Abstract: The Deposit Guarantee Fund (DGF) and its communication with the Society, in general, and with the deposit client of Financial Institutions, in particular, is discussed through the challenges of the accounting and financial report. The Bank of Portugal promotes the Portuguese Deposit Guarantee Fund (PDGF) as a financial institution that enhanced the market confidence and stability on the deposit-insurance system. Due to the nature of their functions, it must be subject to regulation and supervision that provides a first line of defense against adversely affect confidence on the Portuguese financial market. First, this research provides evidence of the effectiveness of the protection mechanisms on the deposit insurance system, which provides high and equal protection to all stakeholders. Second, it emphasizes the need of requirements of rigorous accounting process and effective financial report to reduce the moral hazard implications. Third, this research focuses on the need of total disclosure of the financial information which gives higher transparency and protection to deposit client of financial institutions.
Abstract: Heme oxygenase-1 (HO-1), an enzyme degrading heme to carbon monoxide, iron, and biliverdin, has been recognized as playing a crucial role in cellular defense against stressful conditions, not only related to heme release. In the present study, the effects of TNF-a on the expression of heme oxygenase-1 (HO-1) in human aortic endothelial cells (HAECs) as well as the related mechanisms were investigated. 10 ng/mL TNF-α treatment significantly increased HO-1 expression after 6h, then a further increase at 12h and declined at 24h. Treatment with 2 ng/mL of TNF-a after 12 h resulted in a significant increase in HO-1 expression, which peaked at 10 ng/mL, then declined at 20 ng/mL. TNF-α induced HO-1 expression and then HO-1 expression reduced vascular cell adhesion molecule-1 (VCAM-1) expression. Phosphorylation studies of ERK1/2, JNK, and p38, three subgroups of mitogen-activated protein kinases (MAPKs) demonstrated TNF-α-induced ERK1/2, JNK, and p38 phosphorylation. The increase in HO-1 expression in response to TNF-α treatment was affected by pretreatment with SP600125 (a JNK inhibitor) and SB203580 (a p38 inhibitor), not with PD98059 (an ERK1/2 inhibitor). The expression of HO-1 was stronger in aortas of TNF-α-treated apo-E deficient mice when compared with control mice. These results suggest that low dose of TNF-α treatment notably induced HO-1 expression was mediated through JNK/p38 phosphorylation and may have a protective potential in cardiovascular diseases and inflammatory response through the regulation of HO-1 expression.
Abstract: An expressed sequence tag (EST) analysis provideus portions of expressed genes. We have constructed cDNA library and determined randomly sequences from cDNA library clones of T. molitor injected with acholeplasma lysate. We identified the homologous to a galectin gene. As the result of cloning and characterization of novel, we found that the protein has an open reading frame (ORF) of 495 bp, with 164 amino acid residues and molecular weight of 18.5 kDa. To characterize the role of novel Tm-galectin in immune system, we quantified the mRNA level of galectin at different times after treatment with immune elicitors. The galectin mRNA was up-regulated about 7-folds within 18 hrs. This suggests that Tm-galectin is a novel member of animal lectins, and has a role in the process of pathogen recognition. Our study would be helpful for the study on immune defense system and signaling cascade.
Abstract: Takerbucht is the only cultivar of date palm known as being resistant to the bayoud disease, caused by Fusarium oxysporum f. sp. albedinis (F.o.a.). In the aim to understand more about the defense mechanisms implied, we realized phytochemical analyses of this cultivar leaflets and roots and this, for the first time, using gas chromatography-mass spectrometry (GC-MS).The examination of our results shows that fifty-four molecules have been detected, fourteen of which are common to leaflets and roots. This study revealed also the organs' richness in derivatives fatty acids: both saturated and unsaturated are represented mainly by methyl esters of Hexadecanoic and 9,12,15-Octadecatrienoic acids. 1-Dodecanethiol, derivative Dodecanoic acid is only present in roots. It’s of great interest to note that the screening revealed the steroidal saponins abundance, among which Yamogenin acetate and Diosgenin, exclusively detected in Takerbucht. They may play an essential role, in the date palm resistance to the bayoud disease.
Abstract: Microorganisms can be removed, inhibited or killed by physical agents, physical processes or chemical agents but they have their inherent disadvantages such as increased resistance against antibiotics etc. Since, plants have endless ability to synthesize aromatic substances which act as the master agents for plant defense mechanisms against microorganisms, insects and herbivores. Thus, secondary metabolites or phytochemicals obtained from plants can be used as agents of disease control nowadays. In the present study effect of different concentrations of acetone fraction of leaves and alcohol fraction of inflorescence of Euphorbia pulcherrima on various cytomorphological parameters i.e. cell number, mycelium width, conidial size, conidiophore size etc. of Aspergillus fumigatus has been studied. Change in mycelium/ hyphal cell width, conidium size, conidiophore size etc. was measured with the help of a previously calibrated oculometer. To study effect on morphology, fungal mycelium along with conidiophore and conidia were stained with cotton blue and mounted in lactophenol and observed microscopically. Inhibitory action of the acetone extract of Euphorbia pulcherrima leaf on growth of Aspergillus fumigatus was investigated. Control containing extract free medium supported profuse growth of the fungus. Although decrease in growth was observed even at 3.95μg/ml but significant inhibition of growth was started at7.81μg/ml concentration of the extract. Complete inhibition was observed at 15.62μg/ml and above. Microscopic examination revealed that at 3.95, 7.81 and 15.62μg/ml extract concentration hyphal cell width was found to be increased from 1.44μm in control to 3.86, 5.24 and 8.98 μm respectively giving a beaded appearance to the mycelium. Vesicle size was reduced from 24.78x20.08μm (control) to 11.34x10.06μm at 3.95μg/ml concentration. At 7.81 and 15.62μg/ml concentration no phialides and sterigmata were observed. Inhibitory action of the alcohol extract of inflorescence on the growth of Aspergillus fumigatus was also studied. Control containing extract free medium supported profuse growth of the fungus. Although decrease in growth was observed even at 3.95μg/ml but complete inhibition was observed at 62.5μg/ml and above. Microscopic examination revealed that hyphal cell width of Aspergillus fumigatus was found to be increased from 1.67μm in control to 5.84μm at MIC i.e. at 62.5μg/ml. Vesicle size was reduced from 44.76x 24.22μm (control) to 11.36x 6.80μm at 15.62μg/ml concentrations. At 31.25 μg/ml and 62.5μg/ml concentration no phialides and sterigmata was found. Spore germination was completely found to be inhibited at 3.95μg/ml concentration. Similarly 92.87% reduction in vesicle size was observed at 15.62μg/ml concentration. It is evident from the results that plant extracts inhibit fungal growth and this inhibition is concentration dependent.
Abstract: The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.
Abstract: The experimental design was 4 x 5 factorial with three
replications in fully controlled research greenhouse in Department of
Soil Sciences and Plant Nutrition, Faculty of Agriculture, University
of Selcuk in the year of 2009. Determination of tolerant chickpea
genotypes to drought was made in the research. Additionally,
sophisticated effects of drought on plant growth and development,
biochemical and physical properties or physical defense mechanisms
were presented. According to the results, the primary genotypes were
Ilgın YP (0.0063 g/gh) for leaf water capacity, 22235 70.44(%) for
relative water content, 22159 (82.47%) for real water content,
22159 (5.03 mg/l) for chlorophyll a+b, Ilgın YP (125.89 nmol
H2O2.dak-1/ mg protein-1) for peroxidase, Yunak YP (769.67
unit/ mg protein-1) for superoxide dismutase, Seydişehir YP
(16.74 μg.TA-1) for proline, Gökçe (80.01 nmol H2O2.dak-1/ mg
protein-1) for catalase. Consequently, all the genotypes
increased their enzyme activity depending on the increasing of
drought stress consider with the effects of drought stress on leaf
enzyme activity. Chickpea genotypes are increasing enzyme
activity against to drought stress.
Abstract: Motion detection is a basic operation in the selection of significant segments of the video signals. For an effective Human Computer Intelligent Interaction, the computer needs to recognize the motion and track the moving object. Here an efficient neural network system is proposed for motion detection from the static background. This method mainly consists of four parts like Frame Separation, Rough Motion Detection, Network Formation and Training, Object Tracking. This paper can be used to verify real time detections in such a way that it can be used in defense applications, bio-medical applications and robotics. This can also be used for obtaining detection information related to the size, location and direction of motion of moving objects for assessment purposes. The time taken for video tracking by this Neural Network is only few seconds.
Abstract: For decades, the defense business has been plagued by
not having a reliable, deterministic method to know when the Kalman
filter solution for passive ranging application is reliable for use by the
fighter pilot. This has made it hard to accurately assess when the
ranging solution can be used for situation awareness and weapons
use. To date, we have used ad hoc rules-of-thumb to assess when we
think the estimate of the Kalman filter standard deviation on range is
reliable. A reliable algorithm has been developed at BAE Systems
Electronics & Integrated Solutions that monitors the Kalman gain
matrix elements – and a patent is pending. The “settling" of the gain
matrix elements relates directly to when we can assess the time when
the passive ranging solution is within the 10 percent-of-truth value.
The focus of the paper is on surface-based passive ranging – but the
method is applicable to airborne targets as well.
Abstract: Metal matrix composites (MMC) are generating
extensive interest in diverse fields like defense, aerospace, electronics
and automotive industries. In this present investigation, material
removal rate (MRR) modeling has been carried out using an
axisymmetric model of Al-SiC composite during electrical discharge
machining (EDM). A FEA model of single spark EDM was
developed to calculate the temperature distribution.Further, single
spark model was extended to simulate the second discharge. For
multi-discharge machining material removal was calculated by
calculating the number of pulses. Validation of model has been done
by comparing the experimental results obtained under the same
process parameters with the analytical results. A good agreement was
found between the experimental results and the theoretical value.
Abstract: Kazakhstan attaches the great importance to
cooperation with European countries within the framework of
multilateral security organizations such as NATO. Cooperation of
Kazakhstan with the NATO is a prominent aspect of strengthening of
regional security of republic. It covers a wide spectrum of areas, such
as reform of sector of defense and security, military operative
compatibility of armed forces of NATO member-countries and
Kazakhstan, civil emergency planning and scientific cooperation. The
cooperation between Kazakhstan and NATO is based on the mutual
interests of neighboring republics in the region so that the existing
forms of cooperation between Kazakhstan and NATO will not be
negatively perceived both in Asia as well as among CIS countries.
Kazakhstan tailors its participation in the PfP programme through an
annual Individual Partnership Programme, selecting those activities
that will help achieve the goals it has set in the IPAP. Level of
cooperation within the limits of PfP essentially differs on each
republic. Cooperation with Kazakhstan progressed most of all since
has been signed IPAP from the NATO
Abstract: Defense and Aerospace environment is continuously
striving to keep up with increasingly sophisticated Information
Technology (IT) in order to remain effective in today-s dynamic and
unpredictable threat environment. This makes IT one of the largest
and fastest growing expenses of Defense. Hundreds of millions of
dollars spent a year on IT projects. But, too many of those millions
are wasted on costly mistakes. Systems that do not work properly,
new components that are not compatible with old ones, trendy new
applications that do not really satisfy defense needs or lost through
poorly managed contracts.
This paper investigates and compiles the effective strategies that
aim to end exasperation with low returns and high cost of
Information Technology acquisition for defense; it tries to show how
to maximize value while reducing time and expenditure.
Abstract: The river flow forecasting represents a crucial point to employ for improving a management policy addressed to the right use of water resources as well as for conjugating prevention and defense actions against environmental degradation. The difficulties occurring during the field activities encourage the development and implementation of operative computation and measuring methods addressed to time reduction for data acquisition and processing maintaining a good level of accuracy. Therefore, the aim of the present work is to test a new entropy based expeditive methodology for the evaluation of the rating curves on three gauged sections with different geometric and morphological characteristics. The methodology requires the choice of only three verticals along the measure section and the sampling of only the maximum velocity. The results underline how in most conditions the rating curves drawn can replace those built with classic methodologies, simplifying thus the procedures of data monitoring and calculation.
Abstract: The Ministry of Defense (MoD) spends hundreds of
millions of dollars on software to support its infrastructure, operate
its weapons and provide command, control, communications,
computing, intelligence, surveillance, and reconnaissance (C4ISR)
functions. These and other all new advanced systems have a common
critical component is information technology. Defense and
Aerospace environment is continuously striving to keep up with
increasingly sophisticated Information Technology (IT) in order to
remain effective in today-s dynamic and unpredictable threat
environment. This makes it one of the largest and fastest growing
expenses of Defense. Hundreds of millions of dollars spent a year on
IT projects. But, too many of those millions are wasted on costly
mistakes. Systems that do not work properly, new components that
are not compatible with old once, trendily new applications that do
not really satisfy defense needs or lost though poorly managed
contracts.
This paper investigates and compiles the effective strategies that
aim to end exasperation with low returns and high cost of
Information Technology Acquisition for defense; it tries to show how
to maximize value while reducing time and expenditure.
Abstract: As a primitive assumption, if a new information
system is able to remind users their old work habits, it should have a
better opportunity to be accepted, adopted and finally, utilized. In
this paper some theoretical concepts borrowed from psychodynamic
theory e.g. ego defenses are discussed to show how such resemblance
can be made without necessarily affecting the performance of the
new system. The main assertion is a new system should somehow
imitate old work habits, not literally, but through following their
paces in terms of the order of habitual tensional states including
stimulation, defensive actions and satisfactions.
Abstract: The present study investigated the relationship
between personality characteristics of drivers and the number and
amount of fines they have in a year .This study was carried out on
120 male taxi drivers that worked at least seven hours in a day in
Lamerd - a city in the south of IRAN. Subjects were chosen
voluntarily among those available. Predictive variables were the NEO
–five great personality factors (1. conscientiousness 2. Openness to
Experience 3.Neuroticism4 .Extraversion 5.Agreeableness )
thecriterion variables were the number and amount of fines the
drivers have had the last three years. the result of regression analysis
showed that conscientiousness factor was able to negatively predict
the number and amount of financial fines the drivers had during the
last three years. The openness factor positively predicted the number
of fines they had in last 3 years and the amount of financial fines
during the last year. The extraversion factor both meaningfully and
positively could predict only the amount of financial fines they had
during the last year. Increasing age was associated with decreasing
driving offenses as well as financial loss.The findings can be useful
in recognizing the high-risk drivers and leading them to counseling
centers .They can also be used to inform the drivers about their
personality and it’s relation with their accident rate. Such criteria
would be of great importance in employing drivers in different places
such as companies, offices etc…
Abstract: This article presents the developments of efficient
algorithms for tablet copies comparison. Image recognition has
specialized use in digital systems such as medical imaging,
computer vision, defense, communication etc. Comparison between
two images that look indistinguishable is a formidable task. Two
images taken from different sources might look identical but due to
different digitizing properties they are not. Whereas small variation
in image information such as cropping, rotation, and slight
photometric alteration are unsuitable for based matching
techniques. In this paper we introduce different matching
algorithms designed to facilitate, for art centers, identifying real
painting images from fake ones. Different vision algorithms for
local image features are implemented using MATLAB. In this
framework a Table Comparison Computer Tool “TCCT" is
designed to facilitate our research. The TCCT is a Graphical Unit
Interface (GUI) tool used to identify images by its shapes and
objects. Parameter of vision system is fully accessible to user
through this graphical unit interface. And then for matching, it
applies different description technique that can identify exact
figures of objects.
Abstract: Pattern recognition and image recognition methods are commonly developed and tested using testbeds, which contain known responses to a query set. Until now, testbeds available for image analysis and content-based image retrieval (CBIR) have been scarce and small-scale. Here we present the one million images CEA-List Image Collection (CLIC) testbed that we have produced, and report on our use of this testbed to evaluate image analysis merging techniques. This testbed will soon be made publicly available through the EU MUSCLE Network of Excellence.
Abstract: These days MANET is attracting much attention as
they are expected to gratefully influence communication between
wireless nodes. Along with this great strength, there is much more
chance of leave and being attacked by a malicious node. Due to this
reason much attention is given to the security and the private issue in
MANET. A lot of research in MANET has been doing. In this paper
we present the overview of MANET, the security issues of MANET,
IP configuration in MANET, the solution to puzzle out the security
issues and the simulation of the proposal idea. We add the method to
figure out the malicious nodes so that we can prevent the attack from
them. Nodes exchange the information about nodes to prevent DAD
attack. We can get 30% better performance than the previous
MANETConf.
Abstract: The Spiral development model has been used
successfully in many commercial systems and in a good number of
defense systems. This is due to the fact that cost-effective
incremental commitment of funds, via an analogy of the spiral model
to stud poker and also can be used to develop hardware or integrate
software, hardware, and systems. To support adaptive, semantic
collaboration between domain experts and knowledge engineers, a
new knowledge engineering process, called Spiral_OWL is proposed.
This model is based on the idea of iterative refinement, annotation
and structuring of knowledge base. The Spiral_OWL model is
generated base on spiral model and knowledge engineering
methodology. A central paradigm for Spiral_OWL model is the
concentration on risk-driven determination of knowledge engineering
process. The collaboration aspect comes into play during knowledge
acquisition and knowledge validation phase. Design rationales for the
Spiral_OWL model are to be easy-to-implement, well-organized, and
iterative development cycle as an expanding spiral.