Search results for: authentication mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3236

Search results for: authentication mechanism

2756 Denial among Women Living with Cancer: An Exploratory Study to Understand the Consequences of Cancer and the Denial Mechanism

Authors: Judith Partouche-Sebban, Saeedeh Rezaee Vessal

Abstract:

Because of the rising number of new cases of cancer, especially among women, it is more than essential to better understand how women experience cancer in order to bring them adapted to support and care and enhance their well-being and patient experience. Cancer stands for a traumatic experience in which the diagnosis, its medical treatments, and the related side effects lead to deep physical and psychological changes that may arouse considerable stress and anxiety. In order to reduce these negative emotions, women tend to use various defense mechanisms, among which denial has been defined as the most frequent mechanism used by breast cancer patients. This study aims to better understand the consequences of the experience of cancer and their link with the adoption of a denial strategy. The empirical research was done among female cancer survivors in France. Since the topic of this study is relatively unexplored, a qualitative methodology and open-ended interviews were employed. In total, 25 semi-directive interviews were conducted with a female with different cancers, different stages of treatment, and different ages. A systematic inductive method was performed to analyze data. The content analysis enabled to highlight three different denial-related behaviors among women with cancer, which serve a self-protective function. First, women who expressed high levels of anxiety confessed they tended to completely deny the existence of their cancer immediately after the diagnosis of their illness. These women mainly exhibit many fears and a deep distrust toward the medical context and professionals. This coping mechanism is defined by the patient as being unconscious. Second, other women deliberately decided to deny partial information about their cancer, whether this information is related to the stages of the illness, the emotional consequences, or the behavioral consequences of the illness. These women use this strategy as a way to avoid the reality of the illness and its impact on the different aspects of their life as if cancer does not exist. Third, some women tend to reinterpret and give meaning to their cancer as a way to reduce its impact on their life. To this end, they may use magical thinking or positive reframing, or reinterpretation. Because denial may lead to delays in medical treatments, this topic deserves a deep investigation, especially in the context of oncology. As denial is defined as a specific defense mechanism, this study contributes to the existing literature in service marketing which focuses on emotions and emotional regulation in healthcare services which is a crucial issue. Moreover, this study has several managerial implications for healthcare professionals who interact with patients in order to implement better care and support for the patients.

Keywords: cancer, coping mechanisms, denial, healthcare services

Procedia PDF Downloads 74
2755 Valuation of Entrepreneurship Education (EE) Curriculum and Self-Employment Generation among Graduates of Tertiary Institutions in Edo State, Nigeria

Authors: Angela Obose Oriazowanlan

Abstract:

Despite the introduction of Entrepreneurship education into the Nigerian University curriculum to prepare graduates for self-employment roles in order to abate employment challenges, their unemployment rate still soars high. The study, therefore, examined the relevance of the curriculum contents and its delivery mechanism to equip graduates with appropriate entrepreneurial skills prior to graduation. Four research questions and two hypotheses guided the study. The survey research design was adopted for the study. An infinite population of graduates of a period of five years with 200 sample representatives using the simple random sampling technique was adopted. A 45-item structured questionnaire was used for data gathering. The gathered data thereof was anlysed using the descriptive statistics of mean and standard deviation, while the formulated hypotheses were tested with Z-score at 0.5 level of significance. The findings revealed, among others, that graduates acquisition of appropriate entrepreneurial skills for self-employment generation is low due to curriculum deficiencies, insufficient time allotment, and the delivery mechanism. It was recommended, among others, that the curriculum should be reviewed to improve its relevancy and that sufficient time should be allotted to enable adequate teaching and learning process.

Keywords: evaluation of entrepreneurship education (EE) curriculum, self-employment generation, graduates of tertiary institutions, Edo state, Nigeria

Procedia PDF Downloads 89
2754 Development of 3D Neck Muscle to Analyze the Effect of Active Muscle Contraction in Whiplash Injury

Authors: Nisha Nandlal Sharma, Julaluk Carmai, Saiprasit Koetniyom, Bernd Markert

Abstract:

Whiplash Injuries are mostly experienced in car accidents. Symptoms of whiplash are commonly reported in studies, neck pain and headaches are two most common symptoms observed. The whiplash Injury mechanism is poorly understood. In present study, hybrid neck muscle model were developed with a combination of solid tetrahedral elements and 1D beam elements. Solid tetrahedral elements represents passive part of the muscle whereas, 1D beam elements represents active part. To simulate the active behavior of the muscle, Hill-type muscle model was applied to beam elements. To simulate non-linear passive properties of muscle, solid elements were modeled with rubber/foam material model. Some important muscles were then inserted into THUMS (Total Human Model for Safety) THUMS was given a boundary conditions similar to experimental tests. The model was exposed to 4g and 7g rear impacts as these load impacts are close to low speed impacts causing whiplash. The effect of muscle activation level on occupant kinematics during whiplash was analyzed.

Keywords: finite element model, muscle activation, THUMS, whiplash injury mechanism

Procedia PDF Downloads 324
2753 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 106
2752 Characteristics Features and Action Mechanism of Some Country Made Pistols

Authors: Ajitesh Pal, Arpan Datta Roy, H. K. Pratihari

Abstract:

The different illegal firearms crudely made by skilled gunsmith from scrap materials are popularly known as country made firearms. Such firearms along with improvised ammunition are clandestinely marketed at the cheaper price without any license to the extremist group, criminal, poachers and firearm lovers. As per National Crime Records Bureau (NCRB), MHA, Govt of India about 80% firearm cases are committed by country made/improvised firearms. The ballistic division of the laboratory has examined a good number of cases. The analysis of firearm cases received for forensic examination revealed that 7.65mm calibre pistols mostly improvised firearm are commonly used in firearm related crime cases. In the present communication, physical parameters and other characteristics features of some 7.65mm calibre pistols have been discussed in detail. The detailed study on country made (CM) firearm will help to prepare a database related to type of material used, origin of the raw material and tools used for inscription. The study also includes to establish the chemistry of propellants & head stamp pattern. The database will be helpful to the firearm examiners, researchers, students pursuing study on forensic science as reference material.

Keywords: improvised pistol, stringent gun law, working mechanism, parameters, database

Procedia PDF Downloads 60
2751 Assisted Prediction of Hypertension Based on Heart Rate Variability and Improved Residual Networks

Authors: Yong Zhao, Jian He, Cheng Zhang

Abstract:

Cardiovascular diseases caused by hypertension are extremely threatening to human health, and early diagnosis of hypertension can save a large number of lives. Traditional hypertension detection methods require special equipment and are difficult to detect continuous blood pressure changes. In this regard, this paper first analyzes the principle of heart rate variability (HRV) and introduces sliding window and power spectral density (PSD) to analyze the time domain features and frequency domain features of HRV, and secondly, designs an HRV-based hypertension prediction network by combining Resnet, attention mechanism, and multilayer perceptron, which extracts the frequency domain through the improved ResNet18 features through a modified ResNet18, its fusion with time-domain features through an attention mechanism, and the auxiliary prediction of hypertension through a multilayer perceptron. Finally, the network was trained and tested using the publicly available SHAREE dataset on PhysioNet, and the test results showed that this network achieved 92.06% prediction accuracy for hypertension and outperformed K Near Neighbor(KNN), Bayes, Logistic, and traditional Convolutional Neural Network(CNN) models in prediction performance.

Keywords: feature extraction, heart rate variability, hypertension, residual networks

Procedia PDF Downloads 85
2750 International Criminal Prosecution and Core International Crimes

Authors: Ikediobi Lottanna Samuel

Abstract:

Days are gone when perpetrators of core international crimes hide under the cloak of sovereignty to go with impunity. The principle of international criminal responsibility is a reality. This move to end impunity for violation of human rights has led to the creation of international and hybrid tribunals, a permanent international criminal court, and increased prosecution of human rights violations in domestic courts. This article examines the attempts by the international community to bring perpetrators of heinous crimes to book. The work reveals the inadequacy of the current international mechanism for prosecuting core international crimes in order to end the culture of impunity and entrench the culture of accountability. It also identifies that ad hoc international criminal tribunals and the international criminal court face similar challenges ranging from lack of cooperation by nation states, non-existence of hierarchy of crimes, lack of effective enforcement mechanism, limited prosecutorial capacity and agenda, difficulty in apprehending suspects, difficulty in blending different legal tradition, absence of a coherent sentencing guideline, distant location of courts, selective indictment, etc. These challenges adversely affect the functioning of these courts. It is suggested that a more helpful way to end impunity would be to have a more robust and synergistic relationship between national, regional, and international approaches to prosecuting core international crimes.

Keywords: prosecution, criminal, international, tribunal, justice, ad hoc

Procedia PDF Downloads 205
2749 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 44
2748 Effect of Molecular Weight Distribution on Toughening Performance of Polybutadiene in Polystyrene

Authors: Mohamad Mohsen Yavarizadeh

Abstract:

Polystyrene (PS) and related homopolymers are brittle materials that typically fail in tensile tests at very low strains. These polymers can be toughened by the addition of rubbery particles which initiate a large number of crazes that produce substantial plastic strain at relatively low stresses. Considerable energy is dissipated in the formation of these crazes, producing a relatively tough material that shows an impact toughness of more than 5 times of pure PS. While cross linking of rubbery phase is necessary in aforementioned mechanism of toughening, another mechanism of toughening was also introduced in which low molecular weight liquid rubbers can also toughen PS when dispersed in the form of small pools in the glassy matrix without any cross linking. However, this new mechanism which is based on local plasticization, fails to act properly at high strain rate deformations, i.e. impact tests. In this work, the idea of combination of these two mechanisms was tried. To do so, Polybutadiene rubbers (PB) with bimodal distribution of molecular weight were prepared in which, comparable fractions of very high and very low molecular weight rubbers were mixed. Incorporation of these materials in PS matrix in a reactive process resulted in more significant increases in toughness of PS. In other words, although low molecular weight PB is ineffective in high strain rate impact test by itself, it showed a significant synergistic effect when combined with high molecular weight PB. Surprisingly, incorporation of just 10% of low molecular weight PB doubled the impact toughness of regular high impact PS (HIPS). It was observed that most of rubbery particles could initiate crazes. The effectiveness of low molecular weight PB in impact test was attributed to low strain rate deformation of each individual craze as a result of producing a large number of crazes in this material. In other words, high molecular weight PB chains make it possible to have an appropriate dispersion of rubbery phase in order to create a large number of crazes in the PS matrix and consequently decrease the velocity of each craze. Low molecular weight PB, in turn, would have enough time to locally plasticize craze fibrils and enhance the energy dissipation.

Keywords: molecular weight distribution, polystyrene, toughness, homopolymer

Procedia PDF Downloads 434
2747 The Effect of Visfatin on Pregnant Mouse Myometrial Contractility in vitro

Authors: Seham Alsaif, Susan Wray

Abstract:

Obesity is a worldwide disorder influencing women’s health and childbearing. There is a close relation between obesity and pregnancy related complications. Dyslipidemia and adipokine dysregulation are core environmental changes that may mechanistically link these complications with obesity in pregnant women. We have previously found that visfatin has a relaxant effect on mouse, rat and human myometrial contractility. We hypothesised that visfatin inhibits mouse myometrial contractility through the NAD+ pathway. This study was designed to examine the mechanism of action of visfatin on myometrial contractility. To examine the NAD+ pathway, FK866 which is a potent inhibitor of NAD+ biosynthesis was used. Methods: Myometrial strips from term pregnant mice were dissected, superfused with physiological saline and the effects of visfatin (10nM) on oxytocin-induced contractions (0.5nM) alone and after the infusion of FK866 (10uM) were studied. After regular contractions were established, contractility was examined for control (100%) and test response at 37 °C for 10 min each. Results: FK866 was found to inhibit the effect of visfatin on myometrial contractility (the AUC increased from 89±2% of control, P=0.0009 for visfatin alone to 97±4% of control, P>0.05 for visfatin combined with FK866, n=8). In conclusion, NAD+ pathway appears to be involved in the mechanism of action of visfatin on mouse myometrium. This could have a role in making new targets to prevent obesity-related complications.

Keywords: myometrium, obesity, oxytocin, pregnancy, visfatin

Procedia PDF Downloads 166
2746 The Political Economy of Conservation at Bhitarkanika Wild Life Sanctuary, India: Conflicts, Sustainability, and Development

Authors: Diptimayee Nayak, V. Upadhyay

Abstract:

This paper posits the attempt of conservation and the idea of protected areas from the Marxian primitive accumulation to the politics of sustainability. Using field survey data and secondary literature, this paper analyses an Indian wildlife sanctuary, the Bhitarkanika, Odisha and finds how the hegemony of power among different management regimes attempted for conservation and the present protected area management regime attempted to imbibe the policy of ecotourism for achieving sustainability. The paper contends that the current policy of ecotourism in protected areas acts as a veil for the local deprived people, to avoid many legal conflicts like property rights, livelihood, and man-wildlife issues. Moreover, opening the scope to accumulate on the part of tour operators, the policy of ecotourism establishes a nexus between the profit holders/tour operators (the capitalists) and the power hegemony on the part of management authorities. The sustainability attempt of ecotourism may lead to private benefits maximising the profit accumulation and can expand and continue, showing the bulk of employment generation of local people at petty odd jobs, grabbing a lion share! Positing ecotourism as a capitalist project as against the general assumption of one of the drivers of sustainable development, the paper shows that ecotourism in practice may end up ruining the very social-environmental set up, leading to unsustainability related to waste management, equality, culture, relationship and above all polarised private accumulators in absence of sound mechanism. The paper ends with the caveat that while shopping for neoliberal conservation, the conservators found ecotourism as a product without finalising the hallmark of mechanism/ institutions with appropriate modus operandii to check/guard the quality assurance/standard of ecotourism for sustainability. The paper proposes sound structural and institutional mechanism of ecotourism to be developed to harness sustainability in the local economy as well as in conservation.

Keywords: conservation, ecotourism, Marxian capitalism, protected areas, sustainability

Procedia PDF Downloads 158
2745 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 386
2744 Seismic Active Zones and Mechanism of Earthquakes in Northern Egypt

Authors: Awad Hassoup, Sayed Abdallah, Mohamed Dahy

Abstract:

Northern Egypt is known to be seismically active from the past several thousand years, based on the historical records and documents of eyewitnesses on one- hand and instrumental records on the other hand. Instrumental, historical and pre- historical seismicity data indicate that large destructive earthquakes have occurred quite frequently in the investigated area. The interaction of the African, Arabian, Eurasian plates and Sinai sub-plate is the main factor behind the seismicity of northern part of Egypt. All earthquakes occur at shallow depth and are concentrated at four seismic zones, these zones including the Gulfs of Suez and Aqaba, around the entrance of the Gulf of Suez and the fourth one is located at the south- west of great Cairo (Dahshour area). The seismicity map of the previous zones shows that the activity is coincide with the major tectonic trends of the Suez rift, Aqaba rift with their connection with the great rift system of the Red Sea and Gulf of Suez- Cairo- Alexandria trend. On the other hand, the focal mechanisms of some earthquakes occurred inside the studied area and having small to moderate size show a variety of patterns. The most predominant type is normal faulting.

Keywords: Northern Egypt, seismic active zone, seismicity, focal mechanism

Procedia PDF Downloads 412
2743 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation

Authors: Rizwan Rizwan

Abstract:

This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.

Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats

Procedia PDF Downloads 12
2742 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria

Authors: William Abiodun Duyile

Abstract:

It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.

Keywords: sea power, naval power, land locked states, warship

Procedia PDF Downloads 128
2741 Studying the Load Sharing and Failure Mechanism of Hybrid Composite Joints Using Experiment and Finite Element Modeling

Authors: Seyyed Mohammad Hasheminia, Heoung Jae Chun, Jong Chan Park, Hong Suk Chang

Abstract:

Composite joints have been getting attention recently due to their high specific mechanical strength to weight ratio that is crucial for structures such as aircrafts and automobiles. In this study on hybrid joints, quasi-static experiments and finite element analysis were performed to investigate the failure mechanism of hybrid composite joint with respect to the joint properties such as the adhesive material, clamping force, and joint geometry. The outcomes demonstrated that the stiffness of the adhesive is the most imperative design parameter. In this investigation, two adhesives with various stiffness values were utilized. Regarding the joints utilizing the adhesive with the lower stiffness modulus, it was observed that the load was exchanged promptly through the adhesive since it was shared more proficiently between the bolt and adhesive. This phenomenon permitted the hybrid joints with low-modulus adhesive to support more prominent loads before failure when contrasted with the joints that utilize the stiffer adhesive. In the next step, the stress share between the bond and bolt as a function of various design parameters was studied using a finite element model in which it was understood that the geometrical parameters such as joint overlap and width have a significant influence on the load sharing between the bolt and the adhesive.

Keywords: composite joints, composite materials, hybrid joints, single-lap joint

Procedia PDF Downloads 391
2740 Experimental and Graphical Investigation on Oil Recovery by Buckley-Leveret Theory

Authors: Khwaja Naweed Seddiqi, Zabihullah Mahdi, Shigeo Honma

Abstract:

Recently increasing oil production from petroleum reservoirs is one of the most important issues in the global energy sector. So, in this paper, the recovery of oil by the waterflooding technique from petroleum reservoir are considered. To investigate the aforementioned phenomena, the relative permeability of two immiscible fluids in sand is measured in the laboratory based on the steady-state method. Two sorts of oils, kerosene and heavy oil, and water are pumped simultaneously into a vertical sand column with different pumping ratio. From the change in fractional discharge measured at the outlet, a method for determining the relative permeability is developed focusing on the displacement mechanism in sand. Then, displacement mechanism of two immiscible fluids in the sand is investigated under the Buckley-Leveret frontal displacement theory and laboratory experiment. Two sorts of experiments, one is the displacement of pore water by oil, the other is the displacement of pore oil by water, are carried out. It is revealed that the relative permeability curves display tolerably different shape owing to the properties of oils, and produce different amount of residual oils and irreducible water saturation.

Keywords: petroleum reservoir engineering, relative permeability, two-phase flow, immiscible displacement in porous media, steady-state method, waterflooding

Procedia PDF Downloads 233
2739 Multi-Scale Modelling of the Cerebral Lymphatic System and Its Failure

Authors: Alexandra K. Diem, Giles Richardson, Roxana O. Carare, Neil W. Bressloff

Abstract:

Alzheimer's disease (AD) is the most common form of dementia and although it has been researched for over 100 years, there is still no cure or preventive medication. Its onset and progression is closely related to the accumulation of the neuronal metabolite Aβ. This raises the question of how metabolites and waste products are eliminated from the brain as the brain does not have a traditional lymphatic system. In recent years the rapid uptake of Aβ into cerebral artery walls and its clearance along those arteries towards the lymph nodes in the neck has been suggested and confirmed in mice studies, which has led to the hypothesis that interstitial fluid (ISF), in the basement membranes in the walls of cerebral arteries, provides the pathways for the lymphatic drainage of Aβ. This mechanism, however, requires a net reverse flow of ISF inside the blood vessel wall compared to the blood flow and the driving forces for such a mechanism remain unknown. While possible driving mechanisms have been studied using mathematical models in the past, a mechanism for net reverse flow has not been discovered yet. Here, we aim to address the question of the driving force of this reverse lymphatic drainage of Aβ (also called perivascular drainage) by using multi-scale numerical and analytical modelling. The numerical simulation software COMSOL Multiphysics 4.4 is used to develop a fluid-structure interaction model of a cerebral artery, which models blood flow and displacements in the artery wall due to blood pressure changes. An analytical model of a layer of basement membrane inside the wall governs the flow of ISF and, therefore, solute drainage based on the pressure changes and wall displacements obtained from the cerebral artery model. The findings suggest that an active role in facilitating a reverse flow is played by the components of the basement membrane and that stiffening of the artery wall during age is a major risk factor for the impairment of brain lymphatics. Additionally, our model supports the hypothesis of a close association between cerebrovascular diseases and the failure of perivascular drainage.

Keywords: Alzheimer's disease, artery wall mechanics, cerebral blood flow, cerebral lymphatics

Procedia PDF Downloads 516
2738 Self-Attention Mechanism for Target Hiding Based on Satellite Images

Authors: Hao Yuan, Yongjian Shen, Xiangjun He, Yuheng Li, Zhouzhou Zhang, Pengyu Zhang, Minkang Cai

Abstract:

Remote sensing data can provide support for decision-making in disaster assessment or disaster relief. The traditional processing methods of sensitive targets in remote sensing mapping are mainly based on manual retrieval and image editing tools, which are inefficient. Methods based on deep learning for sensitive target hiding are faster and more flexible. But these methods have disadvantages in training time and cost of calculation. This paper proposed a target hiding model Self Attention (SA) Deepfill, which used self-attention modules to replace part of gated convolution layers in image inpainting. By this operation, the calculation amount of the model becomes smaller, and the performance is improved. And this paper adds free-form masks to the model’s training to enhance the model’s universal. The experiment on an open remote sensing dataset proved the efficiency of our method. Moreover, through experimental comparison, the proposed method can train for a longer time without over-fitting. Finally, compared with the existing methods, the proposed model has lower computational weight and better performance.

Keywords: remote sensing mapping, image inpainting, self-attention mechanism, target hiding

Procedia PDF Downloads 115
2737 Contrastive Learning for Unsupervised Object Segmentation in Sequential Images

Authors: Tian Zhang

Abstract:

Unsupervised object segmentation aims at segmenting objects in sequential images and obtaining the mask of each object without any manual intervention. Unsupervised segmentation remains a challenging task due to the lack of prior knowledge about these objects. Previous methods often require manually specifying the action of each object, which is often difficult to obtain. Instead, this paper does not need action information of objects and automatically learns the actions and relations among objects from the structured environment. To obtain the object segmentation of sequential images, the relationships between objects and images are extracted to infer the action and interaction of objects based on the multi-head attention mechanism. Three types of objects’ relationships in the object segmentation task are proposed: the relationship between objects in the same frame, the relationship between objects in two frames, and the relationship between objects and historical information. Based on these relationships, the proposed model (1) is effective in multiple objects segmentation tasks, (2) just needs images as input, and (3) produces better segmentation results as more relationships are considered. The experimental results on multiple datasets show that this paper’s method achieves state-of-art performance. The quantitative and qualitative analyses of the result are conducted. The proposed method could be easily extended to other similar applications.

Keywords: unsupervised object segmentation, attention mechanism, contrastive learning, structured environment

Procedia PDF Downloads 97
2736 TiO2 Nanowires as Efficient Heterogeneous Photocatalysts for Waste-Water Treatment

Authors: Gul Afreen, Sreedevi Upadhyayula, Mahendra K. Sunkara

Abstract:

One-dimensional (1D) nanostructures like nanowires, nanotubes, and nanorods find variety of practical application owing to their unique physico-chemical properties. In this work, TiO2 nanowires were synthesized by direct oxidation of titanium particles in a unique microwave plasma jet reactor. The prepared TiO2 nanowires manifested the flexible features, and were characterized by using X-ray diffraction, Brunauer-Emmett-Teller (BET) surface area analyzer, UV-Visible and FTIR spectrophotometers, Scanning electron microscope, and Transmission electron microscope. Further, the photodegradation efficiency of these nanowires were tested against toxic organic dye like methylene blue (MB) and the results were compared with the commercial TiO2. It was found that TiO2 nanowires exhibited superior photocatalytic performance (89%) as compared to commercial TiO2 (75%) after 60 min of reaction. This is attributed to the lower recombination rate and increased interfacial charge transfer in TiO2 nanowire. Pseudo-first order kinetic modelling performed with the experimental results revealed that the rate constant of photodegradation in case of TiO2 nanowire was 1.3 times higher than that of commercial TiO2. Superoxide radical (O2˙) was found to be the major contributor in the photodegradation mechanism. Based on the trapping experiments, a plausible mechanism of the photocatalytic reaction is discussed.

Keywords: heterogeneous catalysis, photodegradation, reactive oxygen species, TiO₂ nanowires

Procedia PDF Downloads 133
2735 Strategic Fit between Higher Education Funding and the National Development Goals in Kazakhstan

Authors: Ali Ait Si Mhamed, Rita Kasa, Hans Vossensteyn

Abstract:

Kazakhstan is the eight largest country on the globe, in terms of the territory, it is rich in natural resources and is developing dynamically. Kazakhstan strives to become one of the top 30 global economies by 2050. This goal preconditions intensive reforms in all sectors of economy, including higher education. This paper focuses on the higher education funding reforms that take place in Kazakhstan and their alignment with the strategic goals of national development. Currently, the government funds higher education costs for only a limited number of students while the majority of students pay full cost covering tuition fees. Only students with high examination scores at the end of the secondary education are eligible to be admitted to publically funded study places in higher education. While this merit-based higher education funding model is overall well-received in the country, there is also a discourse calling to change the existing approach of higher education funding. This paper draws on interviews with national policy makers and leadership at institutions of higher education in Kazakhstan collected during 2016. It seeks to answer a question about how well the current higher education funding mechanism is aligned with the strategic development goals in higher education. The paper discusses how stakeholders see the fit between the current higher education funding mechanism and the ability of higher education institutions to achieve the aims of national strategic development.

Keywords: higher education reform, higher education funding, higher education policy, Kazakhstan

Procedia PDF Downloads 269
2734 Atomic Scale Storage Mechanism Study of the Advanced Anode Materials for Lithium-Ion Batteries

Authors: Xi Wang, Yoshio Bando

Abstract:

Lithium-ion batteries (LIBs) can deliver high levels of energy storage density and offer long operating lifetimes, but their power density is too low for many important applications. Therefore, we developed some new strategies and fabricated novel electrodes for fast Li transport and its facile synthesis including N-doped graphene-SnO2 sandwich papers, bicontinuous nanoporous Cu/Li4Ti5O12 electrode, and binder-free N-doped graphene papers. In addition, by using advanced in-TEM, STEM techniques and the theoretical simulations, we systematically studied and understood their storage mechanisms at the atomic scale, which shed a new light on the reasons of the ultrafast lithium storage property and high capacity for these advanced anodes. For example, by using advanced in-situ TEM, we directly investigated these processes using an individual CuO nanowire anode and constructed a LIB prototype within a TEM. Being promising candidates for anodes in lithium-ion batteries (LIBs), transition metal oxide anodes utilizing the so-called conversion mechanism principle typically suffer from the severe capacity fading during the 1st cycle of lithiation–delithiation. Also we report on the atomistic insights of the GN energy storage as revealed by in situ TEM. The lithiation process on edges and basal planes is directly visualized, the pyrrolic N "hole" defect and the perturbed solid-electrolyte-interface (SEI) configurations are observed, and charge transfer states for three N-existing forms are also investigated. In situ HRTEM experiments together with theoretical calculations provide a solid evidence that enlarged edge {0001} spacings and surface "hole" defects result in improved surface capacitive effects and thus high rate capability and the high capacity is owing to short-distance orderings at the edges during discharging and numerous surface defects; the phenomena cannot be understood previously by standard electron or X-ray diffraction analyses.

Keywords: in-situ TEM, STEM, advanced anode, lithium-ion batteries, storage mechanism

Procedia PDF Downloads 344
2733 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 247
2732 Surface Pressure Distribution of a Flapped-Airfoil for Different Momentum Injection at the Leading Edge

Authors: Mohammad Mashud, S. M. Nahid Hasan

Abstract:

The aim of the research work is to modify the NACA 4215 airfoil with flap and rotary cylinder at the leading edge of the airfoil and experimentally study the static pressure distribution over the airfoil completed with flap and leading-edge vortex generator. In this research, NACA 4215 wing model has been constructed by generating the profile geometry using the standard equations and design software such as AutoCAD and SolidWorks. To perform the experiment, three wooden models are prepared and tested in subsonic wind tunnel. The experiments were carried out in various angles of attack. Flap angle and momentum injection rate are changed to observe the characteristics of pressure distribution. In this research, a new concept of flow separation control mechanism has been introduced to improve the aerodynamic characteristics of airfoil. Control of flow separation over airfoil which experiences a vortex generator (rotating cylinder) at the leading edge of airfoil is experimentally simulated under the effects of momentum injection. The experimental results show that the flow separation control is possible by the proposed mechanism, and benefits can be achieved by momentum injection technique. The wing performance is significantly improved due to control of flow separation by momentum injection method.

Keywords: airfoil, momentum injection, flap, pressure distribution

Procedia PDF Downloads 131
2731 The Fuzzy Logic Modeling of Performance Driver Seat’s Localised Cooling and Heating in Standard Car Air Conditioning System

Authors: Ali Ates, Sadık Ata, Kevser Dincer

Abstract:

In this study, performance of the driver seat‘s localized cooling and heating in a standard car air conditioning system was experimentally investigated and modeled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modeling technique. Climate function at automobile is an important variable for thermal comfort. In the experimental study localized heating and cooling performances have been examined with the aid of a mechanism established to a vehicle. The equipment’s used in the experimental setup/mechanism have been provided and assembled. During the measurement, the status of the performance level has been determined. Input parameters revolutions per minute and time; output parameters car seat cooling temperature, car back cooling temperature, car seat heating temperature, car back heating temperature were described by RBMTF if-the rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between experimental data and RBMTF is done by using statistical methods like absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF could be successfully used in standard car air conditioning system.

Keywords: air conditioning system, cooling-heating, RMBTF modelling, car seat

Procedia PDF Downloads 340
2730 Profiling of Apoptotic Protein Expressions after Trabectedin Treatment in Human Prostate Cancer Cell Line PC-3 by Protein Array Technology

Authors: Harika Atmaca, Emir Bozkurt, Latife Merve Oktay, Selim Uzunoglu, Ruchan Uslu, Burçak Karaca

Abstract:

Microarrays have been developed for highly parallel enzyme-linked immunosorbent assay (ELISA) applications. The most common protein arrays are produced by using multiple monoclonal antibodies, since they are robust molecules which can be easily handled and immobilized by standard procedures without loss of activity. Protein expression profiling with protein array technology allows simultaneous analysis of the protein expression pattern of a large number of proteins. Trabectedin, a tetrahydroisoquinoline alkaloid derived from a Caribbean tunicate, Ecteinascidia turbinata, has been shown to have antitumor effects. Here, we used a novel proteomic approach to explore the mechanism of action of trabectedin in prostate cancer cell line PC-3 by apoptosis antibody microarray. XTT cell proliferation kit and Cell Death Detection Elisa Plus Kit (Roche) was used for measuring cytotoxicity and apoptosis. Human Apoptosis Protein Array (R&D Systems) which consists of 35 apoptosis related proteins was used to assess the omic protein expression pattern. Trabectedin induced cytotoxicity and apoptosis in prostate cancer cells in a time and concentration-dependent manner. The expression levels of the death receptor pathway molecules, TRAIL-R1/DR4, TRAIL R2/DR5, TNF R1/TNFRSF1A, FADD were significantly increased by 4.0-, 21.0-, 4.20- and 11.5-fold by trabectedin treatment in PC-3 cells. Moreover, mitochondrial pathway related pro-apoptotic proteins Bax, Bad, Cytochrome c, and Cleaved Caspase-3 expressions were induced by 2.68-, 2.07-, 2.8-, and 4.5-fold and the expression levels of anti-apoptotic proteins Bcl-2 and Bcl-XL were reduced by 3.5- and 5.2-fold in PC-3 cells. Proteomic (antibody microarray) analysis suggests that the mechanism of action of trabectedin may be exerted via the induction of both intrinsic and extrinsic apoptotic pathways. The antibody microarray platform can be utilised to explore the molecular mechanism of action of novel anticancer agents.

Keywords: trabectedin, prostate cancer, omic protein expression profile, apoptosis

Procedia PDF Downloads 434
2729 Approach on Conceptual Design and Dimensional Synthesis of the Linear Delta Robot for Additive Manufacturing

Authors: Efrain Rodriguez, Cristhian Riano, Alberto Alvares

Abstract:

In recent years, robots manipulators with parallel architectures are used in additive manufacturing processes – 3D printing. These robots have advantages such as speed and lightness that make them suitable to help with the efficiency and productivity of these processes. Consequently, the interest for the development of parallel robots for additive manufacturing applications has increased. This article deals with the conceptual design and dimensional synthesis of the linear delta robot for additive manufacturing. Firstly, a methodology based on structured processes for the development of products through the phases of informational design, conceptual design and detailed design is adopted: a) In the informational design phase the Mudge diagram and the QFD matrix are used to aid a set of technical requirements, to define the form, functions and features of the robot. b) In the conceptual design phase, the functional modeling of the system through of an IDEF0 diagram is performed, and the solution principles for the requirements are formulated using a morphological matrix. This phase includes the description of the mechanical, electro-electronic and computational subsystems that constitute the general architecture of the robot. c) In the detailed design phase, a digital model of the robot is drawn on CAD software. A list of commercial and manufactured parts is detailed. Tolerances and adjustments are defined for some parts of the robot structure. The necessary manufacturing processes and tools are also listed, including: milling, turning and 3D printing. Secondly, a dimensional synthesis method applied on design of the linear delta robot is presented. One of the most important key factors in the design of a parallel robot is the useful workspace, which strongly depends on the joint space, the dimensions of the mechanism bodies and the possible interferences between these bodies. The objective function is based on the verification of the kinematic model for a prescribed cylindrical workspace, considering geometric constraints that possibly lead to singularities of the mechanism. The aim is to determine the minimum dimensional parameters of the mechanism bodies for the proposed workspace. A method based on genetic algorithms was used to solve this problem. The method uses a cloud of points with the cylindrical shape of the workspace and checks the kinematic model for each of the points within the cloud. The evolution of the population (point cloud) provides the optimal parameters for the design of the delta robot. The development process of the linear delta robot with optimal dimensions for additive manufacture is presented. The dimensional synthesis enabled to design the mechanism of the delta robot in function of the prescribed workspace. Finally, the implementation of the robotic platform developed based on a linear delta robot in an additive manufacturing application using the Fused Deposition Modeling (FDM) technique is presented.

Keywords: additive manufacturing, delta parallel robot, dimensional synthesis, genetic algorithms

Procedia PDF Downloads 175
2728 Effect of the Soil-Foundation Interface Condition in the Determination of the Resistance Domain of Rigid Shallow Foundations

Authors: Nivine Abbas, Sergio Lagomarsino, Serena Cattari

Abstract:

The resistance domain of a generally loaded rigid shallow foundation is normally represented as an interaction diagram limited by a failure surface in the three dimensional (3D) load space (N, V, M), where N is the vertical centric load component, V is the horizontal load component and M is the bending moment component. Usually, this resistance domain is constructed neglecting the foundation sliding mechanism that take place at the level of soil-foundation interface once the applied horizontal load exceeds the interface frictional resistance of the foundation. This issue is translated in the literature by the fact that the failure limit in the (2D) load space (N, V) is constructed as a parabola having an initial slope, at the center of the coordinate system, that depends, in some works, only of the soil friction angle, and in other works, has an empirical value. However, considering a given geometry of the foundation lying on a given soil type, the initial slope of the failure limit must change, for instance, when varying the roughness of the foundation surface at its interface with the soil. The present study discusses the effect of the soil-foundation interface condition on the construction of the resistance domain, and proposes a correction to be applied to the failure limit in order to overcome this effect.

Keywords: soil-foundation interface, sliding mechanism, soil shearing, resistance domain, rigid shallow foundation

Procedia PDF Downloads 448
2727 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer

Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali

Abstract:

Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.

Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design

Procedia PDF Downloads 178