Search results for: LEACH protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1127

Search results for: LEACH protocol

647 Nano Fat Injection for Scar Treatment and Skin Rejuvenation

Authors: Sokol Isaraj, Lorela Bendo

Abstract:

Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars, and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at three months post-treatment, which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment in scar treatment and skin rejuvenation.

Keywords: fat grafting, fat transfer, micro fat, nano fat

Procedia PDF Downloads 58
646 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 415
645 Nano Fat Injection for Scar Treatment and Skin Rejuvenation

Authors: Sokol Isaraj, Lorela Bendo

Abstract:

Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at 3 months post-treatment which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment for scar treatment and skin rejuvenation.

Keywords: fat grafting, fat transfer, microfat, nanofat

Procedia PDF Downloads 56
644 Biomimicked Nano-Structured Coating Elaboration by Soft Chemistry Route for Self-Cleaning and Antibacterial Uses

Authors: Elodie Niemiec, Philippe Champagne, Jean-Francois Blach, Philippe Moreau, Anthony Thuault, Arnaud Tricoteaux

Abstract:

Hygiene of equipment in contact with users is an important issue in the railroad industry. The numerous cleanings to eliminate bacteria and dirt cost a lot. Besides, mechanical solicitations on contact parts are observed daily. It should be interesting to elaborate on a self-cleaning and antibacterial coating with sufficient adhesion and good resistance against mechanical and chemical solicitations. Thus, a Hauts-de-France and Maubeuge Val-de-Sambre conurbation authority co-financed Ph.D. thesis has been set up since October 2017 based on anterior studies carried by the Laboratory of Ceramic Materials and Processing. To accomplish this task, a soft chemical route has been implemented to bring a lotus effect on metallic substrates. It involves nanometric liquid zinc oxide synthesis under 100°C. The originality here consists in a variation of surface texturing by modification of the synthesis time of the species in solution. This helps to adjust wettability. Nanostructured zinc oxide has been chosen because of the inherent photocatalytic effect, which can activate organic substance degradation. Two methods of heating have been compared: conventional and microwave assistance. Tested subtracts are made of stainless steel to conform to transport uses. Substrate preparation was the first step of this protocol: a meticulous cleaning of the samples is applied. The main goal of the elaboration protocol is to fix enough zinc-based seeds to make them grow during the next step as desired (nanorod shaped). To improve this adhesion, a silica gel has been formulated and optimized to ensure chemical bonding between substrate and zinc seeds. The last step consists of deposing a wide carbonated organosilane to improve the superhydrophobic property of the coating. The quasi-proportionality between the reaction time and the nanorod length will be demonstrated. Water Contact (superior to 150°) and Roll-off Angle at different steps of the process will be presented. The antibacterial effect has been proved with Escherichia Coli, Staphylococcus Aureus, and Bacillus Subtilis. The mortality rate is found to be four times superior to a non-treated substrate. Photocatalytic experiences were carried out from different dyed solutions in contact with treated samples under UV irradiation. Spectroscopic measurements allow to determinate times of degradation according to the zinc quantity available on the surface. The final coating obtained is, therefore, not a monolayer but rather a set of amorphous/crystalline/amorphous layers that have been characterized by spectroscopic ellipsometry. We will show that the thickness of the nanostructured oxide layer depends essentially on the synthesis time set in the hydrothermal growth step. A green, easy-to-process and control coating with self-cleaning and antibacterial properties has been synthesized with a satisfying surface structuration.

Keywords: antibacterial, biomimetism, soft-chemistry, zinc oxide

Procedia PDF Downloads 110
643 Phenotypical and Molecular Characterization of Burkholderia mallei from Horses with Glanders: Preliminary Data

Authors: A. F. C. Nassar, D. K. Tessler, L. Okuda, C. Del Fava, D. P. Chiebao, A. H. C. N. Romaldini, A. P. Alvim, M. J. Sanchez-Vazquez, M. S. Rosa, J. C. Pompei, R. Harakava, M. C. S. Araujo, G. H. F. Marques, E. M. Pituco

Abstract:

Glanders is a zoonotic disease of Equidae caused by the bacterium Burkholderia mallei presented in acute or chronic clinical forms with inflammatory nodules in the respiratory tract, lymphangitis and caseous lymph nodes. There is not a treatment with veterinary drugs to this life-threatening disease; thus, its occurrence must be notified to official animal health services and any infected animal must be eliminated. This study aims to detect B. mallei from horses euthanized in outbreaks of glanders in Brazil, providing a better understanding of the bacterial characteristics and determine a proper protocol for isolation. The work was carried out with the collaboration of the Ministry of Agriculture and the Sao Paulo State Animal Health Department, while its procedures were approved by the Committee of Ethics in Animal Experimentation from the Instituto Biologico (CETEA n°156/2017). To the present time, 16 horses from farms with outbreaks of glanders detected by complement fixation test (CFT) serology method were analyzed. During the necropsy, samples of possibly affected organs (lymph nodes, lungs, heart, liver, spleen, kidneys and trachea) were collected for bacterial isolation, molecular tests and pathology. Isolation was performed using two enriched mediums, a potato infusion agar with 5% sheep blood, 4% glycerol and antibiotics (penicilin100U/ mL), and another with the same ingredients except the antibiotic. A PCR protocol was modified for this study using primers design to identify a region of the Flip gen of B. mallei. Thru isolation, 12.5% (2/16) animals were confirmed positive using only the enriched medium with antibiotic and confirmed by PCR: from mediastinal and submandibular lymph nodes and lungs in one animal and from mediastinal lymph node in the other. The detection of the bacterium using PCR showed positivity of 100% (16/16) horses from 144 samples of organs. Pathology macroscopic lesions observed were catarrhal nasal discharge, fetlock ulcers, emaciation, lymphangitis in limbs, suppurative lymphangitis, lymph node enlargement, star shaped liver, and spleen scars, adherence of the renal capsule, pulmonary hemorrhage, and miliary nodules. Microscopic lesions were suppurative bronchopneumonia with microabscesses and Langhans giant cells in lungs; lymph nodes with abscesses and intense lymphoid reaction; hemosiderosis and abscesses in spleen. Positive samples on PCR will be sequenced later and analyzed comparing with previous records in the literature. A throughout description of the recent acute cases of glanders occurring in Brazil and characterization of the bacterium related will contribute to advances in the knowledge of the pathogenicity, clinical symptoms, and epidemiology of this zoonotic disease. Acknowledgment: This project is sponsored by FAPESP.

Keywords: equines, bacterial isolation, zoonosis, PCR, pathology

Procedia PDF Downloads 108
642 The Narrative Coherence of Autistic Children’s Accounts of an Experienced Event over Time

Authors: Fuming Yang, Telma Sousa Almeida, Xinyu Li, Yunxi Deng, Heying Zhang, Michael E. Lamb

Abstract:

Twenty-seven children aged 6-15 years with autism spectrum disorder (ASD) and 32 typically developing children were questioned about their participation in a set of activities after a two-week delay and again after a two-month delay, using a best-practice interview protocol. This paper assessed the narrative coherence of children’s reports based on key story grammar elements and temporal features included in their accounts of the event. Results indicated that, over time, both children with ASD and typically developing (TD) children decreased their narrative coherence. Children with ASD were no different from TD peers with regards to story length and syntactic complexity. However, they showed significantly less coherence than TD children. They were less likely to use the gist of the story to organize their narrative coherence. Interviewer prompts influenced children’s narrative coherence. The findings indicated that children with ASD could provide meaningful and reliable testimony about an event they personally experienced, but the narrative coherence of their reports deteriorates over time and is affected by interviewer prompts.

Keywords: autism spectrum disorders, delay, eyewitness testimony, narrative coherence

Procedia PDF Downloads 255
641 Formation Control for Linear Multi-Robot System with Switched Directed Topology and Time-Varying Delays

Authors: Yaxiao Zhang, Yangzhou Chen

Abstract:

This study investigate the formation problem for high-order continuous-time multi-robot with bounded symmetric time-varying delay protocol under switched directed communication topology. By using a linear transformation, the formation problem is transformed to stability analysis of a switched delay system. Under the assumption that each communication topology has a directed spanning tree, sufficient conditions are presented in terms of linear matrix inequalities (LMIs) that the multi-robot system can achieve a desired formation by the trade-off among the pre-exist topologies with the help of the scheme of average dwell time. A numeral example is presented to illustrate the effectiveness of the obtained results.

Keywords: multi-robot systems, formation, switched directed topology, symmetric time-varying delay, average dwell time, linear matrix inequalities (lmis)

Procedia PDF Downloads 502
640 Physical Activity and Nutrition Intervention for Singaporean Women Aged 50 Years and Above: A Study Protocol for a Community Based Randomised Controlled Trial

Authors: Elaine Yee Sing Wong, Jonine Jancey, Andy H. Lee, Anthony P. James

Abstract:

Singapore has a rapidly aging population, where the majority of older women aged 50 years and above, are physically inactive and have unhealthy dietary habits, placing them at ‘high risk’ of non-communicable diseases. Given the multiplicity of less than optimal dietary habits and high levels of physical inactivity among Singaporean women, it is imperative to develop appropriate lifestyle interventions at recreational centres to enhance both their physical and nutritional knowledge, as well as provide them with the opportunity to develop skills to support behaviour change. To the best of our knowledge, this proposed study is the first physical activity and nutrition cluster randomised controlled trial conducted in Singapore for older women. Findings from this study may provide insights and recommendations for policy makers and key stakeholders to create new healthy living, recreational centres with supportive environments. This 6-month community-based cluster randomised controlled trial will involve the implementation and evaluation of physical activity and nutrition program for community dwelling Singaporean women, who currently attend recreational centres to promote social leisure activities in their local neighbourhood. The intervention will include dietary education and counselling sessions, physical activity classes, and telephone contact by certified fitness instructors and qualified nutritionists. Social Cognitive Theory with Motivational Interviewing will inform the development of strategies to support health behaviour change. Sixty recreational centres located in Singapore will be randomly selected from five major geographical districts and randomly allocated to the intervention (n=30) or control (n=30) cluster. A sample of 600 (intervention n=300; control n=300) women aged 50 years and above will then be recruited from these recreational centres. The control clusters will only undergo pre and post data collection and will not receive the intervention. It is hypothesised that by the end of the intervention, the intervention group participants (n = 300) compared to the control group (n = 300), will show significant improvements in the following variables: lipid profile, body mass index, physical activity and dietary behaviour, anthropometry, mental and physical health. Data collection will be examined and compared via the Statistical Package for the Social Science version 23. Descriptive and summary statistics will be used to quantify participants’ characteristics and outcome variables. Multi-variable mixed regression analyses will be used to confirm the effects of the proposed health intervention, taking into account the repeated measures and the clustering of the observations. The research protocol was approved by the Curtin University Human Research Ethics Committee (approval number: HRE2016-0366). The study has been registered with the Australian and New Zealand Clinical Trial Registry (12617001022358).

Keywords: community based, healthy aging, intervention, nutrition, older women, physical activity

Procedia PDF Downloads 150
639 Functional Analysis of Thyroid Peroxidase (TPO) Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 324
638 Functional Analysis of Thyroid Peroxidase Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis

Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das

Abstract:

Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.

Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection

Procedia PDF Downloads 308
637 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 229
636 A Learning Automata Based Clustering Approach for Underwater ‎Sensor Networks to Reduce Energy Consumption

Authors: Motahareh Fadaei

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: clustering, energy consumption‎, learning automata, underwater sensor networks

Procedia PDF Downloads 294
635 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique

Authors: Athena Nguyen, Rojin Belganeh

Abstract:

Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.

Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS

Procedia PDF Downloads 158
634 Performance Analysis of Routing Protocols for WLAN Based Wireless Sensor Networks (WSNs)

Authors: Noman Shabbir, Roheel Nawaz, Muhammad N. Iqbal, Junaid Zafar

Abstract:

This paper focuses on the performance evaluation of routing protocols in WLAN based Wireless Sensor Networks (WSNs). A comparative analysis of routing protocols such as Ad-hoc On-demand Distance Vector Routing System (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR) is been made against different network parameters like network load, end to end delay and throughput in small, medium and large-scale sensor network scenarios to identify the best performing protocol. Simulation results indicate that OLSR gives minimum network load in all three scenarios while AODV gives the best throughput in small scale network but in medium and large scale networks, DSR is better. In terms of delay, OLSR is more efficient in small and medium scale network while AODV is slightly better in large networks.

Keywords: WLAN, WSN, AODV, DSR, OLSR

Procedia PDF Downloads 414
633 The Achievements and Challenges of Physics Teachers When Implementing Problem-Based Learning: An Exploratory Study Applied to Rural High Schools

Authors: Osman Ali, Jeanne Kriek

Abstract:

Introduction: The current instructional approach entrenched in memorizing does not assist conceptual understanding in science. Instructional approaches that encourage research, investigation, and experimentation, which depict how scientists work, should be encouraged. One such teaching strategy is problem-based learning (PBL). PBL has many advantages; enhanced self-directed learning and improved problem-solving and critical thinking skills. However, despite many advantages, PBL has challenges. Research confirmed is time-consuming and difficult to formulate ill-structured questions. Professional development interventions are needed for in-service educators to adopt the PBL strategy. The purposively selected educators had to implement PBL in their classrooms after the intervention to develop their practice and then reflect on the implementation. They had to indicate their achievements and challenges. This study differs from previous studies as the rural educators were subjected to implementing PBL in their classrooms and reflected on their experiences, beliefs, and attitudes regarding PBL. Theoretical Framework: The study reinforced Vygotskian sociocultural theory. According to Vygotsky, the development of a child's cognitive is sustained by the interaction between the child and more able peers in his immediate environment. The theory suggests that social interactions in small groups create an opportunity for learners to form concepts and skills on their own better than working individually. PBL emphasized learning in small groups. Research Methodology: An exploratory case study was employed. The reason is that the study was not necessarily for specific conclusive evidence. Non-probability purposive sampling was adopted to choose eight schools from 89 rural public schools. In each school, two educators were approached, teaching physical sciences in grades 10 and 11 (N = 16). The research instruments were questionnaires, interviews, and lesson observation protocol. Two open-ended questionnaires were developed before and after intervention and analyzed thematically. Three themes were identified. The semi-structured interviews and responses were coded and transcribed into three themes. Subsequently, the Reform Teaching Observation Protocol (RTOP) was adopted for lesson observation and was analyzed using five constructs. Results: Evidence from analyzing the questionnaires before and after the intervention shows that participants knew better what was required to develop an ill-structured problem during the implementation. Furthermore, indications from the interviews are that participants had positive views about the PBL strategy. They stated that they only act as facilitators, and learners’ problem-solving and critical thinking skills are enhanced. They suggested a change in curriculum to adopt the PBL strategy. However, most participants may not continue to apply the PBL strategy stating that it is time-consuming and difficult to complete the Annual Teaching Plan (ATP). They complained about materials and equipment and learners' readiness to work. Evidence from RTOP shows that after the intervention, participants learn to encourage exploration and use learners' questions and comments to determine the direction and focus of classroom discussions.

Keywords: problem-solving, self-directed, critical thinking, intervention

Procedia PDF Downloads 84
632 Novel Approach to Privacy - Preserving Secure Multiparty Computation of Complex Solid Geometric Shape

Authors: Rizwan Rizwan

Abstract:

Secure Multiparty Computation is an emerging area of research within the cryptographic community, enabling secure collaboration among multiple parties while safeguarding their sensitive data. Secure Multiparty Computation has been extensively studied in the context of plane geometry, its application to complex solid geometry shapes remains relatively unexplored. This research paper aims to bridge this gap by proposing a solution for the secure multiparty computation of intersecting tetrahedra. We present an approach to calculate the volume of intersecting tetrahedra securely while preserving the privacy of the input data provided by each participating party. The proposed solution leverages accepted simulation paradigms to prove the privacy of the computation. We thoroughly analyze the computational and communication complexities of our approach, demonstrating that they closely align with the minimum theoretical complexity for the problems at hand. This optimal nature of our solution ensures efficient and secure collaborative geometric computations.

Keywords: cryptography, secure multiparty computation, solid geometry, protocol, simulation paradigm

Procedia PDF Downloads 28
631 Social Construction of Gender: Comparison of Gender Stereotypes among Bureaucrats and Non- Bureaucrats

Authors: Arshad Ali

Abstract:

This study aims to highlight the comparative patterns of social construction of gender among bureaucrats and non-bureaucrats. For the purpose of this study purposive sample of 8 respondents, including both male and female bureaucrats and non-bureaucrats, was collected from Gujranwala and Lahore. The measures for collecting data included an indigenous demographic information sheet and interview protocol related to gender roles, social construction of gender and managerial performance. The collected data was analyzed through the Nvivo version 11 and analysis reveals that there are diverse perceptions regarding male and female stereotyping among bureaucrats and non-bureaucrats, as different kinds of social environments lead to the modification of stereotypes. The research contributes to gender studies, specifically in the context of Pakistani society. There are very few studies available, and empirical data about Gender construction is scanty, so the study provides an impetus for future research. It is suggested that future research explore the phenomenon at a larger scale, including more respondents and another dimension, by keeping in view the socio-economic factors and policies of the government regarding the elimination of gender discrimination in Pakistan.

Keywords: social construction, gender, bureaucrats, gender perception

Procedia PDF Downloads 50
630 Automated End of Sprint Detection for Force-Velocity-Power Analysis with GPS/GNSS Systems

Authors: Patrick Cormier, Cesar Meylan, Matt Jensen, Dana Agar-Newman, Chloe Werle, Ming-Chang Tsai, Marc Klimstra

Abstract:

Sprint-derived horizontal force-velocity-power (FVP) profiles can be developed with adequate validity and reliability with satellite (GPS/GNSS) systems. However, FVP metrics are sensitive to small nuances in data processing procedures such that minor differences in defining the onset and end of the sprint could result in different FVP metric outcomes. Furthermore, in team-sports, there is a requirement for rapid analysis and feedback of results from multiple athletes, therefore developing standardized and automated methods to improve the speed, efficiency and reliability of this process are warranted. Thus, the purpose of this study was to compare different methods of sprint end detection on the development of FVP profiles from 10Hz GPS/GNSS data through goodness-of-fit and intertrial reliability statistics. Seventeen national team female soccer players participated in the FVP protocol which consisted of 2x40m maximal sprints performed towards the end of a soccer specific warm-up in a training session (1020 hPa, wind = 0, temperature = 30°C) on an open grass field. Each player wore a 10Hz Catapult system unit (Vector S7, Catapult Innovations) inserted in a vest in a pouch between the scapulae. All data were analyzed following common procedures. Variables computed and assessed were the model parameters, estimated maximal sprint speed (MSS) and the acceleration constant τ, in addition to horizontal relative force (F₀), velocity at zero (V₀), and relative mechanical power (Pmax). The onset of the sprints was standardized with an acceleration threshold of 0.1 m/s². The sprint end detection methods were: 1. Time when peak velocity (MSS) was achieved (zero acceleration), 2. Time after peak velocity drops by -0.4 m/s, 3. Time after peak velocity drops by -0.6 m/s, and 4. When the integrated distance from the GPS/GNSS signal achieves 40-m. Goodness-of-fit of each sprint end detection method was determined using the residual sum of squares (RSS) to demonstrate the error of the FVP modeling with the sprint data from the GPS/GNSS system. Inter-trial reliability (from 2 trials) was assessed utilizing intraclass correlation coefficients (ICC). For goodness-of-fit results, the end detection technique that used the time when peak velocity was achieved (zero acceleration) had the lowest RSS values, followed by -0.4 and -0.6 velocity decay, and 40-m end had the highest RSS values. For intertrial reliability, the end of sprint detection techniques that were defined as the time at (method 1) or shortly after (method 2 and 3) when MSS was achieved had very large to near perfect ICC and the time at the 40 m integrated distance (method 4) had large to very large ICCs. Peak velocity was reached at 29.52 ± 4.02-m. Therefore, sport scientists should implement end of sprint detection either when peak velocity is determined or shortly after to improve goodness of fit to achieve reliable between trial FVP profile metrics. Although, more robust processing and modeling procedures should be developed in future research to improve sprint model fitting. This protocol was seamlessly integrated into the usual training which shows promise for sprint monitoring in the field with this technology.

Keywords: automated, biomechanics, team-sports, sprint

Procedia PDF Downloads 94
629 The Effect of Ethylene Glycol on Cryopreserved Bovine Oocytes

Authors: Sri Wahjuningsih, Nur Ihsan, Hadiah

Abstract:

In the embryo transfer program, to address the limited production of embryos in vivo, in vitro embryo production has become an alternative approach that is relatively inexpensive. One potential source of embryos that can be developed is to use immature oocytes then conducted in vitro maturation and in vitro fertilization. However, obstacles encountered were oocyte viability mammals have very limited that it cannot be stored for a long time, so we need oocyte cryopreservation. The research was conducted to know the optimal concentration use of ethylene glycol as a cryoprotectant on oocytes freezing.Material use in this research was immature oocytes; taken from abbatoir which was aspirated from follicle with diameter 2-6 mm. Concentration ethylen glycol used were 0,5 M, I M, 1,5 M and 2M. The freezing method used was conventional method combined with a five-step protocol washing oocytes from cryoprotectant after thawing. The result showed that concentration ethylen glycol have the significant effect (P<0.05) on oocytes quality after thawing and in vitro maturation. It was concluded that concentration 1,5 M was the best concentration for freezing oocytes using conventional method.

Keywords: bovine, conventional freezing, ethylen glycol, oocytes

Procedia PDF Downloads 331
628 Governance of Clean Energy in Rural Northwest Pakistan

Authors: Inayatullah Jan, Sidra Pervez

Abstract:

Effective institutional arrangements at local and national levels are quintessential for promotion of renewable energy in a country. This study attempts to examine the institutional arrangements for development of domestic renewable energy in rural northwest Pakistan. The study describes that very limited number of public and private organizations were working on clean development in the area. Surprisingly, no institutional arrangements exclusively meant for domestic clean energy promotion were observed in the area. The study concludes that the objectives of Kyoto Protocol in Pakistan can be achieved only if the government and non-governmental organizations work together to launch cost-effective renewable energy interventions, particularly in rural areas. The need is to have a coordinated, consistent, and focused cooperation of all stakeholders involved in promotion of domestic renewable energy at all levels. This will not only improve the socioeconomic and environmental conditions in the local context, but will play a key role in achieving the United Nations Millennium Development Goals(MDGs).

Keywords: governance, clean energy, greenhouse gases, CDM, Northwest Pakistan

Procedia PDF Downloads 362
627 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 95
626 Splenic Artery Aneurysms: A Rare, Insidious Cause of Abdominal Pain

Authors: Christopher Oyediran, Nicola Ubayasiri, Christopher Gough

Abstract:

Splenic artery aneurysms are often clinically occult, occasionally identified incidentally with imaging. The pathogenesis of aneurysms is complex, but certain factors are thought to contribute to their development. Given the potential fatal complications of rupture, a high index of suspicion is required to make an early diagnosis. We present a case of a 36-year-old female with a history of endometriosis and multiple sclerosis who presented to the Emergency Department with sudden onset epigastric pain and collapse. On arrival, she was pale and clammy with profound tachycardia and hypotension. An ultrasound done in the resuscitation department revealed abdominal free fluid. She was resuscitated with blood and transferred for emergent laparotomy. Laparotomy revealed massive haemoperitoneum from the spleen. She underwent emergency splenectomy and inspection of the spleen revealed a splenic artery aneurysm. She received our massive transfusion protocol followed by a short stay on ITU, making a good post-operative recovery and was discharged home a week later.

Keywords: aneurysm, human chorionic gonadotrophin (hCG), resuscitation, laparotomy

Procedia PDF Downloads 407
625 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 268
624 Direct Organogenesis of Begonia Rex cv. DS-EYWA, An Unique Rare Cultivar, via Thin Cell Layering (TCL) Technique

Authors: Mahboubeh Davoudi Pahnekolayi

Abstract:

Begonia rex cv. DS-EYWA is a rare, unique cultivar of begonia rex with curly colorful leaves. Optimization of an in vitro efficient regeneration protocol by focusing on transverse Thin Cell Layer (tTCL) petiole explants for high-scale production of such a beautiful cultivar was considered as our main purpose in this experiment. Thus, various concentrations of Plant Growth Regulators (PGRs) including 6-Benzylaminopurine (BAP), Thidiazuron (TDY), and –Naphthaleneacetic Acid (NAA), were selected in a Completely Randomized Design (CRD) to establish and optimize the direct organogenesis efficiency of this cultivar. Cultivation of 1 mm tTCL petiole explants in noted treatments showed that 1.5 mgl-1 BAP + 0.5 mgl-1 NAA can induce the highest number of direct regenerated shoots and lower concentration of BAP (0.5 mgl-1) can be suggested for shoot elongation before rooting stage. Elongated shoots were successfully rooted in MS free basal medium and acclimatized in 1:1 peat moss: perlite sterilized pot mixture.

Keywords: begonia rare cultivar, direct organogenesis, explant type, regeneration, thin cell layering (TCL)

Procedia PDF Downloads 44
623 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks

Authors: Anusha M., V. Srikanth

Abstract:

Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.

Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios

Procedia PDF Downloads 529
622 Controlled Synthesis of CdSe Quantum Dots via Microwave-Enhanced Process: A Green Approach for Mass Production

Authors: Delele Worku Ayele, Bing-Joe Hwang

Abstract:

A method that does not employ hot injection techniques has been developed for the size-tunable synthesis of high-quality CdSe quantum dots (QDs) with a zinc blende structure. In this environmentally benign synthetic route, which uses relatively less toxic precursors, solvents, and capping ligands, CdSe QDs that absorb visible light are obtained. The size of the as-prepared CdSe QDs and, thus, their optical properties can be manipulated by changing the microwave reaction conditions. The QDs are characterized by XRD, TEM, UV-vis, FTIR, time-resolved fluorescence spectroscopy, and fluorescence spectrophotometry. In this approach, the reaction is conducted in open air and at a much lower temperature than in hot injection techniques. The use of microwaves in this process allows for a highly reproducible and effective synthesis protocol that is fully adaptable for mass production and can be easily employed to synthesize a variety of semiconductor QDs with the desired properties. The possible application of the as-prepared CdSe QDs has been also assessed using deposition on TiO2 films.

Keywords: average life time, CdSe QDs, microwave (MW), mass production oleic acid, Na2SeSO3

Procedia PDF Downloads 285
621 The Impact of an Improved Strategic Partnership Programme on Organisational Performance and Growth of Firms in the Internet Protocol Television and Hybrid Fibre-Coaxial Broadband Industry

Authors: Collen T. Masilo, Brane Semolic, Pieter Steyn

Abstract:

The Internet Protocol Television (IPTV) and Hybrid Fibre-Coaxial (HFC) Broadband industrial sector landscape are rapidly changing and organisations within the industry need to stay competitive by exploring new business models so that they can be able to offer new services and products to customers. The business challenge in this industrial sector is meeting or exceeding high customer expectations across multiple content delivery modes. The increasing challenges in the IPTV and HFC broadband industrial sector encourage service providers to form strategic partnerships with key suppliers, marketing partners, advertisers, and technology partners. The need to form enterprise collaborative networks poses a challenge for any organisation in this sector, in selecting the right strategic partners who will ensure that the organisation’s services and products are marketed in new markets. Partners who will ensure that customers are efficiently supported by meeting and exceeding their expectations. Lastly, selecting cooperation partners who will represent the organisation in a positive manner, and contribute to improving the performance of the organisation. Companies in the IPTV and HFC broadband industrial sector tend to form informal partnerships with suppliers, vendors, system integrators and technology partners. Generally, partnerships are formed without thorough analysis of the real reason a company is forming collaborations, without proper evaluations of prospective partners using specific selection criteria, and with ineffective performance monitoring of partners to ensure that a firm gains real long term benefits from its partners and gains competitive advantage. Similar tendencies are illustrated in the research case study and are based on Skyline Communications, a global leader in end-to-end, multi-vendor network management and operational support systems (OSS) solutions. The organisation’s flagship product is the DataMiner network management platform used by many operators across multiple industries and can be referred to as a smart system that intelligently manages complex technology ecosystems for its customers in the IPTV and HFC broadband industry. The approach of the research is to develop the most efficient business model that can be deployed to improve a strategic partnership programme in order to significantly improve the performance and growth of organisations participating in a collaborative network in the IPTV and HFC broadband industrial sector. This involves proposing and implementing a new strategic partnership model and its main features within the industry which should bring about significant benefits for all involved companies to achieve value add and an optimal growth strategy. The proposed business model has been developed based on the research of existing relationships, value chains and business requirements in this industrial sector and validated in 'Skyline Communications'. The outputs of the business model have been demonstrated and evaluated in the research business case study the IPTV and HFC broadband service provider 'Skyline Communications'.

Keywords: growth, partnership, selection criteria, value chain

Procedia PDF Downloads 103
620 Coaxial Helix Antenna for Microwave Coagulation Therapy in Liver Tissue Simulations

Authors: M. Chaichanyut, S. Tungjitkusolmun

Abstract:

This paper is concerned with microwave (MW) ablation for a liver cancer tissue by using helix antenna. The antenna structure supports the propagation of microwave energy at 2.45 GHz. A 1½ turn spiral catheter-based microwave antenna applicator has been developed. We utilize the three-dimensional finite element method (3D FEM) simulation to analyze where the tissue heat flux, lesion pattern and volume destruction during MW ablation. The configurations of helix antenna where Helix air-core antenna and Helix Dielectric-core antenna. The 3D FEMs solutions were based on Maxwell and bio-heat equations. The simulation protocol was power control (10 W, 300s). Our simulation result, both helix antennas have heat flux occurred around the helix antenna and that can be induced the temperature distribution similar (teardrop). The region where the temperature exceeds 50°C the microwave ablation was successful (i.e. complete destruction). The Helix air-core antenna and Helix Dielectric-core antenna, ablation zone or axial ratios (Widest/length) were respectively 0.82 and 0.85; the complete destructions were respectively 4.18 cm³ and 5.64 cm³.

Keywords: liver cancer, Helix antenna, finite element, microwave ablation

Procedia PDF Downloads 290
619 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 229
618 A Scalable Model of Fair Socioeconomic Relations Based on Blockchain and Machine Learning Algorithms-1: On Hyperinteraction and Intuition

Authors: Merey M. Sarsengeldin, Alexandr S. Kolokhmatov, Galiya Seidaliyeva, Alexandr Ozerov, Sanim T. Imatayeva

Abstract:

This series of interdisciplinary studies is an attempt to investigate and develop a scalable model of fair socioeconomic relations on the base of blockchain using positive psychology techniques and Machine Learning algorithms for data analytics. In this particular study, we use hyperinteraction approach and intuition to investigate their influence on 'wisdom of crowds' via created mobile application which was created for the purpose of this research. Along with the public blockchain and private Decentralized Autonomous Organization (DAO) which were elaborated by us on the base of Ethereum blockchain, a model of fair financial relations of members of DAO was developed. We developed a smart contract, so-called, Fair Price Protocol and use it for implementation of model. The data obtained from mobile application was analyzed by ML algorithms. A model was tested on football matches.

Keywords: blockchain, Naïve Bayes algorithm, hyperinteraction, intuition, wisdom of crowd, decentralized autonomous organization

Procedia PDF Downloads 145