315 research outputs found

    Human Rights Approach to Environment Protection: An Appraisal of Bangladesh

    Get PDF
    The need for effective protection of the global environment is nowadays incident. National and international communities search for instruments as effective as potential to stop or rather slow the destruction of the environment. While the predominant human rights approaches to environmental protection are currently based on public regulation by imposing duties, there have been a new human rights approach emerging based on each individual’s right to a certain quality of environment, which supposes connections between environmental protection and human rights. The well-established national and international systems of human rights guarantees have been increasingly used as an effective instrument for environmental protection. The purpose of this article is to introduce current National and International approaches to the links between human rights and environmental protection and examine how these human rights approaches are applied in the Bangladesh. Keywords: Right to a healthy and sound environment, human rights, protection, Legislation.

    The Use of an enzyme-linked immunosorbent assay (Elisa) for the determination and characterization of antiendotoxin antibodies.

    Get PDF
    Thesis (MMedSc.)-University of Natal, Durban, 1984.Recent clinical studies have highlighted the effectiveness of immunotherapy for Gram-negative bacteraemia in humans. Studies in America, undertaken on patients with Gram-negative bacteraemia, have shown that mortality was reduced by virtually 50% in patients who received specific antiendotoxin antiserum. In India, mortality from pseudomonas septicaemia was significantly reduced by the administration of small quantities of a anti-pseudomonas immunoglobulin. The antibodies in those studies were raised by vaccination of healthy volunteers with heat-killed Gram-negative bacteria or vaccines containing endotoxin. Adverse side effects in volunteers as well as logistic and legal problems make it difficult to produce antiserum on a large scale, in this manner. In Israel, S.L. Gaffin and coworkers found that approximately 7% of plasma units in a blood bank had antiendotoxin antibody concentrations of 40 ).1g/m1 or greater. This high titre human plasma significantly protected cats from lethal endotoxic shock secondary to haemorrhage. The immunoprecipitin technique used by them to measure antiendotoxin antibody concentrations was unsuitable for screening large numbers of blood samples. To overcome this problem we have devised an enzyme-linked imounosorbent assay (ELISA) for determining the level of antiendotoxin immunoglobulin G in human plasma. The assay, which is suitable for large scale use, was found to be specific for antiendotoxin antibodies. It was calibrated using a serum sample of specific antibody concentration as determined by an ilununoprecipitin assay. Serum samples found to be high in antiendotoxin titres (> 40_ug/m1) were tested for their specificity towards endotoxins from 12 bacterial iv strains and species. While each sample was found to have its own characteristic specificities, most were found to react strongly with Sh. flexneri, S. typhimurium and S. enteritidis. The Natal Blood Transfusion Service has found that in Natal, blood units containing high concentrations of specific antibodies occur with a frequency of 3,6% among all White donors and 10,35% among all African donors. They found that African females, in turn, had almost twice the frequency of high titre serum as African males. In this study, Indian female hospital patients did not have a statistically higher frequency of high-titre serum than Indian male patients. Blood units donated to the Natal Blood Transfusion Service are now routinely screened by ELISA for antiendotoxin antibodies and those units with high concentrations (> 40 ug/ml) of antibody were pooled and fractionated to obtain a gamma globulin, Lot LG-l. The binding capacity of the LG-1 antibodies towards 12 endotoxins was examined. Binding was found to be highest with endotoxin from Sh. flexneri, S. abortus equi and S. typhimurium and intermediate with S. enteritidis and E.coli 026:B6. Binding with the other endotoxins tested was relatively low. Differential absorption experiments showed that LG-1 was made up of a mixture of cross-reacting as well as specific antibodies For example, the antibodies binding Sh. flexneri endotoxin were mainly specific. Those binding E. coli 026:B6 endotoxin were specific and cross-reacting in almost equal proportions. Antibodies to the endotoxins from the salmonella strains tested were mainly cross-reacting. The specificities of the LG-1 antibodies towards endotoxins from the various Gram-negative bacteria did not in most cases reflect the incidence of these organisms in blood cultures taken from hospital patients. V The activity of LG-1 antibodies was compared to that of normal human immunoglobulin preparations obtained from the National Blood Fractionation Centre, Pinetown and to an anti-pseudomonas immunoglobulin prepared by Wellcome Laboratories, England. The binding capacity of the antibodies in the standard globulin preparations towards most of the endotoxins tested was less than 15% of that of the LG-1 antibodies. The anti-pseudomonas immunoglobulin was shown to bind poorly to most of the endotoxins tested in comparison with binding by LG-1 antibodies

    A comparative study of neocortical development between humans and great apes

    Get PDF
    The neocortex is the most recently evolved part of the mammalian brain which is involved in a repertoire of higher order brain functions, including those that separate humans from other animals. Humans have evolved an expanded neocortex over the course of evolution through a massive increase in neuron number (compared to our close relatives-­‐‑ the chimpanzees) in spite of sharing similar gestation time frames. So what do humans do differently compared to chimpanzees within the same time frame during their development? This dissertation addresses this question by comparing the developmental progression of neurogenesis between humans and chimpanzees using cerebral organoids as the model system. The usage of cerebral organoids, has enabled us to compare the development of both the human neocortex, and the chimpanzee neocortex from the very initiation of the neural phase of embryogenesis until very long periods of time. The results obtained so far suggest that the genetic programs underlying the development of the chimpanzee neocortex and the human neocortex are not very different, but rather the difference lies in the timing of the developmental progression. These results show that the chimpanzee neocortex spends lesser time in its proliferation phase, and allots lesser time to the generation of its neurons than the human neocortex. In more scientific terms, the neurogenic phase of the neocortex is shorter in chimpanzees than it is in humans. This conclusion is supported by (1) an earlier onset of gliogenesis in chimpanzees compared to humans which is indicative of a declining neurogenic phase, (2) an earlier increase in the chimpanzee neurogenic progenitors during development, compared to humans, (3) a higher number of stem cell– like progenitors in human cortices compared to chimpanzees, (4) a decline in neurogenic areas within the chimpanzee cerebral organoids over time compared to human cerebral organoids

    Quality evaluation of commercially available instant mango drinks powder in local market of Bangladesh

    Get PDF
    The upward trend of consumption of processed food must not dim the demand of taking healthy and safe food among population. Thus, six popular commercial brands of instant mango drinks powder of Bangladesh were targeted to investigate some quality parameters (proximate compositions, mineral contents and bioactive compounds). Mineral contents and bioactive compounds of instant mango drinks powder were determined by using biochemical analyzer and UV-visible spectrophotometer, respectively. Results of proximate analysis showed that moisture content, ash content, fiber content, and carbohydrate content of different brands of instant mango drinks powder ranged from 0.21 to 0.25%, 0.45 to 0.55%, 0.10 to 0.40%, and 98.83 to 99.21%, respectively, whereas energy value ranged from 395.32 to 396.84 Kcal/100g. Sodium, potassium, calcium, chloride, phosphorus, iron and vitamin-C were also determined, which showed the significant different (p<0.05) values among different brands. Total anthocyanin content (TAC), Total flavonoid content (TFC), Total phenolic content (TPC), Antioxidant capacity were determined as bioactive compounds. Results of bioactive compounds analysis also showed that the samples were significantly different (p<0.05). Although, the quality varied from brand to brand, but all the samples could be good source of vitamin-C, carbohydrate and energy. Furthermore, health concerning issues can be improved by focusing the bioactive compounds of commercially available instant drinks powder. Int. J. Agril. Res. Innov. Tech. 10(2): 54-58, December 202

    BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems

    Full text link
    Although experience sharing (ES) accelerates multiagent reinforcement learning (MARL) in an advisor-advisee framework, attempts to apply ES to decentralized multiagent systems have so far relied on trusted environments and overlooked the possibility of adversarial manipulation and inference. Nevertheless, in a real-world setting, some Byzantine attackers, disguised as advisors, may provide false advice to the advisee and catastrophically degrade the overall learning performance. Also, an inference attacker, disguised as an advisee, may conduct several queries to infer the advisors' private information and make the entire ES process questionable in terms of privacy leakage. To address and tackle these issues, we propose a novel MARL framework (BRNES) that heuristically selects a dynamic neighbor zone for each advisee at each learning step and adopts a weighted experience aggregation technique to reduce Byzantine attack impact. Furthermore, to keep the agent's private information safe from adversarial inference attacks, we leverage the local differential privacy (LDP)-induced noise during the ES process. Our experiments show that our framework outperforms the state-of-the-art in terms of the steps to goal, obtained reward, and time to goal metrics. Particularly, our evaluation shows that the proposed framework is 8.32x faster than the current non-private frameworks and 1.41x faster than the private frameworks in an adversarial setting.Comment: 8 pages, 6 figures, 3 tables, Accepted for publication in the proceeding of The 2023 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2023), Oct 01-05, 2023, Detroit, Michigan, US

    Privacy preserving recommender systems

    Get PDF
    The recommender systems help users find suitable and interesting products and contents from the huge amount of information that are available in the internet. There are various types of recommender systems available which have been providing recommendation services to users. For example Collaborative Filtering (CF) based recommendations, Content based (CB) recommendations, context aware recommendations and so on. Despite the fact that these recommender systems are very useful to solve the information overload problem by filtering interesting information, they suffer from huge privacy issues. In order to generate user personalized recommendations, the recommendation service providers need to acquire the information related to attributes, preferences, experiences as well as demands, which are related to users' confidential information. Usually the more information available to the service providers, the more accurate recommendations can be generated. However, the service providers are not always trustworthy to share personal information for recommendation purposes since they may cause serious privacy threats to users' privacy by leaking them to other parties or providing false recommendations. Therefore the user information must be protected prior to share them to any third party service provider to ensure the privacy of users. To overcome the privacy issues of recommender systems several techniques have been proposed which can be categorized into decentralization, randomization and secure computations based approaches. In decentralization based approach, the central service providers are removed and the main controls of recommendation services are given to participant users. The main issue with this kind of approach is that to generate recommendations, the users need to be dependant to other users' availability in online services. If any user becomes offline, her information can not be used in the system. The randomization based techniques add noises to users data to obfuscate them from learning the true information. However the main issue is that adding noise affects recommendation accuracy. On the contrary, the secure computations preserve user information while providing accurate recommendations. In this thesis we preserve user privacy by means of encrypting user information, specifically their ratings and other related information using homomorphic encryption based techniques to provide recommendations based on the encrypted data. The main advantage of homomorphic encryption based technique is that it is semantically secure and computationally it is hard to distinguish the true information from the given ciphertext. Using the homomorphic based encryption tools and techniques we build different privacy preserving protocols for different types of recommendation approaches by analyzing their privacy requirements and challenges. More specifically, we focus on different key recommendation techniques and differentiate them into centralized and partitioned dataset based recommendation techniques. From available recommendation techniques, we found that some of the existing and popular recommendation techniques like user based recommendation, item based recommendation and context aware recommendation can be grouped into centralized recommendation approach. In partitioned dataset based recommendation, the user information can be partitioned into different organizations and these organizations can collaborate with each other by gathering sufficient information in order to provide accurate recommendations without revealing their own confidential information. After categorizing the recommendation techniques we analyze the problems and requirements in terms of privacy preservation. Then for each type of recommendation approach, we develop the privacy preserving protocols to generate recommendations taking their specific privacy requirements and challenges into consideration. We also investigate the problems and limitations of existing privacy preserving recommendations and found that the current solutions suffer from huge computation and communication overhead as well as privacy of users. In the thesis we identify the related problems and solve the issues using our proposed privacy preserving protocols. As an overall idea, our proposed recommendation protocols work as follows. The users encrypt their ratings using homomorphic encryption and send them to service providers. We assume the service providers are semi honest but curious, they follow the protocol but at the same time try to find new information from the available data. The service provider has the ability to perform homomorphic operations and it performs certain computations over encrypted data without learning any true information and returns the results to the query users who ask for recommendations. The system models of our privacy preserving protocols for different recommendation techniques differ from each other because of their different privacy requirements. The proposed privacy preserving protocols are tested on various real world datasets. Based on the application areas of different recommendation approaches our gathered datasets are also different such as movie rating, social network, checkin information for different locations and quality of service of web services. For each proposed privacy preserving protocols we also present the privacy analysis and describe how the system can perform the computations without leaking the private information of users. The experimental and privacy analysis of our proposed privacy preserving protocols for different types of recommendation techniques show that they are private as well as practical

    A 32-year-old male with pain and discomfort during biting

    Get PDF
    This article has no abstract. The first 100 words appear below: A 32-year-old male patient reported to the Department of Conservative Dentistry and Endodontics, Military Dental Center, Dhaka with the complaints of mild to moderate pain and discomfort during eating in his upper left posterior region. His medical history was non-contributory. On extra oral examination, no abnormality was detected. On intraoral examination, clinically there was a dislodged restoration involving the upper left first molar tooth. On vitality test, the offending tooth showed no response to heat or cold. On percussion, ten-derness and dull percussion note were present. There was no mobility of the associated tooth
    corecore