is one of the attractive approach for early diagnosis, and synthetic cationic peptide can be used for the treatment of canine mammary tumour.

Keywords: cancer, cationic peptide, host defense peptides, Breast cancer genes

Procedia PDF Downloads 60
355 Interaction between Kazal-Type Serine Proteinase Inhibitor SPIPm2 and Cyclophilin A from the Black Tiger Shrimp Penaeus monodon

Authors: Sirikwan Ponprateep, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

A Kazal-type serine proteinase inhibitor, SPIPm2, was abundantly expressed in the hemocytes and secreted into shrimp plasma has anti-viral property against white spot syndrome virus (WSSV). To discover the molecular mechanism of antiviral activity, the binding assay showed that SPIPm2 bind to the components of viral particle and shrimp hemocyte. From our previous report, viral target protein of SPIPm2 was identified, namely WSV477 using yeast two-hybrid screening. WSV477 is an early gene product of WSSV and involved in viral propagation. In this study, the co-immunoprecipitation technique and Tandem Mass Spectrometry (LC-MS/MS) was used to identify the target protein of SPIPm2 from shrimp hemocyte. The target protein of SPIPm2 was cyclophilin A. In vertebrate, cyclophilin A or peptidylprolyl isomerase A was reported to be the immune suppressor interacted with cyclosporin A involved in immune defense response. The recombinant cyclophilin A from Penaeus monodon (rPmCypA) was produced in E.coli system and purified using Ni-NTA column to confirm the protein-protein interaction. In vitro pull-down assay showed the interaction between rSPIPm2 and rPmCypA. To study the biological function of these proteins, the expression analysis of immune gene in shrimp defense pathways will be investigated after rPmCypA administration.

Keywords: cyclophilin A, protein-protein interaction, Kazal-type serine proteinase inhibitor, Penaeus monodon

Procedia PDF Downloads 210
354 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 9
353 Cluster-Based Exploration of System Readiness Levels: Mathematical Properties of Interfaces

Authors: Justin Fu, Thomas Mazzuchi, Shahram Sarkani

Abstract:

A key factor in technological immaturity in defense weapons acquisition is lack of understanding critical integrations at the subsystem and component level. To address this shortfall, recent research in integration readiness level (IRL) combines with technology readiness level (TRL) to form a system readiness level (SRL). SRL can be enriched with more robust quantitative methods to provide the program manager a useful tool prior to committing to major weapons acquisition programs. This research harnesses previous mathematical models based on graph theory, Petri nets, and tropical algebra and proposes a modification of the desirable SRL mathematical properties such that a tightly integrated (multitude of interfaces) subsystem can display a lower SRL than an inherently less coupled subsystem. The synthesis of these methods informs an improved decision tool for the program manager to commit to expensive technology development. This research ties the separately developed manufacturing readiness level (MRL) into the network representation of the system and addresses shortfalls in previous frameworks, including the lack of integration weighting and the over-importance of a single extremely immature component. Tropical algebra (based on the minimum of a set of TRLs or IRLs) allows one low IRL or TRL value to diminish the SRL of the entire system, which may not be reflective of actuality if that component is not critical or tightly coupled. Integration connections can be weighted according to importance and readiness levels are modified to be a cardinal scale (based on an analytic hierarchy process). Integration arcs’ importance are dependent on the connected nodes and the additional integrations arcs connected to those nodes. Lack of integration is not represented by zero, but by a perfect integration maturity value. Naturally, the importance (or weight) of such an arc would be zero. To further explore the impact of grouping subsystems, a multi-objective genetic algorithm is then used to find various clusters or communities that can be optimized for the most representative subsystem SRL. This novel calculation is then benchmarked through simulation and using past defense acquisition program data, focusing on the newly introduced Middle Tier of Acquisition (rapidly field prototypes). The model remains a relatively simple, accessible tool, but at higher fidelity and validated with past data for the program manager to decide major defense acquisition program milestones.

Keywords: readiness, maturity, system, integration

Procedia PDF Downloads 58
352 The Amorphousness of the Exposure Sphere

Authors: Nipun Ansal

Abstract:

People guard their beliefs and opinions with their lives. Beliefs that they’ve formed over a period of time, and can go to any lengths to defy, desist from, resist and negate any outward stimulus that has the potential to shake them. Cognitive dissonance is term used to describe it in theory. And every human being, in order to defend himself from cognitive dissonance applies 4 rings of defense viz. Selective Exposure, Selective Perception, Selective Attention, and Selective Retention. This paper is a discursive analysis on how the onslaught of social media, complete with its intrusive weaponry, has amorphized the external ring of defense: the selective exposure. The stimulus-response model of communication is one of the most inherent model that encompasses communication behaviours of children and elderly, individual and masses, humans and animals alike. The paper deliberates on how information bombardment through the uncontrollable channels of the social media, Facebook and Twitter in particular, have dismantled our outer sphere of exposure, leading users online to a state of constant dissonance, and thus feeding impulsive action-taking. It applies case study method citing an example to corroborate how knowledge generation has given in to the information overload and the effect it has on decision making. With stimulus increasing in number of encounters, opinion formation precedes knowledge because of the increased demand of participation and decrease in time for the information to permeate from the outer sphere of exposure to the sphere of retention, which of course, is through perception and attention. This paper discusses the challenge posed by this fleeting, stimulus rich, peer-dominated media on the traditional models of communication and meaning-generation.

Keywords: communication, discretion, exposure, social media, stimulus

Procedia PDF Downloads 382
351 Demonstration of Logical Inconsistency in the Discussion of the Problem of Evil

Authors: Mohammad Soltani Renani

Abstract:

The problem of evil is one of the heated battlegrounds of the idea of theism and its critics. Since time immemorial and in various philosophical schools and religions, the belief in an Omniscient, Omnipotent, and Absolutely Good God has been considered inconsistent with the existence of the evil in the universe. The theist thinkers have generally adopted one of the following four ways for answering this problem: denial of the existence of evil or considering it to be relative, privation theory of evil, attribution of evil to something other than God, and depiction of an alternative picture of God. Defense or criticism of these alternative answers have given rise to an extensive and unending dispute. However, evaluation of the presupposition and context upon/in which a question is raised precedes offering an answer to it. This point in the discussion of the problem of evil is of paramount importance for both parties, i.e., questioners and answerers, that the attributes of knowledge, power, love, good-will, among others, can be supposed to be infinite only in the essence of the attributed and the domain of potentiality but what can be realized in the domain of actuality is always finite. Therefore, infinite nature of Divine Attributes and realization of evil belong to two spheres. Divine Attributes are infinite (absolute) in Divine Essence, but when they are created, each one becomes bounded by the other. This boundedness is a result of the state of being surrounded of the attributes by each other in finite world of possibility. Evil also appears in this limited world. This inconsistency leads to the collapse of the problem of evil from within: the place of infinity of the Divine Attributes, in the words of Muslim mystics, lies in the Holiest Manifestation [Feyze Aqdas] while evil emerges in the Holy Manifestation where the Divine Attributes become bounded by each other. This idea is neither a new answer to the problem of evil nor a defense of theism; rather it reveals a logical inconsistency in the discussion of the problem of evil.

Keywords: problem of evil, infinity of divine attributes, boundedness of divine attributes, holiest manifestation, holy manifestation

Procedia PDF Downloads 118
350 Histopathological and Biochemical Investigations of Protective Role of Honey in Rats with Experimental Aflatoxicosis

Authors: Turan Yaman, Zabit Yener, Ismail Celik

Abstract:

The aim of this study was to investigate the antioxidant properties and protective role of honey, considered a part of traditional medicine, against carcinogen chemical aflatoxin (AF) exposure in rats, which were evaluated by histopathological changes in liver and kidney, measuring level of serum marker enzymes [aspartate aminotransferase (AST), alanin aminotransferase (ALT), gamma glutamil transpeptidase (GGT)], antioxidant defense systems [Reduced glutathione (GSH), glutathione reductase (GR), superoxide dismutase (SOD), glutathione-S-transferase (GST) and catalase (CAT)], and lipid peroxidation content in liver, erythrocyte, brain, kidney, heart and lungs. For this purpose, a total of eighteen healthy Sprague-Dawley rats were randomly allocated into three experimental groups: A (Control), B (AF-treated) and C (AF+honey-treated). While rats in group A were fed with a diet without AF, B, and C groups received 25 µg of AF/rat/day, where C group additionally received 1 mL/kg of honey by gavage for 90 days. At the end of the 90-day experimental period, we found that the honey supplementation decreased the lipid peroxidation and the levels of enzyme associated with liver damage, increased enzymatic and non-enzymatic antioxidants in the AF+honey-treated rats. Hepatoprotective and nephroprotective effects of honey is further substantiated by showing almost normal histological architecture in AF+honey-treated group, compared to degenerative changes in the liver and kidney of AF-treated rats. Additionally, honey supplementation ameliorated antioxidant defense systems and lipid peroxidation content in other tissues of AF+honey-treated rats. In conclusion, the present study indicates that honey has a hepatoprotective and nephroprotective effect in rats with experimental aflatoxicosis due to its antioxidant activity.

Keywords: aflatoxicosis, honey, histopathology, malondialdehyde, antioxidant, rat

Procedia PDF Downloads 304
349 Development and State in Brazil: How Do Some Institutions Think and Influence These Issues

Authors: Alessandro Andre Leme

Abstract:

To analyze three Brazilian think tanks: a) Fernando Henrique Foundation; b) Celso Furtado International Center; c) Millennium Institute and how they dispute interpretations about the type of development and State that should be adopted in Brazil. We will make use of Network and content analysis of the sites. The analyzes show a dispute that goes from a defense of ultraliberalism to developmentalism, going through a hybrid between State and Market voiced in each of the Think Tanks.

Keywords: sociopolitical and economic thinking, development, strategies, intellectuals, state

Procedia PDF Downloads 116
348 Allele Mining for Rice Sheath Blight Resistance by Whole-Genome Association Mapping in a Tail-End Population

Authors: Naoki Yamamoto, Hidenobu Ozaki, Taiichiro Ookawa, Youming Liu, Kazunori Okada, Aiping Zheng

Abstract:

Rice sheath blight is one of the destructive fungal diseases in rice. We have thought that rice sheath blight resistance is a polygenic trait. Host-pathogen interactions and secondary metabolites such as lignin and phytoalexins are likely to be involved in defense against R. solani. However, to our knowledge, it is still unknown how sheath blight resistance can be enhanced in rice breeding. To seek for an alternative genetic factor that contribute to sheath blight resistance, we mined relevant allelic variations from rice core collections created in Japan. Based on disease lesion length on detached leaf sheath, we selected 30 varieties of the top tail-end and the bottom tail-end, respectively, from the core collections to perform genome-wide association mapping. Re-sequencing reads for these varieties were used for calling single nucleotide polymorphisms among the 60 varieties to create a SNP panel, which contained 1,137,131 homozygous variant sites after filitering. Association mapping highlighted a locus on the long arm of chromosome 11, which is co-localized with three sheath blight QTLs, qShB11-2-TX, qShB11, and qSBR-11-2. Based on the localization of the trait-associated alleles, we identified an ankyryn repeat-containing protein gene (ANK-M) as an uncharacterized candidate factor for rice sheath blight resistance. Allelic distributions for ANK-M in the whole rice population supported the reliability of trait-allele associations. Gene expression characteristics were checked to evaluiate the functionality of ANK-M. Since an ANK-M homolog (OsPIANK1) in rice seems a basal defense regulator against rice blast and bacterial leaf blight, ANK-M may also play a role in the rice immune system.

Keywords: allele mining, GWAS, QTL, rice sheath blight

Procedia PDF Downloads 47
347 Taphonomy and Paleoecology of Cenomanian Oysters (Mollusca: Bivalvia) from Egypt

Authors: Ahmed El-Sabbagh, Heba Mansour, Magdy El-Hedeny

Abstract:

This study provided a taphonomic alteration and paleoecology of Cenomanian oysters from the Musabaa Salama area, south western Sinai, Egypt. Three oyster zones can be recognized in the studied area, a lower one of Amphidonte (Ceratostreon) flabellatum (lower-middle Cenomanian), a middle zone of Ilymatogyra (Afrogyra) africana (upper Cenomanian) and an upper one of Exogyra (Costagyra) olisiponensis (upper Cenomanian). Taphonomic features including disarticulation, fragmentation, encrustation and bioerosion were subjected to multivariate statistical analyses. The analyses showed that the distributions of the identified ichnospecies were greatly similar within the identified oyster zones in the Musabaa Salama section. With rare exceptions, Entobia cretacea, Gastrochaenolites torpedo and Maeandropolydora decipiens are considered as common to abundant ichnospecies within the three recorded oyster zones. In contrast, and with some exceptions, E. ovula, E. retiformis and Rogerella pattei are considered as frequent to common ichnospecies within the identified oyster zones. Other ichnospecies, including Caulostrepsis cretacea, G. orbicularis, Trypanites solitarius, E. geometrica and C. taeniola, are mostly recorded in rare to frequent occurrences. Careful investigation of these host shells and the preserved encrusters and/or bioerosion sculptures provided data concerning: 1) the substrate characteristics, 2) time of encrustation and bioerosion, 3) rate of sedimentation, 4) the planktonic productivity level, and 5) the general bathymetry and the rate of transgression across the substrate.

Keywords: oysters, Cenomanian, taphonomy, palaeoecology, Sinai, Egypt

Procedia PDF Downloads 279
346 Tamukkana, Ancient Achaemenids City near the Persian Gulf

Authors: Ghulamhossein Nezami

Abstract:

Civilizations based in Iran, especially in the south, have always realized the all-around importance of the Persian Sea and for various reasons, have paid full attention to it. The first of these was the pre-Aryan government, Ilam in the coastal province of Sharihum and the city of Lian (now the port of Bushehr) in terms of trade, defense and religion. With the establishment of the Achaemenids on the entire plateau of Iran to the center of Persia, they created several communication routes from Parseh to the shores of the Persian Gulf, which ended in the present Bushehr province. This coastal area was extended by a road in the coastal plain to the more southern parts of the ports of Ausinze - according to Ptolemy the port of Siraf before the Sassanids - and Epstane and Hormozia in the present-day Strait of Hormuz. Meanwhile, the ancient city of Temukknana, whose new historical documents testify to its extraordinary importance in the Achaemenid period, especially Darius I of the Achaemenids, from a strategic position with the coastal areas, the coasts and on the other hand with the gamers, the political center. - Achaemenid administration, had. New archeological evidence, research, and excavations show that both the famous Achaemenid kings and courtiers paid special attention to Tamukknana. The discovery of a tomb and three Achaemenid palaces from before the reign of Cyrus to Xerxes in this region showed the importance of the strategic, security-defense and commercial position of this region, extraordinary for the Achaemenids. Therefore, the city of Temukkana in the Dashtestan region of present-day Bushehr province became an important Achaemenid center on the Persian Gulf coast and became the political-economic center of gravity of the Achaemenids and the regulator of communication networks on the Persian Gulf coast. This event showed that the Achaemenids attached importance to their economic goals and oversight of their vast territory by the Persian Gulf. Methods: Book resources and field study.

Keywords: Achaemenids, Bushehr, Persian Gulf, Tamukkana

Procedia PDF Downloads 156
345 Narcissism in the Life of Howard Hughes: A Psychobiographical Exploration

Authors: Alida Sandison, Louise A. Stroud

Abstract:

Narcissism is a personality configuration which has both normal and pathological personality expressions. Narcissism is highly complex, and is linked to a broad field of research. There are both dimensional and categorical conceptualisations of narcissism, and a variety of theoretical formulations that have been put forward to understand the narcissistic personality configuration. Currently, Kernberg’s Object Relations theory is well supported for this purpose. The complexity and particular defense mechanisms at play in the narcissistic personality make it a difficult personality configuration worth further research. Psychobiography as a methodology allows for the exploration of the lived life, and is thus a useful methodology to surmount these inherent challenges. Narcissism has been a focus of academic interest for a long time, and although there is a lot of research done in this area, to the researchers' knowledge, narcissistic dynamics have never been explored within a psychobiographical format. Thus, the primary aim of the research was to explore and describe narcissism in the life of Howard Hughes, with the objective of gaining further insight into narcissism through the use of this unconventional research approach. Hughes was chosen as subject for the study as he is renowned as an eccentric billionaire who had his revolutionary effect on the world, but was concurrently disturbed within his personal pathologies. Hughes was dynamic in three different sectors, namely motion pictures, aviation and gambling. He became more and more reclusive as he entered into middle age. From his early fifties he was agoraphobic, and the social network of connectivity that could reasonably be expected from someone in the top of their field was notably distorted. Due to his strong narcissistic personality configuration, and the interpersonal difficulties he experienced, Hughes represents an ideal figure to explore narcissism. The study used a single case study design, and purposive sampling to select Hughes. Qualitative data was sampled, using secondary data sources. Given that Hughes was a famous figure, there is a plethora of information on his life, which is primarily autobiographical. This includes books written about his life, and archival material in the form of newspaper articles, interviews and movies. Gathered data were triangulated to avoid the effect of author bias, and increase the credibility of the data used. It was collected using Yin’s guidelines for data collection. Data was analysed using Miles and Huberman strategy of data analysis, which consists of three steps, namely, data reduction, data display, and conclusion drawing and verification. Patterns which emerged in the data highlighted the defense mechanisms used by Hughes, in particular that of splitting and projection, in defending his sense of self. These defense mechanisms help us to understand the high levels of entitlement and paranoia experienced by Hughes. Findings provide further insight into his sense of isolation and difference, and the consequent difficulty he experienced in maintaining connections with others. Findings furthermore confirm the effectiveness of Kernberg’s theory in understanding narcissism observing an individual life.

Keywords: Howard Hughes, narcissism, narcissistic defenses, object relations

Procedia PDF Downloads 323
344 On a Negative Relation between Bacterial Taxis and Turing Pattern Formation

Authors: A. Elragig, S. Townley, H. Dreiwi

Abstract:

In this paper we introduce a bacteria-leukocyte model with bacteria chemotaxsis. We assume that bacteria develop a tactic defense mechanism as a response to Leukocyte phagocytosis. We explore the effect of this tactic motion on Turing space in two parameter spaces. A fine tuning of bacterial chemotaxis shows a significant effect on developing a non-uniform steady state.

Keywords: chemotaxis-diffusion driven instability, bacterial chemotaxis, mathematical biology, ecology

Procedia PDF Downloads 338
343 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 117
342 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 395
341 The Right to a Fair Trial in French and Spanish Constitutional Law

Authors: Chloe Fauchon

Abstract:

In Europe, the right to a fair trial is enshrined in the European Convention on Human Rights, signed in 1950, in its famous Article 6, and, in the field of the European Union, in Article 47 of the Charter of Fundamental Rights, binding since 2009. The right to a fair trial is, therefore, a fundamental right protected by all the relevant treaties. The right to a fair trial is an "umbrella right" which encompasses various sub-rights and principles. Although this right applies in all the proceedings, it gets a special relevance in criminal matters and, particularly, regarding the defendant. In criminal proceedings, the parties are not equal: the accusation is represented by a State-organ, with specific prerogatives, and the defense does not benefit from these specific powers and is often inexperienced in criminal law. Equality of arms, and consequently the right to a fair trial, needs some specific mechanisms to be effective in criminal proceedings. For instance, the defendant benefits from some procedural rights, such as the right to a lawyer, the right to be informed of the charges against them, the right to confront witnesses, and so on. These rights aim to give the defendant the tools to dispute the accusation. The role of the defense is, therefore, very important in criminal matters to avoid unjustified convictions. This specificity of criminal matters justifies that the focus will be put on them during this study. Then this paper will also focus on French and Spanish legal orders. Indeed, if the European Court and Convention on Human Rights are the most famous instruments to protect the right to a fair trial, this right is also guaranteed at a constitutional level in European national legal orders in Europe. However, this enshrinement differs from one country to the other: for instance, in Spain, the right to a fair trial is protected explicitly by the 1978 constitutional text, whereas, in France, it is more of a case-law construction. Nevertheless, this difference between both legal orders does not imply huge variations in the substantive aspect of the right to a fair trial. This can be specifically explained by the submission of both States to the European Convention on Human Rights. This work aims to show that, although the French and Spanish legal orders differ in the way they protect the right to a fair trial, this right eventually has the same substantive meaning in both legal orders.

Keywords: right to a fair trial, constitutional law, French law, Spanish law, European Court of Human Rights

Procedia PDF Downloads 33
340 Altered Gene Expression: Induction/Suppression of some Pathogenesis Related Protein Genes in an Egyptian Isolate of Potato Leafroll Virus (PLRV)

Authors: Dalia G. Aseel

Abstract:

The potato (Solanum tubersum, L.) has become one of the major vegetable crops in Egypt and all over the world. Potato leafroll virus(PLRV) was observed on potato plants collected from different governorates in Egypt. Three cultivars, Spunta, Diamont, and Cara, infected with PLRV were collected; RNA was extracted and subjected to Real-Time PCR using the coat protein gene primers. The results showed that the expression of the coat protein was 39.6-fold, 12.45-fold, and 47.43-fold, respectively, for Spunta, Diamont, and Cara cultivars. Differential Display Polymerase Chain Reaction (DD-PCR) using pathogenesis-related protein 1 (PR-1), β-1,3-glucanases (PR-2), chitinase (PR-3), peroxidase (POD), and polyphenol oxidase (PPO) forward primers for pathogenesis-related proteins (PR). The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, 58 up-regulated and 19 down-regulated genes were detected. Sequence analysis of the up-and down-regulated genes revealed that infected plants were observed in comparison with the healthy control. Sequence analysis of the up-regulated gene was performed, and the encoding sequence analysis showed that the obtained genes include: induced stolen tip protein. On the other hand, two down-regulated genes were identified: disease resistance RPP-like protein and non-specific lipid-transfer protein. In this study, the expressions of PR-1, PR-2, PR-3, POD, and PPO genes in the infected leaves of three potato cultivars were estimated by quantitative real-time PCR. We can conclude that the PLRV-infection of potato plants inhibited the expression of the five PR genes. On the contrary, infected leaves by PLRV elevated the expression of some defense genes. This interaction may also induce and/or suppress the expression of some genes responsible for the plant's defense mechanisms.

Keywords: PLRV, pathogenesis-related proteins (PRs), DD-PCR, sequence, real-time PCR

Procedia PDF Downloads 108
339 Structural and Functional Characterization of the Transcriptional Regulator Rv1176 of Mycobacterium tuberculosis H37Rv

Authors: Vikash Yadav, Ashish Arora

Abstract:

Microorganisms have self-defense mechanisms to protect themselves from toxic environments. Phenolic acid decarboxylase(pad) is responsible for the defense against toxicity caused by phenolic acids, converting them into less toxic vinyl derivatives. The transcription of the pad gene is regulated by a negative transcription factor, phenolic acid decarboxylase regulators (PadR), in a substrate-inducible manner. The PadR family members share the conserved DNA-binding features and interact with the operator DNA using a winged helix-turn-helix (wHTH) motif, which contains a three-helix motif and a β-stranded wing. The members of this family function as transcriptional regulators that are involved in various cellular survival processes, such as toxin production, detoxification, multidrug resistance, antibiotic biosynthesis, and carbon catabolism. Rv1176 of Mycobacterium tuberculosis H37Rv has been assigned to the PadR family protein that remains to be structurally and functionally uncharacterized. To reveal the structural mechanism by which Rv1176 could regulates effector-responsive transcription, several experiments were performed, including Electrophoretic Mobility Shift Assay (EMSA) for DNA protein interaction, differential scanning calorimetry (DSC) and Differential Scanning Fluorimetry (DSF) for temperature and ligand-dependent protein stability, Circular Dichroism (CD) spectroscopy for secondary structure analysis. Further, to evaluate the functional role of Rv1176, the intracellular survival of recombinant M. smegmatis was examined in murine macrophage cell line J774A.1 and different stressed conditions like oxidative, pH, and nutritive stress. All these studies demonstrated that Rv1176 could behave as a transcription regulator and its expression in recombinant M. smegmatis increases intracellular survival.

Keywords: EMSA, Mycobacterium tuberculosis, PadR family protein, transcriptional regulator

Procedia PDF Downloads 45
338 Sedimentary Response to Coastal Defense Works in São Vicente Bay, São Paulo

Authors: L. C. Ansanelli, P. Alfredini

Abstract:

The article presents the evaluation of the effectiveness of two groins located at Gonzaguinha and Milionários Beaches, situated on the southeast coast of Brazil. The effectiveness of these coastal defense structures is evaluated in terms of sedimentary dynamics, which is one of the most important environmental processes to be assessed in coastal engineering studies. The applied method is based on the implementation of the Delft3D numerical model system tools. Delft3D-WAVE module was used for waves modelling, Delft3D-FLOW for hydrodynamic modelling and Delft3D-SED for sediment transport modelling. The calibration of the models was carried out in a way that the simulations adequately represent the region studied, evaluating improvements in the model elements with the use of statistical comparisons of similarity between the results and waves, currents and tides data recorded in the study area. Analysis of the maximum wave heights was carried to select the months with higher accumulated energy to implement these conditions in the engineering scenarios. The engineering studies were performed for two scenarios: 1) numerical simulation of the area considering only the two existing groins; 2) conception of breakwaters coupled at the ends of the existing groins, resulting in two “T” shaped structures. The sediment model showed that, for the simulated period, the area is affected by erosive processes and that the existing groins have little effectiveness in defending the coast in question. The implemented T structures showed some effectiveness in protecting the beaches against erosion and provided the recovery of the portion directly covered by it on the Milionários Beach. In order to complement this study, it is suggested the conception of further engineering scenarios that might recover other areas of the studied region.

Keywords: coastal engineering, coastal erosion, Sao Vicente bay, Delft3D, coastal engineering works

Procedia PDF Downloads 102
337 Impact of Elevated Temperature on Spot Blotch Development in Wheat and Induction of Resistance by Plant Growth Promoting Rhizobacteria

Authors: Jayanwita Sarkar, Usha Chakraborty, Bishwanath Chakraborty

Abstract:

Plants are constantly interacting with various abiotic and biotic stresses. In changing climate scenario plants are continuously modifying physiological processes to adapt to changing environmental conditions which profoundly affect plant-pathogen interactions. Spot blotch in wheat is a fast-rising disease in the warmer plains of South Asia where the rise in minimum average temperature over most of the year already affecting wheat production. Hence, the study was undertaken to explore the role of elevated temperature in spot blotch disease development and modulation of antioxidative responses by plant growth promoting rhizobacteria (PGPR) for biocontrol of spot blotch at high temperature. Elevated temperature significantly increases the susceptibility of wheat plants to spot blotch causing pathogen Bipolaris sorokiniana. Two PGPR Bacillus safensis (W10) and Ochrobactrum pseudogrignonense (IP8) isolated from wheat (Triticum aestivum L.) and blady grass (Imperata cylindrical L.) rhizophere respectively, showing in vitro antagonistic activity against Bipolaris sorokiniana were tested for growth promotion and induction of resistance against spot blotch in wheat. GC-MS analysis showed that Bacillus safensis (W10) and Ochrobactrum pseudogrignonense (IP8) produced antifungal and antimicrobial compounds in culture. Seed priming with these two bacteria significantly increase growth, modulate antioxidative signaling and induce resistance and eventually reduce disease incidence in wheat plants at optimum as well as elevated temperature which was further confirmed by indirect immunofluorescence assay using polyclonal antibody raised against Bipolaris sorokiniana. Application of the PGPR led to enhancement in activities of plant defense enzymes- phenylalanine ammonia lyase, peroxidase, chitinase and β-1,3 glucanase in infected leaves. Immunolocalization of chitinase and β-1,3 glucanase in PGPR primed and pathogen inoculated leaf tissue was further confirmed by transmission electron microscopy using PAb of chitinase, β-1,3 glucanase and gold labelled conjugates. Activity of ascorbate-glutathione redox cycle related enzymes such as ascorbate peroxidase, superoxide dismutase and glutathione reductase along with antioxidants such as carotenoids, glutathione and ascorbate and osmolytes like proline and glycine betain accumulation were also increased during disease development in PGPR primed plant in comparison to unprimed plants at high temperature. Real-time PCR analysis revealed enhanced expression of defense genes- chalcone synthase and phenyl alanineammonia lyase. Over expression of heat shock proteins like HSP 70, small HSP 26.3 and heat shock factor HsfA3 in PGPR primed plants effectively protect plants against spot blotch infection at elevated temperature as compared with control plants. Our results revealed dynamic biochemical cross talk between elevated temperature and spot blotch disease development and furthermore highlight PGPR mediated array of antioxidative and molecular alterations responsible for induction of resistance against spot blotch disease at elevated temperature which seems to be associated with up-regulation of defense genes, heat shock proteins and heat shock factors, less ROS production, membrane damage, increased expression of redox enzymes and accumulation of osmolytes and antioxidants.

Keywords: antioxidative enzymes, defense enzymes, elevated temperature, heat shock proteins, PGPR, Real-Time PCR, spot blotch, wheat

Procedia PDF Downloads 139
336 China-Pakistan Nexus and Its Implication for India

Authors: Riddhi Chopra

Abstract:

While China’s friendship with a number of countries has waxed and waned over the decades, Sino-Pak relationship is said to have withstood the vicissitudes of larger international politics as well as changes in regional and domestic currents. Pakistan, one of the first countries to recognize the People’s Republic of China, thus providing China with a corridor into the energy rich Muslim states which was reciprocated with a continual stream of no-strings-attached military hardware and defense-related assistance from Beijing. The joint enmity towards India also provided the initial thrust to a burgeoning Sino-Pak friendship. This paper intends to provide a profound analysis of the strategic relation between China-Pakistan and examine India as a determining factor. The Pakistan-China strategic relationship has been conventionally viewed by India as a zero sum game, wherein any gains accrued by Pakistan or China through their partnership is seen as a direct detriment to the evolution of India-Pakistan or India-China relation. The paper evaluates various factors which were crucial for the synthesis of such a strong relation and presents a comprehensive study of the various policies and programs that have been undertaken by the two countries to tie India to South Asia and reduce its sphere of influence. The geographic dynamics is said to breed a natural coalition, dominating the strategic ambitions of both Beijing and Islamabad hence directing their relationship. In addition to the obvious geopolitical factors, there are several dense collaborations between the two nations knitting a relatively close partnership. Moreover, an attempt has been made to assess the irritants in China-Pak relations and the initiatives taken by the two to further strengthen it. Current trends in diplomatic, economic and defense cooperation – along with the staunch affinity rooted in history and consistent geo-strategic interests – points to a strong and strengthening relationship, significant in directing India’s foreign and security policies. This paper seeks to analyze the changing power dynamics of the China-Pak nexus with external actors such as US and India with an ulterior motive of their own and predict the change in power dynamics between the four countries.

Keywords: China, Pakistan, India, strategy

Procedia PDF Downloads 249
335 A Cooperative Signaling Scheme for Global Navigation Satellite Systems

Authors: Keunhong Chae, Seokho Yoon

Abstract:

Recently, the global navigation satellite system (GNSS) such as Galileo and GPS is employing more satellites to provide a higher degree of accuracy for the location service, thus calling for a more efficient signaling scheme among the satellites used in the overall GNSS network. In that the network throughput is improved, the spatial diversity can be one of the efficient signaling schemes; however, it requires multiple antenna that could cause a significant increase in the complexity of the GNSS. Thus, a diversity scheme called the cooperative signaling was proposed, where the virtual multiple-input multiple-output (MIMO) signaling is realized with using only a single antenna in the transmit satellite of interest and with modeling the neighboring satellites as relay nodes. The main drawback of the cooperative signaling is that the relay nodes receive the transmitted signal at different time instants, i.e., they operate in an asynchronous way, and thus, the overall performance of the GNSS network could degrade severely. To tackle the problem, several modified cooperative signaling schemes were proposed; however, all of them are difficult to implement due to a signal decoding at the relay nodes. Although the implementation at the relay nodes could be simpler to some degree by employing the time-reversal and conjugation operations instead of the signal decoding, it would be more efficient if we could implement the operations of the relay nodes at the source node having more resources than the relay nodes. So, in this paper, we propose a novel cooperative signaling scheme, where the data signals are combined in a unique way at the source node, thus obviating the need of the complex operations such as signal decoding, time-reversal and conjugation at the relay nodes. The numerical results confirm that the proposed scheme provides the same performance in the cooperative diversity and the bit error rate (BER) as the conventional scheme, while reducing the complexity at the relay nodes significantly. Acknowledgment: This work was supported by the National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development.

Keywords: global navigation satellite network, cooperative signaling, data combining, nodes

Procedia PDF Downloads 261
334 Neoliberalism and Otherness: Convergences or Divergences?

Authors: Juliana Pereira Tigre

Abstract:

In the current critical debate on the process of globalization, on the one hand, arises the accusation that neoliberalism standardizes the so-called American way of life on the cultures of the world, operating as a system of subtle domination, expropriating and incorporating the other. On the other hand, it is defended that neoliberalism begins its career of political and economic order as a sensitive conception to the otherness, imposing itself at present due to its peaceful management of pluralism and defense of individual freedom. In this sense, this paper aims to discuss the extent to which the neoliberalism and the otherness converge or diverge in contemporaneity and the guiding principles of globalization.

Keywords: otherness, globalization, neoliberalism, social sciences

Procedia PDF Downloads 404
333 A Methodological Approach to Digital Engineering Adoption and Implementation for Organizations

Authors: Sadia H. Syeda, Zain H. Malik

Abstract:

As systems continue to become more complex and the interdependencies of processes and sub-systems continue to grow and transform, the need for a comprehensive method of tracking and linking the lifecycle of the systems in a digital form becomes ever more critical. Digital Engineering (DE) provides an approach to managing an authoritative data source that links, tracks, and updates system data as it evolves and grows throughout the system development lifecycle. DE enables the developing, tracking, and sharing system data, models, and other related artifacts in a digital environment accessible to all necessary stakeholders. The DE environment provides an integrated electronic repository that enables traceability between design, engineering, and sustainment artifacts. The DE activities' primary objective is to develop a set of integrated, coherent, and consistent system models for the program. It is envisioned to provide a collaborative information-sharing environment for various stakeholders, including operational users, acquisition personnel, engineering personnel, and logistics and sustainment personnel. Examining the processes that DE can support in the systems engineering life cycle (SELC) is a primary step in the DE adoption and implementation journey. Through an analysis of the U.S Department of Defense’s (DoD) Office of the Secretary of Defense (OSD’s) Digital Engineering Strategy and their implementation, examples of DE implementation by the industry and technical organizations, this paper will provide descriptions of the current DE processes and best practices of implementing DE across an enterprise. This will help identify the capabilities, environment, and infrastructure needed to develop a potential roadmap for implementing DE practices consistent with its business strategy. A capability maturity matrix will be provided to assess the organization’s DE maturity emphasizing how all the SELC elements interlink to form a cohesive ecosystem. If implemented, DE can increase efficiency and improve the systems engineering processes' quality and outcomes.

Keywords: digital engineering, digital environment, digital maturity model, single source of truth, systems engineering life-cycle

Procedia PDF Downloads 68
332 Applications of Hyperspectral Remote Sensing: A Commercial Perspective

Authors: Tuba Zahra, Aakash Parekh

Abstract:

Hyperspectral remote sensing refers to imaging of objects or materials in narrow conspicuous spectral bands. Hyperspectral images (HSI) enable the extraction of spectral signatures for objects or materials observed. These images contain information about the reflectance of each pixel across the electromagnetic spectrum. It enables the acquisition of data simultaneously in hundreds of spectral bands with narrow bandwidths and can provide detailed contiguous spectral curves that traditional multispectral sensors cannot offer. The contiguous, narrow bandwidth of hyperspectral data facilitates the detailed surveying of Earth's surface features. This would otherwise not be possible with the relatively coarse bandwidths acquired by other types of imaging sensors. Hyperspectral imaging provides significantly higher spectral and spatial resolution. There are several use cases that represent the commercial applications of hyperspectral remote sensing. Each use case represents just one of the ways that hyperspectral satellite imagery can support operational efficiency in the respective vertical. There are some use cases that are specific to VNIR bands, while others are specific to SWIR bands. This paper discusses the different commercially viable use cases that are significant for HSI application areas, such as agriculture, mining, oil and gas, defense, environment, and climate, to name a few. Theoretically, there is n number of use cases for each of the application areas, but an attempt has been made to streamline the use cases depending upon economic feasibility and commercial viability and present a review of literature from this perspective. Some of the specific use cases with respect to agriculture are crop species (sub variety) detection, soil health mapping, pre-symptomatic crop disease detection, invasive species detection, crop condition optimization, yield estimation, and supply chain monitoring at scale. Similarly, each of the industry verticals has a specific commercially viable use case that is discussed in the paper in detail.

Keywords: agriculture, mining, oil and gas, defense, environment and climate, hyperspectral, VNIR, SWIR

Procedia PDF Downloads 43
331 Characterization of Transcription Factors Involved in Early Defense Response during Interaction of Oil Palm Elaeis guineensis Jacq. with Ganoderma boninense

Authors: Sakeh N. Mohd, Bahari M. N. Abdul, Abdullah S. N. Akmar

Abstract:

Oil palm production generates high export earnings to many countries especially in Southeast Asian region. Infection by necrotrophic fungus, Ganoderma boninense on oil palm results in basal stem rot which compromises oil palm production leading to significant economic loss. There are no reliable disease treatments nor promising resistant oil palm variety has been cultivated to eradicate the disease up to date. Thus, understanding molecular mechanisms underlying early interactions of oil palm with Ganoderma boninense may be vital to promote preventive or control measure of the disease. In the present study, four months old oil palm seedlings were infected via artificial inoculation of Ganoderma boninense on rubber wood blocks. Roots of six biological replicates of treated and untreated oil palm seedlings were harvested at 0, 3, 7 and 11 days post inoculation. Next-generation sequencing was performed to generate high-throughput RNA-Seq data and identify differentially expressed genes (DEGs) during early oil palm-Ganoderma boninense interaction. Based on de novo transcriptome assembly, a total of 427,122,605 paired-end clean reads were assembled into 30,654 unigenes. DEGs analysis revealed upregulation of 173 transcription factors on Ganoderma boninense-treated oil palm seedlings. Sixty-one transcription factors were categorized as DEGs according to stringent cut-off values of genes with log2 ratio [Number of treated oil palm seedlings/ Number of untreated oil palm seedlings] ≥ |1.0| (corresponding to 2-fold or more upregulation) and P-value ≤ 0.01. Transcription factors in response to biotic stress will be screened out from abiotic stress using reverse transcriptase polymerase chain reaction. Transcription factors unique to biotic stress will be verified using real-time polymerase chain reaction. The findings will help researchers to pinpoint defense response mechanism specific against Ganoderma boninense.

Keywords: Ganoderma boninense, necrotrophic, next-generation sequencing, transcription factors

Procedia PDF Downloads 233
330 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 96
329 Effect of Hypoxia on the Antimicrobial Activity of Corvina Drum (Cilus Gilberti) Epidermal Mucus

Authors: Belinda Vega, Claudio Alvarez, Héctor Flores, Marcia Oliva, Katherine Alveal, Teresa Toro, María José Tapia, Fanny Guzmán

Abstract:

With the increase in global temperatures and the decrease of oxygen (O2) concentration in the oceans, fish cultures are exposed to frequent fluctuations in dissolved O2 (DO) concentration that can cause chronic stress in the animals, altering the normal functioning of their immune system and making them vulnerable to infections, consequently increasing morbidity and mortality in the farms with economic losses. The mucosal organs (skin -and mucus-, gills, gut, and nasal mucosa) are the first line of defense of the fish against pathogens. Therefore, the objective of this study is to evaluate the effect of hypoxia on the antimicrobial activity of epidermal mucus from corvina drum (Cilus Gilberti), a native marine species with the potential for the diversification of aquaculture in Chile. To achieve this, the epidermal mucus of juveniles (~220g) kept under normoxia (7 mg/L DO) and hypoxia (2 mg/L DO) environmental conditions was collected after 6 weeks, as well as after 6 days of intraperitoneal inoculation with lipopolysaccharide from Vibrio anguillarum to induce an immune response in the fish. Total protein extracts of the mucus were used for bactericidal activity and lysozyme and peroxidase activity assays. Although the mucus from both experimental groups showed inhibitory effects on the bacterial growth of Vibrio anguillarum and Vibrio ordalli, this effect was more long-lasting in the normoxia group. We also observed a notable reduction in the presence of lysozyme in the mucus from fish exposed to hypoxia, with no differences in peroxidase content. Future proteomic studies of corvina mucus associated with the environmental conditions studied in this work will allow the isolation and identification of peptides with antimicrobial activity, those responsible for the results obtained. This will help establish strategies aimed at minimizing the impacts of hypoxia on the defense responses of corvina drum against potential pathogens. Funding: FONDECYT 3200440 and FONDECYT 1210056

Keywords: Cilus gilberti, mucus, antimicrobial activity, HYPOXIA

Procedia PDF Downloads 44
328 In Defense of Impersonal Obligatoriness

Authors: Peter B. M. Vranas

Abstract:

An important question in moral philosophy is whether whatever is obligatory (i.e., morally required) is personally obligatory, namely obligatory for someone. A positive answer is uncontested in the literature: for example, if it is obligatory for you to keep your promises, it seems that it is obligatory for you you keep your promises. By using conceptual analysis, this paper defends a negative answer: some things are impersonally obligatory, namely obligatory, but not obligatory for anyone. For example, if each of us has promised to vote and thus has an obligation to vote, then it is obligatory that we all vote, but it is not obligatory for anyone that we all vote (because, for example, what is obligatory for you is that you vote, not that we all vote). The paper concludes that there is an important concept of impersonal obligatoriness irreducible to personal obligatoriness.

Keywords: impersonal obligatoriness, ought to be, ought to do, personal obligatoriness

Procedia PDF Downloads 70
327 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 244