Abstract: Kombucha Tea Ferment (KT), was given to male
albino rats, (1ml/Kg of body weight), via gavages, during 2 weeks
before intraperitoneal administration of 3.5 mg/Kg body weight
CdCl2 and/or whole body γ-irradiation with 4Gy, and during 4 weeks
after each treatment. Hepatic and nephritic pathological changes
included significant increases of serum alanine transaminase (ALT),
aspartate transaminase (AST), and alkaline phosphatase (ALP)
activities, and creatinine and urea contents with significant decrease
in serum total antioxidant capacity (TAC). Increase in oxidative
stress markers in liver and kidney tissues expressed by significant
increase in malondialdehyde (MDA) and nitric oxide (NO) contents
associated to significant depletion in superoxide dismutase (SOD)
and catalase (CAT) activities, and reduced glutathione (GSH) content
were recorded. KT administration results in recovery of all the
pathological changes. It could be concluded that KT might protect
liver and kidney from oxidative damage induced by exposure to
cadmium and/ or γ-irradiation.
Abstract: Carbon tetrachloride (CCl4) is a well-known
hepatotoxin and exposure to this chemical is known to induce
oxidative stress and causes liver injury by the formation of free
radicals. Flacourtia indica commonly known as 'Baichi' has been
reported as an effective remedy for the treatment of a variety of
diseases. The objective of this study was to investigate the
hepatoprotective activity of aqueous extract of leaves of Flacourtia
indica against CCl4 induced hepatotoxicity. Animals were pretreated
with the aqueous extract of Flacourtia indica (250 & 500 mg/kg
body weight) for one week and then challenged with CCl4 (1.5 ml/kg
bw) in olive oil (1:1, v/v) on 7th day. Serum marker enzymes (ALP,
AST, ALT, Total Protein & Total Bilirubin) and TBARS level
(Marker for oxidative stress) were estimated in all the study groups.
Alteration in the levels of biochemical markers of hepatic damage
like AST, ALT, ALP, Total Protein, Total Bilirubin and lipid
peroxides (TBARS) were tested in both CCl4 treated and extract
treated groups. CCl4 has enhanced the AST, ALT, ALP and the
Lipid peroxides (TBARS) in liver. Treatment of aqueous extract of
Flacourtia indica leaves (250 & 500 mg/kg) exhibited a significant
protective effect by altering the serum levels of AST, ALT, ALP,
Total Protein, Total Bilirubin and liver TBARS. These biochemical
observations were supported by histopathological study of liver
sections. From this preliminary study it has been concluded that the
aqueous extract of the leaves of Flacourtia indica protects liver
against oxidative damages and could be used as an effective protector
against CCl4 induced hepatic damage. Our findings suggested that
Flacourtia indica possessed good hepatoprotective activity
Abstract: In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Abstract: Human-related information security breaches within organizations are primarily caused by employees who have not been made aware of the importance of protecting the information they work with. Information security awareness is accordingly attracting more attention from industry, because stakeholders are held accountable for the information with which they work. The authors developed an Information Security Retrieval and Awareness model – entitled “ISRA" – that is tailored specifically towards enhancing information security awareness in industry amongst all users of information, to address shortcomings in existing information security awareness models. This paper is principally aimed at expounding a prototype for the ISRA model to highlight the advantages of utilizing the model. The prototype will focus on the non-technical, humanrelated information security issues in industry. The prototype will ensure that all stakeholders in an organization are part of an information security awareness process, and that these stakeholders are able to retrieve specific information related to information security issues relevant to their job category, preventing them from being overburdened with redundant information.
Abstract: The influence of human activities produced by dams
along the river beds is minor, but the location of accumulation of
water directly influences the hydrological regime. The most
important effect of the influence of damming on the way water flows
decreases the frequency of floods. The water rate controls the water
flow of the dams. These natural reservoirs become dysfunctional and,
as a result, a new distribution of flow in the downstream sector,
where maximum flow is, brings about, in this case, higher values. In
addition to fishing, middle and lower courses of rivers located by
accumulation also have a role in mitigating flood waves, thus
providing flood protection. The Vaslui also ensures a good part of the
needs of the town water supply. The most important lake is Solesti,
close to the Vaslui River, opened in 1974. A hydrological regime of
accumulation is related to an anthropogenic and natural drainage
system. The design conditions and their manoeuvres drain or fill the
water courses.
Abstract: The pavement constructions on soft and expansive soils are not durable and unable to sustain heavy traffic loading. As a result, pavement failures and settlement problems will occur very often even under light traffic loading due to cyclic and rolling effects. Geotechnical engineers have dwelled deeply into this matter, and adopt various methods to improve the engineering characteristics of soft fine-grained soils and expansive soils. The problematic soils are either replaced by good and better quality material or treated by using chemical stabilization with various binding materials. Increased the strength and durability are also the part of the sustainability drive to reduce the environment footprint of the built environment by the efficient use of resources and waste recycle materials. This paper presents a series of laboratory tests and evaluates the effect of cement and fly ash on the strength and drainage characteristics of soil in Miri. The tests were performed at different percentages of cement and fly ash by dry weight of soil. Additional tests were also performed on soils treated with the combinations of fly ash with cement and lime. The results of this study indicate an increase in unconfined compression strength and a decrease in hydraulic conductivity of the treated soil.
Abstract: This paper deals with a new way for designing
external fixators applied in traumatology and orthopaedics. These
fixators can be applied in the treatment of open and unstable
fractures or for lengthening human or animal bones etc. The new
design is based on the development of Ilizarov and other techniques
(i.e. shape and weight optimalization based on composite materials,
application of smart materials, nanotechnology, low x-ray absorption,
antibacterial protection, patient's comfort, reduction in the duration
of the surgical treatment, and cost).
Abstract: Crime is a major societal problem for most of the
world's nations. Consequently, the police need to develop new
methods to improve their efficiency in dealing with these ever increasing crime rates. Two of the common difficulties that the police
face in crime control are crime investigation and the provision of crime information to the general public to help them protect themselves. Crime control in police operations involves the use of
spatial data, crime data and the related crime data from different organizations (depending on the nature of the analysis to be made).
These types of data are collected from several heterogeneous sources
in different formats and from different platforms, resulting in a lack of standardization. Moreover, there is no standard framework for
crime data collection, integration and dissemination through mobile
devices. An investigation into the current situation in crime control was carried out to identify the needs to resolve these issues. This
paper proposes and investigates the use of service oriented
architecture (SOA) and the mobile spatial information service in crime control. SOA plays an important role in crime control as an
appropriate way to support data exchange and model sharing from
heterogeneous sources. Crime control also needs to facilitate mobile
spatial information services in order to exchange, receive, share and release information based on location to mobile users anytime and
anywhere.
Abstract: Air pollution is a major environmental health
problem, affecting developed and developing countries around the
world. Increasing amounts of potentially harmful gases and
particulate matter are being emitted into the atmosphere on a global
scale, resulting in damage to human health and the environment.
Petroleum-related air pollutants can have a wide variety of adverse
environmental impacts. In the crude oil production sectors, there is a
strong need for a thorough knowledge of gaseous emissions resulting
from the flaring of associated gas of known composition on daily
basis through combustion activities under several operating
conditions. This can help in the control of gaseous emission from
flares and thus in the protection of their immediate and distant
surrounding against environmental degradation.
The impacts of methane and non-methane hydrocarbons emissions
from flaring activities at oil production facilities at Kuwait Oilfields
have been assessed through a screening study using records of flaring
operations taken at the gas and oil production sites, and by analyzing
available meteorological and air quality data measured at stations
located near anthropogenic sources. In the present study the
Industrial Source Complex (ISCST3) Dispersion Model is used to
calculate the ground level concentrations of methane and nonmethane
hydrocarbons emitted due to flaring in all over Kuwait
Oilfields.
The simulation of real hourly air quality in and around oil
production facilities in the State of Kuwait for the year 2006,
inserting the respective source emission data into the ISCST3
software indicates that the levels of non-methane hydrocarbons from
the flaring activities exceed the allowable ambient air standard set by
Kuwait EPA. So, there is a strong need to address this acute problem
to minimize the impact of methane and non-methane hydrocarbons
released from flaring activities over the urban area of Kuwait.
Abstract: Topics Disaster and Emergency Management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and data exchange. The paper suggests a solution, which allows possibilities and perspectives of new flexible communication platform to the protection of communication systems for crisis management. This platform is used for everyday communication and communication in crisis situations too.
Abstract: Short Message Service (SMS) has grown in
popularity over the years and it has become a common way of
communication, it is a service provided through General System
for Mobile Communications (GSM) that allows users to send text
messages to others.
SMS is usually used to transport unclassified information, but
with the rise of mobile commerce it has become a popular tool for
transmitting sensitive information between the business and its
clients. By default SMS does not guarantee confidentiality and
integrity to the message content.
In the mobile communication systems, security (encryption)
offered by the network operator only applies on the wireless link.
Data delivered through the mobile core network may not be
protected. Existing end-to-end security mechanisms are provided
at application level and typically based on public key
cryptosystem.
The main concern in a public-key setting is the authenticity of
the public key; this issue can be resolved by identity-based (IDbased)
cryptography where the public key of a user can be derived
from public information that uniquely identifies the user.
This paper presents an encryption mechanism based on the IDbased
scheme using Elliptic curves to provide end-to-end security
for SMS. This mechanism has been implemented over the standard
SMS network architecture and the encryption overhead has been
estimated and compared with RSA scheme. This study indicates
that the ID-based mechanism has advantages over the RSA
mechanism in key distribution and scalability of increasing
security level for mobile service.
Abstract: As nanotechnology advances, the use of nanotechnology for medical purposes in the field of nanomedicine seems more promising; the rise of nanorobots for medical diagnostics and treatments could be arriving in the near future. This study proposes a swarm intelligence based control mechanism for swarm nanorobots that operate as artificial platelets to search for wounds. The canonical particle swarm optimization algorithm is employed in this study. A simulation in the circulatory system is constructed and used for demonstrating the movement of nanorobots with essential characteristics to examine the performance of proposed control mechanism. The effects of three nanorobot capabilities including their perception range, maximum velocity and respond time are investigated. The results show that canonical particle swarm optimization can be used to control the early version nanorobots with simple behaviors and actions.
Abstract: This conference paper discusses a risk allocation problem for subprime investing banks involving investment in subprime structured mortgage products (SMPs) and Treasuries. In order to solve this problem, we develop a L'evy process-based model of jump diffusion-type for investment choice in subprime SMPs and Treasuries. This model incorporates subprime SMP losses for which credit default insurance in the form of credit default swaps (CDSs) can be purchased. In essence, we solve a mean swap-at-risk (SaR) optimization problem for investment which determines optimal allocation between SMPs and Treasuries subject to credit risk protection via CDSs. In this regard, SaR is indicative of how much protection investors must purchase from swap protection sellers in order to cover possible losses from SMP default. Here, SaR is defined in terms of value-at-risk (VaR). Finally, we provide an analysis of the aforementioned optimization problem and its connections with the subprime mortgage crisis (SMC).
Abstract: A mobile agent is a software which performs an
action autonomously and independently as a person or an
organizations assistance. Mobile agents are used for searching
information, retrieval information, filtering, intruder recognition in
networks, and so on. One of the important issues of mobile agent is
their security. It must consider different security issues in effective
and secured usage of mobile agent. One of those issues is the
integrity-s protection of mobile agents.
In this paper, the advantages and disadvantages of each method,
after reviewing the existing methods, is examined. Regarding to this
matter that each method has its own advantage or disadvantage, it
seems that by combining these methods, one can reach to a better
method for protecting the integrity of mobile agents. Therefore, this
method is provided in this paper and then is evaluated in terms of
existing method. Finally, this method is simulated and its results are
the sign of improving the possibility of integrity-s protection of
mobile agents.
Abstract: Centrally controlled authentication and authorization services can provide enterprise with an increase in security, more flexible access control solutions and an increased users' trust. By using redirections, users of all Web-based applications within an organization are authenticated at a single well known and secure Web site and using secure communication protocol. Users are first authenticated at the central server using their domain wide credentials before being redirected to a particular Web-based application. The central authentication server will then provide others with pertinence authorization related particulars and credentials of the authenticated user to the specific application. The trust between the clients and the server hosts is established by secure session keys exchange. Case- studies are provided to demonstrate the usefulness and flexibility of the proposed solution.
Abstract: Dengue fever is an important human arboviral disease. Outbreaks are now reported quite often from many parts of the world. The number of cases involving pregnant women and infant cases are increasing every year. The illness is often severe and complications may occur. Deaths often occur because of the difficulties in early diagnosis and in the improper management of the diseases. Dengue antibodies from pregnant women are passed on to infants and this protects the infants from dengue infections. Antibodies from the mother are transferred to the fetus when it is still in the womb. In this study, we formulate a mathematical model to describe the transmission of this disease in pregnant women. The model is formulated by dividing the human population into pregnant women and non-pregnant human (men and non-pregnant women). Each class is subdivided into susceptible (S), infectious (I) and recovered (R) subclasses. We apply standard dynamical analysis to our model. Conditions for the local stability of the equilibrium points are given. The numerical simulations are shown. The bifurcation diagrams of our model are discussed. The control of this disease in pregnant women is discussed in terms of the threshold conditions.
Abstract: This paper proposes a technique to block adult images displayed in websites. The filter is designed so as to perform even in exceptional cases such as, where face detection is not possible or improper face visibility. This is achieved by using an alternative phase to extract the MFC (Most Frequent Color) from the Human Body regions estimated using a biometric of anthropometric distances between fixed rigidly connected body locations. The logical results generated can be protected from overriding by a firewall or intrusion, by encrypting the result in a SSH data packet.
Abstract: Contour filter strips planted with perennial vegetation
can be used to improve surface and ground water quality by reducing
pollutant, such as NO3-N, and sediment outflow from cropland to a
river or lake. Meanwhile, the filter strips of perennial grass with biofuel
potentials also have economic benefits of producing ethanol. In
this study, The Soil and Water Assessment Tool (SWAT) model was
applied to the Walnut Creek Watershed to examine the effectiveness
of contour strips in reducing NO3-N outflows from crop fields to the
river or lake. Required input data include watershed topography,
slope, soil type, land-use, management practices in the watershed and
climate parameters (precipitation, maximum/minimum air
temperature, solar radiation, wind speed and relative humidity).
Numerical experiments were conducted to identify potential
subbasins in the watershed that have high water quality impact, and
to examine the effects of strip size and location on NO3-N reduction
in the subbasins under various meteorological conditions (dry,
average and wet). Variable sizes of contour strips (10%, 20%, 30%
and 50%, respectively, of a subbasin area) planted with perennial
switchgrass were selected for simulating the effects of strip size and
location on stream water quality. Simulation results showed that a
filter strip having 10%-50% of the subbasin area could lead to 55%-
90% NO3-N reduction in the subbasin during an average rainfall
year. Strips occupying 10-20% of the subbasin area were found to be
more efficient in reducing NO3-N when placed along the contour
than that when placed along the river. The results of this study can
assist in cost-benefit analysis and decision-making in best water
resources management practices for environmental protection.
Abstract: This paper presents a new approach for busbar protection with stable operation of current transformer during saturation, using fuzzy neuro and symmetrical components theory. This technique uses symmetrical components of current signals to learn the hidden relationship existing in the input patterns. Simulation studies are preformed and the influence of changing system parameters such as inception fault and source impedance is studied. Details of the design procedure and the results of performance studies with the proposed relay are given in the paper. An analysis of the performance of the proposed technique during ct saturation conditions is presented. The performance of the technique was investigated for a variety of operating conditions and for several busbar configurations. Data generated by EMTDC simulations of model power systems were used in the investigations. The results indicate that the proposed technique is stable during ct saturation conditions.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.