3,191 research outputs found

    HIV/AIDS Pandemic in Africa: Trends and Challenges

    Get PDF
    Three-quarters of the world’s AIDS population lives in Sub-Saharan Africa; most have no access to lifesaving drugs, testing facilities or even basic preventative health care. One of the major factors inhibiting medical professionals in Africa from treating this disease is the inability to access vast areas of the continent with adequately equipped medical facilities. To meet this need, Architecture for Humanity challenged the world’s architects and health care professionals to submit designs for a mobile HIV/AIDS health clinic. The pandemic is changing the demographic structure of Africa and wiping out life expectancy gains. Indeed, in many African countries, life expectancy is dropping from more than 60 years to around 45 years or even less. In this paper, we highlight the uniqueness of factors associated with HIV/AIDS pandemic in Africa and present its impact and challenges.HIV/AIDS, Africa

    Vaccine Development for Respiratory Syncytial Virus

    Get PDF
    The respiratory syncytial virus (RSV) is a human pathogen that causes a lower respiratory infection in infants and healthy adults. The first incidence of RSV was recorded in the 1960s. The greatest success against viruses has always been by increasing immunity through vaccination like in smallpox, measles, influenza, polio. Though RSV spread its roots almost six decades ago, the creation of a vaccine against RSV is still an ongoing challenge. The structural proteins of RSV, mainly F and G, play an essential role in pathogenicity. Structural instability of the F protein is responsible for making the vaccine discovery an uncertain outcome. This review focuses on the details of the vaccine strategies that have been explored so far. It includes an emphasis on the initial formalin-inactivated vaccine, structure-based vaccine, monoclonal antibodies like Palivizumab with a concise portrayal of nanoparticle, chimeric vaccines, and maternal derived immunization. The structure-based vaccine is one of the most reliable strategies to explicate further research. Focusing on the epitopes that monoclonal antibodies can act upon will result in dependable vaccine outcomes

    Performance Metrics for Network Intrusion Systems

    Get PDF
    Intrusion systems have been the subject of considerable research during the past 33 years, since the original work of Anderson. Much has been published attempting to improve their performance using advanced data processing techniques including neural nets, statistical pattern recognition and genetic algorithms. Whilst some significant improvements have been achieved they are often the result of assumptions that are difficult to justify and comparing performance between different research groups is difficult. The thesis develops a new approach to defining performance focussed on comparing intrusion systems and technologies. A new taxonomy is proposed in which the type of output and the data scale over which an intrusion system operates is used for classification. The inconsistencies and inadequacies of existing definitions of detection are examined and five new intrusion levels are proposed from analogy with other detection-based technologies. These levels are known as detection, recognition, identification, confirmation and prosecution, each representing an increase in the information output from, and functionality of, the intrusion system. These levels are contrasted over four physical data scales, from application/host through to enterprise networks, introducing and developing the concept of a footprint as a pictorial representation of the scope of an intrusion system. An intrusion is now defined as “an activity that leads to the violation of the security policy of a computer system”. Five different intrusion technologies are illustrated using the footprint with current challenges also shown to stimulate further research. Integrity in the presence of mixed trust data streams at the highest intrusion level is identified as particularly challenging. Two metrics new to intrusion systems are defined to quantify performance and further aid comparison. Sensitivity is introduced to define basic detectability of an attack in terms of a single parameter, rather than the usual four currently in use. Selectivity is used to describe the ability of an intrusion system to discriminate between attack types. These metrics are quantified experimentally for network intrusion using the DARPA 1999 dataset and SNORT. Only nine of the 58 attack types present were detected with sensitivities in excess of 12dB indicating that detection performance of the attack types present in this dataset remains a challenge. The measured selectivity was also poor indicting that only three of the attack types could be confidently distinguished. The highest value of selectivity was 3.52, significantly lower than the theoretical limit of 5.83 for the evaluated system. Options for improving selectivity and sensitivity through additional measurements are examined.Stochastic Systems Lt

    Current Perspectives on Viral Disease Outbreaks

    Get PDF
    The COVID-19 pandemic has reminded the world that infectious diseases are still important. The last 40 years have experienced the emergence of new or resurging viral diseases such as AIDS, ebola, MERS, SARS, Zika, and others. These diseases display diverse epidemiologies ranging from sexual transmission to vector-borne transmission (or both, in the case of Zika). This book provides an overview of recent developments in the detection, monitoring, treatment, and control of several viral diseases that have caused recent epidemics or pandemics

    Single molecule fluorescence: A tool to study dynamics and structure in single cells

    Get PDF

    Advances in Plant Tolerance to Biotic Stresses

    Get PDF
    Plants being sessile in nature encounter numerous biotic agents, including bacteria, fungi, viruses, insects, nematodes and protists. A great number of publications indicate that biotic agents significantly reduce crop productivity, although there are some biotic agents that symbiotically or synergistically co-exist with plants. Nonetheless, scientists have made significant advances in understanding the plant defence mechanisms expressed against biotic stresses. These mechanisms range from anatomy, physiology, biochemistry, genetics, development and evolution to their associated molecular dynamics. Using model plants, e.g., Arabidopsis and rice, efforts to understand these mechanisms have led to the identification of representative candidate genes, quantitative trait loci (QTLs), proteins and metabolites associated with plant defences against biotic stresses. However, there are drawbacks and insufficiencies in precisely deciphering and deploying these mechanisms, including only modest adaptability of some identified genes or QTLs to changing stress factors. Thus, more systematic efforts are needed to explore and expand the development of biotic stress resistant germplasm. In this chapter, we provided a comprehensive overview and discussed plant defence mechanisms involving molecular and cellular adaptation to biotic stresses. The latest achievements and perspective on plant molecular responses to biotic stresses, including gene expression, and targeted functional analyses of the genes expressed against biotic stresses have been presented and discussed

    Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat

    Get PDF
    Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. In spite of this, stakeholders continue to push for ineffectual anti-infringement actions that destroy this reputational infrastructure. Scholars and policymakers have not made a case for utility by considering only first-stage economic incentives to create content. In addition to the economic consequences, malware must be taken seriously as a threat to infrastructure and national security, especially in light of Russia’s efforts to infect machines to influence and delegitimize elections. Accordingly, this Article proposes that we adopt a harm reduction philosophy that both dissuades piracy and decreases the malware risk attendant to ongoing piracy

    2016 Transformations Program

    Get PDF
    Originally established as Scholars\u27 Day in 1997, Transformations is a day-long conference devoted to showcasing the wide array of scholarship, research and creative activities occurring on campus. In 2012, a new emphasis on student research lead to a name change to Transformations: A Student Research and Creativity Conference. This event focuses on student research, which is defined as an original investigation or creative activity through the primary efforts of a student or group of students. The work should show problem-solving skills and demonstrate new conceptual outcomes.https://digitalcommons.cortland.edu/transformationsprograms/1026/thumbnail.jp

    Positively Fearful: Activating the Individual’s HERO Within to Explain Volitional Security Technology Adoption

    Get PDF
    Regardless of what security professionals do to motivate personal users to adopt security technologies volitionally, the end result seems to be the same—low adoption rates. To increase these rates, we propose activating their positive psychological capital (PsyCap), which consists of hope, self-efficacy, resilience, and optimism (i.e., their “HERO within”). We propose that greater PsyCap toward a security technology is associated with greater adoption rates (and intentions thereof) because positivity increases motivation. We further posit that PsyCap both moderates and is moderated by other constructs. We suggest that personal users’ conditioned fear from the security threat moderates the effect of PsyCap on adoption intentions because some fear is necessary to activate their positive PsyCap to form their behavioral intentions to adopt security technologies. We further hypothesize that PsyCap moderates the effect of adoption intentions on actual adoption rates because activating an individual’s HERO within encourages individuals to exert the effort necessary to translate their intentions into actual adoption. Finally, we theorize that enhancing fear appeal messages with appeals to an individual’s HERO has a greater effect on volitional adoption rates relative to messages without these PsyCap-related appeals. To support our hypotheses, we conducted two experiments using the volitional adoption of a password manager application and a two-factor authentication (2FA) service. We found differential support for our hypotheses across the two security technologies, which suggests technology characteristics might mitigate the impact of PsyCap on volitional adoption decisions
    • …
    corecore