Search results for: authentication mechanism
2866 Defense Mechanism Maturity and the Severity of Mood Disorder Symptoms
Authors: Maja Pandža, Sanjin Lovrić, Iva Čolak, Josipa Mandarić, Miro Klarić
Abstract:
This study explores the role of symptoms related to mood disorders salience on different types of defense mechanisms (mature, neurotic, immature) predominance. Total of 177 both clinical and non-clinical participants in Mostar, Bosnia & Herzegovina, completed a battery of questionnaires associated with defense mechanisms and self-reported depression and anxiety symptoms. The sample was additionally divided into four groups, given the level of symptoms experienced: 1. minimal, 2. mild, 3. moderate, 4. severe depression/anxiety. Participants with minimal anxiety and depression symptoms use mature defense mechanisms more often than other three groups. Immature mechanisms are most commonly used by the group with severe depression/anxiety levels in comparison with other groups. These differences are discussed on the dynamic level of analysis to have a better understanding of the relationship between defense mechanisms' maturity and degree of mood disorders' symptom severity. Also, results given could serve as an implication for the psychotherapeutic treatment plans.Keywords: anxiety/depression symptoms, clinical/non-clinical sample, defense mechanism maturity, dynamic approach
Procedia PDF Downloads 4552865 Study of Electrical Properties of An-Fl Based Organic Semiconducting Thin Film
Authors: A.G. S. Aldajani, N. Smida, M. G. Althobaiti, B. Zaidi
Abstract:
In order to exploit the good electrical properties of anthracene and the excellent properties of fluorescein, new hybrid material has been synthesized (An-Fl). Current-voltage measurements were done on a new single-layer ITO/An-FL/Al device of typically 100 nm thickness. Atypical diode behavior is observed with a turn-on voltage of 4.4 V, a dynamic resistance of 74.07 KΩ and a rectification ratio of 2.02 due to unbalanced transport. Results show also that the current-voltage characteristics present three different regimes of the power-law (J~Vᵐ) for which the conduction mechanism is well described with space-charge-limited current conduction mechanism (SCLC) with a charge carrier mobility of 2.38.10⁻⁵cm2V⁻¹S⁻¹. Moreover, the electrical transport properties of this device have been carried out using a dependent frequency study in the range (50 Hz–1.4 MHz) for different applied biases (from 0 to 6 V). At lower frequency, the σdc values increase with bias voltage rising, supporting that the mobile ion can hop successfully to its nearest vacant site. From σac and impedance measurements, the equivalent electrical circuit is evidenced, where the conductivity process is coherent with an exponential trap distribution caused by structural defects and/or chemical impurities.Keywords: semiconducting polymer, conductivity, SCLC, impedance spectroscopy
Procedia PDF Downloads 1772864 A Hybrid Watermarking Model Based on Frequency of Occurrence
Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis
Abstract:
Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: authentication, copyright protection, information hiding, ownership, watermarking
Procedia PDF Downloads 5642863 A Multimodal Approach to Improve the Performance of Biometric System
Authors: Chander Kant, Arun Kumar
Abstract:
Biometric systems automatically recognize an individual based on his/her physiological and behavioral characteristics. There are also some traits like weight, age, height etc. that may not provide reliable user recognition because of there common and temporary nature. These traits are called soft bio metric traits. Although soft bio metric traits are lack of permanence to uniquely and reliably identify an individual, yet they provide some beneficial evidence about the user identity and may improve the system performance. Here in this paper, we have proposed an approach for integrating the soft bio metrics with fingerprint and face to improve the performance of personal authentication system. In our approach we have proposed a combined architecture of three different sensors to elevate the system performance. The approach includes, soft bio metrics, fingerprint and face traits. We have also proven the efficiency of proposed system regarding FAR (False Acceptance Ratio) and total response time, with the help of MUBI (Multimodal Bio metrics Integration) software.Keywords: FAR, minutiae point, multimodal bio metrics, primary bio metric, soft bio metric
Procedia PDF Downloads 3442862 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 3572861 Frequency of Occurrence Hybrid Watermarking Scheme
Authors: Hamza A. Ali, Adnan H. M. Al-Helali
Abstract:
Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication
Procedia PDF Downloads 3672860 The State Support to the Tourism Policy Formation Mechanism in Black Sea Basin Countries (Azerbaijan, Turkey, Russia, Georgia) and Its Impact on Sustainable Tourism Development
Authors: A. Bahar Ganiyeva, M. Sabuhi Tanriverdiyev
Abstract:
The article analyzes state support and policy mechanisms aimed at driving tourism as one of the vibrant and rapidly developing economies. State programs and long-range strategic roadmaps and previous programs execution, results and their impact on the particular countries economy have been raised during the research. This theme provides a useful framework for discussions with a wider range of stakeholders as the implications arising are of importance both for academics and practitioners engaged in hospitality and tourism development and research. The impact that tourism has on sustainable regional development in emerging markets is highly substantial. For Azerbaijan, Turkey, Georgia, and Russia, with their rich natural resources and cultural heritage, tourism can be an important basis for economic expansion, and a way to form an acceptable image of the countries as safe, open, hospitable, and complex.Keywords: Sustainable tourism, hospitality, destination, strategic roadmap, tourism, economy, growth, state support, mechanism, policy formation, state program
Procedia PDF Downloads 1532859 Artificial Reproduction System and Imbalanced Dataset: A Mendelian Classification
Authors: Anita Kushwaha
Abstract:
We propose a new evolutionary computational model called Artificial Reproduction System which is based on the complex process of meiotic reproduction occurring between male and female cells of the living organisms. Artificial Reproduction System is an attempt towards a new computational intelligence approach inspired by the theoretical reproduction mechanism, observed reproduction functions, principles and mechanisms. A reproductive organism is programmed by genes and can be viewed as an automaton, mapping and reducing so as to create copies of those genes in its off springs. In Artificial Reproduction System, the binding mechanism between male and female cells is studied, parameters are chosen and a network is constructed also a feedback system for self regularization is established. The model then applies Mendel’s law of inheritance, allele-allele associations and can be used to perform data analysis of imbalanced data, multivariate, multiclass and big data. In the experimental study Artificial Reproduction System is compared with other state of the art classifiers like SVM, Radial Basis Function, neural networks, K-Nearest Neighbor for some benchmark datasets and comparison results indicates a good performance.Keywords: bio-inspired computation, nature- inspired computation, natural computing, data mining
Procedia PDF Downloads 2712858 Experimentally Validated Analytical Model for Thermal Analysis of Multi-Stage Depressed Collector
Authors: Vishant Gahlaut, A Mercy Latha, Sanjay Kumar Ghosh
Abstract:
Multi-stage depressed collectors (MDC) are used as an efficiency enhancement technique in traveling wave tubes the high-energy electron beam, after its interaction with the RF signal, gets velocity sorted and collected at various depressed electrodes of the MDC. The ultimate goal is to identify an optimum thermal management scheme (cooling mechanism) that could extract the heat efficiently from the electrodes. Careful thermal analysis, incorporating the cooling mechanism is required to ensure that the maximum temperature does not exceed the safe limits. A simple analytical model for quick prediction of the thermal has been developed. The model has been developed for the worst-case un-modulated DC condition, where all the thermal power is dissipated in the last electrode (typically, fourth electrode in the case of the four-stage depressed collector). It considers the thermal contact resistances at various braze joints accounting for the practical non-uniformities. Analytical results obtained from the model have been validated with simulated and experimental results.Keywords: multi-stage depressed collector, TWTs, thermal contact resistance, thermal management
Procedia PDF Downloads 2212857 Antibacterial Activity of Noble Metal Functionalized Magnetic Core-Zeolitic Shell Nanostructures
Authors: Mohsen Padervand
Abstract:
Functionalized magnetic core-zeolitic shell nanostructures were prepared by the hydrothermal and coprecipitation methods. The products were characterized by Vibrating Sample Magnetometer (VSM), X-ray powder diffraction (XRD), Fourier Transform Infrared spectra (FTIR), nitrogen adsorption-desorption isotherms (BET) and Transmission Electron Microscopy (TEM). The growth of mordenite nanoparticles on the surface of silica coated nickel ferrite nanoparticles at the presence of organic templates was well approved. The antibacterial activity of prepared samples was investigated by the inactivation of E.coli as a gram negative bacterium. A new mechanism was proposed to inactivate the bacterium over the prepared samples. Minimum Inhibitory Concentration (MIC) and reuse ability were studied too. TEM images of the destroyed microorganism after the treatment time were applied to illustrate the inactivation mechanism. The interaction of the noble metals with organic components on the surface of nanostructures studied theoretically and the results were used to interpret the experimental results.Keywords: nickel ferrite nanoparticles, magnetic core-zeolitic shell, antibacterial activity, E. coli
Procedia PDF Downloads 3292856 Evolution Mechanism of the Formation of Rock Heap under Seismic Action and Analysis on Engineering Geological Structure
Authors: Jian-Xiu Wan, Yao Yin
Abstract:
In complex terrain and poor geological conditions areas, Railway, highway and other transportation constructions are still strongly developing. However, various geological disasters happened such as landslide, rock heap and so on. According to the results of geological investigation, the form of skirt (trapezoidal), semicircle and triangle rock heaps are mainly due to complex internal force and external force, in a certain extent, which is related to the terrain, the nature of the rock mass, the supply area and the surface shape of rock heap. Combined with the above factors, discrete element numerical simulation of rock mass is established under different terrain conditions based on 3DEC, and accelerated formation process of rock heap under seismic action is simulated. The fragmentation structure supply area is calculated, in which the most dangerous area is located. At the same time, the formation mechanism and development process are studied in different terrain conditions, and the structure of rock heap is judged by section, which can provide a strong theoretical and technical support for the prevention and control of geological disasters.Keywords: 3DEC, fragmentation structure, rock heap, slope, seismic action
Procedia PDF Downloads 2942855 A Semi-Automatic Mechanism Used in the Peritoneal Dialysis Connection
Authors: I-En Lin, Feng-Jung Yang
Abstract:
In addition to kidney transplant, renal replacement therapy involves hemodialysis and peritoneal dialysis (PD). PD possesses advantages such as maintaining stable physiological blood status and blood pressure, alleviating anemia, and improving mobility, which make it an ideal method for at-home dialysis treatment. However, potential danger still exists despite the numerous advantages of PD, particularly when patients require dialysis exchange four to five times a day, during which improper operation can easily lead to peritonitis. The process of draining and filling is called an exchange and takes about 30 to 40 minutes. Connecting the transfer set requires sterile technique. Transfer set may require a new cap each time that it disconnects from the bag after an exchange. There are many chances to get infection due to unsafe behavior (ex: hand tremor, poor eyesight and weakness, cap fall-down). The proposed semi-automatic connection mechanism used in the PD can greatly reduce infection chances. This light-weight connection device is portable. The device also does not require using throughout the entire process. It is capable of significantly improving quality of life. Therefore, it is very promising to adopt in home care application.Keywords: automatic connection, catheter, glomerulonephritis, peritoneal dialysis
Procedia PDF Downloads 2352854 Alcoxysilanes Production from Silica and Dimethylcarbonate Promoted by Alkali Bases: A DFT Investigation of the Reaction Mechanism
Authors: Valeria Butera, Norihisa Fukaya, Jun-Chu Choi, Kazuhiko Sato, Yoong-Kee Choe
Abstract:
Several silicon dioxide sources can react with dimethyl carbonate (DMC) in presence of alkali bases catalysts to ultimately produce tetramethoxysilane (TMOS). Experimental findings suggested that the reaction proceeds through several steps in which the first molecule of DMC is converted to dimethylsilyloxide (DMOS) and CO₂. Following the same mechanistic steps, a second molecule of DMC reacts with the DMOS to afford the final product TMOS. Using a cluster model approach, a quantum-mechanical investigation of the first part of the reaction leading to DMOS formation is reported with a twofold purpose: (1) verify the viability of the reaction mechanism proposed on the basis of experimental evidences .(2) compare the behaviors of three different alkali hydroxides MOH, where M=Li, K and Cs, to determine whether diverse ionic radius and charge density can be considered responsible for the observed differences in reactivity. Our findings confirm the observed experimental trend and furnish important information about the effective role of the alkali hydroxides giving an explanation of the different catalytic activity of the three metal cations.Keywords: Alcoxysilanes production, cluster model approach, DFT, DMC conversion
Procedia PDF Downloads 2692853 Impact of the Pandemic on China's Digital Creative Industries: Mechanisms and Manifestations
Authors: Li Qiaoming
Abstract:
The outbreak of Coronavirus disease 2019 (COVID-19) in early 2020 brought new opportunities to the development of the digital creative industry in China. Based on the realistic foundation of the development of the digital creative industry in China, an analysis was conducted on the mechanism of action of the pandemic on this industry from both sides of supply and demand by sorting out its concept, connotation, and related theories. To be specific, the demand side experienced changes due to the changes in the consumption habits of residents, the sharp increase in gross domestic time (GDT), the satisfaction of the psychological needs of users, search for substitutes for offline consumption, and other factors. An analysis was carried out on the mechanism of action of the pandemic on the digital creative industry from the production link, supply subjects, product characteristics, and transmission link of the supply side. Then, a detailed discussion was held on the manifestation forms of the impact of the pandemic from the dimensions of time and space. Finally, this paper discussed the main development focuses of the digital creative industry in the post-pandemic era from the aspects of the government, industries, and enterprises.Keywords: COVID-19, demand and supply relationship, digital creative industries, industry shocks
Procedia PDF Downloads 1492852 A Leader-Follower Kinematic-Based Control System for a Cable-Driven Hyper-Redundant Manipulator
Authors: Abolfazl Zaraki, Yoshikatsu Hayashi, Harry Thorpe, Vincent Strong, Gisle-Andre Larsen, William Holderbaum
Abstract:
Thanks to the high maneuverability of the cable-driven hyper-redundant manipulators (HRMs), this class of robots has shown a superior capability in highly confined and unstructured space applications. Although the large number of degrees of freedom (DOF) of HRMs enhances the motion flexibility and the robot’s reachability range, it highly increases the complexity of the kinematic configuration which makes the kinematic control problem very challenging or even impossible to solve. This paper presents our current progress achieved on the development of a kinematic-based leader-follower control system which is designed to control not only the robot’s body posture but also to control the trajectory of the robot’s movement in a semi-autonomous manner (the human operator is retained in the robot’s control loop). To obtain the forward kinematic model, the coordinate frames are established by the classical Denavit–Hartenburg (D-H) convention for a hyper-redundant serial manipulator which has a controlled cables-driven mechanism. To solve the inverse kinematics of the robot, unlike the conventional methods, a leader-follower mechanism, based on the sequential inverse kinematic, is followed. Using this mechanism, the inverse kinematic problem is solved for all sequential joints starting from the head joint to the base joint of the robot. To verify the kinematic design and simulate the robot motion, the MATLAB robotic toolbox is used. The simulation result demonstrated the promising capability of the proposed leader-follower control system in controlling the robot motion and trajectory in our confined space application.Keywords: hyper-redundant robots, kinematic analysis, semi-autonomous control, serial manipulators
Procedia PDF Downloads 1542851 Study on the Transition to Pacemaker of Two Coupled Neurons
Authors: Sun Zhe, Ruggero Micheletto
Abstract:
The research of neural network is very important for the development of advanced next generation intelligent devices and the medical treatment. The most important part of the neural network research is the learning. The process of learning in our brain is essentially several adjustment processes of connection strength between neurons. It is very difficult to figure out how this mechanism works in the complex network and how the connection strength influences brain functions. For this reason, we made a model with only two coupled neurons and studied the influence of connection strength between them. To emulate the neuronal activity of realistic neurons, we prefer to use the Izhikevich neuron model. This model can simulate the neuron variables accurately and it’s simplicity is very suitable to implement on computers. In this research, the parameter ρ is used to estimate the correlation coefficient between spike train of two coupling neurons.We think the results is very important for figuring out the mechanism between synchronization of coupling neurons and synaptic plasticity. The result also presented the importance of the spike frequency adaptation in complex systems.Keywords: neural networks, noise, stochastic processes, coupled neurons, correlation coefficient, synchronization, pacemaker, synaptic plasticity
Procedia PDF Downloads 2842850 The Study of Magnetic and Transport Properties in Normal State Eu1.85+yCe0.15-yCu1-yFeyO4+α-δ
Authors: Risdiana, D. Suhendar, S. Pratiwi, W. A. Somantri, T. Saragi
Abstract:
Superconductor is a promising material for future applications especially for energy saving because of their advantages properties such as zero electrical resistivity when they are cooled down to sufficiently low temperatures. However, the mechanism describing the role of physical properties in superconductor is far from being understood clearly, so that the application of this material for wider benefit in various industries is very limited. Most of superconductors are cuprate compounds, which has CuO2 as a conducting plane in their crystal structures. The study of physical properties through the partially substitution of impurity for Cu in superconducting cuprates has been one of great interests in relation to the mechanism of superconductivity. Different behaviors between the substitution of nonmagnetic impurity and magnetic impurity for Cu are observed. For examples, the superconductivity and Cu-spin fluctuations in the electron-doped system are suppressed through the substitution of magnetic Ni for Cu more markedly than through the substitution of nonmagnetic Zn for Cu, which is contrary to the result in the hole-doped system. Here, we reported the effect of partially substitution of magnetic impurity Fe for Cu to the magnetic and transport properties in electron-doped superconducting cuprates of Eu1.85+yCe0.15-yCu1-yFeyO4+α-δ (ECCFO) with y = 0.01, 0.02, and 0.05, in order to investigate the mechanism of magnetic and transport properties of ECCFO in normal-state. Magnetic properties are investigated by DC magnetic-susceptibility measurements that carried out at low temperatures down to 2 K using a standard SQUID magnetometer in a magnetic field of 5 Oe on field cooling. Transport properties addressed to electron mobility, are extracted from radius of electron localization calculated from temperature dependence of resistivity. For y = 0, temperature dependence of dc magnetic-susceptibility indicated the change of magnetic behavior from paramagnetic to diamagnetic below 15 K. Above 15 K, all samples show paramagnetic behavior with the values of magnetic moment in every volume unit increased with increasing y. Electron mobility decreased with increasing y. Some reasons for these results will be discussed.Keywords: DC magnetic-susceptibility, electron mobility, Eu1.85+yCe0.15-yCu1-yFeyO4+α-δ, normal state
Procedia PDF Downloads 3462849 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 1372848 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1102847 Synthesis, Characterization of Benzodiazepine Derivatives through Condensation Reaction, Crystal Structure, and DFT Calculations
Authors: Samir Hmaimou, Marouane Ait Lahcen, Mohamed Adardour, Mohamed Maatallah, Abdesselam Baouid
Abstract:
The stereoisomers (E)-2,2-dimethyl-4-(4-subsitutedstyryl)-2,3-dihydro-1H-[1,5]-benzodiazepine 3(a-d) were synthesized via the condensation reaction of 2,2,3 4-trimethyl-2,3-dihydro-1H-1,5-benzodiazepine (BZD) 1 with the benzaldehyde derivatives 2(a-d) in polar protic solvent as ethanol. The chemical structure of the prepared products was confirmed by NMR (¹H and ¹³C), HRMS, and X-ray analysis of the crystal structure 3d. The condensation reaction was examined using DFT calculations at the theoretical level of B3LYP/6-311G(d,p). Frontier molecular orbital analysis shows that the most favorable interaction is between the HOMO of BZD 1 and the LUMO of 2(a-d). On the other hand, the calculation of the global reactivity indices (softness, hardness, and chemical potential) confirmed that benzodiazepine BDZ 1 act as a nucleophile, whereas the aldehyde derivatives 2(a-d) play the role of electrophile. Furthermore, we identified each reagent's reactive sites by the measurement of the reactivity indices to explain the experimentally observed regioselectivity, using Fukui local reactivity descriptors. A one-step mechanism reaction and order 2 water elimination were investigated. We also looked at how the electron-withdrawing groups (EWG) of various aldehydes affected the reaction's mechanism and the stability of products 3(a-d).Keywords: benzodiazepine, DFT calculations, crystal structure, regioselective, condensation Reaction
Procedia PDF Downloads 132846 Mechanism of Charge Transport in the Interface of CsSnI₃-FASnI₃ Perovskite Based Solar Cell
Authors: Seyedeh Mozhgan Seyed-Talebi, Weng-Kent Chan, Hsin-Yi Tiffany Chen
Abstract:
Lead-free perovskite photovoltaic (PV) technology employing non-toxic tin halide perovskite absorbers is pivotal for advancing perovskite solar cell (PSC) commercialization. Despite challenges posed by perovskite sensitivity to oxygen and humidity, our study utilizes DFT calculations using VASP and NanoDCAL software and SCAPS-1D simulations to elucidate the charge transport mechanism at the interface of CsSnI₃-FASnI₃ heterojunction. Results reveal how inherent electric fields facilitate efficient carrier transport, reducing recombination losses. We predict optimized power conversion efficiencies (PCEs) and highlight the potential of CsSnI3-FASnI3 heterojunctions for cost-effective and efficient charge transport layer-free (CTLF) photovoltaic devices. Our study provides insights into the future direction of recognizing more efficient, nontoxic heterojunction perovskite devices.Keywords: charge transport layer free, CsSnI₃-FASnI₃ heterojunction, lead-free perovskite solar cell, tin halide perovskite., Charge transport layer free
Procedia PDF Downloads 442845 Moral Dilemmas, Difficulties in the Digital Games
Authors: YuPei Chang
Abstract:
In recent years, moral judgement tasks have served as an increasingly popular plot mechanism in digital gameplay. As a moral agency, the player's choice judgment in digital games is to shuttle between the real world and the game world. The purpose of the research is to explore the moral difficulties brewed by the interactive mechanism of the game and the moral choice of players. In the theoretical level, this research tries to combine moral disengagement, moral foundations theory, and gameplay as an aesthetic experience. And in the methodical level, this research tries to use methods that combine text analysis, diary method, and in-depth interviews. There are three research problems that will be solved in three stages. In the first stage, this project will explore how moral dilemmas are represented in game mechanics. In the second stage, this project will analyze the appearance and conflicts of moral dilemmas in game mechanics based on the five aspects of moral foundations theory. In the third stage, this project will try to understand the players' choices when they face the choices of moral dilemmas, as well as their explanations and reflections after making the decisions.Keywords: morality, moral disengagement, moral foundations theory, PC game, gameplay, moral dilemmas, player
Procedia PDF Downloads 782844 Preliminary Evaluation of Echinacea Species by UV-VIS Spectroscopy Fingerprinting of Phenolic Compounds
Authors: Elena Ionescu, Elena Iacob, Marie-Louise Ionescu, Carmen Elena Tebrencu, Oana Teodora Ciuperca
Abstract:
Echinacea species (Asteraceae) has received a global attention because it is widely used for treatment of cold, flu and upper respiratory tract infections. Echinacea species contain a great variety of chemical components that contribute to their activity. The most important components responsible for the biological activity are those with high molecular-weight such as polysaccharides, polyacetylenes, highly unsaturated alkamides and caffeic acid derivatives. The principal factors that may influence the chemical composition of Echinacea include the species and the part of plant used (aerial parts or roots ). In recent years the market for Echinacea has grown rapidly and also the cases of adultery/replacement especially for Echinacea root. The identification of presence or absence of same biomarkers provide information for safe use of Echinacea species in food supplements industry. The aim of the study was the preliminary evaluation and fingerprinting by UV-VISIBLE spectroscopy of biomarkers in terms of content in phenolic derivatives of some Echinacea species (E. purpurea, E. angustifolia and E. pallida) for identification and authentication of the species. The steps of the study were: (1) samples (extracts) preparation from Echinacea species (non-hydrolyzed and hydrolyzed ethanol extracts); (2) samples preparation of reference substances (polyphenol acids: caftaric acid, caffeic acid, chlorogenic acid, ferulic acid; flavonoids: rutoside, hyperoside, isoquercitrin and their aglycones: quercitri, quercetol, luteolin, kaempferol and apigenin); (3) identification of specific absorption at wavelengths between 700-200 nm; (4) identify the phenolic compounds from Echinacea species based on spectral characteristics and the specific absorption; each class of compounds corresponds to a maximum absorption in the UV spectrum. The phytochemical compounds were identified at specific wavelengths between 700-200 nm. The absorption intensities were measured. The obtained results proved that ethanolic extract showed absorption peaks attributed to: phenolic compounds (free phenolic acids and phenolic acids derivatives) registrated between 220-280 nm, unsymmetrical chemical structure compounds (caffeic acid, chlorogenic acid, ferulic acid) with maximum absorption peak and absorption "shoulder" that may be due to substitution of hydroxyl or methoxy group, flavonoid compounds (in free form or glycosides) between 330-360 nm, due to the double bond in position 2,3 and carbonyl group in position 4 flavonols. UV spectra showed two major peaks of absorption (quercetin glycoside, rutin, etc.). The results obtained by UV-VIS spectroscopy has revealed the presence of phenolic derivatives such as cicoric acid (240 nm), caftaric acid (329 nm), caffeic acid (240 nm), rutoside (205 nm), quercetin (255 nm), luteolin (235 nm) in all three species of Echinacea. The echinacoside is absent. This profile mentioned above and the absence of phenolic compound echinacoside leads to the conclusion that species harvested as Echinacea angustifolia and Echinacea pallida are Echinacea purpurea also; It can be said that preliminary fingerprinting of Echinacea species through correspondence with the phenolic derivatives profile can be achieved by UV-VIS spectroscopic investigation, which is an adequate technique for preliminary identification and authentication of Echinacea in medicinal herbs.Keywords: Echinacea species, Fingerprinting, Phenolic compounds, UV-VIS spectroscopy
Procedia PDF Downloads 2592843 Mechanism of in Vitro Inhibition of Alpha-Amylase, Alpha-Glucosidase by Ethanolic Extracts of Polyalthia Longifolia, Its in Vitro Cytotoxicity on L6, Vero Cell-Lines and Influence of Glucose Uptake by Rat Hemi-Diaphragm
Authors: P. Gayathri, G. P. Jeyanthi
Abstract:
The bark of Polyalthia longifolia is used in ayurvedic system of medicine for the manangement of various ailments including diabetes mellitus. The bark of P. longifolia extracts was extracted using various polar and non-polar solvents and tested for inhibition of alpha-amylase and alpha-glucosidase among which the ethanolic extracts were found to be more potent. The ethanolic extracts of the bark were tested for the in vitro inhibition of alpha-amylase using starch as substrate and alpha-glucosidase using p-nitro phenyl alpha-D-gluco pyranoside as substrate to establish its in vitro antidiabetic effect. The mechanism of inhibition was determined by Dixon plot and Cornish-Bowden plot. The cytotoxic effect of the extract was tested on L6 and Vero cell-lines. The extract was partially purified by TLC. The individual effect of the ethanolic extract, TLC fractions and its combinatorial effect with insulin and glibenclamide on glucose uptake by rat hemi-diaphragm were studied.Results revealed that the ethanolic extracts of Polyalthia longifolia bark exhibited competitive inhibition of alpha-amylase and alpha-glucosidase. The extracts were also found not to be cytotoxic at the highest dose of 1 mg/mL. Glucose uptake study revealed that the extract alone and when combined with insulin, decreased the glucose uptake when compared to insulin control, however the purified TLC fractions exhibited significantly higher (p<0.05) glucose uptake by the rat hemi-diaphragm when compared to insulin. The study shows various possible mechanism of in vitro antidiabetic effect of the P. longifolia bark.Keywords: alpha-amylase, alpha-glucosidase, dixon, cornish-bowden, L6 , Vero cell-lines, glucose uptake, polyalthia longifolia bark, ethanolic extract, TLC fractions
Procedia PDF Downloads 4682842 Comparative Analysis of Enzyme Activities Concerned in Decomposition of Toluene
Authors: Ayuko Itsuki, Sachiyo Aburatani
Abstract:
In recent years, pollutions of the environment by toxic substances become a serious problem. While there are many methods of environmental clean-up, the methods by microorganisms are considered to be reasonable and safety for environment. Compost is known that it catabolize the meladorous substancess in its production process, however the mechanism of its catabolizing system is not known yet. In the catabolization process, organic matters turn into inorganic by the released enzymes from lots of microorganisms which live in compost. In other words, the cooperative of activated enzymes in the compost decomposes malodorous substances. Thus, clarifying the interaction among enzymes is important for revealing the catabolizing system of meladorous substance in compost. In this study, we utilized statistical method to infer the interaction among enzymes. We developed a method which combined partial correlation with cross correlation to estimate the relevance between enzymes especially from time series data of few variables. Because of using cross correlation, we can estimate not only the associative structure but also the reaction pathway. We applied the developed method to the enzyme measured data and estimated an interaction among the enzymes in decomposition mechanism of toluene.Keywords: enzyme activities, comparative analysis, compost, toluene
Procedia PDF Downloads 2712841 Improving Communication System through Router Configuration: The Nigerian Navy Experience
Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale
Abstract:
The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.Keywords: C-band, communication, router, VSAT
Procedia PDF Downloads 3652840 Influence of the Coarse-Graining Method on a DEM-CFD Simulation of a Pilot-Scale Gas Fluidized Bed
Authors: Theo Ndereyimana, Yann Dufresne, Micael Boulet, Stephane Moreau
Abstract:
The DEM (Discrete Element Method) is used a lot in the industry to simulate large-scale flows of particles; for instance, in a fluidized bed, it allows to predict of the trajectory of every particle. One of the main limits of the DEM is the computational time. The CGM (Coarse-Graining Method) has been developed to tackle this issue. The goal is to increase the size of the particle and, by this means, decrease the number of particles. The method leads to a reduction of the collision frequency due to the reduction of the number of particles. Multiple characteristics of the particle movement and the fluid flow - when there is a coupling between DEM and CFD (Computational Fluid Dynamics). The main characteristic that is impacted is the energy dissipation of the system, to regain the dissipation, an ADM (Additional Dissipative Mechanism) can be added to the model. The objective of this current work is to observe the influence of the choice of the ADM and the factor of coarse-graining on the numerical results. These results will be compared with experimental results of a fluidized bed and with a numerical model of the same fluidized bed without using the CGM. The numerical model is one of a 3D cylindrical fluidized bed with 9.6M Geldart B-type particles in a bubbling regime.Keywords: additive dissipative mechanism, coarse-graining, discrete element method, fluidized bed
Procedia PDF Downloads 682839 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures
Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir
Abstract:
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.Keywords: Iot, DID, authorization, verifiable credentials
Procedia PDF Downloads 742838 Comparative Study of Impact Strength and Fracture Morphological of Nano-CaCO3 and Nanoclay Reinforced HDPE Nanocomposites
Authors: Harun Sepet, Necmettin Tarakcioglu
Abstract:
The present study investigated the impact strength and fracture mechanism of nano-CaCO3 and nanoclay reinforced HDPE nanocomposites by using Charpy impact test. The nano-CaCO3 and nanoclay reinforced HDPE granules were prepared by the melt blending method using a compounder system, which consists of industrial banbury mixer, single screw extruder and granule cutting in industrial-scale. The nano-CaCO3 and nanoclay reinforced HDPE granules were molded using an injection-molding machine as plates, and then impact samples were cut by using punching die from the nanocomposite plates. As a result of impact experiments, nano-CaCO3 and nanoclay reinforced HDPE nanocomposites were determined to have lower impact energy level than neat HDPE. Also, the impact strength of HDPE further decreased by addition nanoclay compared to nano-CaCO3. The occurred fracture areas with the impact were detected by SEM examination. It is understood that fracture surface morphology changes when nano-CaCO3 and nanoclay ratio increases. The fracture surface changes were examined to determine the fracture mechanism of nano-CaCO3 and nanoclay reinforced HDPE nanocomposites.Keywords: charpy, HDPE, industrial scale nano-CaCO3, nanoclay, nanocomposite
Procedia PDF Downloads 4092837 Li2S Nanoparticles Impact on the First Charge of Li-ion/Sulfur Batteries: An Operando XAS/XES Coupled With XRD Analysis
Authors: Alice Robba, Renaud Bouchet, Celine Barchasz, Jean-Francois Colin, Erik Elkaim, Kristina Kvashnina, Gavin Vaughan, Matjaz Kavcic, Fannie Alloin
Abstract:
With their high theoretical energy density (~2600 Wh.kg-1), lithium/sulfur (Li/S) batteries are highly promising, but these systems are still poorly understood due to the complex mechanisms/equilibria involved. Replacing S8 by Li2S as the active material allows the use of safer negative electrodes, like silicon, instead of lithium metal. S8 and Li2S have different conductivity and solubility properties, resulting in a profoundly changed activation process during the first cycle. Particularly, during the first charge a high polarization and a lack of reproducibility between tests are observed. Differences observed between raw Li2S material (micron-sized) and that electrochemically produced in a battery (nano-sized) may indicate that the electrochemical process depends on the particle size. Then the major focus of the presented work is to deepen the understanding of the Li2S material charge mechanism, and more precisely to characterize the effect of the initial Li2S particle size both on the mechanism and the electrode preparation process. To do so, Li2S nanoparticles were synthetized according to two ways: a liquid path synthesis and a dissolution in ethanol, allowing Li2S nanoparticles/carbon composites to be made. Preliminary chemical and electrochemical tests show that starting with Li2S nanoparticles could effectively suppress the high initial polarization but also influence the electrode slurry preparation. Indeed, it has been shown that classical formulation process - a slurry composed of Polyvinylidone Fluoride polymer dissolved in N-methyle-2-pyrrolidone - cannot be used with Li2S nanoparticles. This reveals a complete different Li2S material behavior regarding polymers and organic solvents when going at the nanometric scale. Then the coupling between two operando characterizations such as X-Ray Diffraction (XRD) and X-Ray Absorption and Emission Spectroscopy (XAS/XES) have been carried out in order to interpret the poorly understood first charge. This study discloses that initial particle size of the active material has a great impact on the working mechanism and particularly on the different equilibria involved during the first charge of the Li2S based Li-ion batteries. These results explain the electrochemical differences and particularly the polarization differences observed during the first charge between micrometric and nanometric Li2S-based electrodes. Finally, this work could lead to a better active material design and so to more efficient Li2S-based batteries.Keywords: Li-ion/Sulfur batteries, Li2S nanoparticles effect, Operando characterizations, working mechanism
Procedia PDF Downloads 265