Search results for: keyed-hash scheme protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2437

Search results for: keyed-hash scheme protocol

2017 Energy-Efficient Clustering Protocol in Wireless Sensor Networks for Healthcare Monitoring

Authors: Ebrahim Farahmand, Ali Mahani

Abstract:

Wireless sensor networks (WSNs) can facilitate continuous monitoring of patients and increase early detection of emergency conditions and diseases. High density WSNs helps us to accurately monitor a remote environment by intelligently combining the data from the individual nodes. Due to energy capacity limitation of sensors, enhancing the lifetime and the reliability of WSNs are important factors in designing of these networks. The clustering strategies are verified as effective and practical algorithms for reducing energy consumption in WSNs and can tackle WSNs limitations. In this paper, an Energy-efficient weight-based Clustering Protocol (EWCP) is presented. Artificial retina is selected as a case study of WSNs applied in body sensors. Cluster heads’ (CHs) selection is equipped with energy efficient parameters. Moreover, cluster members are selected based on their distance to the selected CHs. Comparing with the other benchmark protocols, the lifetime of EWCP is improved significantly.

Keywords: WSN, healthcare monitoring, weighted based clustering, lifetime

Procedia PDF Downloads 309
2016 Ultrasonographic Manifestation of Periventricular Leukomalacia in Preterm Neonates at Teaching Hospital Peradeniya, Sri Lanka

Authors: P. P. Chandrasekera, P. B. Hewavithana, S. Rosairo, M. H. M. N. Herath, D. M. R. D. Mirihella

Abstract:

Periventricular Leukomalacia (PVL) is a White Matter Injury (WMI) of preterm neonatal brain. Objectives of the study were to assess the neuro-developmental outcome at one year of age and to determine a good protocol of cranial ultrasonography to detect PVL. Two hundred and sixty four preterm neonates were included in the study. Series of cranial ultrasound scans were done by using a dedicated neonatal head probe 4-10 MHz of Logic e portable ultrasound scanner. Clinical history of seizures, abnormal head growth (hydrocephalus or microcephaly) and developmental milestones were assessed and neurological examinations were done until one year of age. Among live neonates, 57% who had cystic PVL (Grades2 and 3) manifested as cerebral palsy. In conclusion cystic PVL has permanent neurological disabilities like cerebral palsy. Good protocol of real time cranial ultrasonography to detect PVL is to perform scans at least once a week until one month and at term (40 weeks of gestation).

Keywords: cerebral palsy, cranial ultrasonography, Periventricular Leukomalacia, preterm neonates

Procedia PDF Downloads 392
2015 Gas Network Noncooperative Game

Authors: Teresa Azevedo PerdicoúLis, Paulo Lopes Dos Santos

Abstract:

The conceptualisation of the problem of network optimisation as a noncooperative game sets up a holistic interactive approach that brings together different network features (e.g., com-pressor stations, sources, and pipelines, in the gas context) where the optimisation objectives are different, and a single optimisation procedure becomes possible without having to feed results from diverse software packages into each other. A mathematical model of this type, where independent entities take action, offers the ideal modularity and subsequent problem decomposition in view to design a decentralised algorithm to optimise the operation and management of the network. In a game framework, compressor stations and sources are under-stood as players which communicate through network connectivity constraints–the pipeline model. That is, in a scheme similar to tatonnementˆ, the players appoint their best settings and then interact to check for network feasibility. The devolved degree of network unfeasibility informs the players about the ’quality’ of their settings, and this two-phase iterative scheme is repeated until a global optimum is obtained. Due to network transients, its optimisation needs to be assessed at different points of the control interval. For this reason, the proposed approach to optimisation has two stages: (i) the first stage computes along the period of optimisation in order to fulfil the requirement just mentioned; (ii) the second stage is initialised with the solution found by the problem computed at the first stage, and computes in the end of the period of optimisation to rectify the solution found at the first stage. The liability of the proposed scheme is proven correct on an abstract prototype and three example networks.

Keywords: connectivity matrix, gas network optimisation, large-scale, noncooperative game, system decomposition

Procedia PDF Downloads 152
2014 Fuzzy-Sliding Controller Design for Induction Motor Control

Authors: M. Bouferhane, A. Boukhebza, L. Hatab

Abstract:

In this paper, the position control of linear induction motor using fuzzy sliding mode controller design is proposed. First, the indirect field oriented control LIM is derived. Then, a designed sliding mode control system with an integral-operation switching surface is investigated, in which a simple adaptive algorithm is utilized for generalised soft-switching parameter. Finally, a fuzzy sliding mode controller is derived to compensate the uncertainties which occur in the control, in which the fuzzy logic system is used to dynamically control parameter settings of the SMC control law. The effectiveness of the proposed control scheme is verified by numerical simulation. The experimental results of the proposed scheme have presented good performances compared to the conventional sliding mode controller.

Keywords: linear induction motor, vector control, backstepping, fuzzy-sliding mode control

Procedia PDF Downloads 489
2013 Evaluating the Impact of Nursing Protocols on External Ventricular Drain Infection Control in Adult Neurosurgery Patients with External Ventricular Drainage at Directorate General of Khoula Hospital ICU, Oman: A Cluster-Randomized Trial

Authors: Shamsa Al Sharji, Athar Al Jabri, Haitham Al Dughaishi, Mirfat Al Barwani, Raja Al Rawahi, Raiya Al Rajhi, Shurooq Al Ruqaishi, Thamreen Al Zadjali, Iman Al Humaidi

Abstract:

Background: External Ventricular Drains (EVDs) are critical in managing traumatic brain injuries and hydrocephalus by controlling intracranial pressure, but they carry a high risk of infection. Infection rates vary globally, ranging from 5% to 45%, leading to increased morbidity, prolonged hospital stays, and higher healthcare costs. Nursing protocols play a pivotal role in reducing these infection rates. This study investigates the impact of a structured nursing protocol on EVD-associated infections in adult neurosurgery patients at the Directorate General of Khoula Hospital, Oman, from January to September 2024. Methods: A cluster-randomized trial was conducted across neurosurgery wards and the ICU. The intervention group followed a comprehensive nursing protocol, including strict sterile insertion, standardized dressing changes, infection control training, and regular clinical audits. The control group received standard care. The primary outcome was the incidence of EVD-associated infections, with secondary outcomes including protocol compliance, infection severity, recovery times, length of stay, and 30-day mortality. Statistical analysis was conducted using Chi-square tests, paired t-tests, and logistic regression to assess the differences between groups. Results: The study involved 75 patients, with an overall infection rate of 13.3%. The intervention group showed a reduced infection rate of 8.9% compared to 20% in the control group. Compliance rates for key nursing actions were high, with 89.7% for hand hygiene and 86.2% for wound dressing. The relative risk of infection was 0.44 in the intervention group, reflecting a 55.6% reduction. Logistic regression identified obesity as a significant predictor of EVD infections. Although mortality rates were slightly higher in the intervention group, the number needed to treat (NNT) of 9 suggests that the nursing protocol may improve survival outcomes. Conclusion: This study demonstrates that structured nursing protocols can reduce EVD-related infections and improve patient outcomes in neurosurgery. While the findings are promising, further research with larger sample sizes is needed to confirm these results and optimize infection control strategies in neurosurgical care.

Keywords: EVD, CSF, nursing protocol, EVD infection

Procedia PDF Downloads 23
2012 Genetic Algorithm and Multi-Parametric Programming Based Cascade Control System for Unmanned Aerial Vehicles

Authors: Dao Phuong Nam, Do Trong Tan, Pham Tam Thanh, Le Duy Tung, Tran Hoang Anh

Abstract:

This paper considers the problem of cascade control system for unmanned aerial vehicles (UAVs). Due to the complicated modelling technique of UAV, it is necessary to separate them into two subsystems. The proposed cascade control structure is a hierarchical scheme including a robust control for inner subsystem based on H infinity theory and trajectory generator using genetic algorithm (GA), outer loop control law based on multi-parametric programming (MPP) technique to overcome the disadvantage of a big amount of calculations. Simulation results are presented to show that the equivalent path has been found and obtained by proposed cascade control scheme.

Keywords: genetic algorithm, GA, H infinity, multi-parametric programming, MPP, unmanned aerial vehicles, UAVs

Procedia PDF Downloads 212
2011 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 353
2010 A Car Parking Monitoring System Using a Line-Topology Wireless Sensor Network

Authors: Dae Il Kim, Jungho Moon, Tae Yun Chung

Abstract:

This paper presents a car parking monitoring system using a wireless sensor network. The presented sensor network has a line-shaped topology and adopts a TDMA-based protocol for allowing multi-hop communications. Sensor nodes are deployed in the ground of an outdoor parking lot in such a way that a sensor node monitors a parking space. Each sensor node detects the availability of the associated parking space and transmits the detection result to a sink node via intermediate sensor nodes existing between the source sensor node and the sink node. We evaluate the feasibility of the presented sensor network and the TDMA-based communication protocol through experiments using 11 sensor nodes deployed in a real parking lot. The result shows that the presented car parking monitoring system is robust to changes in the communication environments and efficient for monitoring parking spaces of outdoor parking lots.

Keywords: multi-hop communication, parking monitoring system, TDMA, wireless sensor network

Procedia PDF Downloads 303
2009 Comparison of Computed Tomography Dose Index, Dose Length Product and Effective Dose Among Male and Female Patients From Contrast Enhanced Computed Tomography Pancreatitis Protocol

Authors: Babina Aryal

Abstract:

Background: The diagnosis of pancreatitis is generally based on clinical and laboratory findings; however, Computed Tomography (CT) is an imaging technique of choice specially Contrast Enhanced Computed Tomography (CECT) shows morphological characteristic findings that allow for establishing the diagnosis of pancreatitis and determining the extent of disease severity which is done along with the administration of appropriate contrast medium. The purpose of this study was to compare Computed Tomography Dose Index (CTDI), Dose Length Product (DLP) and Effective Dose (ED) among male and female patients from Contrast Enhanced Computed Tomography (CECT) Pancreatitis Protocol. Methods: This retrospective study involved data collection based on clinical/laboratory/ultrasonography diagnosis of Pancreatitis and has undergone CECT Abdomen pancreatitis protocol. data collection involved detailed information about a patient's Age and Gender, Clinical history, Individual Computed Tomography Dose Index and Dose Length Product and effective dose. Results: We have retrospectively collected dose data from 150 among which 127 were males and 23 were females. The values obtained from the display of the CT screen were measured, calculated and compared to determine whether the CTDI, DLP and ED values were similar or not. CTDI for females was more as compared to males. The differences in CTDI values for females and males were 32.2087 and 37.1609 respectively. DLP values and Effective dose for both the genders did not show significant differences. Conclusion: This study concluded that there were no more significant changes in the DLP and ED values among both the genders however we noticed that female patients had more CTDI than males.

Keywords: computed tomography, contrast enhanced computed tomography, computed tomography dose index, dose length product, effective dose

Procedia PDF Downloads 118
2008 Robust and Transparent Spread Spectrum Audio Watermarking

Authors: Ali Akbar Attari, Ali Asghar Beheshti Shirazi

Abstract:

In this paper, we propose a blind and robust audio watermarking scheme based on spread spectrum in Discrete Wavelet Transform (DWT) domain. Watermarks are embedded in the low-frequency coefficients, which is less audible. The key idea is dividing the audio signal into small frames, and magnitude of the 6th level of DWT approximation coefficients is modifying based upon the Direct Sequence Spread Spectrum (DSSS) technique. Also, the psychoacoustic model for enhancing in imperceptibility, as well as Savitsky-Golay filter for increasing accuracy in extraction, is used. The experimental results illustrate high robustness against most common attacks, i.e. Gaussian noise addition, Low pass filter, Resampling, Requantizing, MP3 compression, without significant perceptual distortion (ODG is higher than -1). The proposed scheme has about 83 bps data payload.

Keywords: audio watermarking, spread spectrum, discrete wavelet transform, psychoacoustic, Savitsky-Golay filter

Procedia PDF Downloads 199
2007 Nursing System Development in Patients Undergoing Operation in 3C Ward

Authors: Darawan Augsornwan, Artitaya Sabangbal, Maneewan Srijan, Kanokarn Kongpitee, Lalida Petphai, Palakorn Surakunprapha

Abstract:

Background: Srinagarind Hospital, Ward 3C, has patients with head and neck cancer, congenital urology anomalies such as hypospadis, cleft lip and cleft palate and congenital megacolon who need surgery. Undergoing surgery is a difficult time for patients/ family; they feel fear and anxiety. Nurses work closely with patients and family for 24 hours in the process of patients care, so should have the good nursing ability, innovation and an efficient nursing care system to promote patients self-care ability reducing suffering and preventing complications. From previous nursing outcomes we found patients did not receive appropriate information, could not take care of their wound, not early ambulation after the operation and lost follow-up. Objective: to develop the nursing system for patients who were undergoing an operation. Method: this is a participation action research. The sample population was 11 nurses and 60 patients. This study was divided into 3 phase: Phase 1. Situation review In this phase we review the clinical outcomes, the process of care from documents such as nurses note and interview nurses, patients and family about the process of care by nurses. Phase 2: focus group with 11 nurses, searching guideline for specific care, nursing care system then establish the protocol. This phase we have the protocol for giving information, teaching protocol and teaching record, leaflet for all of top five diseases, make video media to convey information, ambulation package and protocol for patients with head and neck cancer, patients zoning, primary nurse, improved job description for each staff level. Program to record number of patients, kind of medical procedures for showing nurses activity each day. Phase 3 implementation and evaluation. Result: patients/family receive appropriate information about deep breathing exercise, cough, early ambulation after the operation, information during the stay in the hospital. Patients family satisfaction is 95.04 percent, appropriate job description for a practical nurse, nurse aid, and worker. Nurses satisfaction is 95 percent. The complications can be prevented. Conclusion: the nursing system is the dynamic process using evidence to develop nursing care. The appropriate system depends on context and needs to keep an eye on every event.

Keywords: development, nursing system, patients undergoing operation, 3C Ward

Procedia PDF Downloads 264
2006 A Second Order Genetic Algorithm for Traveling Salesman Problem

Authors: T. Toathom, M. Munlin, P. Sugunnasil

Abstract:

The traveling salesman problem (TSP) is one of the best-known problems in optimization problem. There are many research regarding the TSP. One of the most usage tool for this problem is the genetic algorithm (GA). The chromosome of the GA for TSP is normally encoded by the order of the visited city. However, the traditional chromosome encoding scheme has some limitations which are twofold: the large solution space and the inability to encapsulate some information. The number of solution for a certain problem is exponentially grow by the number of city. Moreover, the traditional chromosome encoding scheme fails to recognize the misplaced correct relation. It implies that the tradition method focuses only on exact solution. In this work, we relax some of the concept in the GA for TSP which is the exactness of the solution. The proposed work exploits the relation between cities in order to reduce the solution space in the chromosome encoding. In this paper, a second order GA is proposed to solve the TSP. The term second order refers to how the solution is encoded into chromosome. The chromosome is divided into 2 types: the high order chromosome and the low order chromosome. The high order chromosome is the chromosome that focus on the relation between cities such as the city A should be visited before city B. On the other hand, the low order chromosome is a type of chromosome that is derived from a high order chromosome. In other word, low order chromosome is encoded by the traditional chromosome encoding scheme. The genetic operation, mutation and crossover, will be performed on the high order chromosome. Then, the high order chromosome will be mapped to a group of low order chromosomes whose characteristics are satisfied with the high order chromosome. From the mapped set of chromosomes, the champion chromosome will be selected based on the fitness value which will be later used as a representative for the high order chromosome. The experiment is performed on the city data from TSPLIB.

Keywords: genetic algorithm, traveling salesman problem, initial population, chromosomes encoding

Procedia PDF Downloads 270
2005 Structural Identification for Layered Composite Structures through a Wave and Finite Element Methodology

Authors: Rilwan Kayode Apalowo, Dimitrios Chronopoulos

Abstract:

An approach for identifying the geometric and material characteristics of layered composite structures through an inverse wave and finite element methodology is proposed. These characteristics are obtained through multi-frequency single shot measurements. However, it is established that the frequency regime of the measurements does not matter, meaning that both ultrasonic and structural dynamics frequency spectra can be employed. Taking advantage of a full FE (finite elements) description of the periodic composite, the scheme is able to account for arbitrarily complex structures. In order to demonstrate the robustness of the presented scheme, it is applied to a sandwich composite panel and results are compared with that of experimental characterization techniques. Excellent agreement is obtained with the experimental measurements.

Keywords: structural identification, non-destructive evaluation, finite elements, wave propagation, layered structures, ultrasound

Procedia PDF Downloads 143
2004 An Implementation of a Configurable UART-to-Ethernet Converter

Authors: Jungho Moon, Myunggon Yoon

Abstract:

This paper presents an implementation of a configurable UART-to-Ethernet converter using an ARM-based 32-bit microcontroller as well as a dedicated configuration program running on a PC for configuring the operating parameters of the converter. The program was written in Python. Various parameters pertaining to the operation of the converter can be modified by the configuration program through the Ethernet interface of the converter. The converter supports 3 representative asynchronous serial communication protocols, RS-232, RS-422, and RS-485 and supports 3 network modes, TCP/IP server, TCP/IP client, and UDP client. The TCP/IP and UDP protocols were implemented on the microcontroller using an open source TCP/IP protocol stack called lwIP (A lightweight TCP/IP) and FreeRTOS, a free real-time operating system for embedded systems. Due to the use of a real-time operating system, the firmware of the converter was implemented as a multi-thread application and as a result becomes more modular and easier to develop. The converter can provide a seamless bridge between a serial port and an Ethernet port, thereby allowing existing legacy apparatuses with no Ethernet connectivity to communicate using the Ethernet protocol.

Keywords: converter, embedded systems, ethernet, lwIP, UART

Procedia PDF Downloads 706
2003 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 145
2002 World War II Vaccination Scheme as a Determinant of Gender-Specific Differences in Anti-Tetanus Antibody Levels in the British Elderly Population

Authors: Myrto Vlazaki

Abstract:

Tetanus is a non-transmissible, preventable bacterial disease with high mortality. In the U.K., the demographic group systematically accounting for a large proportion of the infections notified to the authorities over the years have been the elderly (> 60 years old). The 2009 seroepidemiological study for tetanus in England reports a gender-age interaction for the +70, with males having significantly higher anti-tetanus antibody levels than females. A systematic review of the literature was carried out to characterise: I. the seroepidemiology of tetanus in economically developed countries with similar immunisation schemes to the U.K., introduced in the 1960’s. II. the factors leading to differential vaccine uptake between males and females in 1910-1945 (corresponding to ages of 60-95 in 2005). III. the immune response elicited by anti-tetanus immunisation in males and females IV. the value of catch-up immunisation in the elderly Similar age- and gender- differences in anti-tetanus antibody levels are noted in other countries. Gender differences in immune responses elicited by vaccination are not consistent with the finding that elder females are less well protected against tetanus compared to their male counterparts. Attention is drawn to the selective anti-tetanus immunisation scheme introduced in the U.K. in 1938, specific to the World War II conscripts. The age-specific immunity gap observed amongst the +70 could be explained as the by-product of that early scheme targetting mostly males. Introducing anti-tetanus vaccination in the +70 in the U.K. could help bridge the immunity gap between males and females and reduce the overall tetanus susceptibility of this age group.

Keywords: elderly, immunisation, gender-specific differences, seroepidemiology, tetanus, World War II

Procedia PDF Downloads 149
2001 Identifying the Traditional Color Scheme in Decorative Patterns Used by the Bahnar Ethnic Group in the Central Highlands of Vietnam

Authors: Nguyen Viet Tan

Abstract:

The Bahnar is one of 11 indigenous groups living in the Central Highlands of Vietnam. It is one among the four most popular groups in this area, including the Mnong who speak the same language of Mon Khmer family, while both groups of the Jrai and the Rhade belong to the Malayo-Polynesian language family. These groups once captured fertile plateaus, left their cultural and artistic heritage which affected the remaining small groups. Despite the difference in ethnic origins, these groups seem to share similar beliefs, customs and related folk arts after a very long time living beside each other. However, through an in-depth study, this paper points out the fact that the decorative patterns used by the Bahnar are different from the other ethnic groups, especially in color. Based on historical materials from the local museums and some studies in 1980s when all of the ethnic groups in this area had still lived in self-sufficient condition, this paper characterizes the traditional color scheme used by the Bahnar and identifies the difference in decorative motifs of this group compared to the others by pointing out they do not use green in their usual decorative patterns. Moreover, combined with some field surveys recently, through comparative analysis, it also discovers stylistic variations of these patterns in the process of cultural exchange with the other ethnic groups, both in and out of the region, in modern living conditions. This study helps to preserve and promote the traditional values and cultural identity of the Bahnar people in the Central Highlands of Vietnam, avoiding the fusion of styles among groups during the cultural exchange.

Keywords: Bahnar ethnic group, decorative patterns, the central highlands of Vietnam, the traditional color scheme

Procedia PDF Downloads 125
2000 Comparison of Two Transcranial Magnetic Stimulation Protocols on Spasticity in Multiple Sclerosis - Pilot Study of a Randomized and Blind Cross-over Clinical Trial

Authors: Amanda Cristina da Silva Reis, Bruno Paulino Venâncio, Cristina Theada Ferreira, Andrea Fialho do Prado, Lucimara Guedes dos Santos, Aline de Souza Gravatá, Larissa Lima Gonçalves, Isabella Aparecida Ferreira Moretto, João Carlos Ferrari Corrêa, Fernanda Ishida Corrêa

Abstract:

Objective: To compare two protocols of Transcranial Magnetic Stimulation (TMS) on quadriceps muscle spasticity in individuals diagnosed with Multiple Sclerosis (MS). Method: Clinical, crossover study, in which six adult individuals diagnosed with MS and spasticity in the lower limbs were randomized to receive one session of high-frequency (≥5Hz) and low-frequency (≤ 1Hz) TMS on motor cortex (M1) hotspot for quadriceps muscle, with a one-week interval between the sessions. To assess the spasticity was applied the Ashworth scale and were analyzed the latency time (ms) of the motor evoked potential (MEP) and the central motor conduction time (CMCT) of the bilateral quadriceps muscle. Assessments were performed before and after each intervention. The difference between groups was analyzed using the Friedman test, with a significance level of 0.05 adopted. Results: All statistical analyzes were performed using the SPSS Statistic version 26 programs, with a significance level established for the analyzes at p<0.05. Shapiro Wilk normality test. Parametric data were represented as mean and standard deviation for non-parametric variables, median and interquartile range, and frequency and percentage for categorical variables. There was no clinical change in quadriceps spasticity assessed using the Ashworth scale for the 1 Hz (p=0.813) and 5 Hz (p= 0.232) protocols for both limbs. Motor Evoked Potential latency time: in the 5hz protocol, there was no significant change for the contralateral side from pre to post-treatment (p>0.05), and for the ipsilateral side, there was a decrease in latency time of 0.07 seconds (p<0.05 ); for the 1Hz protocol there was an increase of 0.04 seconds in the latency time (p<0.05) for the contralateral side to the stimulus, and for the ipsilateral side there was a decrease in the latency time of 0.04 seconds (p=<0.05), with a significant difference between the contralateral (p=0.007) and ipsilateral (p=0.014) groups. Central motor conduction time in the 1Hz protocol, there was no change for the contralateral side (p>0.05) and for the ipsilateral side (p>0.05). In the 5Hz protocol for the contralateral side, there was a small decrease in latency time (p<0.05) and for the ipsilateral side, there was a decrease of 0.6 seconds in the latency time (p<0.05) with a significant difference between groups (p=0.019). Conclusion: A high or low-frequency session does not change spasticity, but it is observed that when the low-frequency protocol was performed, there was an increase in latency time on the stimulated side, and a decrease in latency time on the non-stimulated side, considering then that inhibiting the motor cortex increases cortical excitability on the opposite side.

Keywords: multiple sclerosis, spasticity, motor evoked potential, transcranial magnetic stimulation

Procedia PDF Downloads 89
1999 The Correlation between Nasal Resistance and Obligatory Oronasal Switching Point in Non-Athletic Non-Smoking Healthy Men

Authors: Amir H. Bayat, Mohammad R. Alipour, Saeed Khamneh

Abstract:

As the respiration via nose is important physiologically, many studies have been done about nasal breathing that switches to oronasal breathing during exercise. The aim of this study was to assess the role of anterior nasal resistance as one of the effective factors on this switching. Twelve young, healthy, non-athletic and non-smoker male volunteers with normal BMI were selected after physical examination and participated in exercise protocol, including measurement of the ventilation, work load and oronasal switching point (OSP) during exercise, and anterior rhinomanometry at rest. The protocol was an incremental exercise with 25 watt increase in work load per minute up to OSP occurrence. There was a significant negative correlation between resting total anterior nasal resistance with OSP, work load and ventilation (p<0.05, r= -0.709). Resting total anterior nasal resistance can be considered as an important factor on OSP occurrence. So, the reducing the resistance of nasal passage may increase nasal respiration tolerance for longer time during exercise.

Keywords: anterior nasal resistance, exercise, OSP, ventilation, work load

Procedia PDF Downloads 403
1998 Validation of the Recovery of House Dust Mites from Fabrics by Means of Vacuum Sampling

Authors: A. Aljohani, D. Burke, D. Clarke, M. Gormally, M. Byrne, G. Fleming

Abstract:

Introduction: House Dust Mites (HDMs) are a source of allergen particles embedded in textiles and furnishings. Vacuum sampling is commonly used to recover and determine the abundance of HDMs but the efficiency of this method is less than standardized. Here, the efficiency of recovery of HDMs was evaluated from home-associated textiles using vacuum sampling protocols.Methods/Approach: Living Mites (LMs) or dead Mites (DMs) House Dust Mites (Dermatophagoides pteronyssinus: FERA, UK) were separately seeded onto the surfaces of Smooth Cotton, Denim and Fleece (25 mites/10x10cm2 squares) and left for 10 minutes before vacuuming. Fabrics were vacuumed (SKC Flite 2 pump) at a flow rate of 14 L/min for 60, 90 or 120 seconds and the number of mites retained by the filter (0.4μm x 37mm) unit was determined. Vacuuming was carried out in a linear direction (Protocol 1) or in a multidirectional pattern (Protocol 2). Additional fabrics with LMs were also frozen and then thawed, thereby euthanizing live mites (now termed EMs). Results/Findings: While there was significantly greater (p=0.000) recovery of mites (76% greater) in fabrics seeded with DMs than LMs irrespective of vacuuming protocol or fabric type, the efficiency of recovery of DMs (72%-76%) did not vary significantly between fabrics. For fabrics containing EMs, recovery was greatest for Smooth Cotton and Denim (65-73% recovered) and least for Fleece (15% recovered). There was no significant difference (p=0.99) between the recovery of mites across all three mite categories from Smooth Cotton and Denim but significantly fewer (p=0.000) mites were recovered from Fleece. Scanning Electron Microscopy images of HMD-seeded fabrics showed that live mites burrowed deeply into the Fleece weave which reduced their efficiency of recovery by vacuuming. Research Implications: Results presented here have implications for the recovery of HDMs by vacuuming and the choice of fabric to ameliorate HDM-dust sensitization.

Keywords: allergy, asthma, dead, fabric, fleece, live mites, sampling

Procedia PDF Downloads 139
1997 Performance Analysis of Bluetooth Low Energy Mesh Routing Algorithm in Case of Disaster Prediction

Authors: Asmir Gogic, Aljo Mujcic, Sandra Ibric, Nermin Suljanovic

Abstract:

Ubiquity of natural disasters during last few decades have risen serious questions towards the prediction of such events and human safety. Every disaster regardless its proportion has a precursor which is manifested as a disruption of some environmental parameter such as temperature, humidity, pressure, vibrations and etc. In order to anticipate and monitor those changes, in this paper we propose an overall system for disaster prediction and monitoring, based on wireless sensor network (WSN). Furthermore, we introduce a modified and simplified WSN routing protocol built on the top of the trickle routing algorithm. Routing algorithm was deployed using the bluetooth low energy protocol in order to achieve low power consumption. Performance of the WSN network was analyzed using a real life system implementation. Estimates of the WSN parameters such as battery life time, network size and packet delay are determined. Based on the performance of the WSN network, proposed system can be utilized for disaster monitoring and prediction due to its low power profile and mesh routing feature.

Keywords: bluetooth low energy, disaster prediction, mesh routing protocols, wireless sensor networks

Procedia PDF Downloads 385
1996 Direct Power Control Applied on 5-Level Diode Clamped Inverter Powered by a Renewable Energy Source

Authors: A. Elnady

Abstract:

This paper presents an improved Direct Power Control (DPC) scheme applied to the multilevel inverter that forms a Distributed Generation Unit (DGU). This paper demonstrates the performance of active and reactive power injected by the DGU to the smart grid. The DPC is traditionally operated by the hysteresis controller with the Space Vector Modulation (SVM) which is applied on the 2-level inverters or 3-level inverters. In this paper, the DPC is operated by the PI controller with the Phase-Disposition Pulse Width Modulation (PD-PWM) applied to the 5-level diode clamped inverter. The new combination of the DPC, PI controller, PD-PWM and multilevel inverter proves that its performance is much better than the conventional hysteresis-SVM based DPC. Simulations results have been presented to validate the performance of the suggested control scheme in the grid-connected mode.

Keywords: direct power control, PI controller, PD-PWM, and power control

Procedia PDF Downloads 240
1995 Location Privacy Preservation of Vehicle Data In Internet of Vehicles

Authors: Ying Ying Liu, Austin Cooke, Parimala Thulasiraman

Abstract:

Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor.

Keywords: differential privacy, internet of things, internet of vehicles, location privacy, privacy preservation scheme

Procedia PDF Downloads 179
1994 PDDA: Priority-Based, Dynamic Data Aggregation Approach for Sensor-Based Big Data Framework

Authors: Lutful Karim, Mohammed S. Al-kahtani

Abstract:

Sensors are being used in various applications such as agriculture, health monitoring, air and water pollution monitoring, traffic monitoring and control and hence, play the vital role in the growth of big data. However, sensors collect redundant data. Thus, aggregating and filtering sensors data are significantly important to design an efficient big data framework. Current researches do not focus on aggregating and filtering data at multiple layers of sensor-based big data framework. Thus, this paper introduces (i) three layers data aggregation and framework for big data and (ii) a priority-based, dynamic data aggregation scheme (PDDA) for the lowest layer at sensors. Simulation results show that the PDDA outperforms existing tree and cluster-based data aggregation scheme in terms of overall network energy consumptions and end-to-end data transmission delay.

Keywords: big data, clustering, tree topology, data aggregation, sensor networks

Procedia PDF Downloads 345
1993 Face Sketch Recognition in Forensic Application Using Scale Invariant Feature Transform and Multiscale Local Binary Patterns Fusion

Authors: Gargi Phadke, Mugdha Joshi, Shamal Salunkhe

Abstract:

Facial sketches are used as a crucial clue by criminal investigators for identification of suspects when the description of eyewitness or victims are only available as evidence. A forensic artist develops a sketch as per the verbal description is given by an eyewitness that shows the facial look of the culprit. In this paper, the fusion of Scale Invariant Feature Transform (SIFT) and multiscale local binary patterns (MLBP) are proposed as a feature to recognize a forensic face sketch images from a gallery of mugshot photos. This work focuses on comparative analysis of proposed scheme with existing algorithms in different challenges like illumination change and rotation condition. Experimental results show that proposed scheme can lead to better performance for the defined problem.

Keywords: SIFT feature, MLBP, PCA, face sketch

Procedia PDF Downloads 336
1992 Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security

Authors: Rosmini Yanti, Safira Aviolita, Marsetio

Abstract:

Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.

Keywords: archipelago state, maritime law, maritime security, traffic separation scheme

Procedia PDF Downloads 128
1991 Application of Finite Volume Method for Numerical Simulation of Contaminant Transfer in a Two-Dimensional Reservoir

Authors: Atousa Ataieyan, Salvador A. Gomez-Lopera, Gennaro Sepede

Abstract:

Today, due to the growing urban population and consequently, the increasing water demand in cities, the amount of contaminants entering the water resources is increasing. This can impose harmful effects on the quality of the downstream water. Therefore, predicting the concentration of discharged pollutants at different times and distances of the interested area is of high importance in order to carry out preventative and controlling measures, as well as to avoid consuming the contaminated water. In this paper, the concentration distribution of an injected conservative pollutant in a square reservoir containing four symmetric blocks and three sources using Finite Volume Method (FVM) is simulated. For this purpose, after estimating the flow velocity, classical Advection-Diffusion Equation (ADE) has been discretized over the studying domain by Backward Time- Backward Space (BTBS) scheme. Then, the discretized equations for each node have been derived according to the initial condition, boundary conditions and point contaminant sources. Finally, taking into account the appropriate time step and space step, a computational code was set up in MATLAB. Contaminant concentration was then obtained at different times and distances. Simulation results show how using BTBS differentiating scheme and FVM as a numerical method for solving the partial differential equation of transport is an appropriate approach in the case of two-dimensional contaminant transfer in an advective-diffusive flow.

Keywords: BTBS differentiating scheme, contaminant concentration, finite volume, mass transfer, water pollution

Procedia PDF Downloads 135
1990 Development of Orthogonally Protected 2,1':4,6-Di-O-Diisopropylidene Sucrose as the Versatile Intermediate for Diverse Synthesis of Phenylpropanoid Sucrose Esters

Authors: Li Lin Ong, Duc Thinh Khong, Zaher M. A. Judeh

Abstract:

Phenylpropanoid sucrose esters (PSEs) are natural compounds found in various medicinal plants which exhibit important biological activities such as antiproliferation and α- and β-glucosidase inhibitory activities. Despite their potential as new therapeutics, total synthesis of PSEs has been very limited as their inherent structures contain one or more (substituted) cinnamoyl groups randomly allocated on the sucrose core via ester linkage. Since direct acylation of unprotected sucrose would be complex and tedious due to the presence of eight free hydroxyl groups, partially protected 2,1’:4,6-di-O-diisopropylidene sucrose was used as the starting material instead. However, similar reactivity between the remaining four hydroxyl groups still pose a challenge in the total synthesis of PSEs as the lack of selectivity can restrict customisation where acylation at specific OH is desired. To overcome this problem, a 4-step orthogonal protection scheme was developed. In this scheme, the remaining four hydroxyl groups on 2,1’:4,6-di-O-diisopropylidene sucrose, 6’-OH, 3’-OH, 4’-OH, and 3-OH, were protected with different protecting groups with an overall yield of > 40%. This orthogonally protected intermediate would provide a convenient and divergent access to a wider range of natural and synthetic PSEs as (substituted) cinnamoyl groups can be selectively introduced at desired positions. Using this scheme, three different series of monosubstituted PSEs were successfully synthesized where (substituted) cinnamoyl groups were introduced selectively at O-3, O-3’, and O-4’ positions, respectively. The expanded library of PSEs would aid in structural-activity relationship study of PSEs for identifying key components responsible for their biological activities.

Keywords: orthogonal protection, phenylpropanoid sucrose esters, selectivity, sucrose

Procedia PDF Downloads 158
1989 Event Driven Dynamic Clustering and Data Aggregation in Wireless Sensor Network

Authors: Ashok V. Sutagundar, Sunilkumar S. Manvi

Abstract:

Energy, delay and bandwidth are the prime issues of wireless sensor network (WSN). Energy usage optimization and efficient bandwidth utilization are important issues in WSN. Event triggered data aggregation facilitates such optimal tasks for event affected area in WSN. Reliable delivery of the critical information to sink node is also a major challenge of WSN. To tackle these issues, we propose an event driven dynamic clustering and data aggregation scheme for WSN that enhances the life time of the network by minimizing redundant data transmission. The proposed scheme operates as follows: (1) Whenever the event is triggered, event triggered node selects the cluster head. (2) Cluster head gathers data from sensor nodes within the cluster. (3) Cluster head node identifies and classifies the events out of the collected data using Bayesian classifier. (4) Aggregation of data is done using statistical method. (5) Cluster head discovers the paths to the sink node using residual energy, path distance and bandwidth. (6) If the aggregated data is critical, cluster head sends the aggregated data over the multipath for reliable data communication. (7) Otherwise aggregated data is transmitted towards sink node over the single path which is having the more bandwidth and residual energy. The performance of the scheme is validated for various WSN scenarios to evaluate the effectiveness of the proposed approach in terms of aggregation time, cluster formation time and energy consumed for aggregation.

Keywords: wireless sensor network, dynamic clustering, data aggregation, wireless communication

Procedia PDF Downloads 450
1988 Exploring SSD Suitable Allocation Schemes Incompliance with Workload Patterns

Authors: Jae Young Park, Hwansu Jung, Jong Tae Kim

Abstract:

Whether the data has been well parallelized is an important factor in the Solid-State-Drive (SSD) performance. SSD parallelization is affected by allocation scheme and it is directly connected to SSD performance. There are dynamic allocation and static allocation in representative allocation schemes. Dynamic allocation is more adaptive in exploiting write operation parallelism, while static allocation is better in read operation parallelism. Therefore, it is hard to select the appropriate allocation scheme when the workload is mixed read and write operations. We simulated conditions on a few mixed data patterns and analyzed the results to help the right choice for better performance. As the results, if data arrival interval is long enough prior operations to be finished and continuous read intensive data environment static allocation is more suitable. Dynamic allocation performs the best on write performance and random data patterns.

Keywords: dynamic allocation, NAND flash based SSD, SSD parallelism, static allocation

Procedia PDF Downloads 339