540,254 research outputs found

    Efficient community-based control strategies in adaptive networks

    Full text link
    Most researches on adaptive networks mainly concentrate on the properties of steady state, but neglect transient dynamics. In this study, we pay attention to the emergence of community structures in transient process and the effects of community-based control strategies on epidemic spreading. First, by normalizing modularity QQ, we investigate the evolution of community structures during the transient process, and find that very strong community structures are induced by rewiring mechanism in the early stage of epidemic spreading, which remarkably delays the outbreaks of epidemic. Then we study the effects of control strategies started from different stages on the prevalence. Both immunization and quarantine strategies indicate that it is not "the earlier, the better" for the implementing of control measures. And the optimal control effect is obtained if control measures can be efficiently implemented in the period of strong community structure. For immunization strategy, immunizing the S nodes on SI links and immunizing S nodes randomly have similar control effects. Yet for quarantine strategy, quarantining the I nodes on SI links can yield far better effects than quarantining I nodes randomly. More significantly, community-based quarantine strategy plays more efficient performance than community-based immunization strategy. This study may shed new lights on the forecast and the prevention of epidemic among human population.Comment: 5 pages, 5 figure

    A novel defense mechanism against web crawler intrusion

    Get PDF
    Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with repeated measures for two groups with each group containing ninety web pages. The outputs of the logistic regression analysis of treatment and control groups confirm the novel five-factor identification process as an effective mechanism to prevent unwanted web crawlers. This study concluded that the proposed five distinct identifier process is a very effective technique as demonstrated by a successful outcome

    A Review on the epidemiology and characteristics of COVID-19

    Get PDF
    In December 2019, there was a health emergency worldwide named novel coronavirus or COVID-19 by the world health organization (WHO). It originated from the Wuhan seafood market, Hubei Province, China. Till now Severe Acute Respiratory Syndrome Coronavirus-2 or SARS-CoV-2 spread over 216 countries with 177,108,695 confirmed cases and 3,840,223 confirmed death cases has been reported (5:31 pm CEST, 18 June 2021; WHO). Analyzing the risk factor of this pandemic situation, different government health organizations of all the countries including WHO are taking several preventive measures with ongoing research works, even the vaccination process started. In this study, we tried to analyze all the available information on pandemic COVID-19, which includes the origin of COVID-19, pathogenic mechanism, transmission, diagnosis, treatment, and control-preventive measures, also the additional treatment and prevention taken by the Indian government is being studied here

    The Role of Relapse Prevention and Goal Setting in Training Transfer Enhancement

    Get PDF
    This article reviews the effect of two post-training transfer interventions (relapse prevention [RP] and goal setting [GS]) on trainees’ ability to apply skills gained in a training context to the workplace. Through a review of post-training transfer interventions literature, the article identifies a number of key issues that remain unresolved or underexplored, for example, the inconsistent results on the impact of RP on transfer of training, the lack of agreement on which GS types are more efficient to improve transfer performance, the lack of clarity about the distinction between RP and GS, and the underlying process through which these two post-training transfer interventions influence transfer of training. We offer some recommendations to overcome these problems and also provide guidance for future research on transfer of training

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    A novel model to explain dietary factors affecting hypocalcaemia in dairy cattle

    Get PDF
    Most dairy cows exhibit different degrees of hypocalcaemia around calving because the gestational Ca requirements shift to the disproportionately high Ca requirements of lactation. Ca homeostasis is a robust system that effectively adapts to changes in Ca demand or supply. However, these adaptations often are not rapid enough to avoid hypocalcaemia. A delay in the reconfiguration of intestinal Ca absorption and bone resorption is probably the underlying cause of this transient hypocalcaemia. Several dietary factors that affect different aspects of Ca metabolism are known to reduce the incidence of milk fever. The present review describes the interactions between nutrition and Ca homeostasis using observations from cattle and extrapolations from other species and aims to quantitatively model the effects of the nutritional approaches that are used to induce dry cows into an early adaptation of Ca metabolism. The present model suggests that reducing dietary cation–anion difference (DCAD) increases Ca clearance from the blood by dietary induction of systemic acidosis, which results in hypercalciuria due to the loss of function of the renal Ca transient receptor potential vanilloid channel TRPV5. Alternatively, reducing the gastrointestinal availability of Ca by reducing dietary Ca or its nutritional availability will also induce the activation of Ca metabolism to compensate for basal blood Ca clearance. Our model of gastrointestinal Ca availability as well as blood Ca clearance in the transition dairy cow allowed us to conclude that the most common dietary strategies for milk fever prevention may have analogous modes of action that are based on the principle of metabolic adaptation before calving

    PHARMACODYNAMICS STUDY OF ETHANOL EXTRACT OF CYCLEA BARBATA (MIERS.) LEAVES ON SRF AND COX-2 GASTRIC MICE WITH NSAID GASTROPATHY

    Get PDF
    Epidemiology of NSAIDs gastropathy is increasing as increase number of usage. From arthritis to cardiovascular events and cancer prevention, the versatility of NSAIDs is not questioned. However, no dose of NSAIDs is safe. No matter low dose, or single use, NSAIDs will cause gastric damage upto 3-7 days after use. In inflammation and healing process of gastropathy there are various proteins involved, but treatment with COX-2 and SRF are associated with an immediate healing and better quality of gastric mucosa. Cyclea barbata (miers.) has been declared as functional food for preventing and treatment gastropathy yet, its mechanism of actions have not yet clearly discovered. Hence the aim of this study is to analyze the effects of Cyclea barbata (miers.) ethanol extract to COX-2 and SRF in gastric tissue, in time series basis. Laboratory mice was induced with aspirin to produce gastropathy and then treated with Cyclea barbata (miers.) extract for 1, 3, 7, 10 or 14 days. Gastric tissue then harvested and analysed with elisa procedure to determine tissue SRF and COX-2 level. Treatment was proven to increase COX-2 and SRF higher than control group. This concludes one of Cyclea barbata (miers.) mechanism for NSAIDs gastropathy is by increasing tissue COX-2 and SRF.

    The assessment of usability of electronic shopping: A heuristic evaluation

    Get PDF
    Today there are thousands of electronic shops accessible via the Web. Some provide user-friendly features whilst others seem not to consider usability factors at all. Yet, it is critical that the electronic shopping interface is user-friendly so as to help users to obtain their desired results. This study applied heuristic evaluation to examine the usability of current electronic shopping. In particular, it focused on four UK-based supermarkets offering electronic services: including ASDA, Iceland, Sainsbury, and Tesco. The evaluation consists of two stages: a free-flow inspection and a task-based inspection. The results indicate that the most significant and common usability problems have been found to lie within the areas of ‘User Control and Freedom’ and ‘Help and Documentation’. The findings of this study are applied to develop a set of usability guidelines to support the future design of effective interfaces for electronic shopping
    corecore