CINXE.COM

Search results for: Yuval Shahar

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Yuval Shahar</title> <meta name="description" content="Search results for: Yuval Shahar"> <meta name="keywords" content="Yuval Shahar"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Yuval Shahar" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Yuval Shahar"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 16</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Yuval Shahar</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nir%20Nissim">Nir Nissim</a>, <a href="https://publications.waset.org/abstracts/search?q=Erez%20Shalom"> Erez Shalom</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomer%20Lancewiki"> Tomer Lancewiki</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Elovici"> Yuval Elovici</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Shahar"> Yuval Shahar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=medical%20device" title="medical device">medical device</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/50731/cyber-med-practical-detection-methodology-of-cyber-attacks-aimed-at-medical-devices-eco-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50731.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Reducing Stigma and Discrimination among Islamic Religious Officers Towards People Living with HIV/AIDS in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hazlin%20Kadir%20Shahar">Hazlin Kadir Shahar</a>, <a href="https://publications.waset.org/abstracts/search?q=Razaleigh%20Muhamat%20Kawangit"> Razaleigh Muhamat Kawangit</a>, <a href="https://publications.waset.org/abstracts/search?q=Badlihisham%20%20Mohd%20Nasir"> Badlihisham Mohd Nasir</a>, <a href="https://publications.waset.org/abstracts/search?q=Rosmawati%20Mohamad%20Rasit"> Rosmawati Mohamad Rasit </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Stigma and discrimination have become the main topic of discussion when dealing with HIV/AIDS issues. They affect the daily life of People Living With HIV(PLHIV), families, friends and people around them indirectly. This paper discusses the potential measurement in helping to reduce stigma and discrimination existence among Islamic Religious Officers towards PLHIV in Malaysia. These people have been trained with special programmes to tackle the HIV/AIDS issues by using a manual, namely as ‘The Manual of Islam and HIV/AIDS’, specifically designed by the Islamic Development Department of Malaysia (JAKIM). The objectives of the training programmes are to give the accurate information about HIV/AIDS and to suggest ways on how to handle the PLHIV issues in Islamic perspective. This research used quantitative methodology by survey. A pilot test had been done over thirty (30) trained Islamic Religious Officers in Malaysia. The findings have shown that the trainings have given a positive impact for them as they managed to acquire the knowledge of HIV/AIDS from both primer and authorized sources such as medical practitioners, Muslim chaplains and social workers. The knowledge they have acquired from the trainings has guided them in changing their perception, thus helping to reduce their own stigma and discrimination towards PLHIV. The training programmes have given them opportunities to practice what they have learned through several outreach sessions as they have had the opportunities to approach PLHIV directly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20religious%20officers" title="Islamic religious officers">Islamic religious officers</a>, <a href="https://publications.waset.org/abstracts/search?q=people%20with%20HIV" title=" people with HIV"> people with HIV</a>, <a href="https://publications.waset.org/abstracts/search?q=stigma%20and%20discrimination" title=" stigma and discrimination"> stigma and discrimination</a>, <a href="https://publications.waset.org/abstracts/search?q=training%20programmes" title=" training programmes"> training programmes</a> </p> <a href="https://publications.waset.org/abstracts/20028/reducing-stigma-and-discrimination-among-islamic-religious-officers-towards-people-living-with-hivaids-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20028.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Whole Coding Genome Inter-Clade Comparison to Predict Global Cancer-Protecting Variants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lamis%20Naddaf">Lamis Naddaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Tabach"> Yuval Tabach</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this research, we identified the missense genetic variants that have the potential to enhance resistance against cancer. Such field has not been widely explored, as researchers tend to investigate mutations that cause diseases, in response to the suffering of patients, rather than those mutations that protect from them. In conjunction with the genomic revolution, and the advances in genetic engineering and synthetic biology, identifying the protective variants will increase the power of genotype-phenotype predictions and can have significant implications on improved risk estimation, diagnostics, prognosis and even for personalized therapy and drug discovery. To approach our goal, we systematically investigated the sites of the coding genomes and picked up the alleles that showed a correlation with the species’ cancer resistance. We predicted 250 protecting variants (PVs) with a 0.01 false discovery rate and more than 20 thousand PVs with a 0.25 false discovery rate. Cancer resistance in Mammals and reptiles was significantly predicted by the number of PVs a species has. Moreover, Genes enriched with the protecting variants are enriched in pathways relevant to tumor suppression like pathways of Hedgehog signaling and silencing, which its improper activation is associated with the most common form of cancer malignancy. We also showed that the PVs are more abundant in healthy people compared to cancer patients within different human races. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=comparative%20genomics" title="comparative genomics">comparative genomics</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer%20resistance" title=" cancer resistance"> cancer resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer-protecting%20alleles" title="cancer-protecting alleles">cancer-protecting alleles</a> </p> <a href="https://publications.waset.org/abstracts/150807/whole-coding-genome-inter-clade-comparison-to-predict-global-cancer-protecting-variants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150807.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> Whole Coding Genome Inter-Clade Comparisons to Predict Global Cancer-Protecting Variants</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lamis%20Naddaf">Lamis Naddaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Tabach"> Yuval Tabach</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We identified missense genetic variants with the potential to enhance resistance against cancer. Such a field has not been widely explored as researchers tend to investigate the mutations that cause diseases, in response to the suffering of patients, rather than those mutations that protect from them. In conjunction with the genomic revolution and the advances in genetic engineering and synthetic biology, identifying the protective variants will increase the power of genotype-phenotype predictions and have significant implications for improved risk estimation, diagnostics, prognosis, and even personalized therapy and drug discovery. To approach our goal, we systematically investigated the sites of the coding genomes and selected the alleles that showed a correlation with the species’ cancer resistance. Interestingly, we found several amino acids that are more generally preferred (like the Proline) or avoided (like the Cysteine) by the resistant species. Furthermore, Cancer resistance in mammals and reptiles is significantly predicted by the number of the predicted protecting variants (PVs) a species has. Moreover, PVs-enriched-genes are enriched in pathways relevant to tumor suppression. For example, they are enriched in the Hedgehog signaling and silencing pathways, which its improper activation is associated with the most common form of cancer malignancy. We also showed that the PVs are mostly more abundant in healthy people compared to cancer patients within different human races. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cancer%20resistance" title="cancer resistance">cancer resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=protecting%20variant" title=" protecting variant"> protecting variant</a>, <a href="https://publications.waset.org/abstracts/search?q=naked%20mole%20rat" title=" naked mole rat"> naked mole rat</a>, <a href="https://publications.waset.org/abstracts/search?q=comparative%20genomics" title=" comparative genomics"> comparative genomics</a> </p> <a href="https://publications.waset.org/abstracts/158145/whole-coding-genome-inter-clade-comparisons-to-predict-global-cancer-protecting-variants" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158145.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">111</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Parvi̇z Jabrail&#039;s Novel &#039;in Foreign Language&#039;: Delimitation of Postmodernism with Modernism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nargiz%20Ismayilova">Nargiz Ismayilova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The issue of modernism and the concept of postmodernism has been the focus of world researchers for many years, and there are very few researchers who have come to a common denominator about this term. During the independence period, the expansion of the relations of Azerbaijani literature with the world has led to the spread of many currents and tendencies formed in the West to the literary environment in our country. In this context, the works created in our environment are distinguished by their extreme richness in terms of subject matter and diversity in terms of genre. As an interesting example of contemporary postmodern prose in Azerbaijan, Parviz Jabrayil's novel "In a Foreign Language" pays attention with its more different plotline. The disagreement exists among the critics about the novel. Some are looking for high artistry in work; others are satisfied with the elements of postmodernism in work. Delimitation of the border between modernism and postmodernism can serve to carry out a deep scientific study of the novel. The novel depicts the world in the author's consciousness against the background of water shortage (thirst) in the Old City (Icharishahar). The author deconstructs today's Ichari Shahar mould. Along with modernism, elements of postmodernism occupy a large place in the work. When we look at the general tendencies of postmodernist art, we see that science and individuality are questioned, criticizing the sharp boundaries of modernism and the negativity of these restrictions, and modernism offers alternatives to artistic production by identifying its negatives and shortcomings in the areas of artistic freedom. The novel is extremely interesting in this point of view. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=concept%20of%20postmodernism" title="concept of postmodernism">concept of postmodernism</a>, <a href="https://publications.waset.org/abstracts/search?q=modernism" title=" modernism"> modernism</a>, <a href="https://publications.waset.org/abstracts/search?q=delimitation" title=" delimitation"> delimitation</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20postmodernism" title=" political postmodernism"> political postmodernism</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20postmodern%20prose" title=" modern postmodern prose"> modern postmodern prose</a>, <a href="https://publications.waset.org/abstracts/search?q=Azerbaijani%20literature" title=" Azerbaijani literature"> Azerbaijani literature</a>, <a href="https://publications.waset.org/abstracts/search?q=novel" title=" novel"> novel</a>, <a href="https://publications.waset.org/abstracts/search?q=comparison" title=" comparison"> comparison</a>, <a href="https://publications.waset.org/abstracts/search?q=world%20literature" title=" world literature"> world literature</a>, <a href="https://publications.waset.org/abstracts/search?q=analysis" title=" analysis"> analysis</a> </p> <a href="https://publications.waset.org/abstracts/129909/parviz-jabrails-novel-in-foreign-language-delimitation-of-postmodernism-with-modernism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129909.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11</span> Jewish Law in the State of Israel: Law, Religion and State</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Sinai">Yuval Sinai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As part of the historical, religious and cultural heritage of the Jewish people, Jewish law is part of the legal system in Israel, which is a Jewish and democratic state. The proper degree of use of Jewish law in judicial decisions is an issue that crops up in Israeli law from time to time. This was a burning question in the 1980s in the wake of the enactment of the Foundations of Law Act 1980, which declared Jewish heritage a supplementary legal method to Israeli law. The enactment of the Basic Law: Human Dignity and Liberty 1992, which decreed that the basic Israeli legal principles must be interpreted in light of the values of a Jewish and democratic state, marks a significant change in the impact of Judaism in the law created and applied by the courts. Both of these legislative developments revived the initiative to grant a central status to Jewish law within the state law. How should Jewish law be applied in Israel’s secular courts? This is not a simple question. It is not merely a question of identifying the relevant rule of Jewish law or tracing its development from the Talmud to modern times. Nor is it the same as asking how a rabbinic court would handle the issue. It is a matter of delicate judgment to distill out of the often conflicting Jewish law sources a rule that will fit into the existing framework of Israeli law so as to advance a policy that will best promote the interests of Israel’s society. We shall point out the occasional tensions between Jewish religious law and secular law, and introduce opinions as to how reconciliation of the two can best be achieved in light of Jewish legal tradition and in light of the reality in the modern State of Israel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=law%20and%20religion" title="law and religion">law and religion</a>, <a href="https://publications.waset.org/abstracts/search?q=israel" title=" israel"> israel</a>, <a href="https://publications.waset.org/abstracts/search?q=jewish%20law" title=" jewish law"> jewish law</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20and%20society" title=" law and society"> law and society</a> </p> <a href="https://publications.waset.org/abstracts/170182/jewish-law-in-the-state-of-israel-law-religion-and-state" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170182.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">10</span> The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Reinfeld">Yuval Reinfeld</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20privacy" title="digital privacy">digital privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a>, <a href="https://publications.waset.org/abstracts/search?q=European%20Union%20Law" title=" European Union Law"> European Union Law</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20normative%20power" title=" global normative power"> global normative power</a> </p> <a href="https://publications.waset.org/abstracts/191507/the-eus-role-in-exporting-digital-privacy-and-security-standards-a-legal-framework-for-global-normative-diffusion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">24</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9</span> Jewish Law in Israel: State, Law, and Religion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Sinai">Yuval Sinai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As part of the historical, religious and cultural heritage of the Jewish people, Jewish law is part of the legal system in Israel, which is a Jewish and democratic state. The proper degree of use of Jewish law in judicial decisions is an issue that crops up in Israeli law from time to time. This was a burning question in the 1980s in the wake of the enactment of the Foundations of Law Act 1980, which declared Jewish heritage a supplementary legal method to Israeli law. The enactment of the Basic Law: Human Dignity and Liberty 1992, which decreed that the basic Israeli legal principles must be interpreted in light of the values of a Jewish and democratic state, marks a significant change in the impact of Judaism in the law created and applied by the courts. Both of these legislative developments revived the initiative to grant a central status to Jewish law within the state law. How should Jewish law be applied in Israel’s secular courts? This is not a simple question. It is not merely a question of identifying the relevant rule of Jewish law or tracing its development from the Talmud to modern times. Nor is it the same as asking how a rabbinic court would handle the issue. It is a matter of delicate judgment to distill out of the often conflicting Jewish law sources a rule that will fit into the existing framework of Israeli law so as to advance a policy that will best promote the interests of Israel’s society. We shall point out the occasional tensions between Jewish religious law and secular law, and introduce opinions as to how reconciliation of the two can best be achieved in light of Jewish legal tradition and in light of the reality in the modern State of Israel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=law%20and%20politics" title="law and politics">law and politics</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20and%20religion" title=" law and religion"> law and religion</a>, <a href="https://publications.waset.org/abstracts/search?q=comparative%20law" title=" comparative law"> comparative law</a>, <a href="https://publications.waset.org/abstracts/search?q=law%20and%20society" title=" law and society"> law and society</a> </p> <a href="https://publications.waset.org/abstracts/170184/jewish-law-in-israel-state-law-and-religion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170184.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">73</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">8</span> Age and Gender Differences in Positive Solitude Preferences </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Ost%20Mor">Sharon Ost Mor</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Palgi"> Yuval Palgi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ddikla%20Segel-Karpas"> Ddikla Segel-Karpas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Solitude and positive solitude (PS) are used in literature interchangeably, yet they have different attributes and effects. While solitude might have devastating outcomes such as depression or health deterioration, PS has beneficial outcomes. Yet, both solitude and PS have no clear unanimous definition. Most researches focus on solitude, while the phenomenon of PS is somewhat neglected. Most research deals with young people and adults, while the current research is interested in PS concepts especially in old age. A qualitative study, with 124 participants was performed in order to understand the essence of PS in different age groups. The findings revealed seven categories related to PS, including: Quietness, religious and spiritual experience, escapism, experience in nature or abroad, controlling stress or thoughts, facilitation achievements and recreation-hobbies-routines. Moreover, three meta-themes emerged: PS is a matter of choice, it is meaningful and enjoyable. One stand alone category was found: PS preconditions. Differences between younger and older adults were found in several categories and in PS preconditions, while the meta-themes were equally mentioned by all participants. Based on the participant's reflections and descriptions a new PS paradigm was built and will be presented as well as a new definition of PS. PS was renamed as 'Soulitude' in order to emphasize its' positive nature. Conclusions: PS serves well most people, yet it has different attributes in different ages. By giving PS a unanimous definition and by understanding its' contribution for the elderly, PS might be addressed as a legitimate, stand alone phenomenon. The paradigm might serve theory as well as clinicians for further PS research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=old-old" title="old-old">old-old</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20solitude" title=" positive solitude"> positive solitude</a>, <a href="https://publications.waset.org/abstracts/search?q=solitude" title=" solitude"> solitude</a>, <a href="https://publications.waset.org/abstracts/search?q=soulitude" title=" soulitude"> soulitude</a> </p> <a href="https://publications.waset.org/abstracts/108699/age-and-gender-differences-in-positive-solitude-preferences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108699.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">7</span> Following the Modulation of Transcriptional Activity of Genes by Chromatin Modifications during the Cell Cycle in Living Cells</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Yunger">Sharon Yunger</a>, <a href="https://publications.waset.org/abstracts/search?q=Liat%20Altman"> Liat Altman</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Garini"> Yuval Garini</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaron%20Shav-Tal"> Yaron Shav-Tal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Understanding the dynamics of transcription in living cells has improved since the development of quantitative fluorescence-based imaging techniques. We established a method for following transcription from a single copy gene in living cells. A gene tagged with MS2 repeats, used for mRNA tagging, in its 3' UTR was integrated into a single genomic locus. The actively transcribing gene was detected and analyzed by fluorescence in situ hybridization (FISH) and live-cell imaging. Several cell clones were created that differed in the promoter regulating the gene. Thus, comparative analysis could be obtained without the risk of different position effects at each integration site. Cells in S/G2 phases could be detected exhibiting two adjacent transcription sites on sister chromatids. A sharp reduction in the transcription levels was observed as cells progressed along the cell cycle. We hypothesized that a change in chromatin structure acts as a general mechanism during the cell cycle leading to down-regulation in the activity of some genes. We addressed this question by treating the cells with chromatin decondensing agents. Quantifying and imaging the treated cells suggests that chromatin structure plays a role both in regulating transcriptional levels along the cell cycle, as well as in limiting an active gene from reaching its maximum transcription potential at any given time. These results contribute to understanding the role of chromatin as a regulator of gene expression. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cell%20cycle" title="cell cycle">cell cycle</a>, <a href="https://publications.waset.org/abstracts/search?q=living%20cells" title=" living cells"> living cells</a>, <a href="https://publications.waset.org/abstracts/search?q=nucleus" title=" nucleus"> nucleus</a>, <a href="https://publications.waset.org/abstracts/search?q=transcription" title=" transcription"> transcription</a> </p> <a href="https://publications.waset.org/abstracts/40812/following-the-modulation-of-transcriptional-activity-of-genes-by-chromatin-modifications-during-the-cell-cycle-in-living-cells" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40812.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6</span> Simulating Elevated Rapid Transit System for Performance Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ran%20Etgar">Ran Etgar</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Cohen"> Yuval Cohen</a>, <a href="https://publications.waset.org/abstracts/search?q=Erel%20Avineri"> Erel Avineri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the major challenges of transportation in medium sized inner-cities (such as Tel-Aviv) is the last-mile solution. Personal rapid transit (PRT) seems like an applicable candidate for this, as it combines the benefits of personal (car) travel with the operational benefits of transit. However, the investment required for large area PRT grid is significant and there is a need to economically justify such investment by correctly evaluating the grid capacity. PRT main elements are small automated vehicles (sometimes referred to as podcars) operating on a network of specially built guideways. The research is looking at a specific concept of elevated PRT system. Literature review has revealed the drawbacks PRT modelling and simulation approaches, mainly due to the lack of consideration of technical and operational features of the system (such as headways, acceleration, safety issues); the detailed design of infrastructure (guideways, stations, and docks); the stochastic and sessional characteristics of demand; and safety regulations – all of them have a strong effect on the system performance. A highly detailed model of the system, developed in this research, is applying a discrete event simulation combined with an agent-based approach, to represent the system elements and the podecars movement logic. Applying a case study approach, the simulation model is used to study the capacity of the system, the expected throughput of the system, the utilization, and the level of service (journey time, waiting time, etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=capacity" title="capacity">capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=productivity%20measurement" title=" productivity measurement"> productivity measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=PRT" title=" PRT"> PRT</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=transportation" title=" transportation"> transportation</a> </p> <a href="https://publications.waset.org/abstracts/108682/simulating-elevated-rapid-transit-system-for-performance-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108682.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5</span> Suggested Role for Neutrophil Extracellular Traps Formation in Ewing Sarcoma Immune Microenvironment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rachel%20Shukrun">Rachel Shukrun</a>, <a href="https://publications.waset.org/abstracts/search?q=Szilvia%20Baron"> Szilvia Baron</a>, <a href="https://publications.waset.org/abstracts/search?q=Victoria%20Fidel"> Victoria Fidel</a>, <a href="https://publications.waset.org/abstracts/search?q=Anna%20Shusterman"> Anna Shusterman</a>, <a href="https://publications.waset.org/abstracts/search?q=Osnat%20Sher"> Osnat Sher</a>, <a href="https://publications.waset.org/abstracts/search?q=Netanya%20Kollender"> Netanya Kollender</a>, <a href="https://publications.waset.org/abstracts/search?q=Dror%20Levin"> Dror Levin</a>, <a href="https://publications.waset.org/abstracts/search?q=Yair%20Peled"> Yair Peled</a>, <a href="https://publications.waset.org/abstracts/search?q=Yair%20Gortzak"> Yair Gortzak</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoav%20Ben-Shahar"> Yoav Ben-Shahar</a>, <a href="https://publications.waset.org/abstracts/search?q=Revital%20Caspi"> Revital Caspi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sagi%20Gordon"> Sagi Gordon</a>, <a href="https://publications.waset.org/abstracts/search?q=Michal%20Manisterski"> Michal Manisterski</a>, <a href="https://publications.waset.org/abstracts/search?q=Ronit%20Elhasid"> Ronit Elhasid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ewing sarcoma (EWS) is a highly aggressive cancer with a survival rate of 70–80% for patients with localized disease and under 30% for those with metastatic disease. Tumor-infiltrating neutrophils (TIN) can generate extracellular net-like DNA structures known as neutrophil extracellular traps (NETs). However, little is known about the presence and prognostic significance of tumor-infiltrating NETs in EWS. Herein, we investigated 46 patients diagnosed with EWS and treated in the Tel Aviv Medical Center between 2010 and 2021. TINs and NETs were identified in diagnostic biopsies of EWS by immunofluorescent. In addition, NETs were investigated in neutrophils isolated from peripheral blood samples of EWS patients at diagnosis and following neoadjuvant chemotherapy. The relationships between the presence of TINs and NETs, pathological and clinical features, and outcomes were analyzed. Our results demonstrate that TIN and NETs at diagnosis were higher in EWS patients with metastatic disease compared to those with local disease. High NETs formation at diagnosis predicted poor response to neo-adjuvant chemotherapy, relapse, and death from disease (P < .05). NETs formation in peripheral blood samples at diagnosis was significantly elevated among patients with EWS compared to pediatric controls and decreased significantly following neoadjuvant chemotherapy. In conclusion, NETs formation seems to have a role in the EWS immune microenvironment. Their presence can refine risk stratification, predict chemotherapy resistance and survival, and serve as a therapeutic target in patients with EWS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ewing%20sarcoma" title="Ewing sarcoma">Ewing sarcoma</a>, <a href="https://publications.waset.org/abstracts/search?q=tumor%20microenvironment" title=" tumor microenvironment"> tumor microenvironment</a>, <a href="https://publications.waset.org/abstracts/search?q=neutrophil" title=" neutrophil"> neutrophil</a>, <a href="https://publications.waset.org/abstracts/search?q=neutrophil%20extracellular%20traps%20%28NETs%29" title=" neutrophil extracellular traps (NETs)"> neutrophil extracellular traps (NETs)</a>, <a href="https://publications.waset.org/abstracts/search?q=prognosis" title=" prognosis"> prognosis</a> </p> <a href="https://publications.waset.org/abstracts/177507/suggested-role-for-neutrophil-extracellular-traps-formation-in-ewing-sarcoma-immune-microenvironment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">64</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">4</span> Developing an Intervention Program to Promote Healthy Eating in a Catering System Based on Qualitative Research Results</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20Katz-Shufan">O. Katz-Shufan</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Simon-Tuval"> T. Simon-Tuval</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Sabag"> L. Sabag</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Granek"> L. Granek</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20R.%20Shahar"> D. R. Shahar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Meals provided at catering systems are a common source of workers' nutrition and were found as contributing high amounts calories and fat. Thus, eating daily catering food can lead to overweight and chronic diseases. On the other hand, the institutional dining room may be an ideal environment for implementation of intervention programs that promote healthy eating. This may improve diners' lifestyle and reduce their prevalence of overweight, obesity and chronic diseases. The significance of this study is in developing an intervention program based on the diners’ dietary habits, preferences and their attitudes towards various intervention programs. In addition, a successful catering-based intervention program may have a significant effect simultaneously on a large group of diners, leading to improved nutrition, healthier lifestyle, and disease-prevention on a large scale. In order to develop the intervention program, we conducted a qualitative study. We interviewed 13 diners who eat regularly at catering systems, using a semi-structured interview. The interviews were recorded, transcribed and then analyzed by the thematic method, which identifies, analyzes and reports themes within the data. The interviews revealed several major themes, including expectation of diners to be provided with healthy food choices; their request for nutrition-expert involvement in planning the meals; the diners' feel that there is a conflict between sensory attractiveness of the food and its' nutritional quality. In the context of the catering-based intervention programs, the diners prefer scientific and clear messages focusing on labeling healthy dishes only, as opposed to the labeling of unhealthy dishes; they were interested in a nutritional education program to accompany the intervention program. Based on these findings, we have developed an intervention program that includes: changes in food served such as replacing several menu items and nutritional improvement of some of the recipes; as well as, environmental changes such as changing the location of some food items presented on the buffet, placing positive nutritional labels on healthy dishes and an ongoing healthy nutrition campaign, all accompanied by a nutrition education program. The intervention program is currently being tested for its impact on health outcomes and its cost-effectiveness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=catering%20system" title="catering system">catering system</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20services" title=" food services"> food services</a>, <a href="https://publications.waset.org/abstracts/search?q=intervention" title=" intervention"> intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=nutrition%20policy" title=" nutrition policy"> nutrition policy</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health" title=" public health"> public health</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20research" title=" qualitative research"> qualitative research</a> </p> <a href="https://publications.waset.org/abstracts/81662/developing-an-intervention-program-to-promote-healthy-eating-in-a-catering-system-based-on-qualitative-research-results" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81662.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3</span> Text Mining Past Medical History in Electrophysiological Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roni%20Ramon-Gonen">Roni Ramon-Gonen</a>, <a href="https://publications.waset.org/abstracts/search?q=Amir%20Dori"> Amir Dori</a>, <a href="https://publications.waset.org/abstracts/search?q=Shahar%20Shelly"> Shahar Shelly</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background and objectives: Healthcare professionals produce abundant textual information in their daily clinical practice. The extraction of insights from all the gathered information, mainly unstructured and lacking in normalization, is one of the major challenges in computational medicine. In this respect, text mining assembles different techniques to derive valuable insights from unstructured textual data, so it has led to being especially relevant in Medicine. Neurological patient’s history allows the clinician to define the patient’s symptoms and along with the result of the nerve conduction study (NCS) and electromyography (EMG) test, assists in formulating a differential diagnosis. Past medical history (PMH) helps to direct the latter. In this study, we aimed to identify relevant PMH, understand which PMHs are common among patients in the referral cohort and documented by the medical staff, and examine the differences by sex and age in a large cohort based on textual format notes. Methods: We retrospectively identified all patients with abnormal NCS between May 2016 to February 2022. Age, gender, and all NCS attributes reports were recorded, including the summary text. All patients’ histories were extracted from the text report by a query. Basic text cleansing and data preparation were performed, as well as lemmatization. Very popular words (like ‘left’ and ‘right’) were deleted. Several words were replaced with their abbreviations. A bag of words approach was used to perform the analyses. Different visualizations which are common in text analysis, were created to easily grasp the results. Results: We identified 5282 unique patients. Three thousand and five (57%) patients had documented PMH. Of which 60.4% (n=1817) were males. The total median age was 62 years (range 0.12 – 97.2 years), and the majority of patients (83%) presented after the age of forty years. The top two documented medical histories were diabetes mellitus (DM) and surgery. DM was observed in 16.3% of the patients, and surgery at 15.4%. Other frequent patient histories (among the top 20) were fracture, cancer (ca), motor vehicle accident (MVA), leg, lumbar, discopathy, back and carpal tunnel release (CTR). When separating the data by sex, we can see that DM and MVA are more frequent among males, while cancer and CTR are less frequent. On the other hand, the top medical history in females was surgery and, after that, DM. Other frequent histories among females are breast cancer, fractures, and CTR. In the younger population (ages 18 to 26), the frequent PMH were surgery, fractures, trauma, and MVA. Discussion: By applying text mining approaches to unstructured data, we were able to better understand which medical histories are more relevant in these circumstances and, in addition, gain additional insights regarding sex and age differences. These insights might help to collect epidemiological demographical data as well as raise new hypotheses. One limitation of this work is that each clinician might use different words or abbreviations to describe the same condition, and therefore using a coding system can be beneficial. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abnormal%20studies" title="abnormal studies">abnormal studies</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20analytics" title=" healthcare analytics"> healthcare analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20history" title=" medical history"> medical history</a>, <a href="https://publications.waset.org/abstracts/search?q=nerve%20conduction%20studies" title=" nerve conduction studies"> nerve conduction studies</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20mining" title=" text mining"> text mining</a>, <a href="https://publications.waset.org/abstracts/search?q=textual%20analysis" title=" textual analysis"> textual analysis</a> </p> <a href="https://publications.waset.org/abstracts/155947/text-mining-past-medical-history-in-electrophysiological-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155947.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2</span> USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nir%20Nissim">Nir Nissim</a>, <a href="https://publications.waset.org/abstracts/search?q=Ran%20Yahalom"> Ran Yahalom</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomer%20Lancewiki"> Tomer Lancewiki</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Elovici"> Yuval Elovici</a>, <a href="https://publications.waset.org/abstracts/search?q=Boaz%20Lerner"> Boaz Lerner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=USB" title="USB">USB</a>, <a href="https://publications.waset.org/abstracts/search?q=device" title=" device"> device</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/50734/usbware-a-trusted-and-multidisciplinary-framework-for-enhanced-detection-of-usb-based-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1</span> Toward Understanding the Glucocorticoid Receptor Network in Cancer </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Swati%20Srivastava">Swati Srivastava</a>, <a href="https://publications.waset.org/abstracts/search?q=Mattia%20Lauriola"> Mattia Lauriola</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Gilad"> Yuval Gilad</a>, <a href="https://publications.waset.org/abstracts/search?q=Adi%20Kimchi"> Adi Kimchi</a>, <a href="https://publications.waset.org/abstracts/search?q=Yosef%20Yarden"> Yosef Yarden</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The glucocorticoid receptor (GR) has been proposed to play important, but incompletely understood roles in cancer. Glucocorticoids (GCs) are widely used as co-medication of various carcinomas, due to their ability to reduce the toxicity of chemotherapy. Furthermore, GR antagonism has proven to be a strategy to treat triple negative breast cancer and castration-resistant prostate cancer. These observations suggest differential GR involvement in cancer subtypes. The goal of our study has been to elaborate the current understanding of GR signaling in tumor progression and metastasis. Our study involves two cellular models, non-tumorigenic breast epithelial cells (MCF10A) and Ewing sarcoma cells (CHLA9). In our breast cell model, the results indicated that the GR agonist dexamethasone inhibits EGF-induced mammary cell migration, and this effect was blocked when cells were stimulated with a GR antagonist, namely RU486. Microarray analysis for gene expression revealed that the mechanism underlying inhibition involves dexamenthasone-mediated repression of well-known activators of EGFR signaling, alongside with enhancement of several EGFR’s negative feedback loops. Because GR mainly acts primarily through composite response elements (GREs), or via a tethering mechanism, our next aim has been to find the transcription factors (TFs) which can interact with GR in MCF10A cells.The TF-binding motif overrepresented at the promoter of dexamethasone-regulated genes was predicted by using bioinformatics. To validate the prediction, we performed high-throughput Protein Complementation Assays (PCA). For this, we utilized the Gaussia Luciferase PCA strategy, which enabled analysis of protein-protein interactions between GR and predicted TFs of mammary cells. A library comprising both nuclear receptors (estrogen receptor, mineralocorticoid receptor, GR) and TFs was fused to fragments of GLuc, namely GLuc(1)-X, X-GLuc(1), and X-GLuc(2), where GLuc(1) and GLuc(2) correspond to the N-terminal and C-terminal fragments of the luciferase gene.The resulting library was screened, in human embryonic kidney 293T (HEK293T) cells, for all possible interactions between nuclear receptors and TFs. By screening all of the combinations between TFs and nuclear receptors, we identified several positive interactions, which were strengthened in response to dexamethasone and abolished in response to RU486. Furthermore, the interactions between GR and the candidate TFs were validated by co-immunoprecipitation in MCF10A and in CHLA9 cells. Currently, the roles played by the uncovered interactions are being evaluated in various cellular processes, such as cellular proliferation, migration, and invasion. In conclusion, our assay provides an unbiased network analysis between nuclear receptors and other TFs, which can lead to important insights into transcriptional regulation by nuclear receptors in various diseases, in this case of cancer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=epidermal%20growth%20factor" title="epidermal growth factor">epidermal growth factor</a>, <a href="https://publications.waset.org/abstracts/search?q=glucocorticoid%20receptor" title=" glucocorticoid receptor"> glucocorticoid receptor</a>, <a href="https://publications.waset.org/abstracts/search?q=protein%20complementation%20assay" title=" protein complementation assay"> protein complementation assay</a>, <a href="https://publications.waset.org/abstracts/search?q=transcription%20factor" title=" transcription factor"> transcription factor</a> </p> <a href="https://publications.waset.org/abstracts/56709/toward-understanding-the-glucocorticoid-receptor-network-in-cancer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56709.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10