Search results for: protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1092

Search results for: protocol

642 The Narrative Coherence of Autistic Children’s Accounts of an Experienced Event over Time

Authors: Fuming Yang, Telma Sousa Almeida, Xinyu Li, Yunxi Deng, Heying Zhang, Michael E. Lamb

Abstract:

Twenty-seven children aged 6-15 years with autism spectrum disorder (ASD) and 32 typically developing children were questioned about their participation in a set of activities after a two-week delay and again after a two-month delay, using a best-practice interview protocol. This paper assessed the narrative coherence of children’s reports based on key story grammar elements and temporal features included in their accounts of the event. Results indicated that, over time, both children with ASD and typically developing (TD) children decreased their narrative coherence. Children with ASD were no different from TD peers with regards to story length and syntactic complexity. However, they showed significantly less coherence than TD children. They were less likely to use the gist of the story to organize their narrative coherence. Interviewer prompts influenced children’s narrative coherence. The findings indicated that children with ASD could provide meaningful and reliable testimony about an event they personally experienced, but the narrative coherence of their reports deteriorates over time and is affected by interviewer prompts.

Keywords: autism spectrum disorders, delay, eyewitness testimony, narrative coherence

Procedia PDF Downloads 253
641 Formation Control for Linear Multi-Robot System with Switched Directed Topology and Time-Varying Delays

Authors: Yaxiao Zhang, Yangzhou Chen

Abstract:

This study investigate the formation problem for high-order continuous-time multi-robot with bounded symmetric time-varying delay protocol under switched directed communication topology. By using a linear transformation, the formation problem is transformed to stability analysis of a switched delay system. Under the assumption that each communication topology has a directed spanning tree, sufficient conditions are presented in terms of linear matrix inequalities (LMIs) that the multi-robot system can achieve a desired formation by the trade-off among the pre-exist topologies with the help of the scheme of average dwell time. A numeral example is presented to illustrate the effectiveness of the obtained results.

Keywords: multi-robot systems, formation, switched directed topology, symmetric time-varying delay, average dwell time, linear matrix inequalities (lmis)

Procedia PDF Downloads 500
640 Physical Activity and Nutrition Intervention for Singaporean Women Aged 50 Years and Above: A Study Protocol for a Community Based Randomised Controlled Trial

Authors: Elaine Yee Sing Wong, Jonine Jancey, Andy H. Lee, Anthony P. James

Abstract:

Singapore has a rapidly aging population, where the majority of older women aged 50 years and above, are physically inactive and have unhealthy dietary habits, placing them at ‘high risk’ of non-communicable diseases. Given the multiplicity of less than optimal dietary habits and high levels of physical inactivity among Singaporean women, it is imperative to develop appropriate lifestyle interventions at recreational centres to enhance both their physical and nutritional knowledge, as well as provide them with the opportunity to develop skills to support behaviour change. To the best of our knowledge, this proposed study is the first physical activity and nutrition cluster randomised controlled trial conducted in Singapore for older women. Findings from this study may provide insights and recommendations for policy makers and key stakeholders to create new healthy living, recreational centres with supportive environments. This 6-month community-based cluster randomised controlled trial will involve the implementation and evaluation of physical activity and nutrition program for community dwelling Singaporean women, who currently attend recreational centres to promote social leisure activities in their local neighbourhood. The intervention will include dietary education and counselling sessions, physical activity classes, and telephone contact by certified fitness instructors and qualified nutritionists. Social Cognitive Theory with Motivational Interviewing will inform the development of strategies to support health behaviour change. Sixty recreational centres located in Singapore will be randomly selected from five major geographical districts and randomly allocated to the intervention (n=30) or control (n=30) cluster. A sample of 600 (intervention n=300; control n=300) women aged 50 years and above will then be recruited from these recreational centres. The control clusters will only undergo pre and post data collection and will not receive the intervention. It is hypothesised that by the end of the intervention, the intervention group participants (n = 300) compared to the control group (n = 300), will show significant improvements in the following variables: lipid profile, body mass index, physical activity and dietary behaviour, anthropometry, mental and physical health. Data collection will be examined and compared via the Statistical Package for the Social Science version 23. Descriptive and summary statistics will be used to quantify participants’ characteristics and outcome variables. Multi-variable mixed regression analyses will be used to confirm the effects of the proposed health intervention, taking into account the repeated measures and the clustering of the observations. The research protocol was approved by the Curtin University Human Research Ethics Committee (approval number: HRE2016-0366). The study has been registered with the Australian and New Zealand Clinical Trial Registry (12617001022358).

Keywords: community based, healthy aging, intervention, nutrition, older women, physical activity

Procedia PDF Downloads 150
639 Functional Analysis of Thyroid Peroxidase (TPO) Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 323
638 Functional Analysis of Thyroid Peroxidase Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 308
637 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 227
636 A Learning Automata Based Clustering Approach for Underwater ‎Sensor Networks to Reduce Energy Consumption

Authors: Motahareh Fadaei

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: clustering, energy consumption‎, learning automata, underwater sensor networks

Procedia PDF Downloads 294
635 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.

Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 157
634 Performance Analysis of Routing Protocols for WLAN Based Wireless Sensor Networks (WSNs)

Authors: Noman Shabbir, Roheel Nawaz, Muhammad N. Iqbal, Junaid Zafar

Abstract:

This paper focuses on the performance evaluation of routing protocols in WLAN based Wireless Sensor Networks (WSNs). A comparative analysis of routing protocols such as Ad-hoc On-demand Distance Vector Routing System (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR) is been made against different network parameters like network load, end to end delay and throughput in small, medium and large-scale sensor network scenarios to identify the best performing protocol. Simulation results indicate that OLSR gives minimum network load in all three scenarios while AODV gives the best throughput in small scale network but in medium and large scale networks, DSR is better. In terms of delay, OLSR is more efficient in small and medium scale network while AODV is slightly better in large networks.

Keywords: WLAN, WSN, AODV, DSR, OLSR

Procedia PDF Downloads 410
633 The Achievements and Challenges of Physics Teachers When Implementing Problem-Based Learning: An Exploratory Study Applied to Rural High Schools

Authors: Osman Ali, Jeanne Kriek

Abstract:

Introduction: The current instructional approach entrenched in memorizing does not assist conceptual understanding in science. Instructional approaches that encourage research, investigation, and experimentation, which depict how scientists work, should be encouraged. One such teaching strategy is problem-based learning (PBL). PBL has many advantages; enhanced self-directed learning and improved problem-solving and critical thinking skills. However, despite many advantages, PBL has challenges. Research confirmed is time-consuming and difficult to formulate ill-structured questions. Professional development interventions are needed for in-service educators to adopt the PBL strategy. The purposively selected educators had to implement PBL in their classrooms after the intervention to develop their practice and then reflect on the implementation. They had to indicate their achievements and challenges. This study differs from previous studies as the rural educators were subjected to implementing PBL in their classrooms and reflected on their experiences, beliefs, and attitudes regarding PBL. Theoretical Framework: The study reinforced Vygotskian sociocultural theory. According to Vygotsky, the development of a child's cognitive is sustained by the interaction between the child and more able peers in his immediate environment. The theory suggests that social interactions in small groups create an opportunity for learners to form concepts and skills on their own better than working individually. PBL emphasized learning in small groups. Research Methodology: An exploratory case study was employed. The reason is that the study was not necessarily for specific conclusive evidence. Non-probability purposive sampling was adopted to choose eight schools from 89 rural public schools. In each school, two educators were approached, teaching physical sciences in grades 10 and 11 (N = 16). The research instruments were questionnaires, interviews, and lesson observation protocol. Two open-ended questionnaires were developed before and after intervention and analyzed thematically. Three themes were identified. The semi-structured interviews and responses were coded and transcribed into three themes. Subsequently, the Reform Teaching Observation Protocol (RTOP) was adopted for lesson observation and was analyzed using five constructs. Results: Evidence from analyzing the questionnaires before and after the intervention shows that participants knew better what was required to develop an ill-structured problem during the implementation. Furthermore, indications from the interviews are that participants had positive views about the PBL strategy. They stated that they only act as facilitators, and learners’ problem-solving and critical thinking skills are enhanced. They suggested a change in curriculum to adopt the PBL strategy. However, most participants may not continue to apply the PBL strategy stating that it is time-consuming and difficult to complete the Annual Teaching Plan (ATP). They complained about materials and equipment and learners' readiness to work. Evidence from RTOP shows that after the intervention, participants learn to encourage exploration and use learners' questions and comments to determine the direction and focus of classroom discussions.

Keywords: problem-solving, self-directed, critical thinking, intervention

Procedia PDF Downloads 83
632 Novel Approach to Privacy - Preserving Secure Multiparty Computation of Complex Solid Geometric Shape

Authors: Rizwan Rizwan

Abstract:

Secure Multiparty Computation is an emerging area of research within the cryptographic community, enabling secure collaboration among multiple parties while safeguarding their sensitive data. Secure Multiparty Computation has been extensively studied in the context of plane geometry, its application to complex solid geometry shapes remains relatively unexplored. This research paper aims to bridge this gap by proposing a solution for the secure multiparty computation of intersecting tetrahedra. We present an approach to calculate the volume of intersecting tetrahedra securely while preserving the privacy of the input data provided by each participating party. The proposed solution leverages accepted simulation paradigms to prove the privacy of the computation. We thoroughly analyze the computational and communication complexities of our approach, demonstrating that they closely align with the minimum theoretical complexity for the problems at hand. This optimal nature of our solution ensures efficient and secure collaborative geometric computations.

Keywords: cryptography, secure multiparty computation, solid geometry, protocol, simulation paradigm

Procedia PDF Downloads 27
631 Social Construction of Gender: Comparison of Gender Stereotypes among Bureaucrats and Non- Bureaucrats

Authors: Arshad Ali

Abstract:

This study aims to highlight the comparative patterns of social construction of gender among bureaucrats and non-bureaucrats. For the purpose of this study purposive sample of 8 respondents, including both male and female bureaucrats and non-bureaucrats, was collected from Gujranwala and Lahore. The measures for collecting data included an indigenous demographic information sheet and interview protocol related to gender roles, social construction of gender and managerial performance. The collected data was analyzed through the Nvivo version 11 and analysis reveals that there are diverse perceptions regarding male and female stereotyping among bureaucrats and non-bureaucrats, as different kinds of social environments lead to the modification of stereotypes. The research contributes to gender studies, specifically in the context of Pakistani society. There are very few studies available, and empirical data about Gender construction is scanty, so the study provides an impetus for future research. It is suggested that future research explore the phenomenon at a larger scale, including more respondents and another dimension, by keeping in view the socio-economic factors and policies of the government regarding the elimination of gender discrimination in Pakistan.

Keywords: social construction, gender, bureaucrats, gender perception

Procedia PDF Downloads 48
630 Automated End of Sprint Detection for Force-Velocity-Power Analysis with GPS/GNSS Systems

Authors: Patrick Cormier, Cesar Meylan, Matt Jensen, Dana Agar-Newman, Chloe Werle, Ming-Chang Tsai, Marc Klimstra

Abstract:

Sprint-derived horizontal force-velocity-power (FVP) profiles can be developed with adequate validity and reliability with satellite (GPS/GNSS) systems. However, FVP metrics are sensitive to small nuances in data processing procedures such that minor differences in defining the onset and end of the sprint could result in different FVP metric outcomes. Furthermore, in team-sports, there is a requirement for rapid analysis and feedback of results from multiple athletes, therefore developing standardized and automated methods to improve the speed, efficiency and reliability of this process are warranted. Thus, the purpose of this study was to compare different methods of sprint end detection on the development of FVP profiles from 10Hz GPS/GNSS data through goodness-of-fit and intertrial reliability statistics. Seventeen national team female soccer players participated in the FVP protocol which consisted of 2x40m maximal sprints performed towards the end of a soccer specific warm-up in a training session (1020 hPa, wind = 0, temperature = 30°C) on an open grass field. Each player wore a 10Hz Catapult system unit (Vector S7, Catapult Innovations) inserted in a vest in a pouch between the scapulae. All data were analyzed following common procedures. Variables computed and assessed were the model parameters, estimated maximal sprint speed (MSS) and the acceleration constant τ, in addition to horizontal relative force (F₀), velocity at zero (V₀), and relative mechanical power (Pmax). The onset of the sprints was standardized with an acceleration threshold of 0.1 m/s². The sprint end detection methods were: 1. Time when peak velocity (MSS) was achieved (zero acceleration), 2. Time after peak velocity drops by -0.4 m/s, 3. Time after peak velocity drops by -0.6 m/s, and 4. When the integrated distance from the GPS/GNSS signal achieves 40-m. Goodness-of-fit of each sprint end detection method was determined using the residual sum of squares (RSS) to demonstrate the error of the FVP modeling with the sprint data from the GPS/GNSS system. Inter-trial reliability (from 2 trials) was assessed utilizing intraclass correlation coefficients (ICC). For goodness-of-fit results, the end detection technique that used the time when peak velocity was achieved (zero acceleration) had the lowest RSS values, followed by -0.4 and -0.6 velocity decay, and 40-m end had the highest RSS values. For intertrial reliability, the end of sprint detection techniques that were defined as the time at (method 1) or shortly after (method 2 and 3) when MSS was achieved had very large to near perfect ICC and the time at the 40 m integrated distance (method 4) had large to very large ICCs. Peak velocity was reached at 29.52 ± 4.02-m. Therefore, sport scientists should implement end of sprint detection either when peak velocity is determined or shortly after to improve goodness of fit to achieve reliable between trial FVP profile metrics. Although, more robust processing and modeling procedures should be developed in future research to improve sprint model fitting. This protocol was seamlessly integrated into the usual training which shows promise for sprint monitoring in the field with this technology.

Keywords: automated, biomechanics, team-sports, sprint

Procedia PDF Downloads 94
629 The Effect of Ethylene Glycol on Cryopreserved Bovine Oocytes

Authors: Sri Wahjuningsih, Nur Ihsan, Hadiah

Abstract:

In the embryo transfer program, to address the limited production of embryos in vivo, in vitro embryo production has become an alternative approach that is relatively inexpensive. One potential source of embryos that can be developed is to use immature oocytes then conducted in vitro maturation and in vitro fertilization. However, obstacles encountered were oocyte viability mammals have very limited that it cannot be stored for a long time, so we need oocyte cryopreservation. The research was conducted to know the optimal concentration use of ethylene glycol as a cryoprotectant on oocytes freezing.Material use in this research was immature oocytes; taken from abbatoir which was aspirated from follicle with diameter 2-6 mm. Concentration ethylen glycol used were 0,5 M, I M, 1,5 M and 2M. The freezing method used was conventional method combined with a five-step protocol washing oocytes from cryoprotectant after thawing. The result showed that concentration ethylen glycol have the significant effect (P<0.05) on oocytes quality after thawing and in vitro maturation. It was concluded that concentration 1,5 M was the best concentration for freezing oocytes using conventional method.

Keywords: bovine, conventional freezing, ethylen glycol, oocytes

Procedia PDF Downloads 330
628 Governance of Clean Energy in Rural Northwest Pakistan

Authors: Inayatullah Jan, Sidra Pervez

Abstract:

Effective institutional arrangements at local and national levels are quintessential for promotion of renewable energy in a country. This study attempts to examine the institutional arrangements for development of domestic renewable energy in rural northwest Pakistan. The study describes that very limited number of public and private organizations were working on clean development in the area. Surprisingly, no institutional arrangements exclusively meant for domestic clean energy promotion were observed in the area. The study concludes that the objectives of Kyoto Protocol in Pakistan can be achieved only if the government and non-governmental organizations work together to launch cost-effective renewable energy interventions, particularly in rural areas. The need is to have a coordinated, consistent, and focused cooperation of all stakeholders involved in promotion of domestic renewable energy at all levels. This will not only improve the socioeconomic and environmental conditions in the local context, but will play a key role in achieving the United Nations Millennium Development Goals(MDGs).

Keywords: governance, clean energy, greenhouse gases, CDM, Northwest Pakistan

Procedia PDF Downloads 362
627 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 94
626 Splenic Artery Aneurysms: A Rare, Insidious Cause of Abdominal Pain

Authors: Christopher Oyediran, Nicola Ubayasiri, Christopher Gough

Abstract:

Splenic artery aneurysms are often clinically occult, occasionally identified incidentally with imaging. The pathogenesis of aneurysms is complex, but certain factors are thought to contribute to their development. Given the potential fatal complications of rupture, a high index of suspicion is required to make an early diagnosis. We present a case of a 36-year-old female with a history of endometriosis and multiple sclerosis who presented to the Emergency Department with sudden onset epigastric pain and collapse. On arrival, she was pale and clammy with profound tachycardia and hypotension. An ultrasound done in the resuscitation department revealed abdominal free fluid. She was resuscitated with blood and transferred for emergent laparotomy. Laparotomy revealed massive haemoperitoneum from the spleen. She underwent emergency splenectomy and inspection of the spleen revealed a splenic artery aneurysm. She received our massive transfusion protocol followed by a short stay on ITU, making a good post-operative recovery and was discharged home a week later.

Keywords: aneurysm, human chorionic gonadotrophin (hCG), resuscitation, laparotomy

Procedia PDF Downloads 406
625 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 266
624 Direct Organogenesis of Begonia Rex cv. DS-EYWA, An Unique Rare Cultivar, via Thin Cell Layering (TCL) Technique

Authors: Mahboubeh Davoudi Pahnekolayi

Abstract:

Begonia rex cv. DS-EYWA is a rare, unique cultivar of begonia rex with curly colorful leaves. Optimization of an in vitro efficient regeneration protocol by focusing on transverse Thin Cell Layer (tTCL) petiole explants for high-scale production of such a beautiful cultivar was considered as our main purpose in this experiment. Thus, various concentrations of Plant Growth Regulators (PGRs) including 6-Benzylaminopurine (BAP), Thidiazuron (TDY), and –Naphthaleneacetic Acid (NAA), were selected in a Completely Randomized Design (CRD) to establish and optimize the direct organogenesis efficiency of this cultivar. Cultivation of 1 mm tTCL petiole explants in noted treatments showed that 1.5 mgl-1 BAP + 0.5 mgl-1 NAA can induce the highest number of direct regenerated shoots and lower concentration of BAP (0.5 mgl-1) can be suggested for shoot elongation before rooting stage. Elongated shoots were successfully rooted in MS free basal medium and acclimatized in 1:1 peat moss: perlite sterilized pot mixture.

Keywords: begonia rare cultivar, direct organogenesis, explant type, regeneration, thin cell layering (TCL)

Procedia PDF Downloads 43
623 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks

Authors: Anusha M., V. Srikanth

Abstract:

Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.

Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios

Procedia PDF Downloads 528
622 Controlled Synthesis of CdSe Quantum Dots via Microwave-Enhanced Process: A Green Approach for Mass Production

Authors: Delele Worku Ayele, Bing-Joe Hwang

Abstract:

A method that does not employ hot injection techniques has been developed for the size-tunable synthesis of high-quality CdSe quantum dots (QDs) with a zinc blende structure. In this environmentally benign synthetic route, which uses relatively less toxic precursors, solvents, and capping ligands, CdSe QDs that absorb visible light are obtained. The size of the as-prepared CdSe QDs and, thus, their optical properties can be manipulated by changing the microwave reaction conditions. The QDs are characterized by XRD, TEM, UV-vis, FTIR, time-resolved fluorescence spectroscopy, and fluorescence spectrophotometry. In this approach, the reaction is conducted in open air and at a much lower temperature than in hot injection techniques. The use of microwaves in this process allows for a highly reproducible and effective synthesis protocol that is fully adaptable for mass production and can be easily employed to synthesize a variety of semiconductor QDs with the desired properties. The possible application of the as-prepared CdSe QDs has been also assessed using deposition on TiO2 films.

Keywords: average life time, CdSe QDs, microwave (MW), mass production oleic acid, Na2SeSO3

Procedia PDF Downloads 280
621 The Impact of an Improved Strategic Partnership Programme on Organisational Performance and Growth of Firms in the Internet Protocol Television and Hybrid Fibre-Coaxial Broadband Industry

Authors: Collen T. Masilo, Brane Semolic, Pieter Steyn

Abstract:

The Internet Protocol Television (IPTV) and Hybrid Fibre-Coaxial (HFC) Broadband industrial sector landscape are rapidly changing and organisations within the industry need to stay competitive by exploring new business models so that they can be able to offer new services and products to customers. The business challenge in this industrial sector is meeting or exceeding high customer expectations across multiple content delivery modes. The increasing challenges in the IPTV and HFC broadband industrial sector encourage service providers to form strategic partnerships with key suppliers, marketing partners, advertisers, and technology partners. The need to form enterprise collaborative networks poses a challenge for any organisation in this sector, in selecting the right strategic partners who will ensure that the organisation’s services and products are marketed in new markets. Partners who will ensure that customers are efficiently supported by meeting and exceeding their expectations. Lastly, selecting cooperation partners who will represent the organisation in a positive manner, and contribute to improving the performance of the organisation. Companies in the IPTV and HFC broadband industrial sector tend to form informal partnerships with suppliers, vendors, system integrators and technology partners. Generally, partnerships are formed without thorough analysis of the real reason a company is forming collaborations, without proper evaluations of prospective partners using specific selection criteria, and with ineffective performance monitoring of partners to ensure that a firm gains real long term benefits from its partners and gains competitive advantage. Similar tendencies are illustrated in the research case study and are based on Skyline Communications, a global leader in end-to-end, multi-vendor network management and operational support systems (OSS) solutions. The organisation’s flagship product is the DataMiner network management platform used by many operators across multiple industries and can be referred to as a smart system that intelligently manages complex technology ecosystems for its customers in the IPTV and HFC broadband industry. The approach of the research is to develop the most efficient business model that can be deployed to improve a strategic partnership programme in order to significantly improve the performance and growth of organisations participating in a collaborative network in the IPTV and HFC broadband industrial sector. This involves proposing and implementing a new strategic partnership model and its main features within the industry which should bring about significant benefits for all involved companies to achieve value add and an optimal growth strategy. The proposed business model has been developed based on the research of existing relationships, value chains and business requirements in this industrial sector and validated in 'Skyline Communications'. The outputs of the business model have been demonstrated and evaluated in the research business case study the IPTV and HFC broadband service provider 'Skyline Communications'.

Keywords: growth, partnership, selection criteria, value chain

Procedia PDF Downloads 102
620 Coaxial Helix Antenna for Microwave Coagulation Therapy in Liver Tissue Simulations

Authors: M. Chaichanyut, S. Tungjitkusolmun

Abstract:

This paper is concerned with microwave (MW) ablation for a liver cancer tissue by using helix antenna. The antenna structure supports the propagation of microwave energy at 2.45 GHz. A 1½ turn spiral catheter-based microwave antenna applicator has been developed. We utilize the three-dimensional finite element method (3D FEM) simulation to analyze where the tissue heat flux, lesion pattern and volume destruction during MW ablation. The configurations of helix antenna where Helix air-core antenna and Helix Dielectric-core antenna. The 3D FEMs solutions were based on Maxwell and bio-heat equations. The simulation protocol was power control (10 W, 300s). Our simulation result, both helix antennas have heat flux occurred around the helix antenna and that can be induced the temperature distribution similar (teardrop). The region where the temperature exceeds 50°C the microwave ablation was successful (i.e. complete destruction). The Helix air-core antenna and Helix Dielectric-core antenna, ablation zone or axial ratios (Widest/length) were respectively 0.82 and 0.85; the complete destructions were respectively 4.18 cm³ and 5.64 cm³.

Keywords: liver cancer, Helix antenna, finite element, microwave ablation

Procedia PDF Downloads 288
619 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 228
618 A Scalable Model of Fair Socioeconomic Relations Based on Blockchain and Machine Learning Algorithms-1: On Hyperinteraction and Intuition

Authors: Merey M. Sarsengeldin, Alexandr S. Kolokhmatov, Galiya Seidaliyeva, Alexandr Ozerov, Sanim T. Imatayeva

Abstract:

This series of interdisciplinary studies is an attempt to investigate and develop a scalable model of fair socioeconomic relations on the base of blockchain using positive psychology techniques and Machine Learning algorithms for data analytics. In this particular study, we use hyperinteraction approach and intuition to investigate their influence on 'wisdom of crowds' via created mobile application which was created for the purpose of this research. Along with the public blockchain and private Decentralized Autonomous Organization (DAO) which were elaborated by us on the base of Ethereum blockchain, a model of fair financial relations of members of DAO was developed. We developed a smart contract, so-called, Fair Price Protocol and use it for implementation of model. The data obtained from mobile application was analyzed by ML algorithms. A model was tested on football matches.

Keywords: blockchain, Naïve Bayes algorithm, hyperinteraction, intuition, wisdom of crowd, decentralized autonomous organization

Procedia PDF Downloads 145
617 Preparation of Superparamagnetic Functionalized Magnetite Nanoparticles for Magnetically Separable Catalysis

Authors: Priya Arora, Jaspreet K. Rajput

Abstract:

Superparamagnetism has accelerated the research and use of more economical and ecological magnetically separable catalysts due to their more efficient isolation by response to an applied magnetic field. Magnetite nanomaterials coated by SiO2 shell have received a great deal of focus in the last decades as it provides high stability and also easy further surface functionalization depending upon the application. In this protocol, Fe3O4 magnetic nanoparticles have been synthesized by co-precipitation combined with sonication method. Further, Fe3O4 superparamagnetic nanoparticles have been functionalized by various moieties to serve as efficient catalysts for multicomponent reactions. The functionalized nanoparticles were characterized by techniques like Fourier transform infrared spectroscopy (FT-IR), transmission electron microscopy (TEM), scanning electron microscopy (SEM), vibrating sample magnetometer (VSM), thermogravimetric analysis (TGA), Brunauer-Emmett-Teller (BET) surface area analysis. The as prepared nanocatalysts can be reused for several times without any significant loss in its activity. The utilization of magnetic nanoparticles as catalysts for this reaction is one approach i.e. green, inexpensive, facile and widely applicable.

Keywords: functionalized, magnetite, multicomponent reactions, superparamagnetic

Procedia PDF Downloads 317
616 Model and Neural Control of the Depth of Anesthesia during Surgery

Authors: Javier Fernandez, Mayte Medina, Rafael Fernandez de Canete, Nuria Alcain, Juan Carlos Ramos-Diaz

Abstract:

At present, the experimentation of anesthetic drugs on patients requires a regulation protocol, and the response of each patient to several doses of entry drug must be well known. Therefore, the development of pharmacological dose control systems is a promising field of research in anesthesiology. In this paper, it has been developed a non-linear compartmental the pharmacokinetic-pharmacodynamical model which describes the anesthesia depth effect in a sufficiently reliable way over a set of patients with the depth effect quantified by the Bi-Spectral Index. Afterwards, an Artificial Neural Network (ANN) predictive controller has been designed based on the depth of anesthesia model so as to keep the patient in the optimum condition while he undergoes surgical treatment. For the purpose of quantifying the efficiency of the neural predictive controller, a classical proportional-integral-derivative controller has also been developed to compare both strategies. Results show the superior performance of predictive neural controller during BiSpectral Index reference tracking.

Keywords: anesthesia, bi-spectral index, neural network control, pharmacokinetic-pharmacodynamical model

Procedia PDF Downloads 306
615 Rapid Microwave-Enhanced Process for Synthesis of CdSe Quantum Dots for Large Scale Production and Manipulation of Optical Properties

Authors: Delele Worku Ayele, Bing-Joe Hwang

Abstract:

A method that does not employ hot injection techniques has been developed for the size-tunable synthesis of high-quality CdSe quantum dots (QDs) with a zinc blende structure. In this environmentally benign synthetic route, which uses relatively less toxic precursors, solvents, and capping ligands, CdSe QDs that absorb visible light are obtained. The size of the as-prepared CdSe QDs and, thus, their optical properties can be manipulated by changing the microwave reaction conditions. The QDs are characterized by XRD, TEM, UV-vis, FTIR, time-resolved fluorescence spectroscopy, and fluorescence spectrophotometry. In this approach, the reaction is conducted in open air and at a much lower temperature than in hot injection techniques. The use of microwaves in this process allows for a highly reproducible and effective synthesis protocol that is fully adaptable for mass production and can be easily employed to synthesize a variety of semiconductor QDs with the desired properties. The possible application of the as-prepared CdSe QDs has been also assessed using deposition on TiO2 films.

Keywords: CdSe QDs, Na2SeSO3, microwave (MW), oleic acid, mass production, average life time

Procedia PDF Downloads 679
614 Invasion of Scaevola sericea (Goodeniaceae) in Cuba: Invasive Dynamic and Density-Dependent Relationship with the Native Species Tournefortia gnaphalodes (Boraginaceae)

Authors: Jorge Ferro-Diaz, Lazaro Marquez-Llauger, Jose Alberto Camejo-Lamas, Lazaro Marquez-Govea

Abstract:

The invasion of Scaevola sericea Vahl (Goodeniaceae) in Cuba is a recent process, this exotic invasive species was reported for the first time, in the national territory, by 2008. S. sericea is native to the coasts around the Indian Ocean and western Pacific, common on sandy beaches; it has expanded rapidly around the planet by either natural or anthropic causes, mainly due to its use in hotel gardening. Cuba is highly vulnerable to the colonization of these species, mainly due to tropical hurricanes which have increased in the last decades; it also affects other native species such as Tournefortia gnaphalodes (L.) R. Br. (Boraginaceae) that show invasive manifestations because of the unbalanced state of demographic processes of littoral vegetation, which has been studied by authors during the last 10 years. The fast development of Cuban tourism has encouraged the use of exotic species in gardening that invade large sectors of sandy coasts. Taking into account the importance of assessing the impacts dimensions and adopting effective control measures, a monitoring program for the invasion of S. sericea in Cuba was undertaken. The program has been implemented since 2013 and the main objective was to identify invasive patterns and interactions with other native species of coastal vegetation. This experience also aimed to validate the design and propose a standardized monitoring protocol to be applied throughout the country. In the Cuban territory, 12 sites were chosen, where there were established 24 permanent plots of 100 m2; measurements were taken twice a year taking into consideration variables such as abundance, plant height, soil cover, flora and companion vegetation, density and frequency; other physical variables of the beaches were also measured. Similarly, for associated individuals of T. gnaphalodes, the same variables were measured. The results of these first four years allowed us to document patterns of S. sericea invasion, highlighting the use of adventitious roots to enhance their colonization, and to characterize demographic indicators, ecosystem affections, and interactions with native plants. A density-dependent relationship with T. gnaphalodes was documented, finding a controlling effect on S. sericea, so that a manipulation experiment was applied to evaluate possible management actions to be incorporated in the Plans of the protected areas involved. With these results, it was concluded, for the evaluated sites, that S. sericea has had an invasion dynamics ruled by effects of coastal dynamics, more intense in beaches with affectations to the native vegetation, and more controlled in beaches with more preserved vegetation. It was found that when S. sericea is established, the mechanism that most reinforces its invasion is the use of adventitious roots, used to expand the patches and colonize beach sectors. It was also found that when the density of T. gnaphalodes increases, it detains the expansion of S. sericea and reduces its colonization possibilities, behaving as a natural controller of its biological invasion. The results include a proposal of a new Monitoring Protocol for Scaevola sericea in Cuba, with the possibility of extending its implementation to other countries in the region.

Keywords: biological invasion, exotic invasive species, plant interactions, Scaevola sericea

Procedia PDF Downloads 196
613 Antimicrobial Activity of Olive Mill Wastewater Fractions

Authors: Chahinez Ait Si Said, Ouassila Touafek, Mohamed Reda Zahi, Smain Sabour, ‎Mohamed El Hattab ‎

Abstract:

Oil mill wastewater (OMW) is a major effluent of the olive industry resulting from olive ‎oil extraction which is a great source for the development of new drugs. The present ‎study aimed to evaluate the antimicrobial activity of seven different fractions separated ‎from OMW extract. The sample was recovered from an oil mill in the Blida region ‎‎(Algeria). A crude ethyl acetate extract was prepared from OMW according to a well-‎established protocol; the yield of the extract obtained was 4%. From the extract, ‎different fractions were prepared by fractionating the total extract with an open column ‎chromatography. The obtained fractions were submitted to antimicrobial activity ‎screening in a comparative purpose. All the fractions obtained show great antimicrobial ‎potential. ‎Phytochemical study of the different fractions was assessed by evaluating the total ‎phenolic compounds for all fractions studied as the main compounds found in OMW ‎were phenols like hydroxytyrosol, tyrosol, phenolic acids like caffeic, quinic and ferulic ‎acids which show great therapeutic activities. ‎

Keywords: olive mill wastewater, fractionation, total phenolic compound, antimicrobial activity

Procedia PDF Downloads 63