Search results for: nerve message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 586

Search results for: nerve message

286 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 118
285 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 475
284 Support Vector Machine Based Retinal Therapeutic for Glaucoma Using Machine Learning Algorithm

Authors: P. S. Jagadeesh Kumar, Mingmin Pan, Yang Yung, Tracy Lin Huan

Abstract:

Glaucoma is a group of visual maladies represented by the scheduled optic nerve neuropathy; means to the increasing dwindling in vision ground, resulting in loss of sight. In this paper, a novel support vector machine based retinal therapeutic for glaucoma using machine learning algorithm is conservative. The algorithm has fitting pragmatism; subsequently sustained on correlation clustering mode, it visualizes perfect computations in the multi-dimensional space. Support vector clustering turns out to be comparable to the scale-space advance that investigates the cluster organization by means of a kernel density estimation of the likelihood distribution, where cluster midpoints are idiosyncratic by the neighborhood maxima of the concreteness. The predicted planning has 91% attainment rate on data set deterrent on a consolidation of 500 realistic images of resolute and glaucoma retina; therefore, the computational benefit of depending on the cluster overlapping system pedestal on machine learning algorithm has complete performance in glaucoma therapeutic.

Keywords: machine learning algorithm, correlation clustering mode, cluster overlapping system, glaucoma, kernel density estimation, retinal therapeutic

Procedia PDF Downloads 243
283 External Retinal Prosthesis Image Processing System Used One-Cue Saliency Map Based on DSP

Authors: Yili Chen, Jixiang Fu, Zhihua Liu, Zhicheng Zhang, Rongmao Li, Nan Fu, Yaoqin Xie

Abstract:

Retinal prothesis is designed to help the blind to get some sight.It is made up of internal part and external part.In external part ,there is made up of camera, image processing, and RF transmitter.In internal part, there is RF receiver, implant chip,micro-electrode.The image got from the camera should be processed by suitable stragies to corresponds to stimulus the electrode.Nowadays, the number of the micro-electrode is hundreds and we don’t know the mechanism how the elctrode stimulus the optic nerve, an easy way to the hypothesis is that the pixel in the image is correspondence to the electrode.So it is a question how to get the important information of the image captured from the picture.There are many strategies to experimented to get the most important information as soon as possible, due to the real time system.ROI is a useful algorithem to extract the region of the interest.Our paper will explain the details of the orinciples and functions of the ROI.And based on this, we simplified the ROI algrithem,and used it in outside image prcessing DSP system of the retinal prothesis.Results show that our image processing stratiges is suitable for real-time retinal prothesis and can cut redundant information and help useful information to express in the low-size image.

Keywords: image processing, region of interest, saliency map, low-size image, useful information express, cut redundant information in image

Procedia PDF Downloads 275
282 Accounting as Addressed in the Qur’aan

Authors: Shahriar M. Saadullah, Abdul-Quddoos Abdul-Basith, Zaki K. Abushawish

Abstract:

As a part of academic research in Islamic Accounting it is important to know how the word Accounting is discussed in the Qur’aan. This paper identifies and analyzes the word Accounting in the Qur’aan, which is significant to know and understand. The paper uses a methodology of identifying the root word of Accounting Hasaba (حسب) in the Qur’aan with the help of Islam 360 software and analyzes the use of the relevant words derived from the root word. Then the paper attempts to connect the findings to the contemporary Accounting issues. The paper finds that the root word of Accounting Hasaba (حسب) appears in the Qur’aan 109 times but it is only used in the sense Account, Accountable, or Accounting 45 times. These words appear in 44 different verses in the Qur’aan, appearing twice in one of the verses. The paper divides these verses into 8 different themes namely, Day of Accounting, without any Accounting, Accounting of Time, Self-Accounting, Swift in Accounting, Accounting is only with God, Awareness and the Good Accounting, and Heedlessness and the Bad Accounting. The way the words Account, Accounting, and Accountable is discussed in the Qur’aan links to the contemporary accounting issues including Ethics, Agency Theory, and Internal Control. The links discovered in the paper clearly shows the timeless nature of the message of the Qur’aan.

Keywords: accounting, contemporary accounting issues, Qur'aan, root word of accounting hasaba

Procedia PDF Downloads 413
281 An Observational Study of Vitamin B12 Levels and Peripheral Neuropathy Profile in Patients of Diabetes Mellitus on Metformin Therapy

Authors: Kamesh Gupta, Nitin Jain, Anurag Rohatgi

Abstract:

Objective: To study Vitamin B12 levels and presence of peripheral neuropathy among diabetes mellitus patients on metformin therapy. Method: The observational study was conducted from November 2014 to March 2015. Patients were selected from the Lady Hardinge Medical College, Delhi, India. Exhaustive history regarding dietary habits and metformin usage was taken. Lab tests including HbA1c levels and Vit B12 assays were done, on the basis of which patients were classified into subgroups. Peripheral neuropathy was detected by both clinical scoring and electrophysiological studies. Appropriate Statistical analysis for observational studies was done to evaluate the data. Results: The average duration of metformin usage was higher in patients with definite B12 deficiency (9.4y) than patients with normal B12 levels (5.6 y). Patients in the definite B12 deficiency group had much higher incidence of neuropathy (89%) than patients with no deficiency (27%). The incidence of neuropathy was higher in cases with longer metformin usage (100% with 18-22y of use and 83% with 14-17y of use) than shorter periods (29% with 2-5y of use and 75% with 6-9y of use). Conclusion: Thus patients on long-term metformin therapy are at a high risk for Vitamin B12 deficiency. Definite and possible Vitamin B12 deficiency on metformin had an earlier onset of neuropathy than the subgroup with normal Vitamin B12 levels.

Keywords: diabetic neuroptahy, cobalamine deficiency, metformin, nerve conduction studies

Procedia PDF Downloads 357
280 Nutrient Foramina of the Lunate Bone of the Hand – an Anatomical Study

Authors: P.J. Jiji, B.V. Murlimanju, Latha V. Prabhu, Mangala M. Pai

Abstract:

Background: The lunate bone dislocation can lead to the compression of the median nerve and subsequent carpal tunnel syndrome. The dislocation can interrupt the vasculature and would cause avascular necrosis. The objective of the present study was to study the morphology and number of the nutrient foramina in the cadaveric dried lunate bones of the Indian population. Methods: The present study included 28 lunate bones (13 right sided and 15 left sided) which were obtained from the gross anatomy laboratory of our institution. The bones were macroscopically observed for the nutrient foramina and the data was collected with respect to their number. The tabulation of the data and analysis were done. Results: All of our specimens (100%) exhibited the nutrient foramina over the non-articular surfaces. The foramina were observed only over the palmar and dorsal surfaces of the lunate bones. The foramen ranged between 2 and 10. The foramina were more in number over the dorsal surface (average number 3.3) in comparison to the palmar surface (average number 2.4). Conclusion: We believe that the present study has provided important data about the nutrient foramina of the lunate bones. The data is enlightening to the orthopedic surgeon and would help in the hand surgeries. The morphological knowledge of the vasculature, their foramina of entry and their number is required to understand the concepts in the lunatomalacia and Kienbock’s disease.

Keywords: avascular necrosis, foramen, lunate, nutrient

Procedia PDF Downloads 241
279 Epileptic Seizures in Patients with Multiple Sclerosis

Authors: Anat Achiron

Abstract:

Background: Multiple sclerosis (MS) is a chronic autoimmune disease that affects the central nervous system in young adults. It involves the immune system attacking the protective covering of nerve fibers (myelin), leading to inflammation and damage. MS can result in various neurological symptoms, such as muscle weakness, coordination problems, and sensory disturbances. Seizures are not common in MS, and the frequency is estimated between 0.4 to 6.4% over the disease course. Objective: Investigate the frequency of seizures in individuals with multiple sclerosis and to identify associated risk factors. Methods: We evaluated the frequency of seizures in a large cohort of 5686 MS patients followed at the Sheba Multiple Sclerosis Center and studied associated risk factors and comorbidities. Our research was based on data collection using a cohort study design. We applied logistic regression analysis to assess the strength of associations. Results: We found that younger age at onset, longer disease duration, and prolonged time to immunomodulatory treatment initiation were associated with increased risk for seizures. Conclusions: Our findings suggest that seizures in people with MS are directly related to the demyelination process and not associated with other factors like medication side effects or comorbid conditions. Therefore, initiating immunomodulatory treatment early in the disease course could reduce not only disease activity but also decrease seizure risk.

Keywords: epilepsy, seizures, multiple sclerosis, white matter, age

Procedia PDF Downloads 61
278 Hot Face of Cold War: 007 James Bond

Authors: Günevi Uslu Evren

Abstract:

Propaganda is one of the most effective methods for changing individual and mass opinions. Propaganda tries to get the message across to people or masses to effect rather than to provide objective information. There are many types of propaganda. Especially, political propaganda is a very powerful method that is used by states during in both war and peace. The aim of this method is to create a reaction against them by showing within the framework of internal and external enemies. Propaganda can be practiced by many different methods. Especially during the Cold War Era, the US and USSR have tried to create an ideological effect by using the mass media intensively. Cinema, which is located at the beginning of these methods, is the most powerful weapon to influence the masses. In this study, the historical process of the Cold War is examined. Especially, these propagandas that had been used by United States and The Soviet Union were investigated. The purposes of propaganda and construction methods were presented. Cold War events and relations between the US and the USSR during the Cold War will be discussed. Outlooks of two countries to each other during the Cold War, propaganda techniques used defectively during Cold War and how to use the cinema as a propaganda tool will be examined. The film "From Russia with Love, James Bond 007" that was filmed in Cold War were examined to explain how cinema was used as a propaganda tool in this context.

Keywords: cinema, cold war, James Bond, propaganda

Procedia PDF Downloads 515
277 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 256
276 Cardiolipin-Incorporated Liposomes Carrying Curcumin and Nerve Growth Factor to Rescue Neurons from Apoptosis for Alzheimer’s Disease Treatment

Authors: Yung-Chih Kuo, Che-Yu Lin, Jay-Shake Li, Yung-I Lou

Abstract:

Curcumin (CRM) and nerve growth factor (NGF) were entrapped in liposomes (LIP) with cardiolipin (CL) to downregulate the phosphorylation of mitogen-activated protein kinases for Alzheimer’s disease (AD) management. AD belongs to neurodegenerative disorder with a gradual loss of memory, yielding irreversible dementia. CL-conjugated LIP loaded with CRM (CRM-CL/LIP) and that with NGF (NGF-CL/LIP) were applied to AD models of SK-N-MC cells and Wistar rats with an insult of β-amyloid peptide (Aβ). Lipids comprising 1,2-dipalmitoyl-sn-glycero-3- phosphocholine (Avanti Polar Lipids, Alabaster, AL), 1',3'-bis[1,2- dimyristoyl-sn-glycero-3-phospho]-sn-glycerol (CL; Avanti Polar Lipids), 1,2-dipalmitoyl-sn-glycero-3-phosphoethanolamine-N- [methoxy(polyethylene glycol)-2000] (Avanti Polar Lipids), 1,2-distearoyl-sn-glycero-3-phosphoethanolamine-N-[carboxy(polyethylene glycol)-2000] (Avanti Polar Lipids) and CRM (Sigma–Aldrich, St. Louis, MO) were dissolved in chloroform (J. T. Baker, Phillipsburg, NJ) and condensed using a rotary evaporator (Panchum, Kaohsiung, Taiwan). Human β-NGF (Alomone Lab, Jerusalem, Israel) was added in the aqueous phase. Wheat germ agglutinin (WGA; Medicago AB, Uppsala, Sweden) was grafted on LIP loaded with CRM for (WGA-CRM-LIP) and CL-conjugated LIP loaded with CRM (WGA-CRM-CL/LIP) using 1-ethyl-3-(3-dimethylaminopropyl) carbodiimide (Sigma–Aldrich) and N-hydroxysuccinimide (Alfa Aesar, Ward Hill, MA). The protein samples of SK-N-MC cells (American Type Tissue Collection, Rockville, MD) were used for sodium dodecyl sulfate (Sigma–Aldrich) polyacrylamide gel (Sigma–Aldrich) electrophoresis. In animal study, the LIP formulations were administered by intravenous injection via a tail vein of male Wistar rats (250–280 g, 8 weeks, BioLasco, Taipei, Taiwan), which were housed in the Animal Laboratory of National Chung Cheng University in accordance with the institutional guidelines and the guidelines of Animal Protection Committee under the Council of Agriculture of the Republic of China. We found that CRM-CL/LIP could inhibit the expressions of phosphorylated p38 (p-p38), p-Jun N-terminal kinase (p-JNK), and p-tau protein at serine 202 (p-Ser202) to retard the neuronal apoptosis. Free CRM and released CRM from CRM-LIP and CRM-CL/LIP were not in a straightforward manner to effectively inhibit the expression of p-p38 and p-JNK in the cytoplasm. In addition, NGF-CL/LIP enhanced the quantities of p-neurotrophic tyrosine kinase receptor type 1 (p-TrkA) and p-extracellular-signal-regulated kinase 5 (p-ERK5), preventing the Aβ-induced degeneration of neurons. The membrane fusion of NGF-LIP activated the ERK5 pathway and the targeting capacity of NGF-CL/LIP enhanced the possibility of released NGF to affect the TrkA level. Moreover, WGA-CRM-LIP improved the permeation of CRM across the blood–brain barrier (BBB) and significantly reduced the Aβ plaque deposition and malondialdehyde level and increased the percentage of normal neurons and cholinergic function in the hippocampus of AD rats. This was mainly because the encapsulated CRM was protected by LIP against a rapid degradation in the blood. Furthermore, WGA on LIP could target N-acetylglucosamine on endothelia and increased the quantity of CRM transported across the BBB. In addition, WGA-CRM-CL/LIP could be effective in suppressing the synthesis of acetylcholinesterase and reduced the decomposition of acetylcholine for better neurotransmission. Based on the in vitro and in vivo evidences, WGA-CRM-CL/LIP can rescue neurons from apoptosis in the brain and can be a promising drug delivery system for clinical AD therapy.

Keywords: Alzheimer’s disease, β-amyloid, liposome, mitogen-activated protein kinase

Procedia PDF Downloads 328
275 Rathke’s Cleft Cyst Presenting as Unilateral Visual Field Defect

Authors: Ritesh Verma, Manisha Rathi, Chand Singh Dhull, Sumit Sachdeva, Jitender Phogat

Abstract:

A Rathke's cleft cyst is a benign growth found on the pituitary gland in the brain, specifically a fluid-filled cyst in the posterior portion of the anterior pituitary gland. It occurs when the Rathke's pouch does not develop properly and ranges in size from 2 to 40mm in diameter. A 38-year-old male presented to the outpatient department with loss of vision in the inferior quadrant of the left eye since 15 days. Visual acuity was 6/6 in the right eye and 6/9 in the left eye. Visual field analysis by HFA-24-2 revealed an inferior field defect extending to the supero-temporal quadrant in the left eye. MRI brain and orbit was advised to the patient and it revealed a well defined cystic pituitary adenoma indenting left optic nerve near optic chiasm consistent with the diagnosis of Rathke’s cleft cyst (RCC). The patient was referred to neurosurgery department for further management. Symptoms vary greatly between individuals having RCCs. RCCs can be non-functioning, functioning, or both. Besides headaches, neurocognitive deficits are almost always present but have a high rate of immediate reversal if the cyst is properly treated or drained.

Keywords: pituitary tumors, rathke’s cleft cyst, visual field defects, vision loss

Procedia PDF Downloads 193
274 The Role of QX-314 and Capsaicin in Producing Long-Lasting Local Anesthesia in the Animal Model of Trigeminal Neuralgia

Authors: Ezzati Givi M., Ezzatigivi N., Eimani H.

Abstract:

Trigeminal Neuralgia (TN) consists of painful attacks often triggered with general activities, which cause impairment and disability. The first line of treatment consists of pharmacotherapy. However, the occurrence of many side-effects limits its application. Acute pain relief is crucial for titrating oral drugs and making time for neurosurgical intervention. This study aimed to examine the long-term anesthetic effect of QX-314 and capsaicin in trigeminal neuralgia using an animal model. TN was stimulated by surgical constriction of the infraorbital nerve in rats. After seven days, anesthesia infiltration was done, and the duration of mechanical allodynia was compared. Thirty-five male Wistar rats were randomly divided into seven groups as follows: control (normal saline); lidocaine (2%); QX314 (30 mM); lidocaine (2%)+QX314 (15 mM); lidocaine (2%)+QX314 (22 mM); lidocaine (2%)+QX314 (30 mM); and lidocaine (2%)+QX314 (30 mM) +capsaicin (1μg). QX314 in combination with lidocaine significantly increased the duration of anesthesia, which was dose-dependent. The combination of lidocaine+QX314+capsaicin could significantly increase the duration of anesthesia in trigeminal neuralgia. In the present study, we demonstrated that the combination of QX-314 with lidocaine and capsaicin produced a long-lasting, reversible local anesthesia and was superior to lidocaine alone in the fields of the duration of trigeminal neuropathic pain blockage.

Keywords: trigeminal neuralgia, capsaicin, lidocaine, long-lasting

Procedia PDF Downloads 109
273 Multimodal Database of Emotional Speech, Video and Gestures

Authors: Tomasz Sapiński, Dorota Kamińska, Adam Pelikant, Egils Avots, Cagri Ozcinar, Gholamreza Anbarjafari

Abstract:

People express emotions through different modalities. Integration of verbal and non-verbal communication channels creates a system in which the message is easier to understand. Expanding the focus to several expression forms can facilitate research on emotion recognition as well as human-machine interaction. In this article, the authors present a Polish emotional database composed of three modalities: facial expressions, body movement and gestures, and speech. The corpora contains recordings registered in studio conditions, acted out by 16 professional actors (8 male and 8 female). The data is labeled with six basic emotions categories, according to Ekman’s emotion categories. To check the quality of performance, all recordings are evaluated by experts and volunteers. The database is available to academic community and might be useful in the study on audio-visual emotion recognition.

Keywords: body movement, emotion recognition, emotional corpus, facial expressions, gestures, multimodal database, speech

Procedia PDF Downloads 346
272 Analysis of Building Response from Vertical Ground Motions

Authors: George C. Yao, Chao-Yu Tu, Wei-Chung Chen, Fung-Wen Kuo, Yu-Shan Chang

Abstract:

Building structures are subjected to both horizontal and vertical ground motions during earthquakes, but only the horizontal ground motion has been extensively studied and considered in design. Most of the prevailing seismic codes assume the vertical component to be 1/2 to 2/3 of the horizontal one. In order to understand the building responses from vertical ground motions, many earthquakes records are studied in this paper. System identification methods (ARX Model) are used to analyze the strong motions and to find out the characteristics of the vertical amplification factors and the natural frequencies of buildings. Analysis results show that the vertical amplification factors for high-rise buildings and low-rise building are 1.78 and 2.52 respectively, and the average vertical amplification factor of all buildings is about 2. The relationship between the vertical natural frequency and building height was regressed to a suggested formula in this study. The result points out an important message; the taller the building is, the greater chance of resonance of vertical vibration on the building will be.

Keywords: vertical ground motion, vertical amplification factor, natural frequency, component

Procedia PDF Downloads 312
271 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 238
270 Unusual High Origin and Superficial Course of Radial Artery: A Case Report with Embryological Explanation

Authors: Anasuya Ghosh, Subhramoy Chaudhury

Abstract:

During routine cadaveric dissection at gross anatomy lab of our institution, a radial artery was found with unusual origin and superficial course. Normally the radial artery takes its origin as one of the terminal branches of brachial artery at the level of the neck of radius. It usually lies along the lateral border of fore arm deep to the brachioradialis muscle. While dissecting a 72-year-old Caucasian female cadaver, it was found that the right sided radial artery originated from the upper part of brachial artery of arm, 2 cm below the lower border of teres major muscle, from the lateral aspect of brachial artery. Then the radial artery superficially crossed the brachial artery and median nerve from lateral to medial direction and rested superficially at the cubital fossa. Embryologically, it can be explained as a failure of disappearance, or abnormal persistence of some insignificant embryonic vessels may give rise to this kind of vascular anomalies. As radial artery is one of the most important upper limb arteries, its variation and related complications are clinically significant. This unusual origin and course of radial artery should be kept in mind by all healthcare providers including surgeons and radiologists during routine venipuncture, orthopedic and plastic surgeries of arm, coronary angiographic procedures in radial approach etc. to prevent unwanted complications.

Keywords: brachial artery anomalies, brachio-radial artery, high origin radial artery, superficial radial artery

Procedia PDF Downloads 322
269 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 155
268 Solution of Singularly Perturbed Differential Difference Equations Using Liouville Green Transformation

Authors: Y. N. Reddy

Abstract:

The class of differential-difference equations which have characteristics of both classes, i.e., delay/advance and singularly perturbed behaviour is known as singularly perturbed differential-difference equations. The expression ‘positive shift’ and ‘negative shift’ are also used for ‘advance’ and ‘delay’ respectively. In general, an ordinary differential equation in which the highest order derivative is multiplied by a small positive parameter and containing at least one delay/advance is known as singularly perturbed differential-difference equation. Singularly perturbed differential-difference equations arise in the modelling of various practical phenomena in bioscience, engineering, control theory, specifically in variational problems, in describing the human pupil-light reflex, in a variety of models for physiological processes or diseases and first exit time problems in the modelling of the determination of expected time for the generation of action potential in nerve cells by random synaptic inputs in dendrites. In this paper, we envisage the use of Liouville Green Transformation to find the solution of singularly perturbed differential difference equations. First, using Taylor series, the given singularly perturbed differential difference equation is approximated by an asymptotically equivalent singularly perturbation problem. Then the Liouville Green Transformation is applied to get the solution. Several model examples are solved, and the results are compared with other methods. It is observed that the present method gives better approximate solutions.

Keywords: difference equations, differential equations, singular perturbations, boundary layer

Procedia PDF Downloads 191
267 Improving Communication System through Router Configuration: The Nigerian Navy Experience

Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale

Abstract:

The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.

Keywords: C-band, communication, router, VSAT

Procedia PDF Downloads 361
266 Da’wah (Proselytization) and Qur’anic Moral Excellence: An Exposition

Authors: Attahir Shehu Mainiyo, Ahmad Ibrahim Karfe

Abstract:

The Glorious Qur’an, as the central religious text of Islam, addresses various aspects of human life and provides guidance for personal and societal development. It also outlines the moral excellence of individuals and communities, focusing on spiritual, moral, and social dimensions. Da’wah is the act of inviting others to Islam, emphasizing the significance of conveying the message with kindness, patience, and understanding. Qur’anic moral excellence, as evinced in the Qur’an encompasses virtues such as compassion, honesty, humility, patience, and generosity. The Glorious Qur’an, therefore, harps on the importance of embodying these values in daily life, serving as a guide for individuals engaged in Da’wah activities to exemplify moral excellence through their actions and characters. It is in line with this backdrop that this article intends to assess the Da’wah and Qur’anic Moral Excellence. However, to achieve the objectives of the research, the article attempts to answer some basic questions. Emphasizes were laid in the Glorious on the need to invite others to the true path of Islam and the qualities of Da’i necessary for his Da’wah activities. The paper also discussed the impact of Qur’anic moral excellence on the Da’i and those invited to Islam. The paper adopts an analytical methodology and utilizes secondary data for the research.

Keywords: Da'wah, Qur'an, moral, excellence

Procedia PDF Downloads 43
265 Development of a Smart Liquid Level Controller

Authors: Adamu Mudi, Ibrahim Wahab Fawole, Abubakar Abba Kolo

Abstract:

In this research paper, we present a microcontroller-based liquid level controller that identifies the various levels of a liquid, carries out certain actions, and is capable of communicating with the human being and other devices through the GSM network. This project is useful in ensuring that a liquid is not wasted. It also contributes to the internet of things paradigm, which is the future of the internet. The method used in this work includes designing the circuit and simulating it. The circuit is then implemented on a solderless breadboard, after which it is implemented on a strip board. A C++ computer program is developed and uploaded into the microcontroller. This program instructs the microcontroller on how to carry out its actions. In other to determine levels of the liquid, an ultrasonic wave is sent to the surface of the liquid similar to radar or the method for detecting the level of sea bed. Message is sent to the phone of the user similar to the way computers send messages to phones of GSM users. It is concluded that the routine of observing the levels of a liquid in a tank, refilling the tank when the liquid level is too low can be entirely handled by a programmable device without wastage of the liquid or bothering a human being with such tasks.

Keywords: Arduino Uno, HC-SR04 ultrasonic sensor, internet of things, IoT, SIM900 GSM module

Procedia PDF Downloads 121
264 Street Art Lenses: A Glimpse into the Street Artists’ Identity and Socio-Political Perspective in Brussels

Authors: José Francisco Urrutia Reyes, Judith Espinosa Real

Abstract:

This paper is meant to re-examine the role of street art in the contemporary world. By studying this form of art in Brussels, it can be explained how murals show the socio-political reality of a given community and influence on its interaction. Through the definitions of street art, murals and street artists, and analysing their role in Brussels, it is possible to understand how this counter culture movement serves as an engine of social development, as it interacts with its surroundings sending a clear message to a wider audience. Street art impacts on its environment because it interacts with the people who occupies the day-to-day public space. This has proven to be effective in the arouse of social consciousness, up to the point of being adopted by the government of Brussels to promote social movements such as the AIDS-HIV campaign along with the Plate-Forme Prévention Sida. It can be concluded that street art has evolved since its vandalic beginnings, to become a form of art that has not lost it counter official status, but now has a critical vision that can promote social awakening. Street art is now a global trend that uses visual inputs to create a positive impact.

Keywords: street art, Brussels, social impact, political perspective

Procedia PDF Downloads 354
263 Initiative Programme to Reform Education in Thailand

Authors: Piyapat Chitpirom, Teerakiat Jareonsettasin, Chintida Vichitsophaphan

Abstract:

The Foundation of Virtuous Youth was established and supported by the Crown Property Bureau, with the intention to instill goodness in Thai youth. The Centre for Educational Psychology is one of the three units under the foundation. We aim to develop programmes that can be used to improve the quality of education in schools. Translation of the King’s message in keeping with the modern research from various sources, our team create 6 programmes: (1) Teacher-Student Relationship (2) Growth Mindset (3) Socratic Teaching (4) Peer Tutoring (5) Parental Involvement (6) Inclusion. After nine months of implementing the programmes in the schools, we found that there were more cooperation between student-student, teacher-student, teacher-parent, and student-parent and the school regained trust from the community. Our ideas were accepted well by the government as our director was promoted to be the Vice Minister of Education in order to implement our programmes into national education system. We consider that the key of our success is that we do practical things. We are still continuing, improving, and learning from our work with hope that the quality of Thai education will improve in near future.

Keywords: education reform, educational psychology, effective teaching, teacher-student relationship

Procedia PDF Downloads 423
262 Chinese College Students’ Intercultural Competence and Culture Learning Through Telecollaboration

Authors: Li Yuqing

Abstract:

Fostering the development of intercultural (communicative) competence (IC) is one way to equip our students with the linguistic and cultural skills to communicate effectively with people from diverse backgrounds, particularly English majors who are most likely to encounter multicultural work environments in the future. The purpose of this study is to compare the English majors' intercultural competence in terms of cognitive, affective, and behavioral aspects before and after a ten-week telecollaboration program between 23 English majors at a Chinese university and 23 American students enrolled in a Chinese class at an American university, and analyze their development during the program. The results indicate that subjects' cognitive, affective, and behavioral perceptions of IC improved significantly over time. In addition, the program had significant effects on the participants' “Interaction Confidence,” “Interaction Engagement,” and “Interaction Enjoyment” - three components of intercultural sensitivity - as well as their overall intercultural effectiveness (except for “Message Skills”). With the widespread use of the internet, this type of online cultural exchange has a promising future, as suggested by the findings of the current study.

Keywords: intercultural competence, English majors, computer-mediated communication, telecollaboration

Procedia PDF Downloads 71
261 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 75
260 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 331
259 Bank ATM Monitoring System Using IR Sensor

Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari

Abstract:

This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.

Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver

Procedia PDF Downloads 303
258 Transporting the Setting of the Beloved Musical, Peter Pan, to Colonial India

Authors: R. Roznowski

Abstract:

This paper is an examination of a recent Michigan State University production of the classic musical, Peter Pan. In this production, approved by the licensor, the action was moved to Colonial India transforming the musical’s message to include themes of cultural identity, racism, classism and ultimately inclusion. Major character changes and casting decisions expanded the scope of the musical while still retaining the original book and score. Major changes included reframing the Darlings as British Colonials stationed in India. The Lost Boy’s as mixed race children of British officials and their Indian nannies, the Pirates were a female 'fishing fleet' a group of women sent from England to keep the British soldiers from mixing with the locals and the Michigan State University Bhangra Dance Team played the Indians in the production. Traditional Indian theatrical techniques were also employed in the storytelling. The presentation will cover the key changes to the musical, the rehearsal process, historical accuracy and audience reaction. A final analysis of cultural appropriation versus historical reframing will be examined.

Keywords: directing, history, musical theatre, producing

Procedia PDF Downloads 238
257 How Much for a Dancer? Culture Policy in Japan and Czech Republic towards Dance

Authors: Lucie Hayashi

Abstract:

This paper offers a view on a different approach towards a dancer´s career in two very dissimilar countries: on one hand Japan, an economic predator at the end of last century, but suffering under economic crisis from the beginning of the new century; and the Czech Republic, a post-communist country, caught up in capitalist fever from the 1990s on the other. The government’s approach towards culture and dance in these two countries not only has a different history and nature, but also presents a different take on the ideal future development in its respective dance scenes. The level of support from the state budget echoes in all the fields of a professional dance career, dance art and the education of the public towards dance. The message of the statistic data is clear: the production of an enormous number of well trained and expensively educated dancers with no jobs for them in Japan, and a lack of good dancers ready to fill state supported theatre companies in the Czech Republic (that gladly employs Japanese dancers). The paradigm leaves a big exclamation mark on the huge influence the policy has on dance in society, and a question mark on the ideal situation.

Keywords: culture policy, dance, education, employment, Czech Republic, Japan

Procedia PDF Downloads 157