875 research outputs found

    UNDERSTANDING COVID-19 RELATED HEALTH LITERACY SKILLS AND COMPETENCIES AMONG THE WORKING LIS PROFESSIONALS IN DR. ZAKIR HUSAIN CENTRAL LIBRARY, JAMIA MILLIA ISLAMIA: A STUDY

    Get PDF
    Health literacy has become an integral component of human life, and it plays a significant role in ensuring safety from a variety of deadly diseases. India\u27s health literacy rate is below average when compared to other countries. Since the Covid-19 pandemic, doctors and volunteers from all over the world have been striving to promote health literacy to raise public awareness through various media. Given the foregoing, the main objective of this study is to identify the level of Covid-19 related health literacy among working LIS professionals at Jamia Millia Islamia\u27s Dr.Zakir Husain Central Library. The survey approach is being used in this study\u27s methodology. For ease of understanding, a well-structured questionnaire was created in both Hindi and English. A total of 54 questionnaires were distributed, with 40 completed questionnaires received. The key findings demonstrate that 100% of LIS professionals are aware of health literacy, and that the most common source of health information is family/friends 23(57.5%), followed by doctors 19 (47.5%). Electronic media (short clip videos provided by health organisations) is the most favoured medium for obtaining health-related information, i.e. 38. (95%). Furthermore, respondents are well-versed on COVID-19 transmission mechanisms; yet, respondents\u27 difficulties in obtaining health information are attributed to a lack of understanding of health literacy sources. Another significant finding from the study is that 100% of respondents believe that libraries can play an essential role in improving health literacy among academic community. The entire work is based on original research and serves as a resource for other scholars working in the same field

    Absorption on horizon-wrapped branes

    Full text link
    We compute the absorption cross section of space-time scalars on a static D2 rane, in global coordinates, wrapped on the S^2 of an AdS_2 X S^2 X CY_3 geometry. We discuss its relevance for the construction of the dual quantum mechanics of Calabi-Yau black holes.Comment: 18 pages, 2 figure

    ANOMALY BASED DETECTION AND PREVENTION TO PROVIDE SECURE MANET USING DUAL HEAD CLUSTER IN HIERARCHICAL COOPERATIVE IDS

    Get PDF
    ABSTRACT A purely wireless network wherein each device itself acts as a node and also performs the task of router is called as Mobile Ad-hoc network. A MANET has become a need of today's fastest developing era. A measure issue in MANET is security as it is an autonomous system of nodes which has no fixed infrastructure and also, due to continuous movement of mobile nodes it has dynamic topology so it is difficult to maintain security. In our proposed system a cluster with dual head will be used in cooperative IDS for anomaly detection system .Two head nodes will be protecting each other from intrusion along with detecting intrusion for cluster member. This intrusion can be detected by signature analysis or anomaly based detection. Anomaly based detection will detect intrusion by monitoring the whole system activities. Our proposed system will also find attacks which are new and which were not possible to detect by using signature analysis. Proposed system will be able to detect the anomaly behaviour of the attacks like black hole, Dos and flood anomaly. As a result of our research work a stable, secure network will get formed

    Implementation of Bootstrap ARIMA Method to Forecasting Gross Domestic Products (GDP)

    Get PDF
    This study examines the application of bootstrap ARIMA method to forecasting the GDP of West Sulawesi Province. GDP data is time series data so to predict GDP of West Sulawesi Province for some future period used time series analysis technique. One method often used in time series modeling in forecasting data is ARIMA Box-Jenkins. A nonparametric approach that is free of assumptions, one of which is the bootstrap method. The bootstrap method is a computer-based method that is very potential to be used on accuracy problems where the method is based on data simulations for statistical inference purposes. From result of research obtained that model of GDP data is ARIMA Bootstrap (0,2,1)

    Double dermal sinuses: a case study

    Get PDF
    <p>Abstract</p> <p>Introduction</p> <p>Dermal sinus tracts are rare congenital lesions located in the midline characterized by a cutaneous pit or dimple. They occur all along the midline neuroaxis, from the nasion and occipital area down to the lumbar and sacral regions, most frequently in the lumbar and lumbosacral region.</p> <p>Case presentation</p> <p>Here we report a 5-year-old girl who presented with occasional headache. There were two dimples, one on the dorsal aspect of her head and another on her neck.</p> <p>Conclusion</p> <p>Dermal sinuses are almost always singular and the co-existence of double dermal sinuses has not been reported previously.</p

    Preserving Chain-of-Evidence in Surveillance Videos for Authentication and Trust-Enabled Sharing

    Get PDF
    Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become a piece of evidence until proven to be unaltered. Similarly, video sharing from closed-circuit television video recording or in social media interaction requires self-authentication for responsible and reliable data sharing. This article presents a computationally inexpensive method of preserving a chain-of-evidence in surveillance videos by means of hashing and steganography. The method conforms to the data protection regulations, which are increasingly adopted by governments, and is applicable to network edge storage. Encryption keys are stored in a hardware wallet independently of the video capture device itself, while evidential information is stored steganographically within video frames themselves, independently of the content. Added protection is provided by hiding information within the two least-valued of pixel bitplanes, using a newly introduced technique that randomizes the pixel storage locations on a per video frame and video-capture device basis. Overall, the proposed method has turned out to not only preserve the integrity of stored video data but also results in minimal degradation of the video data resulting from steganography. Despite the inclusion of hidden information, video frames will still be available for common image-processing tasks such as tracking and classification, as their objective video quality is almost unchanged

    MuLViS: Multi-Level Encryption Based Security System for Surveillance Videos

    Get PDF
    Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, which must be privacy protected, sometimes along with the locations of the surveillance and other sensitive information. Within the Surveillance System, these videos are processed and stored on a variety of devices. The processing and storage heterogeneity of those devices, together with their network requirements, make real-time surveillance systems complex and challenging. This paper proposes a surveillance system, named as Multi-Level Video Security (MuLViS) for privacy-protected cameras. Firstly, a Smart Surveillance Security Ontology (SSSO) is integrated within the MuLViS, with the aim of autonomously selecting the privacy level matching the operating device's hardware specifications and network capabilities. Overall, along with its device-specific security, the system leads to relatively fast indexing and retrieval of surveillance video. Secondly, information within the videos are protected at the times of capturing, streaming, and storage by means of differing encryption levels. An extensive evaluation of the system, through visual inspection and statistical analysis of experimental video results, such as by the Encryption Space Ratio (ESR), has demonstrated the aptness of the security level assignments. The system is suitable for surveillance footage protection, which can be made General Data Protection Regulation (GDPR) compliant, ensuring that lawful data access respects individuals' privacy rights

    Entomopathogenic Fungus as a Biological Control for an Important Vector of Livestock Disease: The Culicoides Biting Midge

    Get PDF
    BACKGROUND: The recent outbreak of bluetongue virus in northern Europe has led to an urgent need to identify control measures for the Culicoides (Diptera: Ceratopogonidae) biting midges that transmit it. Following successful use of the entomopathogenic fungus Metarhizium anisopliae against larval stages of biting midge Culicoides nubeculosus Meigen, we investigated the efficacy of this strain and other fungi (Beauveria bassiana, Isaria fumosorosea and Lecanicillium longisporum) as biocontrol agents against adult C. nubeculosus in laboratory and greenhouse studies. METHODOLOGY/FINDINGS: Exposure of midges to 'dry' conidia of all fungal isolates caused significant reductions in survival compared to untreated controls. Metarhizium anisopliae strain V275 was the most virulent, causing a significantly decrease in midge survival compared to all other fungal strains tested. The LT(50) value for strain V275 was 1.42 days compared to 2.21-3.22 days for the other isolates. The virulence of this strain was then further evaluated by exposing C. nubeculosus to varying doses (10(8)-10(11) conidia m(-2)) using different substrates (horse manure, damp peat, leaf litter) as a resting site. All exposed adults were found to be infected with the strain V275 four days after exposure. A further study exposed C. nubeculosus adults to 'dry' conidia and 'wet' conidia (conidia suspended in 0.03% aq. Tween 80) of strain V275 applied to damp peat and leaf litter in cages within a greenhouse. 'Dry' conidia were more effective than 'wet' conidia, causing 100% mortality after 5 days. CONCLUSION/SIGNIFICANCE: This is the first study to demonstrate that entomopathogenic fungi are potential biocontrol agents against adult Culicoides, through the application of 'dry' conidia on surfaces (e.g., manure, leaf litter, livestock) where the midges tend to rest. Subsequent conidial transmission between males and females may cause an increased level of fungi-induced mortality in midges thus reducing the incidence of disease
    • …
    corecore