CINXE.COM

Search results for: hosts

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: hosts</title> <meta name="description" content="Search results for: hosts"> <meta name="keywords" content="hosts"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="hosts" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="hosts"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 184</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: hosts</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">184</span> Mobile Agent Security Using Reference Monitor Based Security Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandhya%20Armoogum">Sandhya Armoogum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=reference%20monitor" title=" reference monitor"> reference monitor</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/31788/mobile-agent-security-using-reference-monitor-based-security-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">183</span> Intriguing Modulations in the Excited State Intramolecular Proton Transfer Process of Chrysazine Governed by Host-Guest Interactions with Macrocyclic Molecules</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Poojan%20Gharat">Poojan Gharat</a>, <a href="https://publications.waset.org/abstracts/search?q=Haridas%20Pal"> Haridas Pal</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharmistha%20Dutta%20Choudhury"> Sharmistha Dutta Choudhury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tuning photophysical properties of guest dyes through host-guest interactions involving macrocyclic hosts are the attractive research areas since past few decades, as these changes can directly be implemented in chemical sensing, molecular recognition, fluorescence imaging and dye laser applications. Excited state intramolecular proton transfer (ESIPT) is an intramolecular prototautomerization process display by some specific dyes. The process is quite amenable to tunability by the presence of different macrocyclic hosts. The present study explores the interesting effect of p-sulfonatocalix[n]arene (SCXn) and cyclodextrin (CD) hosts on the excited-state prototautomeric equilibrium of Chrysazine (CZ), a model antitumour drug. CZ exists exclusively in its normal form (N) in the ground state. However, in the excited state, the excited N* form undergoes ESIPT along with its pre-existing intramolecular hydrogen bonds, giving the excited state prototautomer (T*). Accordingly, CZ shows a single absorption band due to N form, but two emission bands due to N* and T* forms. Facile prototautomerization of CZ is considerably inhibited when the dye gets bound to SCXn hosts. However, in spite of lower binding affinity, the inhibition is more profound with SCX6 host as compared to SCX4 host. For CD-CZ system, while prototautomerization process is hindered by the presence of β-CD, it remains unaffected in the presence of γCD. Reduction in the prototautomerization process of CZ by SCXn and βCD hosts is unusual, because T* form is less dipolar in nature than the N*, hence binding of CZ within relatively hydrophobic hosts cavities should have enhanced the prototautomerization process. At the same time, considering the similar chemical nature of two CD hosts, their effect on prototautomerization process of CZ would have also been similar. The atypical effects on the prototautomerization process of CZ by the studied hosts are suggested to arise due to the partial inclusion or external binding of CZ with the hosts. As a result, there is a strong possibility of intermolecular H-bonding interaction between CZ dye and the functional groups present at the portals of SCXn and βCD hosts. Formation of these intermolecular H-bonds effectively causes the pre-existing intramolecular H-bonding network within CZ molecule to become weak, and this consequently reduces the prototautomerization process for the dye. Our results suggest that rather than the binding affinity between the dye and host, it is the orientation of CZ in the case of SCXn-CZ complexes and the binding stoichiometry in the case of CD-CZ complexes that play the predominant role in influencing the prototautomeric equilibrium of the dye CZ. In the case of SCXn-CZ complexes, the results obtained through experimental findings are well supported by quantum chemical calculations. Similarly for CD-CZ systems, binding stoichiometries obtained through geometry optimization studies on the complexes between CZ and CD hosts correlate nicely with the experimental results. Formation of βCD-CZ complexes with 1:1 stoichiometry while formation of γCD-CZ complexes with 1:1, 1:2 and 2:2 stoichiometries are revealed from geometry optimization studies and these results are in good accordance with the observed effects by the βCD and γCD hosts on the ESIPT process of CZ dye. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intermolecular%20proton%20transfer" title="intermolecular proton transfer">intermolecular proton transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=macrocyclic%20hosts" title=" macrocyclic hosts"> macrocyclic hosts</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20chemical%20studies" title=" quantum chemical studies"> quantum chemical studies</a>, <a href="https://publications.waset.org/abstracts/search?q=photophysical%20studies" title=" photophysical studies"> photophysical studies</a> </p> <a href="https://publications.waset.org/abstracts/110705/intriguing-modulations-in-the-excited-state-intramolecular-proton-transfer-process-of-chrysazine-governed-by-host-guest-interactions-with-macrocyclic-molecules" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110705.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">182</span> Population Growth of Bracon hebetor Say. under the Influence of Various Lepidopteran Host</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Muslim">Mohammad Muslim</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Shafiq%20Ansari"> M. Shafiq Ansari</a>, <a href="https://publications.waset.org/abstracts/search?q=Fazil%20Hasan"> Fazil Hasan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bracon hebetor Say (Hymenoptera: Braconidae) is considered as a highly cosmopolitan ecto-parasitoid of various species of order Lepidoptera. To study the influence of lepidopteran hosts on population growth of B. hebetor, the newly mated gravid females were released on various host and the eggs laid by such females on respective host were counted and a single egg was allow to develop on single host larvae. The experiment was conducted at 27 ± 1°C, 65 ± 5% RH and 14L: 10D hr in Biological Oxygen Demand (BOD) chamber. Upon hatching the tiny larvae of parasitoid pierced the body of insect host, enter into them and consumed the internal body contents of paralyzed host larvae. Present findings showed that B. hebetor took ~36 days to complete its survivorship on Corcyra cephalonica and Galleria mellonella. However, on Spodoptera littoralis the survivorship decreased to 24 days. Nevertheless, development of H. hebetor’s immature was significantly prolonged on S. littoralis and S. litura compared to other insect hosts tested. Female of B. hebetor took longer time to lay eggs on C. cephalonica and G. mellonella than other hosts tested in this study. Longevity of male and female is significantly prolonged on C. cephalonica and G. mellonella compared to others insect hosts tested. Population growth parameters like mx Ro, rm, Tc, and τ was considerably highest on C. cephalonica and lowest on S. littoralis. Based on the demographic studies C. cephalonica and H. armegera were proved to be the most suitable host for the mass rearing of B. hebetor. Nevertheless, results of present investigation could be utilized to improve the mass-breeding program of B. hebetor, so that sufficient number of B. hebetor’s adults could be provided time to time for the effective control of lepidopteran pests of various economically important crops. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bracon%20hebetor" title="Bracon hebetor">Bracon hebetor</a>, <a href="https://publications.waset.org/abstracts/search?q=lepidopteran%20hosts" title=" lepidopteran hosts"> lepidopteran hosts</a>, <a href="https://publications.waset.org/abstracts/search?q=demography" title=" demography"> demography</a>, <a href="https://publications.waset.org/abstracts/search?q=biology" title=" biology"> biology</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/68867/population-growth-of-bracon-hebetor-say-under-the-influence-of-various-lepidopteran-host" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68867.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">258</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">181</span> Social and Economic Impact of Home Sharing in Metro Manila: Hosts&#039; Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ma.%20Karen%20Jimeno">Ma. Karen Jimeno</a>, <a href="https://publications.waset.org/abstracts/search?q=Erika%20Kate%20Co"> Erika Kate Co</a>, <a href="https://publications.waset.org/abstracts/search?q=Ma.%20Claudia%20Alexis%20Frani"> Ma. Claudia Alexis Frani</a>, <a href="https://publications.waset.org/abstracts/search?q=Shane%20Rosshel%20Guzman"> Shane Rosshel Guzman</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Jaye%20Constance%20Selga"> Marie Jaye Constance Selga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Home sharing continues to gain traction in the Philippines at the expense of traditional lodging options, to which the hospitality industry has reacted in stages. This study aims to describe the social and economic impact of home sharing in Metro Manila from the perspective of hosts. A cross-sectional survey questionnaire consisting of five-point Likert items was administered to 120 hosts in Metro Manila. Kruskal-Wallis test, together with Dunn’s pairwise comparison, was used in the analysis of data. Results show that there is a significant difference in the median scores between increased awareness of Filipino food/heritage and the pursuit of enjoyable life in terms of social impact. Economic-wise, the respondents, did not perceive that their businesses as an additional source of income for the local government. These findings can be used for further exploratory studies and formulation of sustainable business policies conducive for the entrepreneurs and the hospitality industry alike. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bed-and-breakfast" title="bed-and-breakfast">bed-and-breakfast</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20sharing" title=" home sharing"> home sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=marketing" title=" marketing"> marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism" title=" tourism"> tourism</a> </p> <a href="https://publications.waset.org/abstracts/52633/social-and-economic-impact-of-home-sharing-in-metro-manila-hosts-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">323</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">180</span> Ganoderma Infection in Acacia mangium: Difference of Plant Hosts to Virulency of Ganoderma</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rosa%20Suryantini">Rosa Suryantini</a>, <a href="https://publications.waset.org/abstracts/search?q=Reine%20S.%20Wulandari"> Reine S. Wulandari</a>, <a href="https://publications.waset.org/abstracts/search?q=Slamet%20Rifanjani"> Slamet Rifanjani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Acacia (Acacia mangium) is a forest plant species which is produced to pulp and paper. The high demand for pulp and paper increase the acacia plantation forest area. However, the outbreak of Ganoderma (root rot pathogen) infection becomes obstacles for the development of acacia plantations. This is due to the extent of host range and species of Ganoderma. Ganoderma has also the ability to survive the long-term without hosts. The diversity of the host and Ganoderma species affects its virulence. Therefore, this study aimed to determine the virulence of Ganoderma from different hosts (acacia, palm oil (Elaeis guineensis) and rubber (Hevea brasiliensis)). The methods were isolation and morphology identification of Ganoderma, and inoculation of Ganoderma isolates on acacia seedlings. The results showed that the three isolates of Ganoderma from different hosts had a morphological similarity with G. Lucidum (according to Ganoderma isolated from acacia or G1), G. boninense (according to Ganoderma isolated from palm oil or G2) and G. applanatum (according to Ganoderma isolated from rubber or G3). Symptoms of infection in acacia were seen at 3 months of age. The symptoms were begun with chlorosis, necrosis and death of seedlings (such as burning). Necrosis was started from the tip of the leaf. Based on this visible symptoms, G1 was moderate virulence isolate and G2 was low virulence isolate while G3 was avirulen isolate. The symptoms were still growing in accordance with the development of plant so it affected the value of diseases severity index. Ganoderma infection decreased the dry weight of seedlings, ie. 3.82 g (seedlings that were inoculated by G1), 4.01 g (seedlings that were inoculated by G2); and 5.02 g (seedlings that were inoculated by G3) when the dry weight of seedlings control was 10,02 g. These results provide information for early control of Ganoderma diseases on acacia especially those planted near rubber and oil palm crops. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Acacia" title="Acacia">Acacia</a>, <a href="https://publications.waset.org/abstracts/search?q=Ganoderma" title=" Ganoderma"> Ganoderma</a>, <a href="https://publications.waset.org/abstracts/search?q=infection" title=" infection"> infection</a>, <a href="https://publications.waset.org/abstracts/search?q=virulence" title=" virulence"> virulence</a> </p> <a href="https://publications.waset.org/abstracts/74648/ganoderma-infection-in-acacia-mangium-difference-of-plant-hosts-to-virulency-of-ganoderma" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">179</span> Modeling and Simulation for Infection Processes of Bird Flu within a Poultry Farm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tertia%20Delia%20Nova">Tertia Delia Nova</a>, <a href="https://publications.waset.org/abstracts/search?q=Masaji%20Watanabge"> Masaji Watanabge</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Infection of bird flu within a poultry farm involves hosts, virus, and medium. Intrusion of bird flu into a poultry farm divides the population into two groups; healthy and susceptible chickens and infected chickens. A healthy and susceptible bird is infected to become an infected bird. Bird flu viruses spread among chickens through medium such as air and droppings, and increase in hosts. A model for an infection process of bird flu within a poultry farm is described, numerical techniques are illustrated, and numerical results are introduced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bird%20flu" title="bird flu">bird flu</a>, <a href="https://publications.waset.org/abstracts/search?q=poultry%20farm" title=" poultry farm"> poultry farm</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20for%20an%20infection%20process" title=" model for an infection process"> model for an infection process</a>, <a href="https://publications.waset.org/abstracts/search?q=flu%20viruses" title=" flu viruses "> flu viruses </a> </p> <a href="https://publications.waset.org/abstracts/10493/modeling-and-simulation-for-infection-processes-of-bird-flu-within-a-poultry-farm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10493.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">178</span> Evaluation of Routing Protocols in Mobile Adhoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anu%20Malhotra">Anu Malhotra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An Ad-hoc network is one that is an autonomous, self configuring network made up of mobile nodes connected via wireless links. Ad-hoc networks often consist of nodes, mobile hosts (MH) or mobile stations (MS, also serving as routers) connected by wireless links. Different routing protocols are used for data transmission in between the nodes in an adhoc network. In this paper two protocols (OLSR and AODV) are analyzed on the basis of two parameters i.e. time delay and throughput with different data rates. On the basis of these analysis, we observed that with same data rate, AODV protocol is having more time delay than the OLSR protocol whereas throughput for the OLSR protocol is less compared to the AODV protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=routing%20adhoc" title="routing adhoc">routing adhoc</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20hosts" title=" mobile hosts"> mobile hosts</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20stations" title=" mobile stations"> mobile stations</a>, <a href="https://publications.waset.org/abstracts/search?q=OLSR%20protocol" title=" OLSR protocol"> OLSR protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=AODV%20protocol" title=" AODV protocol"> AODV protocol</a> </p> <a href="https://publications.waset.org/abstracts/14695/evaluation-of-routing-protocols-in-mobile-adhoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14695.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">177</span> Black-Legged Tick (Ixodes Scapularis) Impacts on Hematology and Ectoparasite Communities of Peromyscus Mice</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erica%20Fellin">Erica Fellin</a>, <a href="https://publications.waset.org/abstracts/search?q=Albrecht%20Schulte-Hostedde"> Albrecht Schulte-Hostedde</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the climate warms, the black-legged tick’s (Ixodes scapularis) range expands further north in Ontario, Canada, reaching new host populations that have not previously interacted with this blood-feeding parasite. Peromyscus mice in these northern areas are unfamiliar and inexperienced to the effects of these ticks compared to their southern counterparts that have adapted to living with these organisms. The purpose of this study was to see if there is a difference in physiology between these two groups – deer mice living in areas where tick populations have established and deer mice living in black-legged tick-free environments – looking specifically to see if there is significant variation in hemoglobin levels, which can negatively impact how these mice function in their environment. Along with this, a comparison of the parasite community structure on these mice hosts was analyzed to see if ticks change the composition of these micro-environments. Blood samples were collected from individual mice from populations where black-legged ticks were either present or absent to assess haemoglobin levels. At the same time, ectoparasites were collected from these same mice to determine parasite loads and species diversity. Haemoglobin levels were found to be lower when tick loads were high, and parasite diversity appeared to be higher when ticks were absent. Since black-legged ticks are carriers of many pathogens that can be passed on to humans, including Lyme’s disease, it is important to understand their movement and distribution across Ontario as well as their interactions with their hosts (and co-occurring parasites) in their environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20ecology" title="community ecology">community ecology</a>, <a href="https://publications.waset.org/abstracts/search?q=hematology" title=" hematology"> hematology</a>, <a href="https://publications.waset.org/abstracts/search?q=hosts" title=" hosts"> hosts</a>, <a href="https://publications.waset.org/abstracts/search?q=parasites" title=" parasites"> parasites</a> </p> <a href="https://publications.waset.org/abstracts/114218/black-legged-tick-ixodes-scapularis-impacts-on-hematology-and-ectoparasite-communities-of-peromyscus-mice" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">176</span> Importance-Performance Analysis of Volunteer Tourism in Ethiopia: Host and Guest Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zita%20Fomukong%20Andam">Zita Fomukong Andam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With a general objective of evaluating the importance and Performance attributes of Volunteer Tourism in Ethiopia and also specifically intending to rank out the importance to evaluate the competitive performance of Ethiopia to host volunteer tourists, laying them in a four quadrant grid and conduct the IPA Iso-Priority Line comparison of Volunteer Tourism in Ethiopia. From hosts and guests point of view, a deeper research discourse was conducted with a randomly selected 384 guests and 165 hosts in Ethiopia. Findings of the discourse through an exploratory research design on both the hosts and the guests confirm that attributes of volunteer tourism generally and marginally fall in the South East quadrant of the matrix where their importance is relatively higher than their performance counterpart, also referred as ‘Concentrate Here’ quadrant. The fact that there are more items in this particular place in both the host and guest study, where they are highly important, but their relative performance is low, strikes a message that the country has more to do. Another focus point of this study is mapping the scores of attributes regarding the guest and host importance and performance against the Iso-Priority Line. Results of Iso-Priority Line Analysis of the IPA of Volunteer Tourism in Ethiopia from the Host’s Perspective showed that there are no attributes where their importance is exactly the same as their performance. With this being found, the fact that this research design inhabits many characters of exploratory nature, it is not confirmed research output. This paper reserves from prescribing anything to the applied world before further confirmatory research is conducted on the issue and rather calls the scientific community to augment this study through comprehensive, exhaustive, extensive and extended works of inquiry in order to get a refined set of recommended items to the applied world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=volunteer%20tourism" title="volunteer tourism">volunteer tourism</a>, <a href="https://publications.waset.org/abstracts/search?q=competitive%20performance%20importance-performance%20analysis" title=" competitive performance importance-performance analysis"> competitive performance importance-performance analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethiopian%20tourism" title=" Ethiopian tourism"> Ethiopian tourism</a> </p> <a href="https://publications.waset.org/abstracts/97805/importance-performance-analysis-of-volunteer-tourism-in-ethiopia-host-and-guest-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97805.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">233</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">175</span> Inclusion Complexes of Some Imidazoline Drugs with Cucurbit[N]Uril (N=7,8): Preparation, Characterization and Theoretical Calculations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fakhreldin%20O.%20Suliman">Fakhreldin O. Suliman</a>, <a href="https://publications.waset.org/abstracts/search?q=Alia%20H.%20Al-Battashi"> Alia H. Al-Battashi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work explored the interaction of three different imidazoline drugs, naphazoline nitrate (NPH), oxymetazoline hydrochloride (OXY) and xylometazoline hydrochloride (XYL) with two different synthesized cucurbit[n]urils CB[n], cucurbit[7]uril (CB[7]) and cucuribit[8]uril (CB[8]). Three binary inclusion complexes have been investigated in solution and in the solid state. The solid complexes were obtained by lyophilization, whereas the physical mixtures of guests and hosts at a stoichiometric ratio of 1:1 were obtained for each drug. 1HNMR, electrospray ionization mass spectrometry (ESI-MS), and matrix-assisted laser desorption-ionization time-of-flight (MALDI-TOF) mass spectrometry was used to study the complexes prepared in aqueous media. The lyophilized solid complexes were characterized by Fourier transform-infrared spectroscopy (FT-IR), powder X-ray diffractometry (PXRD), thermogravimetric analysis (TGA), and differential scanning calorimetry (DSC). MS, FT-IR and PXRD experimental results established in this work reveal that NPH, OXY and XYL molecules form stable inclusion complexes with the two hosts. The TGA and DSC confirmed the enhancement of the thermal stability of each drug and the production of a thermally stable solid complex. The 1HNMR has shown that the protons of the guests faced shifting in ppm and broadening of their peaks upon the formation of inclusion complexes with the selected CB[n]. The aromatic protons of the guest exhibited the highest changes in the chemical shifts and shape of the NMR peaks, suggesting their inclusion into the cavity of the CB[n]. The diffusion coefficients (D), developed from the diffusion-controlled NMR Spectroscopy (DOSY) measurements, for the complexation of the selected imidazoline drugs with CB[7] and CB[8], were decreased in the presence of hosts compared to the free guests indicating the formation of the guest-host adduct. Furthermore, we conducted molecular dynamic simulations and quantum mechanics calculations on these complexes. The results of the theoretical study corroborate the experimental findings and have also shed light on the mechanism of inclusion of the guests into the two hosts. This study generates initial data for potential drug delivery or drug formulation systems for these three selected imidazoline drug compounds based on their inclusion into the CB[n] cavities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cucurbit%5Bn%5Durils" title="cucurbit[n]urils">cucurbit[n]urils</a>, <a href="https://publications.waset.org/abstracts/search?q=imidazoline" title=" imidazoline"> imidazoline</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusion%20complexes" title=" inclusion complexes"> inclusion complexes</a>, <a href="https://publications.waset.org/abstracts/search?q=molecular%20dynamics" title=" molecular dynamics"> molecular dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=DFT%20calculations" title=" DFT calculations"> DFT calculations</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20spectrometry" title=" mass spectrometry"> mass spectrometry</a> </p> <a href="https://publications.waset.org/abstracts/178820/inclusion-complexes-of-some-imidazoline-drugs-with-cucurbitnuril-n78-preparation-characterization-and-theoretical-calculations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178820.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">68</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">174</span> A New Reliability based Channel Allocation Model in Mobile Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anujendra">Anujendra</a>, <a href="https://publications.waset.org/abstracts/search?q=Parag%20Kumar%20Guha%20Thakurta"> Parag Kumar Guha Thakurta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The data transmission between mobile hosts and base stations (BSs) in Mobile networks are often vulnerable to failure. Thus, efficient link connectivity, in terms of the services of both base stations and communication channels of the network, is required in wireless mobile networks to achieve highly reliable data transmission. In addition, it is observed that the number of blocked hosts is increased due to insufficient number of channels during heavy load in the network. Under such scenario, the channels are allocated accordingly to offer a reliable communication at any given time. Therefore, a reliability-based channel allocation model with acceptable system performance is proposed as a MOO problem in this paper. Two conflicting parameters known as Resource Reuse factor (RRF) and the number of blocked calls are optimized under reliability constraint in this problem. The solution to such MOO problem is obtained through NSGA-II (Non-dominated Sorting Genetic Algorithm). The effectiveness of the proposed model in this work is shown with a set of experimental results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=base%20station" title="base station">base station</a>, <a href="https://publications.waset.org/abstracts/search?q=channel" title=" channel"> channel</a>, <a href="https://publications.waset.org/abstracts/search?q=GA" title=" GA"> GA</a>, <a href="https://publications.waset.org/abstracts/search?q=pareto-optimal" title=" pareto-optimal"> pareto-optimal</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/2639/a-new-reliability-based-channel-allocation-model-in-mobile-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2639.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">173</span> The Four-Way Interactions among Host Plant-Whitefly-Virus-Endosymbionts in Insect and Disease Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20R.%20Prasannakumar">N. R. Prasannakumar</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20N.%20Maruthi"> M. N. Maruthi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The whitefly, Bemisia tabaci (Gennadius) (Hemiptera; Aleyrodidae) is a highly polyphagous pest reported to infest over 600 plant hosts globally. About 42 genetic groups/cryptic species of B. tabaci exist in the world on different hosts. The species have variable behaviour with respect to feeding, development and transmission of viral diseases. Feeding on diverse host plants affect both whitefly development and the population of the endosymbionts harboured by the insects. Due to changes in the level of endosymbionts, the virus transmission efficiency by the vector also gets affected. We investigated these interactions on five host plants – egg plant, tomato, beans, okra and cotton - using a single whitefly species Asia 1 infected with three different bacteria Portiera, Wolbachia and Arsenophonus. The Asia 1 transmits the Tomato leaf curl Bangalore virus (ToLCBV) effectively and thus was used in the interaction studies. We found a significant impact of hosts on whitefly growth and development; eggplant was most favourable host, while okra and tomato were least favourable. Among the endosymbiotic bacteria, the titre of Wolbachia was significantly affected by feeding of B. tabaci on different host plants whereas Arsenophonus and Portiera were unaffected. When whitefly fed on ToLCBV-infected tomato plants, the Arsenophonus population was significantly increased, indicating its previously confirmed role in ToLCBV transmission. Further, screening of total proteins of B. tabaci Asia 1 genetic group interacting with ToLCBV coat protein was carried out using Y2H system. Some of the proteins found to be interacting with ToLCBV CP were HSPs 70kDa, GroEL, nucleoproteins, vitellogenins, apolipophorins, lachesins, enolase. The reported protein thus would be the potential targets for novel whitefly control strategies such as RNAi or novel insecticide target sites for sustainable whitefly management after confirmation of genuine proteins. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cDNA" title="cDNA">cDNA</a>, <a href="https://publications.waset.org/abstracts/search?q=whitefly" title=" whitefly"> whitefly</a>, <a href="https://publications.waset.org/abstracts/search?q=ToLCBV" title=" ToLCBV"> ToLCBV</a>, <a href="https://publications.waset.org/abstracts/search?q=endosymbionts" title=" endosymbionts"> endosymbionts</a>, <a href="https://publications.waset.org/abstracts/search?q=Y2H" title=" Y2H"> Y2H</a> </p> <a href="https://publications.waset.org/abstracts/119847/the-four-way-interactions-among-host-plant-whitefly-virus-endosymbionts-in-insect-and-disease-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">172</span> Packet Fragmentation Caused by Encryption and Using It as a Security Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Said%20Rabah%20Azzam">Said Rabah Azzam</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Graham"> Andrew Graham</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fragmentation" title="fragmentation">fragmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=switch" title=" switch "> switch </a> </p> <a href="https://publications.waset.org/abstracts/30056/packet-fragmentation-caused-by-encryption-and-using-it-as-a-security-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30056.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">171</span> Isolation and Identification of Sarcocystis suihominis in a Slaughtered Domestic Pig (Sus scrofa) in Benue State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20I.%20Obadiah">H. I. Obadiah</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20N.%20Wieser"> S. N. Wieser</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20A.%20Omudu"> E. A. Omudu</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20O.%20Atu"> B. O. Atu</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20Byanet"> O. Byanet</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Schnittger"> L. Schnittger</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Florin-Christensen"> M. Florin-Christensen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sarcocystis sp. are Apicomplexan protozoan parasites with a life cycle that involves a predator and a prey as final and intermediate hosts, respectively. In tissues of the intermediate hosts, the parasites produce sarcocysts that vary in size and morphology according to the species. When a suitable predator ingests sarcocyst-containing meat, the parasites are released in the intestine and undergo sexual reproduction producing infective sporocysts, which are excreted with the feces into the environment. The cycle is closed when a prey ingests sporocyst-contaminated water or pasture; the parasites gain access to the circulation, and eventually invade tissues and reproduce asexually yielding sarcocysts. Pig farming is a common practice in Nigeria as well as in many countries around the world. In addition to its importance as protein source, pork is also a source of several pathogens relevant to humans. In the case of Sarcocystis, three species have been described both in domestic and wild pigs, namely, S. miescheriana, S. porcifelis and S. suihominis. Humans can act both as final and aberrant intermediate hosts of S. suihominis, after ingesting undercooked sarcocyst-infested pork. Infections are usually asymptomatic but can be associated with inappetence, nausea, vomiting and diarrhea, or with muscle pain, fever, eosinophilia and bronchospasm, in humans acting as final or intermediate hosts, respectively. Moreover, excretion of infective forms with human feces leads to further dissemination of the infection. In this study, macroscopic sarcocysts of white color, oval shape and a size range of approximately 3-5 mm were observed in the skeletal muscle of a slaughtered pig in an abattoir in Makurdi, Benue State, Nigeria, destined to human consumption. Sarcocysts were excised and washed in distilled water, and genomic DNA was extracted using a commercial kit. The near-complete length of the 18S rRNA gene was analyzed after PCR amplification of two overlapping fragments, each of which were submitted to direct sequencing. In addition, the mitochondrial cytochrome oxidase (cox-1) gene was PCR-amplified and directly sequenced. Two phylogenetic trees containing the obtained sequences along with available relevant 18S rRNA and cox-1 sequences were constructed by neighbor joining after alignment, using the corresponding sequences of Toxoplasma gondii as outgroup. The results showed in both cases that the analyzed sequences grouped with S. suihominis with high bootstrap value, confirming the identity of this macroscopic sarcocyst-forming parasite as S. suihominis. To the best of our knowledge, these results represent the first demonstration of this parasite in pigs of Nigeria and the largest sarcocysts described so far for S. suihominis. The close proximity between pigs and humans in pig farms, and the frequent poor sanitary conditions in human dwellings strongly suggest that the parasite undergoes the sexual stages of its life cycle in humans as final hosts. These findings provide an important reference for the examination and control of Sarcocystis species in pigs of Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nigeria" title="nigeria">nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=pork" title=" pork"> pork</a>, <a href="https://publications.waset.org/abstracts/search?q=sarcocystis%20suihominis" title=" sarcocystis suihominis"> sarcocystis suihominis</a>, <a href="https://publications.waset.org/abstracts/search?q=zoonotic%20parasite" title=" zoonotic parasite"> zoonotic parasite</a> </p> <a href="https://publications.waset.org/abstracts/159034/isolation-and-identification-of-sarcocystis-suihominis-in-a-slaughtered-domestic-pig-sus-scrofa-in-benue-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159034.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">170</span> Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrii%20Shalaginov">Andrii Shalaginov</a>, <a href="https://publications.waset.org/abstracts/search?q=Katrin%20Franke"> Katrin Franke</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiongwei%20Huang"> Xiongwei Huang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=malware%20detection" title="malware detection">malware detection</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=targeted%20attack" title=" targeted attack"> targeted attack</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20intelligence" title=" computational intelligence"> computational intelligence</a> </p> <a href="https://publications.waset.org/abstracts/44685/malware-beaconing-detection-by-mining-large-scale-dns-logs-for-targeted-attack-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44685.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">169</span> Radiation Protection Study for the Assessment of Mixed Fields Ionizing Radiation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avram%20Irina">Avram Irina</a>, <a href="https://publications.waset.org/abstracts/search?q=Coiciu%20Eugenia-Mihaela"> Coiciu Eugenia-Mihaela</a>, <a href="https://publications.waset.org/abstracts/search?q=Popovici%20Mara-Georgiana"> Popovici Mara-Georgiana</a>, <a href="https://publications.waset.org/abstracts/search?q=Mitu%20Iani%20Octavian"> Mitu Iani Octavian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ELI-NP stands as a cutting-edge facility globally, hosting unique radiological setups. It conducts experiments leveraging high-power lasers capable of producing extremely brief 10 PW pulses on two fronts. Moreover, it houses an exceptional gamma beam system with distinctive spectral characteristics. The facility hosts various experiments across designated experimental areas, encompassing ultra-short high-power laser tests, high-intensity gamma beam trials, and combined experiments utilizing both setups. The facility hosts a dosimetry laboratory, which recently obtained accreditation, where the radiation safety group employs a host of different types of detectors for monitoring the personnel, environment, and public exposure to ionizing radiation generated in experiments performed. ELI-NP's design was shaped by radiological protection assessments conducted through Monte Carlo simulations. The poster exemplifies an assessment conducted using the FLUKA code in an experimental area where a high-power laser system is implemented, and the future diagnostic system for variable energy gamma beams will soon be operational. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=radiation%20protection" title="radiation protection">radiation protection</a>, <a href="https://publications.waset.org/abstracts/search?q=Monte%20Carlo%20simulation" title=" Monte Carlo simulation"> Monte Carlo simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=FLUKA" title=" FLUKA"> FLUKA</a>, <a href="https://publications.waset.org/abstracts/search?q=dosimetry" title=" dosimetry"> dosimetry</a> </p> <a href="https://publications.waset.org/abstracts/179173/radiation-protection-study-for-the-assessment-of-mixed-fields-ionizing-radiation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179173.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">168</span> Bio-Hub Ecosystems: Profitability through Circularity for Sustainable Forestry, Energy, Agriculture and Aquaculture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kimberly%20Samaha">Kimberly Samaha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Bio-Hub Ecosystem model was developed to address a critical area of concern within the global energy market regarding biomass as a feedstock for power plants. Yet the lack of an economically-viable business model for bioenergy facilities has resulted in the continuation of idled and decommissioned plants. This study analyzed data and submittals to the Born Global Maine Innovation Challenge. The Innovation Challenge was a global innovation challenge to identify process innovations that could address a ‘whole-tree’ approach of maximizing the products, byproducts, energy value and process slip-streams into a circular zero-waste design. Participating companies were at various stages of developing bioproducts and included biofuels, lignin-based products, carbon capture platforms and biochar used as both a filtration medium and as a soil amendment product. This case study shows the QCA (Qualitative Comparative Analysis) methodology of the prequalification process and the resulting techno-economic model that was developed for the maximizing profitability of the Bio-Hub Ecosystem through continuous expansion of system waste streams into valuable process inputs for co-hosts. A full site plan for the integration of co-hosts (biorefinery, land-based shrimp and salmon aquaculture farms, a tomato green-house and a hops farm) at an operating forestry-based biomass to energy plant in West Enfield, Maine USA. This model and process for evaluating the profitability not only proposes models for integration of forestry, aquaculture and agriculture in cradle-to-cradle linkages of what have typically been linear systems, but the proposal also allows for the early measurement of the circularity and impact of resource use and investment risk mitigation, for these systems. In this particular study, profitability is assessed at two levels CAPEX (Capital Expenditures) and in OPEX (Operating Expenditures). Given that these projects start with repurposing facilities where the industrial level infrastructure is already built, permitted and interconnected to the grid, the addition of co-hosts first realizes a dramatic reduction in permitting, development times and costs. In addition, using the biomass energy plant’s waste streams such as heat, hot water, CO₂ and fly ash as valuable inputs to their operations and a significant decrease in the OPEX costs, increasing overall profitability to each of the co-hosts bottom line. This case study utilizes a proprietary techno-economic model to demonstrate how utilizing waste streams of a biomass energy plant and/or biorefinery, results in significant reduction in OPEX for both the biomass plants and the agriculture and aquaculture co-hosts. Economically viable Bio-Hubs with favorable environmental and community impacts may prove critical in garnering local and federal government support for pilot programs and more wide-scale adoption, especially for those living in severely economically depressed rural areas where aging industrial sites have been shuttered and local economies devastated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bio-economy" title="bio-economy">bio-economy</a>, <a href="https://publications.waset.org/abstracts/search?q=biomass%20energy" title=" biomass energy"> biomass energy</a>, <a href="https://publications.waset.org/abstracts/search?q=financing" title=" financing"> financing</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-waste" title=" zero-waste"> zero-waste</a> </p> <a href="https://publications.waset.org/abstracts/103144/bio-hub-ecosystems-profitability-through-circularity-for-sustainable-forestry-energy-agriculture-and-aquaculture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103144.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">167</span> Mass Rearing and Effects of Gamma Irradiation on the Pupal Mortality and Reproduction of Citrus Leaf Miner Phyllocnistis citrella Stainton (Lepidoptera: Gracillariidae)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shiva%20Osouli">Shiva Osouli</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Atapour"> Maryam Atapour</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehrdad%20Ahmadi"> Mehrdad Ahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shima%20Shokri"> Shima Shokri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Citrus leaf miner (<em>Phyllocnistis citrella</em> Stainton) is native to Asia and one of the most serious pests of Iran’s citrus nursery stocks. In the present study, the possibility of insect mass rearing on four various citrus hosts and the effects of gamma irradiation on the pupal mortality and reproduction of this pest were studied. Trifoliate orange and grapefruit showed less infection, while the number of pupae in Valencia oranges and sweet lemons cages was so high. There was not any significant difference between weight of male and female pupae among different citrus hosts, but generally the weight of male pupae was less than females. Use of Valencia orange or sweet lemons seedlings in especial dark emergence and oviposition cages could be recommended for mass rearing of this pest. In this study, the effects of gamma radiation at doses 100 to 450 Gy on biological and reproductive parameters of the pest has been determined. The results show that mean percent of pupal mortality increased with increasing doses and reached to 28.67% at 450 Gy for male pupae and 38.367% for female pupae. Also, the mean values of this parameter were higher for irradiated female, which indicated the higher sensitivity of this sex. The gamma ray irradiation from 200 and 300 Gy caused decrease in male and female adult moth longevity, respectively. The eggs were laid by emerged females, and their hatchability was decreased by increasing gamma doses. The fecundity of females in both combinations of crosses (irradiated male × normal female and irradiated female × normal male) did not differ, but fertility of laid eggs by irradiated female × normal male affected seriously and the mean values of this parameter reached to zero at 300 Gy. The hatchability percentage of produced eggs by normal female × irradiated male at 300 Gy was 23.29% and reached to less than 2 % at 450 Gy as the highest tested dose. The results of this test show that females have more radio-sensitivity in comparison to males. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=citrus%20leaf%20miner" title="citrus leaf miner">citrus leaf miner</a>, <a href="https://publications.waset.org/abstracts/search?q=Phyllocnistis%20citrella" title=" Phyllocnistis citrella"> Phyllocnistis citrella</a>, <a href="https://publications.waset.org/abstracts/search?q=citrus%20hosts" title=" citrus hosts"> citrus hosts</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20rearing" title=" mass rearing"> mass rearing</a>, <a href="https://publications.waset.org/abstracts/search?q=Sterile%20Insect%20Technique%20%28SIT%29" title=" Sterile Insect Technique (SIT) "> Sterile Insect Technique (SIT) </a> </p> <a href="https://publications.waset.org/abstracts/75754/mass-rearing-and-effects-of-gamma-irradiation-on-the-pupal-mortality-and-reproduction-of-citrus-leaf-miner-phyllocnistis-citrella-stainton-lepidoptera-gracillariidae" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">166</span> Functional Gene Expression in Human Cells Using Linear Vectors Derived from Bacteriophage N15 Processing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kumaran%20Narayanan">Kumaran Narayanan</a>, <a href="https://publications.waset.org/abstracts/search?q=Pei-Sheng%20Liew"> Pei-Sheng Liew</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper adapts the bacteriophage N15 protelomerase enzyme to assemble linear chromosomes as vectors for gene expression in human cells. Phage N15 has the unique ability to replicate as a linear plasmid with telomeres in E. coli during its prophage stage of life-cycle. The virus-encoded protelomerase enzyme cuts its circular genome and caps its ends to form hairpin telomeres, resulting in a linear human-chromosome-like structure in E. coli. In mammalian cells, however, no enzyme with TelN-like activities has been found. In this work, we show for the first-time transfer of the protelomerase from phage into human and mouse cells and demonstrate recapitulation of its activity in these hosts. The function of this enzyme is assayed by demonstrating cleavage of its target DNA, followed by detecting telomere formation based on its resistance to recBCD enzyme digestion. We show protelomerase expression persists for at least 60 days, which indicates limited silencing of its expression. Next, we show that an intact human β-globin gene delivered on this linear chromosome accurately retains its expression in the human cellular environment for at least 60 hours, demonstrating its stability and potential as a vector. These results demonstrate that the N15 protelomerse is able to function in mammalian cells to cut and heal DNA to create telomeres, which provides a new tool for creating novel structures by DNA resolution in these hosts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chromosome" title="chromosome">chromosome</a>, <a href="https://publications.waset.org/abstracts/search?q=beta-globin" title=" beta-globin"> beta-globin</a>, <a href="https://publications.waset.org/abstracts/search?q=DNA" title=" DNA"> DNA</a>, <a href="https://publications.waset.org/abstracts/search?q=gene%20expression" title=" gene expression"> gene expression</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20vector" title=" linear vector"> linear vector</a> </p> <a href="https://publications.waset.org/abstracts/111231/functional-gene-expression-in-human-cells-using-linear-vectors-derived-from-bacteriophage-n15-processing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111231.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">165</span> Cloning, Expression and Protein Purification of AV1 Gene of Okra Leaf Curl Virus Egyptian Isolate and Genetic Diversity between Whitefly and Different Plant Hosts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dalia.%20G.%20Aseel">Dalia. G. Aseel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <em>Begomoviruses</em> are economically important plant viruses that infect dicotyledonous plants and exclusively transmitted by the whitefly <em>Bemisia tabaci. Here, replicative form was isolated from Okra, Cotton, Tomato plants and whitefly infected with Begomoviruses. Using coat protein specific primers (AV1), the viral infection was verified with amplicon at 450 bp. </em>The sequence of OLCuV-AV1 gene was recorded and received an accession number (FJ441605) from Genebank. The phylogenetic tree of OLCuV was closely related to <em>Okra leaf curl virus </em>previously isolated from Cameroon and USA with nucleotide sequence identity of 92%. The protein purification was carried out using His-Tag methodology by using Affinity Chromatography. The purified protein was separated on SDS-PAGE analysis and an enriched expected size of band at 30 kDa was observed. Furthermore, RAPD and SDS-PAGE were used to detect genetic variability between different hosts of <em>okra leaf curl virus</em> (OLCuV), <em>cotton leaf curl virus</em> (CLCuV), <em>tomato yellow leaf curl virus</em> (TYLCuV) and the whitefly vector. Finally, the present study would help to understand the relationship between the whitefly and different economical crops in Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=okra%20leaf%20curl%20virus" title="okra leaf curl virus">okra leaf curl virus</a>, <a href="https://publications.waset.org/abstracts/search?q=AV1%20gene" title=" AV1 gene"> AV1 gene</a>, <a href="https://publications.waset.org/abstracts/search?q=sequencing" title=" sequencing"> sequencing</a>, <a href="https://publications.waset.org/abstracts/search?q=phylogenetic" title=" phylogenetic"> phylogenetic</a>, <a href="https://publications.waset.org/abstracts/search?q=cloning" title=" cloning"> cloning</a>, <a href="https://publications.waset.org/abstracts/search?q=purified%20protein" title=" purified protein"> purified protein</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20diversity%20and%20viral%20proteins" title=" genetic diversity and viral proteins"> genetic diversity and viral proteins</a> </p> <a href="https://publications.waset.org/abstracts/91013/cloning-expression-and-protein-purification-of-av1-gene-of-okra-leaf-curl-virus-egyptian-isolate-and-genetic-diversity-between-whitefly-and-different-plant-hosts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">164</span> Regression Approach for Optimal Purchase of Hosts Cluster in Fixed Fund for Hadoop Big Data Platform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haitao%20Yang">Haitao Yang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jianming%20Lv"> Jianming Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=Fei%20Xu"> Fei Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xintong%20Wang"> Xintong Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yilin%20Huang"> Yilin Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Lanting%20Xia"> Lanting Xia</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuewu%20Zhu"> Xuewu Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Given a fixed fund, purchasing fewer hosts of higher capability or inversely more of lower capability is a must-be-made trade-off in practices for building a Hadoop big data platform. An exploratory study is presented for a Housing Big Data Platform project (HBDP), where typical big data computing is with SQL queries of aggregate, join, and space-time condition selections executed upon massive data from more than 10 million housing units. In HBDP, an empirical formula was introduced to predict the performance of host clusters potential for the intended typical big data computing, and it was shaped via a regression approach. With this empirical formula, it is easy to suggest an optimal cluster configuration. The investigation was based on a typical Hadoop computing ecosystem HDFS+Hive+Spark. A proper metric was raised to measure the performance of Hadoop clusters in HBDP, which was tested and compared with its predicted counterpart, on executing three kinds of typical SQL query tasks. Tests were conducted with respect to factors of CPU benchmark, memory size, virtual host division, and the number of element physical host in cluster. The research has been applied to practical cluster procurement for housing big data computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadoop%20platform%20planning" title="Hadoop platform planning">Hadoop platform planning</a>, <a href="https://publications.waset.org/abstracts/search?q=optimal%20cluster%20scheme%20at%20fixed-fund" title=" optimal cluster scheme at fixed-fund"> optimal cluster scheme at fixed-fund</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20predicting%20formula" title=" performance predicting formula"> performance predicting formula</a>, <a href="https://publications.waset.org/abstracts/search?q=typical%20SQL%20query%20tasks" title=" typical SQL query tasks"> typical SQL query tasks</a> </p> <a href="https://publications.waset.org/abstracts/66144/regression-approach-for-optimal-purchase-of-hosts-cluster-in-fixed-fund-for-hadoop-big-data-platform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66144.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">163</span> Multi-Dimension Threat Situation Assessment Based on Network Security Attributes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Yu">Yang Yu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jian%20Wang"> Jian Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiqiang%20Liu"> Jiqiang Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Lei%20Han"> Lei Han</a>, <a href="https://publications.waset.org/abstracts/search?q=Xudong%20He"> Xudong He</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaohua%20Lv"> Shaohua Lv</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DDoS%20evaluation" title="DDoS evaluation">DDoS evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=improved%20CVSS" title=" improved CVSS"> improved CVSS</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security%20attribute" title=" network security attribute"> network security attribute</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20situation%20assessment" title=" threat situation assessment"> threat situation assessment</a> </p> <a href="https://publications.waset.org/abstracts/88121/multi-dimension-threat-situation-assessment-based-on-network-security-attributes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">209</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">162</span> Production of Recombinant Human Serum Albumin in Escherichia coli: A Crucial Biomolecule for Biotechnological and Healthcare Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashima%20Sharma">Ashima Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Tapan%20K.%20Chaudhuri"> Tapan K. Chaudhuri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Human Serum Albumin (HSA) is one of the most demanded therapeutic protein with immense biotechnological applications. The current source of HSA is human blood plasma. Blood is a limited and an unsafe source as it possesses the risk of contamination by various blood derived pathogens. This issue led to exploitation of various hosts with the aim to obtain an alternative source for the production of the rHSA. But, till now no host has been proven to be effective commercially for rHSA production because of their respective limitations. Thus, there exists an indispensable need to promote non-animal derived rHSA production. Of all the host systems, Escherichia coli is one of the most convenient hosts which has contributed in the production of more than 30% of the FDA approved recombinant pharmaceuticals. E. coli grows rapidly and its culture reaches high cell density using inexpensive and simple substrates. The fermentation batch turnaround number for E. coli culture is 300 per year, which is far greater than any of the host systems available. Therefore, E. coli derived recombinant products have more economical potential as fermentation processes are cheaper compared to the other expression hosts available. Despite of all the mentioned advantages, E. coli had not been successfully adopted as a host for rHSA production. The major bottleneck in exploiting E. coli as a host for rHSA production was aggregation i.e. majority of the expressed recombinant protein was forming inclusion bodies (more than 90% of the total expressed rHSA) in the E. coli cytosol. Recovery of functional rHSA form inclusion body is not preferred because it is tedious, time consuming, laborious and expensive. Because of this limitation, E. coli host system was neglected for rHSA production for last few decades. Considering the advantages of E. coli as a host, the present work has targeted E. coli as an alternate host for rHSA production through resolving the major issue of inclusion body formation associated with it. In the present study, we have developed a novel and innovative method for enhanced soluble and functional production of rHSA in E.coli (~60% of the total expressed rHSA in the soluble fraction) through modulation of the cellular growth, folding and environmental parameters, thereby leading to significantly improved and enhanced -expression levels as well as the functional and soluble proportion of the total expressed rHSA in the cytosolic fraction of the host. Therefore, in the present case we have filled in the gap in the literature, by exploiting the most well studied host system Escherichia coli which is of low cost, fast growing, scalable and ‘yet neglected’, for the enhancement of functional production of HSA- one of the most crucial biomolecule for clinical and biotechnological applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=enhanced%20functional%20production%20of%20rHSA%20in%20E.%20coli" title="enhanced functional production of rHSA in E. coli">enhanced functional production of rHSA in E. coli</a>, <a href="https://publications.waset.org/abstracts/search?q=recombinant%20human%20serum%20albumin" title=" recombinant human serum albumin"> recombinant human serum albumin</a>, <a href="https://publications.waset.org/abstracts/search?q=recombinant%20protein%20expression" title=" recombinant protein expression"> recombinant protein expression</a>, <a href="https://publications.waset.org/abstracts/search?q=recombinant%20protein%20processing" title=" recombinant protein processing"> recombinant protein processing</a> </p> <a href="https://publications.waset.org/abstracts/67504/production-of-recombinant-human-serum-albumin-in-escherichia-coli-a-crucial-biomolecule-for-biotechnological-and-healthcare-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">347</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">161</span> Isolation and Characterization of Cotton Infecting Begomoviruses in Alternate Hosts from Cotton Growing Regions of Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Irfan%20Fareed">M. Irfan Fareed</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Tahir"> Muhammad Tahir</a>, <a href="https://publications.waset.org/abstracts/search?q=Alvina%20Gul%20Kazi"> Alvina Gul Kazi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Castor bean (Ricinus communis; family Euphorbiaceae) is cultivated for the production of oil and as an ornamental plant throughout tropical regions. Leaf samples from castor bean plants with leaf curl and vein thickening were collected from areas around Okara (Pakistan) in 2011. PCR amplification using diagnostic primers showed the presence of a begomovirus and subsequently the specific pair (BurNF 5’- CCATGGTTGTGGCAGTTGATTGACAGATAC-3’, BurNR 5’- CCATGGATTCACGCACAGGGGAACCC-3’) was used to amplify and clone the whole genome of the virus. The complete nucleotide sequence was determined to be 2,759 nt (accession No. HE985227). Alignments showed the highest levels of nucleotide sequence identity (98.8%) with Cotton leaf curl Burewala virus (CLCuBuV; accession No. JF416947) No. JF416947). The virus in castor beans lacks on intact C2 gene, as is typical of CLCuBuV in cotton. An amplification product of ca. 1.4 kb was obtained in PCR with primers for betasatellites and the complete nucleotide sequence of a clone was determined to be 1373 nt (HE985228). The sequence showed 96.3% nucleotide sequence identity to the recombinant Cotton leaf curl Multan betasatellite (CLCuMB; JF502389). This is the first report of CLCuBuV and its betasatellite infecting castor bean, showing this plant species as an alternate host of the virus. Already many alternate host have been reported from different alternate host like tobacco, tomato, hibiscus, okra, ageratum, Digera arvensis, habiscus, Papaya and now in Ricinus communis. So, it is suggested that these alternate hosts should be avoided to grow near cotton growing regions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ricinus%20communis" title="Ricinus communis">Ricinus communis</a>, <a href="https://publications.waset.org/abstracts/search?q=begomovirus" title=" begomovirus"> begomovirus</a>, <a href="https://publications.waset.org/abstracts/search?q=betasatellite" title=" betasatellite"> betasatellite</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a> </p> <a href="https://publications.waset.org/abstracts/21282/isolation-and-characterization-of-cotton-infecting-begomoviruses-in-alternate-hosts-from-cotton-growing-regions-of-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21282.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">531</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">160</span> Environmental Degradation of Natural Resources in Broghil National Park in the High Mountains of Pakistan – Empirical Evidence From Local Community and Geoinformatics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siddique%20Ullah%20Baig">Siddique Ullah Baig</a>, <a href="https://publications.waset.org/abstracts/search?q=Alisha%20Manzoor"> Alisha Manzoor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The remotest, mountainous, and icy Broghil Valley is a high-profile protected area as a national park, which hosts one of the highest altitude permanent human settlements on the earth. This park hosts a distributed but diverse range of habitats. Due to a lack of infrastructures, higher altitudes, and harsh environmental conditions, poverty-stricken inhabitants mostly rely on its resources, causing ecological dis-balance. This study aims to investigate the environmental degradation of natural resources of the park based on empirical evidence from stakeholders and geoinformatics. The result shows that one-fourth of the park is a gently undulating basin dotted with water bodies / grass, and agricultural land and three fourth is entirely rugged with steep mountains and glaciers. There are virtually no forests as the arid cold tundra climate and high altitude prevent tree growth. Rapid three-decadal land cover changes have led to ecological disequilibrium of the park, narrowing the traditional diverse food base, decreasing the resilience of biodiversity and local livelihoods as crop-land has shifted towards fallow, alpine-grass to peat-land and snow/glacial ice area to bare-soil/rocks. The local community believes in exploiting whatever vegetation or organic material is available for use as food, fodder, and fuel. The permanent presence of the community and limited cost-effective options in the park will be a challenge forever to maintain undisturbed natural processes as the objective of a national park. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Broghil%20National%20Park" title="Broghil National Park">Broghil National Park</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20resources" title=" natural resources"> natural resources</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20degradation" title=" environmental degradation"> environmental degradation</a>, <a href="https://publications.waset.org/abstracts/search?q=land%20cover" title=" land cover"> land cover</a> </p> <a href="https://publications.waset.org/abstracts/178610/environmental-degradation-of-natural-resources-in-broghil-national-park-in-the-high-mountains-of-pakistan-empirical-evidence-from-local-community-and-geoinformatics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178610.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">159</span> Isolation and Characterisation of Novel Environmental Bacteriophages Which Target the Escherichia coli Lamb Outer Membrane Protein</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ziyue%20Zeng">Ziyue Zeng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bacteriophages are viruses which infect bacteria specifically. Over the past decades, phage λ has been extensively studied, especially its interaction with the Escherichia coli LamB (EcLamB) protein receptor. Nonetheless, despite the enormous numbers and near-ubiquity of environmental phages, aside from phage λ, there is a paucity of information on other phages which target EcLamB as a receptor. In this study, to answer the question of whether there are other EcLamB-targeting phages in the natural environment, a simple and convenient method was developed and used for isolating environmental phages which target a particular surface structure of a particular bacterium; in this case, the EcLamB outer membrane protein. From the enrichments with the engineered bacterial hosts, a collection of EcLamB-targeting phages (ΦZZ phages) were easily isolated. Intriguingly, unlike phage λ, an obligate EcLamB-dependent phage in the Siphoviridae family, the newly isolated ΦZZ phages alternatively recognised EcLamB or E. coli OmpC (EcOmpC) as a receptor when infecting E. coli. Furthermore, ΦZZ phages were suggested to represent new species in the Tequatrovirus genus in the Myoviridae family, based on phage morphology and genomic sequences. Most phages are thought to have a narrow host range due to their exquisite specificity in receptor recognition. With the ability to optionally recognise two receptors, ΦZZ phages were considered relatively promiscuous. Via the heterologous expression of EcLamB on the bacterial cell surface, the host range of ΦZZ phages was further extended to three different enterobacterial genera. Besides, an interesting selection of evolved phage mutants with a broader host range was isolated, and the key mutations involved in their evolution to adapt to new hosts were investigated by genomic analysis. Finally, and importantly, two ΦZZ phages were found to be putative generalised transducers, which could be exploited as tools for DNA manipulations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20microbiology" title="environmental microbiology">environmental microbiology</a>, <a href="https://publications.waset.org/abstracts/search?q=phage" title=" phage"> phage</a>, <a href="https://publications.waset.org/abstracts/search?q=microbe-host%20interactions" title=" microbe-host interactions"> microbe-host interactions</a>, <a href="https://publications.waset.org/abstracts/search?q=microbial%20ecology" title=" microbial ecology"> microbial ecology</a> </p> <a href="https://publications.waset.org/abstracts/150284/isolation-and-characterisation-of-novel-environmental-bacteriophages-which-target-the-escherichia-coli-lamb-outer-membrane-protein" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150284.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">100</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">158</span> Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing" title="mobile grid computing">mobile grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20authority%20%28CA%29" title=" certificate authority (CA)"> certificate authority (CA)</a>, <a href="https://publications.waset.org/abstracts/search?q=SSL%2FTLS%20protocol" title=" SSL/TLS protocol"> SSL/TLS protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=secured%20service%20certificates" title=" secured service certificates"> secured service certificates</a> </p> <a href="https://publications.waset.org/abstracts/29817/adaptive-certificate-based-mutual-authentication-protocol-for-mobile-grid-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">157</span> Spinochromes: Kairomones Involved in the Symbiosis between the Shrimp Tuleariocaris holthuisi and Echinometra mathaei</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lola%20Brasseur">Lola Brasseur</a>, <a href="https://publications.waset.org/abstracts/search?q=Guillaume%20Caulier"> Guillaume Caulier</a>, <a href="https://publications.waset.org/abstracts/search?q=Marie%20Demeyer"> Marie Demeyer</a>, <a href="https://publications.waset.org/abstracts/search?q=Pascal%20Gerbaux"> Pascal Gerbaux</a>, <a href="https://publications.waset.org/abstracts/search?q=Igor%20Eeckhaut"> Igor Eeckhaut</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Seawater being an ideal dispersing agent, chemical communication stays predominant in marine ecosystems. However, if many molecules acting in chemical heterospecific communication have already been well described in terrestrial ecosystems, only three of these molecules were identified in marine ecosystems. Echinoderms and their symbiotic organisms constitute very good models to study heterospecific chemical communication because each class synthesizes a specific type of molecules and symbioses with echinoderms as hosts are very usual. In this study, the chemical communication that allows the commensal shrimps Tuleariocaris holthuisi Hipeau-Jacquotte, 1965 to live with their host Echinometra mathaei (Blainville, 1825) was investigated. The chemoreception of the shrimp was characterized using olfactometers and it was demonstrated that hosts and synthetic hydroxynaphthoquinones are attractive to the symbiotic shrimps. Hydroxynaphthoquinonic pigments also known as spinochromes are by the way synthesized by sea urchin and involved in all probability in a lot of mechanisms. To our knowledge, this study is the first highlighting the ecological function of naphthoquinones as kairomones. Chemical extractions were also performed on sea urchins in order to analyze and identify their specific hydroxynaphthoquinones using HPLC-ESI-MS. Accurate mass identification and elemental composition have been performed on various organs (gonads, coelomic liquid, digestive system and test) in different morphotypes of Echinometra mathaei for a better understanding of the molecular diversity of these semiochemicals. Moreover, some experiments were performed to investigate the dependence of T. holthuisi for their host. First, the analyses showed that the molecules involved in shrimp pigmentation are the same that the ones involved in E. mathaei, suggesting a potential feeding on the host. Secondly, a substantial shrimp depigmentation and an increase of the mortality rate were demonstrated after the symbionts-host separation which could mean a potential implication of spinochromes in the shrimp metabolism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crustacean" title="crustacean">crustacean</a>, <a href="https://publications.waset.org/abstracts/search?q=sea%20urchin" title=" sea urchin"> sea urchin</a>, <a href="https://publications.waset.org/abstracts/search?q=spinochrome" title=" spinochrome"> spinochrome</a>, <a href="https://publications.waset.org/abstracts/search?q=symbiosis" title=" symbiosis"> symbiosis</a> </p> <a href="https://publications.waset.org/abstracts/55314/spinochromes-kairomones-involved-in-the-symbiosis-between-the-shrimp-tuleariocaris-holthuisi-and-echinometra-mathaei" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55314.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">156</span> Studies on the Emergence Pattern of Cercariae from Fresh Water Snails (Mollusca: Gastropoda)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20R.%20Kakulte">V. R. Kakulte</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20N.%20Gaikwad"> K. N. Gaikwad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence pattern of different types of cercariae form three snail hosts Melania tuberculata, Lymnea auricularia Viviparous bengalensis has been studied in detail. In natural emerging method the snails (2 to 3 at a time) were kept in separate test tube. This was constant source of living cercariae naturally emerging from the snails. The sunlight and artificial light play an important positive role in stimulating the emergence of cercariae has been observed. The effect of light and dark on the emission pattern of cercariae has been studied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cercariae" title="cercariae">cercariae</a>, <a href="https://publications.waset.org/abstracts/search?q=snail%20host" title=" snail host"> snail host</a>, <a href="https://publications.waset.org/abstracts/search?q=emergence%20pattern" title=" emergence pattern"> emergence pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=gastropoda" title=" gastropoda"> gastropoda</a> </p> <a href="https://publications.waset.org/abstracts/13767/studies-on-the-emergence-pattern-of-cercariae-from-fresh-water-snails-mollusca-gastropoda" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13767.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">155</span> Metagenomics Analysis of Bacteria in Sorghum Using next Generation Sequencing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kedibone%20Masenya">Kedibone Masenya</a>, <a href="https://publications.waset.org/abstracts/search?q=Memory%20Tekere"> Memory Tekere</a>, <a href="https://publications.waset.org/abstracts/search?q=Jasper%20Rees"> Jasper Rees</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sorghum is an important cereal crop in the world. In particular, it has attracted breeders due to capacity to serve as food, feed, fiber and bioenergy crop. Like any other plant, sorghum hosts a variety of microbes, which can either, have a neutral, negative and positive influence on the plant. In the current study, regions (V3/V4) of 16 S rRNA were targeted to extensively assess bacterial multitrophic interactions in the phyllosphere of sorghum. The results demonstrated that the presence of a pathogen has a significant effect on the endophytic bacterial community. Understanding these interactions is key to develop new strategies for plant protection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bacteria" title="bacteria">bacteria</a>, <a href="https://publications.waset.org/abstracts/search?q=multitrophic" title=" multitrophic"> multitrophic</a>, <a href="https://publications.waset.org/abstracts/search?q=sorghum" title=" sorghum"> sorghum</a>, <a href="https://publications.waset.org/abstracts/search?q=target%20sequencing" title=" target sequencing"> target sequencing</a> </p> <a href="https://publications.waset.org/abstracts/73720/metagenomics-analysis-of-bacteria-in-sorghum-using-next-generation-sequencing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73720.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=hosts&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10