Search results for: authentication protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 796

Search results for: authentication protocols

376 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing

Authors: G. Rajeshwari, V. D. M. Jabez Daniel

Abstract:

Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.

Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag

Procedia PDF Downloads 292
375 Investigating the Relationship and Interaction between Auditory Processing Disorder and Auditory Attention

Authors: Amirreza Razzaghipour Sorkhab

Abstract:

The exploration of the connection between cognition and Auditory Processing Disorder (APD) holds significant value. Individuals with APD experience challenges in processing auditory information through the central auditory nervous system's varied pathways. Understanding the importance of auditory attention in individuals with APD, as well as the primary diagnostic tools such as language and auditory attention tests, highlights the critical need for assessing their auditory attention abilities. While not all children with Auditory Processing Disorder (APD) show deficits in auditory attention, there are often deficiencies in cognitive and attentional performance. The link between various types of attention deficits and APD suggests impairments in sustained and divided auditory attention. Research into the origins of APD should also encompass higher-level processes, such as auditory attention. It is evident that investigating the interaction between APD and auditory and cognitive functions holds significant value. Furthermore, it was demonstrated that APD tests may be influenced by cognitive factors, but despite signs of auditory attention interaction with auditory processing skills and the influence of cognitive factors on tests for this disorder, auditory attention measures are not typically included in APD diagnostic protocols. Therefore, incorporating attention assessment tests into the battery of tests for individuals with auditory processing disorder will be beneficial for obtaining useful insights into their attentional abilities.

Keywords: auditory processing disorder, auditory attention, central auditory processing disorder, top-down pathway

Procedia PDF Downloads 48
374 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 270
373 A State-Of-The-Art Review on Web Services Adaptation

Authors: M. Velasco, D. While, P. Raju, J. Krasniewicz, A. Amini, L. Hernandez-Munoz

Abstract:

Web service adaptation involves the creation of adapters that solve Web services incompatibilities known as mismatches. Since the importance of Web services adaptation is increasing because of the frequent implementation and use of online Web services, this paper presents a literature review of web services to investigate the main methods of adaptation, their theoretical underpinnings and the metrics used to measure adapters performance. Eighteen publications were reviewed independently by two researchers. We found that adaptation techniques are needed to solve different types of problems that may arise due to incompatibilities in Web service interfaces, including protocols, messages, data and semantics that affect the interoperability of the services. Although adapters are non-invasive methods that can improve Web services interoperability and there are current approaches for service adaptation; there is, however, not yet one solution that fits all types of mismatches. Our results also show that only a few research projects incorporate theoretical frameworks and that metrics to measure adapters’ performance are very limited. We conclude that further research on software adaptation should improve current adaptation methods in different layers of the service interoperability and that an adaptation theoretical framework that incorporates a theoretical underpinning and measures of qualitative and quantitative performance needs to be created.

Keywords: Web Services Adapters, software adaptation, web services mismatches, web services interoperability

Procedia PDF Downloads 278
372 Vocal Training and Practice Methods: A Glimpse on the South Indian Carnatic Music

Authors: Raghavi Janaswamy, Saraswathi K. Vasudev

Abstract:

Music is one of the supreme arts of expressions, next to the speech itself. Its evolution over centuries has paved the way with a variety of training protocols and performing methods. Indian classical music is one of the most elaborate and refined systems with immense emphasis on the voice culture related to range, breath control, quality of the tone, flexibility and diction. Several exercises namely saraliswaram, jantaswaram, dhatuswaram, upper stayi swaram, alamkaras and varnams lay the required foundation to gain the voice culture and deeper understanding on the voice development and further on to the intricacies of the raga system. This article narrates a few of the Carnatic music training methods with an emphasis on the advanced practice methods for articulating the vocal skills, continuity in the voice, ability to produce gamakams, command in the multiple speeds of rendering with reasonable volume. The creativity on these exercises and their impact on the voice production are discussed. The articulation of the outlined conscious practice methods and vocal exercises bestow the optimum use of the natural human vocal system to not only enhance the signing quality but also to gain health benefits.

Keywords: Carnatic music, Saraliswaram, Varnam, vocal training

Procedia PDF Downloads 166
371 Experimental Study of Mixture of R290/R600 to Replace R134a in a Domestic Refrigerator

Authors: T. O. Babarinde, B. O. Bolaji, S. O. Ismaila

Abstract:

Interest in natural refrigerants, such as hydrocarbons has been renewed in recent years because of the environmental problems associated with synthetic chlorofluorocarbon (CFC) and hydro-chlorofluorocarbon (HCFC) refrigerants. Due to the depletion of ozone-layer and global warming effects, synthetic refrigerants are being gradually phased out in accordance with the international protocols that aim to protect the environment. In this work, a refrigerator designed to work with R134a was used for this experiment, Liquefied Petroleum Gas (LPG) which consists of commercial propane and butane in a single evaporator domestic refrigerator with a total volume of 62 litres. In this experiment, type K thermocouples with their probes were used to measure the temperatures of four major components (evaporator, compressor, condenser and expansion device) of the refrigeration system. Also the system was instrumented with two pressure gauges at the inlet and outlet of the compressor for measuring the suction and discharged pressures. The experiments were carried out using 40, 60, 80,100g charges and the charges were measured with a digital charging scale. Thermodynamic properties of the LPG refrigerant were determined. The results obtained showed that using LPG charge of 60g. The system COP increased with 14.6% and the power consumption reduced with 9.8% when compared with R134a. Therefore, LPG can replace R134a in domestic refrigerator.

Keywords: domestic refrigerator, experimental, LPG, R134a

Procedia PDF Downloads 465
370 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 321
369 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 524
368 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 414
367 Callus Induction, In-Vitro Plant Regeneration and Acclimatization of Lycium barbarum L. (Goji)

Authors: Rosna Mat Taha, Sakinah Abdullah, Sadegh Mohajer, Asmah Awal

Abstract:

Lycium barbarum L. (Goji) belongs to Solanaceae family and native to some areas of China. Ethnobotanical studies have shown that this plant has been consumed by the Chinese since ancient times. It has been used as medicine in providing excellent effects on cardiovascular system and cholesterol level, besides contains high antioxidant and antidiabetic properties. In the present study, some tissue culture work has been carried out to induce callus, in vitro regeneration from various explants of Goji and also some acclimatization protocols were followed to transfer the regenerated plants to soil. The main aims being to establish high efficient regeneration system for mass production and commercialization for future uses, since the growth of this species is very limited in Malaysia. The optimum hormonal regime and the most suitable and responsive explants were identified. It was found that leaves and stems gave good responses. Murashige and Skoog’s (MS) medium supplemented with 2.0 mg/L NAA and 0.5 mg/L BAP was the best for callus induction and MS media fortified with 1.0 mg/L NAA and 1.0 mg/L BAP was optimum for in vitro regeneration. The survival rates of plantlets after acclimatization was 63±1.5 % on black soil and 50±1.3 % on mixed soil (combination of black and red soil at a ratio of 2 to 1), respectively.

Keywords: callus, acclimatization, in vitro culture, regeneration

Procedia PDF Downloads 436
366 Intelligent System of the Grinding Robot for Spiral Welded Pipe

Authors: Getachew Demeissie Ayalew, Yongtao Sun, Yang Yang

Abstract:

The spiral welded pipe manufacturing industry requires strict production standards for automated grinders for welding seams. However, traditional grinding machines in this sector are insufficient due to a lack of quality control protocols and inconsistent performance. This research aims to improve the quality of spiral welded pipes by developing intelligent automated abrasive belt grinding equipment. The system has equipped with six degrees of freedom (6 DOF) KUKA KR360 industrial robots, enabling concurrent grinding operations on both internal and external welds. The grinding robot control system is designed with a PLC, and a human-machine interface (HMI) system is employed for operations. The system includes an electric speed controller, data connection card, DC driver, analog amplifier, and HMI for input data. This control system enables the grinding of spiral welded pipe. It ensures consistent production quality and cost-effectiveness by reducing the product life cycle and minimizing risks in the working environment.

Keywords: Intelligent Systems, Spiral Welded Pipe, Grinding, Industrial Robot, End-Effector, PLC Controller System, 3D Laser Sensor, HMI.

Procedia PDF Downloads 271
365 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 157
364 Muddle Effort for Organized Crime in India: Social Work Concern for Anti Human Trafficking Unit

Authors: Rajkamal Ajmeri, Leena Mehta

Abstract:

Growing magnitude of human trafficking is the indicatory symptom of ill society. Despite of many treaties, legislation and protocols control over human trafficking require additional attention. However, many Anti Human Trafficking Units (AHTU) are working throughout India but it is a fact that incidence pertaining to illegal human trade is not fully under control. Social work as discipline and practice base profession has a lot of concern about situation and the trafficked victims. United state put Indian in tier II watch list because they are not fully complying with the minimum standard of Trafficking Victims Protection laws but they are making a significant effort to bring themselves into compliance with those standards. In order to solve the issue, scientific research of experiences and opinions of government / non government machineries can play an effective role in raising the standard legislation for trafficked victims. Proper study can enhance understanding on various problems faced by government machineries. The study can help in developing the scientific model, which can effectively solve the problem in human trafficking field.

Keywords: human trafficking, legislations, victims, social work, government machinery

Procedia PDF Downloads 285
363 Evaluation of Radiological Health Danger Indices Arising from Diagnostic X-Ray Rooms

Authors: Jessica Chukwuyem Molua, Collins O Molua

Abstract:

The effective dose of selected health care workers who are constantly exposed to X-ray radiation was measured using thermoluminescence dosimeters (TLD) placed over the lead apron at the chest region in all categories of medical personnel investigated. To measure radiation in all the selected hospitals to ascertain the exposure of x-ray machines at exactly 1m from the primary source. The work was carried out within a year in each of the selected centers. The personnel examination records containing the type of examination each day, peak tube voltage, tube current, and exposure time, including the actual number of films used, were obtained. A total of 40personel were examined in government hospital Agbor, 21 in central hospital Owa Alero and 18 in Okonye hospital The method used here has also been used by other researchers. Findings showed that the results obtained from the three hospitals investigated in this work were found to conform with the recommendations of the National Commission on radiological and protection {NCRP} 70 and 116 protocols. The Radiologist in the three study areas has the highest dose level, but of particular note is the dosage of the radiologist in Okonye hospital. This, as observed, is because the protective shielding parameters were inadequate and this could result in severe health consequences over time.

Keywords: radiology, health, Agbor, Owa

Procedia PDF Downloads 74
362 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 195
361 Investigating the Thermal Characteristics of Reclaimed Solid Waste from a Landfill Site Using Thermogravimetry

Authors: S. M. Al-Salem, G.A. Leeke, H. J. Karam, R. Al-Enzi, A. T. Al-Dhafeeri, J. Wang

Abstract:

Thermogravimetry has been popularized as a thermal characterization technique since the 1950s. It aims at investigating the weight loss against both reaction time and temperature, whilst being able to characterize the evolved gases from the volatile components of the organic material being tested using an appropriate hyphenated analytical technique. In an effort to characterize and identify the reclaimed waste from an unsanitary landfill site, this approach was initiated. Solid waste (SW) reclaimed from an active landfill site in the State of Kuwait was collected and prepared for characterization in accordance with international protocols. The SW was segregated and its major components were identified after washing and air drying. Shredding and cryomilling was conducted on the plastic solid waste (PSW) component to yield a material that is representative for further testing and characterization. The material was subjected to five heating rates (b) with minimal repeatable weight for high accuracy thermogravimetric analysis (TGA) following the recommendation of the International Confederation for Thermal Analysis and Calorimetry (ICTAC). The TGA yielded thermograms that showed an off-set from typical behavior of commercial grade resin which was attributed to contact of material with soil and thermal/photo-degradation.

Keywords: polymer, TGA, pollution, landfill, waste, plastic

Procedia PDF Downloads 121
360 Effect of Radiotherapy/Chemotherapy Protocol on the Gut Microbiome in Pediatric Cancer Patients

Authors: Nourhan G. Sahly, Ahmed Moustafa, Mohamed S. Zaghloul, Tamer Z. Salem

Abstract:

The gut microbiome plays important roles in the human body that includes but not limited to digestion, immunity, homeostasis and response to some drugs such as chemotherapy and immunotherapy. Its role has also been linked to radiotherapy and associated gastrointestinal injuries, where the microbial dysbiosis could be the driving force for dose determination or the complete suspension of the treatment protocol. Linking the gut microbiota alterations to different cancer treatment protocols is not easy especially in humans. However, enormous effort was exerted to understand this complex relationship. In the current study, we described the gut microbiota dysbiosis in pediatric sarcoma patients, in the pelvic region, with regards to radiotherapy and antibiotics. Fecal samples were collected as a source of microbial DNA for which the gene encoding for V3-V5 regions of 16S rRNA was sequenced. Two of the three patients understudy had experienced an increase in alpha diversity post exposure to 50.4 Gy. Although phylum Firmicutes overall relative abundance has generally decreased, six of its taxa increased in all patients. Our results may indicate the possibility of radiosensitivity or enrichment of the antibiotic resistance of the elevated taxa. Further studies are needed to describe the extent of radiosensitivity with regards to antibiotic resistance.

Keywords: combined radiotherapy and chemotherapy, gut microbiome, pediatric cancer, radiosensitivity

Procedia PDF Downloads 140
359 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 78
358 Phenotypic and Symbiotic Characterization of Rhizobia Isolated from Faba Bean (Vicia faba L.) in Moroccan Soils

Authors: Y. Hajjam, I. T. Alami, S. M. Udupa, S. Cherkaoui

Abstract:

Faba bean (Vicia faba L.) is an important food legume crop in Morocco. It is mainly used as human food and feed for animals. Faba bean also plays an important role in cereal-based cropping systems, when rotated with cereals it improves soil fertility by fixing N2 in root nodules mediated by Rhizobium. Both faba bean and its biological nitrogen fixation symbiotic bacterium Rhizobium are affected by different stresses such as: salinity, drought, pH, heavy metal, and the uptake of inorganic phosphate compounds. Therefore, the aim of the present study was to evaluate the phenotypic diversity among the faba bean rhizobial isolates and to select the tolerant strains that can fix N2 under environmental constraints for inoculation particularly for affected soils, in order to enhance the productivity of faba bean and to improve soil fertility. Result have shown that 62% of isolates were fast growing with the ability of producing acids compounds , while 38% of isolates are slow growing with production of alkalins. Moreover, 42.5% of these isolates were able to solubilize inorganic phosphate Ca3(PO4)2 and the index of solubilization was ranged from 2.1 to 3.0. The resistance to extreme pH, temperature, water stress heavy metals and antibiotics lead us to classify rhizobial isolates into different clusters. Finally, the authentication test under greenhouse conditions showed that 55% of the rhizobial isolates could induce nodule formation on faba bean (Vicia faba L.) under greenhouse experiment. This phenotypic characterization may contribute to improve legumes and non legumes crops especially in affected soils and also to increase agronomic yield in the dry areas.

Keywords: rhizobia, vicia faba, phenotypic characterization, nodule formation, environmental constraints

Procedia PDF Downloads 239
357 Surgical Site Infections Post Ventriculoperitoneal (VP) Shunting: A Matched Healthcare Cost and Length of Stay Study

Authors: Issa M. Hweidi, Saba W. Al-Ibraheem

Abstract:

This study aimed to assess the increased hospital length of stay and healthcare costs associated with SSIs among ventriculoperitoneal shunting surgery patients in Jordan. This study adopted a retrospective and nested 1:1 matched case-control design. A non-probability convenient sample of 48 VP shunt patients was recruited for the purpose of the study. The targeted groups of the study basically used to cross-match the variables investigated to minimize the risk of confounding. Information was extracted from the text of patients' electronic health records. As compared to the non-SSI group, the SSI group had an extra mean healthcare cost of $13,696.53 (p=0.001) and longer hospital length of stay (22.64 mean additional days). Furthermore, Acinetobacter baumannii and Klebsiella pneumonia were identified as being the most predominant causative agents of SSIs. The results of this study may provide baseline data for national and regional benchmarking to evaluate the quality of care provided to likewise patients. Adherence to infection control strategies and protocols considering new surveillance methods of SSIs is encouraged.

Keywords: ventriculoperitoneal shunt, health care cost, length of stay, neurosurgery, surgical site infections

Procedia PDF Downloads 63
356 Basic Aspects and Ecology of a Group of Capuchin Monkeys (Cebus spp.) (Primates: Cebidae) and Frequency of Contact with Visitor of the State Park Alberto Lofgren, Sao Paulo, Brazil

Authors: Luma Vaz, Marcio Port-Carvalho

Abstract:

The main objective of this research was to study the basics aspects of the ecology of a group of capuchin monkeys (Cebus spp.), evaluating the risks that habit and food that is given by the visitors may cause to the people's health and animals welfare, also how to make proposals for mitigation and management guidelines. In order to do that, some aspects of the animal's ecology (such as diet, habitat range and habitat use) and activity patterns were studied. It was also measured the frequency of contact with visitors at the park using protocols for data collection. The behavioral categories of displacement and resting represent more than 80% of total activities, followed by feeding (13%) and others (6%). When compared to the studies in natural environment, the Cebus group studied has a small living area (1.7ha) occupying mostly the PEAL public area. The diversity of items offered by the visitors and the high frequency of contact closer than one meter suggests that using information and education campaigns must be a priority in the public program in PEAL in order to avoid future accidents and diseases transmissions.

Keywords: capuchin monkeys, Cebus, environmental education, public health, wildlife management

Procedia PDF Downloads 128
355 Experimental Investigation to Find Transition Temperature of VG 30 Binder

Authors: D. Latha, V. Sunitha, Samson Mathew

Abstract:

In India, most of the pavement is laid by bituminous road and the consumption of binder is high for pavement construction and also modified binders are used to satisfy any specific pavement requirement. Since the binders are visco-elastic material which is having the mechanical properties of binder transition from visco-elastic solid to visco-elastic fluid. In this paper, two different protocols were used to measure the viscosity property of binder using a Brookfield Viscometer and there is a need to find the appropriate mixing and compaction temperatures of various types of binders which can result in complete aggregate coating and adequate field density of HMA mixtures. The aim of this work is to find the transition temperature from Non-Newtonian behavior to Newtonian behavior of the binder by adopting a steady shear protocol and the shear rate ramp protocol. The transition from non-Newtonian to Newtonian can occur through an increase of temperature and shear of the material. The test has been conducted for unmodified binder VG 30. The transition temperature was found in the unmodified binder VG is 120oC. So the application of both modified binder and unmodified binder in the pavement construction needs to be studied properly by considering temperature and traffic loading factors of the respective project site.

Keywords: unmodified and modified binders, Brookfield viscometer, transition temperature, steady shear and shear rate protocol

Procedia PDF Downloads 194
354 Vibratinal Spectroscopic Identification of Beta-Carotene in Usnic Acid and PAHs as a Potential Martian Analogue

Authors: A. I. Alajtal, H. G. M. Edwards, M. A. Elbagermi

Abstract:

Raman spectroscopy is currently a part of the instrumentation suite of the ESA ExoMars mission for the remote detection of life signatures in the Martian surface and subsurface. Terrestrial analogues of Martian sites have been identified and the biogeological modifications incurred as a result of extremophilic activity have been studied. Analytical instrumentation protocols for the unequivocal detection of biomarkers in suitable geological matrices are critical for future unmanned explorations, including the forthcoming ESA ExoMars mission to search for life on Mars scheduled for 2018 and Raman spectroscopy is currently a part of the Pasteur instrumentation suite of this mission. Here, Raman spectroscopy using 785nm excitation was evaluated for determining various concentrations of beta-carotene in admixture with polyaromatic hydrocarbons and usnic acid have been investigated by Raman microspectrometry to determine the lowest levels detectable in simulation of their potential identification remotely in geobiological conditions in Martian scenarios. Information from this study will be important for the development of a miniaturized Raman instrument for targetting Martian sites where the biosignatures of relict or extant life could remain in the geological record.

Keywords: raman spectroscopy, mars-analog, beta-carotene, PAHs

Procedia PDF Downloads 330
353 Common Sense Leadership in the Example of Turkish Political Leader Devlet Bahçeli

Authors: B. Gültekin, T. Gültekin

Abstract:

Peace diplomacy is the most important international tool to maintain peace all over the World. This study consists of three parts. In the first part, the leadership of Devlet Bahçeli, leader of the Nationalist Movement Party, will be introduced as a tool of peace communication and peace management. Also, in this part, peace communication will be explained by the peace leadership traits of Devlet Bahçeli, who is one of the efficient political leaders representing the concepts of compromise and agreement on different sides of politics. In the second part of study, it is aimed to analyze Devlet Bahçeli’s leadership within the frame of peace communication and the final part of this study is about creating an original public communication model for public diplomacy based on Devlet Bahçeli as an example. As a result, the main purpose of this study is to develop an original peace communication model including peace modules, peace management projects, original dialogue procedures and protocols exhibited in the policies of Devlet Bahçeli. The political leadership represented by Devlet Bahçeli inspires political leaders to provide peace communication. In this study, principles and policies of peace leadership of Devlet Bahçeli will be explained as an original model on a peace communication platform.

Keywords: public diplomacy, dialogue management, peace leadership, peace diplomacy

Procedia PDF Downloads 150
352 Optimal Rest Interval between Sets in Robot-Based Upper-Arm Rehabilitation

Authors: Virgil Miranda, Gissele Mosqueda, Pablo Delgado, Yimesker Yihun

Abstract:

Muscular fatigue affects the muscle activation that is needed for producing the desired clinical outcome. Integrating optimal muscle relaxation periods into a variety of health care rehabilitation protocols is important to maximize the efficiency of the therapy. In this study, four muscle relaxation periods (30, 60, 90, and 120 seconds) and their effectiveness in producing consistent muscle activation of the muscle biceps brachii between sets of elbow flexion and extension task was investigated among a sample of 10 subjects with no disabilities. The same resting periods were then utilized in a controlled exoskeleton-based exercise for a sample size of 5 subjects and have shown similar results. On average, the muscle activity of the biceps brachii decreased by 0.3% when rested for 30 seconds, and it increased by 1.25%, 0.76%, and 0.82% when using muscle relaxation periods of 60, 90, and 120 seconds, respectively. The preliminary results suggest that a muscle relaxation period of about 60 seconds is needed for optimal continuous muscle activation within rehabilitation regimens. Robot-based rehabilitation is good to produce repetitive tasks with the right intensity, and knowing the optimal resting period will make the automation more effective.

Keywords: rest intervals, muscle biceps brachii, robot rehabilitation, muscle fatigue

Procedia PDF Downloads 174
351 Measuring Delay Using Software Defined Networks: Limitations, Challenges, and Suggestions for Openflow

Authors: Ahmed Alutaibi, Ganti Sudhakar

Abstract:

Providing better Quality-of-Service (QoS) to end users has been a challenging problem for researchers and service providers. Building applications relying on best effort network protocols hindered the adoption of guaranteed service parameters and, ultimately, Quality of Service. The introduction of Software Defined Networking (SDN) opened the door for a new paradigm shift towards a more controlled programmable configurable behavior. Openflow has been and still is the main implementation of the SDN vision. To facilitate better QoS for applications, the network must calculate and measure certain parameters. One of those parameters is the delay between the two ends of the connection. Using the power of SDN and the knowledge of application and network behavior, SDN networks can adjust to different conditions and specifications. In this paper, we use the capabilities of SDN to implement multiple algorithms to measure delay end-to-end not only inside the SDN network. The results of applying the algorithms on an emulated environment show that we can get measurements close to the emulated delay. The results also show that depending on the algorithm, load on the network and controller can differ. In addition, the transport layer handshake algorithm performs best among the tested algorithms. Out of the results and implementation, we show the limitations of Openflow and develop suggestions to solve them.

Keywords: software defined networking, quality of service, delay measurement, openflow, mininet

Procedia PDF Downloads 154
350 Establishment and Improvement of Oil Palm Liquid Culture for Clonal Propagation

Authors: Mohd Naqiuddin Bin Husri, Siti Rahmah Abd Rahman, Dalilah Abu Bakar, Dayang Izawati Abang Masli, Meilina Ong Abdullah

Abstract:

A serious shortage of prime agricultural land coupled with environmental concerns inland expansion has daunted efforts to increase the national yield average. To address this issue, maximising yield per unit hectare through quality planting material is of great importance. Breeding for improved planting materials has been a continuous effort since the early days of this industry, it is time-consuming, and the likelihood of segregation within the progenies further impedes progress in this area. Incorporation of the cloning technology in oil palm breeding programmes is therefore advantageous to expedite the development of commercial elite and high-yielding planting materials. After more than 22 years of research and development through this project, reliable protocols for liquid/suspension culture systems coupled with various innovative technologies which are effective at promoting proliferation and growth of oil palm culture have been established. Subsequently, clonal palms derived from the suspension culture system were extensively studied in the field, and the results have been encouraging. Clones such as CPS1, CPS2 and a few others recorded superior performance in comparison with D x P standard crosses.

Keywords: tissue culture, suspension culture, oil palm, Elaeis guineensis

Procedia PDF Downloads 176
349 Solubility Measurements in the Context of Nanoregulation

Authors: Ratna Tantra

Abstract:

From a risk assessment point of view, solubility is a property that has been identified as being important. If nanomaterial is completely soluble, then its disposal can be treated much in the same way as ‘ordinary’ chemicals, which subsequently will simplify testing and characterization regimes. The measurement of solubility has been highlighted as important in a pan-European project, Framework Programme (FP) 7 NANoREG. Some of the project outputs surrounding this topic will be presented here, in which there are two parts. First, a review on existing methods capable of measuring nanomaterial solubility will be discussed. Second, a case study will be presented based on using colorimetry methods to quantify dissolve zinc from ZnO nanomaterial upon exposure to digestive juices. The main findings are as follows: a) there is no universal method for nanomaterial solubility testing. The method chosen will be dependent on sample type and nano-specific application/scenario. b) The colorimetry results show a positive correlation between particle concentration and amount of [Zn2+] released; this was expected c) results indicate complete dissolution of the ZnO nanomaterial, as a result of the digestion protocol but only a fraction existing as free ions. Finally, what differentiates the F7 NANoREG project over other projects is the need for participating research laboratories to follow a set of defined protocols, necessary to establish quality control and assurance. The methods and results associated with mandatory testing that carried out by all partners in NANoREG will be discussed.

Keywords: nanomaterials, nanotoxicology, solubility, zinc oxide

Procedia PDF Downloads 323
348 The Effect of Tai Chi Exercises on Postural Stability and Control in Older Patients with Knee Osteoarthritis

Authors: Elham Ghandali, Saeed Talebian Moghadam, Mohammad Reza Hadian, Gholamreza Olyaei, Shohreh Jalaie, Elaheh Sajjadi

Abstract:

Purpose: A few studies have examined the effect of Tai Chi on balance in elderly patients with knee osteoarthritis (OA). The aim of this study was to determine the balance measures in elderly patients with knee OA after Tai Chi exercises. For this purpose, 14 females and 6 males with knee OA were chosen. The area and mean velocity of the center of pressure movements (CoP) were measured by force plate in standing positions (on foam and rigid surfaces). The measurements of area and mean velocity of CoP were performed before and after 60 min of Tai Chi sessions (twice a week for 8 weeks). Results: The results showed that the area of CoP in a standing position on a rigid surface was significantly decreased (P < 0.01) after Tai Chi exercises. Furthermore, the mean velocity of CoP was significantly decreased after Tai Chi exercises on both rigid and foam surfaces (P < 0.001). Our study also indicated that changes in surfaces (rigid and foam) would cause significant differences regarding the area of CoP in standing positions. How- ever, similar findings were not found regarding the mean velocity of CoP. Considering the effects of Tai Chi on the mean velocity of CoP, it might be concluded that motor control and Postural stability improvements have occurred. Conclusions: Therefore, based on these results, Tai Chi exercises could be recommended for elderly patients with knee OA as part of their rehabilitation and physical therapy protocols.

Keywords: Tai Chi, balance, knee osteoarthritis, elderly patients, different surfaces

Procedia PDF Downloads 79
347 Visible Light Communication and Challenges

Authors: Hamid Sharif, Nazish Saleem Abbas, Muhammad Haris Jamil

Abstract:

Visible light communication is an emerging technology for almost a decade now; there is a growing need for VLC systems to overcome the challenges faced by radio frequency RF communication systems. With the advancement in the development of solid-state sources, in the future would replace incandescent and fluorescent light sources. These solid-state devices are not only to be used for illumination but can also be employed for communication and navigational purposes. The replacement of conventional illumination sources with highly efficient light-emitting diodes (LED's) (generally white light) will reduce energy consumption as well as environmental pollution. White LEDs dissipate very less power as compared to conventional light sources. The use of LED's is not only beneficial in terms of power consumption, but it also has an intrinsic capability for indoor wireless communication as compared to indoor RF communication. It is considerably low in cost to operate than the RF systems such as Wi-Fi routers, allows convenient means of reusing the bandwidth, and there is a huge potential for high data rate transmissions with enhanced data security. This paper provides an overview of some of the current challenges with VLC and proposes a possible solution to deal with these challenges; it also examines some joint protocols to optimize the joint illumination and communication functionality.

Keywords: visible light communication, line of sight, root mean square delay spread, light emitting diodes

Procedia PDF Downloads 60