Search results for: physical layer wireless security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11378

Search results for: physical layer wireless security

6308 Low-Voltage and Low-Power Bulk-Driven Continuous-Time Current-Mode Differentiator Filters

Authors: Ravi Kiran Jaladi, Ezz I. El-Masry

Abstract:

Emerging technologies such as ultra-wide band wireless access technology that operate at ultra-low power present several challenges due to their inherent design that limits the use of voltage-mode filters. Therefore, Continuous-time current-mode (CTCM) filters have become very popular in recent times due to the fact they have a wider dynamic range, improved linearity, and extended bandwidth compared to their voltage-mode counterparts. The goal of this research is to develop analog filters which are suitable for the current scaling CMOS technologies. Bulk-driven MOSFET is one of the most popular low power design technique for the existing challenges, while other techniques have obvious shortcomings. In this work, a CTCM Gate-driven (GD) differentiator has been presented with a frequency range from dc to 100MHz which operates at very low supply voltage of 0.7 volts. A novel CTCM Bulk-driven (BD) differentiator has been designed for the first time which reduces the power consumption multiple times that of GD differentiator. These GD and BD differentiator has been simulated using CADENCE TSMC 65nm technology for all the bilinear and biquadratic band-pass frequency responses. These basic building blocks can be used to implement the higher order filters. A 6th order cascade CTCM Chebyshev band-pass filter has been designed using the GD and BD techniques. As a conclusion, a low power GD and BD 6th order chebyshev stagger-tuned band-pass filter was simulated and all the parameters obtained from all the resulting realizations are analyzed and compared. Monte Carlo analysis is performed for both the 6th order filters and the results of sensitivity analysis are presented.

Keywords: bulk-driven (BD), continuous-time current-mode filters (CTCM), gate-driven (GD)

Procedia PDF Downloads 259
6307 A Study on the Different Components of a Typical Back-Scattered Chipless RFID Tag Reflection

Authors: Fatemeh Babaeian, Nemai Chandra Karmakar

Abstract:

Chipless RFID system is a wireless system for tracking and identification which use passive tags for encoding data. The advantage of using chipless RFID tag is having a planar tag which is printable on different low-cost materials like paper and plastic. The printed tag can be attached to different items in the labelling level. Since the price of chipless RFID tag can be as low as a fraction of a cent, this technology has the potential to compete with the conventional optical barcode labels. However, due to the passive structure of the tag, data processing of the reflection signal is a crucial challenge. The captured reflected signal from a tag attached to an item consists of different components which are the reflection from the reader antenna, the reflection from the item, the tag structural mode RCS component and the antenna mode RCS of the tag. All these components are summed up in both time and frequency domains. The effect of reflection from the item and the structural mode RCS component can distort/saturate the frequency domain signal and cause difficulties in extracting the desired component which is the antenna mode RCS. Therefore, it is required to study the reflection of the tag in both time and frequency domains to have a better understanding of the nature of the captured chipless RFID signal. The other benefits of this study can be to find an optimised encoding technique in tag design level and to find the best processing algorithm the chipless RFID signal in decoding level. In this paper, the reflection from a typical backscattered chipless RFID tag with six resonances is analysed, and different components of the signal are separated in both time and frequency domains. Moreover, the time domain signal corresponding to each resonator of the tag is studied. The data for this processing was captured from simulation in CST Microwave Studio 2017. The outcome of this study is understanding different components of a measured signal in a chipless RFID system and a discovering a research gap which is a need to find an optimum detection algorithm for tag ID extraction.

Keywords: antenna mode RCS, chipless RFID tag, resonance, structural mode RCS

Procedia PDF Downloads 197
6306 Three-Dimensional Spillage Effects on the Pressure Distribution of a Double Ramp

Authors: Pengcheng Quan, Shan Zhong

Abstract:

Double ramp geometry is widely used in supersonic and hypersonic environments as it presents unique flow patterns for shock wave-boundary layer interaction studies as well as for two-dimensional inlets and deflected control surfaces for re-entry vehicles. Hence, the surface pressure distribution is critical for optimum design. Though when the model is wide enough on spanwise direction the flow can be regarded as a two-dimensional flow, in actual applications a finite width would normally cause some three-dimensional spillage effects. No research has been found addressed this problem, hence the primary interest of this study is to set up a liable surface pressure distribution on a double ramp with three-dimensional effects. Both numerical and experimental (pressure sensitive paints) are applied to obtain the pressure distribution; the results agree well except that the numerical computation doesn’t capture the Gortler vortices. The pressure variations on the spanwise planes are used to analyse the development of the Gortler vortices and the effects of three-dimensional spillage on the vortices. Results indicate that the three-dimensionl spillage effects not only enhance the developing of the Gortler vortice, but also increase the periodic distance between vortice pairs.

Keywords: spillage effects, pressure sensitive paints, hypersonic, double ramp

Procedia PDF Downloads 329
6305 A Novel Dual Band-pass filter Based On Coupling of Composite Right/Left Hand CPW and (CSRRs) Uses Ferrite Components

Authors: Mohammed Berka, Khaled Merit

Abstract:

Recent works on microwave filters show that the constituent materials such filters are very important in the design and realization. Several solutions have been proposed to improve the qualities of filtering. In this paper, we propose a new dual band-pass filter based on the coupling of a composite (CRLH) coplanar waveguide with complementary split ring resonators (CSRRs). The (CRLH) CPW is composed of two resonators, each one has an interdigital capacitor (CID) and two short-circuited stubs parallel to top ground plane. On the lower ground plane, we use defected ground structure technology (DGS) to engrave two (CSRRs) offered with different shapes and dimensions. Between the top ground plane and the substrate, we place a ferrite layer to control the electromagnetic coupling between (CRLH) CPW and (CSRRs). The global filter that has coplanar access will have a dual band-pass behavior around the magnetic resonances of (CSRRs). Since there’s no scientific or experimental result in the literature for this kind of complicated structure, it was necessary to perform simulation using HFSS Ansoft designer.

Keywords: complementary split ring resonators, coplanar waveguide, ferrite, filter, stub.

Procedia PDF Downloads 401
6304 Corrosion Inhibition of AA2024 Alloy with Graphene Oxide Derivative: Electrochemical and Surface Analysis

Authors: Nisrine Benzbiria, Abderrahmane Thoume, Mustapha Zertoubi

Abstract:

The goal of this research is to investigate the corrosion inhibition potential of functionalized graphene oxide (GO) with oxime derivative on AA2024-T3 surface in synthetic seawater. The utilization of functionalized graphene oxide is creating a category of corrosion inhibitors known as organically modified nanomaterials. In our work, the functionalization of GO by chalcone oxime enables graphene oxide to have enhanced water solubility and a good corrosion mitigation capacity. Fourier-transform infrared (FT-IR) spectroscopy was utilized to evaluate the main functional groups of the inhibitor. Electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization curves (PDP) showed that the inhibitor acts as a mixed-type inhibitor. The inhibitory efficiency (IE) improved as the concentration increased to a value of 96% after one hour of exposure to a medium containing 60 mg/L ppm of the inhibitor. According to thermodynamic calculations, the adsorption of the inhibitor on the AA2024-T3 surface in 3% NaCl followed the Langmuir isotherm. The formation of a barrier layer was further confirmed by surface analysis. The protective film prevented the alloy dissolution and limited the accessibility of attacking ions, as evinced by solution analysis techniques.

Keywords: AA2024-T3, NaCl, electrochemical methods, FT-IR, SEM/AFM, DFT, MC simulation

Procedia PDF Downloads 59
6303 The Culture of Extrajudicial Executions: An Investigative Study of the Philippines’ Fifth Republic

Authors: Nathalie Quinto, Danielle Solancho

Abstract:

In 1986, after Marcos’ Martial Law of 1972, the Philippines revised its constitution for the fifth time, under the Aquino Administration. Extrajudicial violence was expected to be lessened, if not completely eradicated after this was passed. However, state-sponsored executions continued to persist even in the present time. There are currently identified policy gaps when it comes to extrajudicial cases, as there is no generally accepted definition of the term in the Philippines. In this paper, a triangulation method of historically published papers, key informant interviews, and focus group discussions of academics, scholars, and people who are involved in various cases found, was utilized for the methodology. This paper explores the establishment of a normalized system of state-sponsored executions in the country and why the state resorts to this kind of action. It found that due to a weak political, and social institution, a culture of extrajudicial executions was established.

Keywords: extrajudicial execution, human rights, justice, security

Procedia PDF Downloads 261
6302 Singularization: A Technique for Protecting Neural Networks

Authors: Robert Poenaru, Mihail Pleşa

Abstract:

In this work, a solution that addresses the protection of pre-trained neural networks is developed: Singularization. This method involves applying permutations to the weight matrices of a pre-trained model, introducing a form of structured noise that obscures the original model’s architecture. These permutations make it difficult for an attacker to reconstruct the original model, even if the permuted weights are obtained. Experimental benchmarks indicate that the application of singularization has a profound impact on model performance, often degrading it to the point where retraining from scratch becomes necessary to recover functionality, which is particularly effective for securing intellectual property in neural networks. Moreover, unlike other approaches, singularization is lightweight and computationally efficient, which makes it well suited for resource-constrained environments. Our experiments also demonstrate that this technique performs efficiently in various image classification tasks, highlighting its broad applicability and practicality in real-world scenarios.

Keywords: machine learning, ANE, CNN, security

Procedia PDF Downloads 12
6301 Associations between Sleep Problems and Disordered Eating in Japanese Adolescents: A Cross-Sectional Study

Authors: Takaharu Hirai, Yuta Mitobe, Hiromi Hirai

Abstract:

Introduction: Eating disorders (ED) are serious psychiatric disorders that affect individuals, especially adolescents. It has been suggested that nonclinical ED-like characteristics are related to sleep problems. However, studies exploring the association between potential ED and sleep disorders have primarily been conducted in Europe and the United States. We conducted a survey of Japanese adolescents to investigate this claim. Method: In this cross-sectional study, 398 school-aged adolescents, aged 12–18 years old, matched for gender ratio, responded to a self-administered questionnaire survey. We used the Eating Attitudes Test-26 (EAT-26) and the Athens Insomnia Scale (AIS) to measure potential ED and sleep problems, respectively. In this study, participants with an EAT-26 total score of 0–19 points were classified as non-ED, while those with scores of 20 points or higher were classified as potential ED. Result: Of the 398 participants, 17 (4.3%) had an EAT-26 total score of 20 or higher. Among boys, the rate was 6 of 199 participants (3%), and among girls, the rate was 11 of 182 participants (6%). There were 89 participants (22.4%) with an AIS score of 6 points or higher, of which 36 (17.6%) were boys, and 53 (27.5%) were girls. Adolescents with potential ED had significantly higher rates of daytime sleep problems than those without ED. Further, while examining the types of sleep problems, adolescents with potential ED had greater problems with a sense of well-being and physical and mental functioning during the day. In contrast, no significant associations were found between potential ED and sleep initiation, awakenings during the night, early morning awakening, total sleep duration, or overall quality of sleep. Finally, nocturnal and daytime sleep scores were significantly associated with dieting, bulimia, and oral control EAT-26 sub-scores. Discussion: While Japanese adolescents with possible ED do not experience nighttime sleep problems, they do experience problems related to well-being and mental and physical functioning, which are indicators of daytime sleep problems. This may assist with early detection of disordered eating in adolescents. The study suggested that professionals working towards adolescent mental health issues need an approach that comprehensively integrates both sleep problems and potential ED.

Keywords: adolescents, potential eating disorders, sleep problems, eating attitudes test-26

Procedia PDF Downloads 174
6300 Controlling the Degradation Rate of Biodegradable Mg Implant Using Magnetron-Sputtered (Zr-Nb) Thin Films

Authors: Somayeh Azizi, Mohammad Hossein Ehsani, Amir Zareidoost

Abstract:

In this research, a technique has been developed to reduce the corrosion rate of magnesium (Mg) metal by creating Zr-Nb thin film coatings. In this regard, thin-film coatings of niobium (Nb) zirconium (Zr) double alloy are applied on pure Mg specimens under different processes conditions, such as the change of the substrate temperature, substrate bias, and coating thickness using the magnetron sputtering method. Then, deposited coatings are analyzed in terms of surface features via field-emission scanning electron microscopy (FE-SEM), thin-layer X-ray diffraction (GI-XRD), energy-dispersive X-ray spectroscopy (EDS), atomic force microscopy (AFM), and corrosion tests. Also, nano-scratch tests were carried out to investigate the adhesion of the thin film. The results showed that the (Zr-Nb) thin films could control the degradation rate of Mg in the simulated body fluid (SBF). The nano-scratch studies depicted that the (Zr-Nb) thin films have a proper adhesion with the Mg substrate. Therefore, this technique could be used to enhance the corrosion resistance of bare Mg and could result in improving the performance of the biodegradable Mg implant for orthopedic applications.

Keywords: (Zr-Nb) thin film, magnetron sputtering, biodegradable Mg, degradation rate

Procedia PDF Downloads 118
6299 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 161
6298 Enhancing the Safety Climate and Reducing Violence against Staff in Closed Hospital Wards

Authors: Valerie Isaak

Abstract:

This study examines the effectiveness of an intervention program aimed at enhancing a unit-level safety climate as a way to minimize the risk of employees being injured by patient violence. The intervention program conducted in maximum security units in one of the psychiatric hospitals in Israel included a three day workshop. Safety climate was examined before and after the implementation of the intervention. We also collected data regarding incidents involving patient violence. Six months after the intervention a significant improvement in employees’ perceptions regarding management’s commitment to safety were found as well as a marginally significant improvement in communication concerning safety issues. Our research shows that an intervention program aimed at enhancing a safety climate is associated with a decrease in the number of aggressive incidents. We conclude that such an intervention program is likely to return the sense of safety and reduce the scope of violence.

Keywords: violence, intervention, safety climate, performance, public sector

Procedia PDF Downloads 352
6297 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks

Authors: Hyunsun Lee, Yi Zhu

Abstract:

Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.

Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles

Procedia PDF Downloads 122
6296 Social Reforms and the Welfare State in America after the New Deal (1945-1969)

Authors: Aziza Tahar Djebbar

Abstract:

Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.

Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms

Procedia PDF Downloads 455
6295 An Inverse Heat Transfer Algorithm for Predicting the Thermal Properties of Tumors during Cryosurgery

Authors: Mohamed Hafid, Marcel Lacroix

Abstract:

This study aimed at developing an inverse heat transfer approach for predicting the time-varying freezing front and the temperature distribution of tumors during cryosurgery. Using a temperature probe pressed against the layer of tumor, the inverse approach is able to predict simultaneously the metabolic heat generation and the blood perfusion rate of the tumor. Once these parameters are predicted, the temperature-field and time-varying freezing fronts are determined with the direct model. The direct model rests on one-dimensional Pennes bioheat equation. The phase change problem is handled with the enthalpy method. The Levenberg-Marquardt Method (LMM) combined to the Broyden Method (BM) is used to solve the inverse model. The effect (a) of the thermal properties of the diseased tissues; (b) of the initial guesses for the unknown thermal properties; (c) of the data capture frequency; and (d) of the noise on the recorded temperatures is examined. It is shown that the proposed inverse approach remains accurate for all the cases investigated.

Keywords: cryosurgery, inverse heat transfer, Levenberg-Marquardt method, thermal properties, Pennes model, enthalpy method

Procedia PDF Downloads 198
6294 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 216
6293 SnSₓ, Cu₂ZnSnS₄ Nanostructured Thin Layers for Thin-Film Solar Cells

Authors: Elena A. Outkina, Marina V. Meledina, Aliaksandr A. Khodin

Abstract:

Nanostructured thin films of SnSₓ, Cu₂ZnSnS₄ (CZTS) semiconductors were fabricated by chemical processing to produce thin-film photoactive layers for photocells as a prospective lowest-cost and environment-friendly alternative to Si, Cu(In, Ga)Se₂, and other traditional solar cells materials. To produce SnSₓ layers, the modified successive ionic layer adsorption and reaction (SILAR) technique were investigated, including successive cyclic dipping into Na₂S solution and SnCl₂, NaCl, triethanolamine solution. To fabricate CZTS layers, the cyclic dipping into CuSO₄ with ZnSO₄, SnCl₂, and Na₂S solutions was used with intermediate rinsing in distilled water. The nano-template aluminum/alumina substrate was used to control deposition processes. Micromorphology and optical characteristics of the fabricated layers have been investigated. Analysis of 2D-like layers deposition features using nano-template substrate is presented, including the effect of nanotips in a template on surface charge redistribution and transport.

Keywords: kesterite, nanotemplate, SILAR, solar cell, tin sulphide

Procedia PDF Downloads 141
6292 Gas Condensing Unit with Inner Heat Exchanger

Authors: Dagnija Blumberga, Toms Prodanuks, Ivars Veidenbergs, Andra Blumberga

Abstract:

Gas condensing units with inner tubes heat exchangers represent third generation technology and differ from second generation heat and mass transfer units, which are fulfilled by passive filling material layer. The first one improves heat and mass transfer by increasing cooled contact surface of gas and condensate drops and film formed in inner tubes heat exchanger. This paper presents a selection of significant factors which influence the heat and mass transfer. Experimental planning is based on the research and analysis of main three independent variables; velocity of water and gas as well as density of spraying. Empirical mathematical models show that the coefficient of heat transfer is used as dependent parameter which depends on two independent variables; water and gas velocity. Empirical model is proved by the use of experimental data of two independent gas condensing units in Lithuania and Russia. Experimental data are processed by the use of heat transfer criteria-Kirpichov number. Results allow drawing the graphical nomogram for the calculation of heat and mass transfer conditions in the innovative and energy efficient gas cooling unit.

Keywords: gas condensing unit, filling, inner heat exchanger, package, spraying, tunes

Procedia PDF Downloads 287
6291 An Ensemble Deep Learning Architecture for Imbalanced Classification of Thoracic Surgery Patients

Authors: Saba Ebrahimi, Saeed Ahmadian, Hedie Ashrafi

Abstract:

Selecting appropriate patients for surgery is one of the main issues in thoracic surgery (TS). Both short-term and long-term risks and benefits of surgery must be considered in the patient selection criteria. There are some limitations in the existing datasets of TS patients because of missing values of attributes and imbalanced distribution of survival classes. In this study, a novel ensemble architecture of deep learning networks is proposed based on stacking different linear and non-linear layers to deal with imbalance datasets. The categorical and numerical features are split using different layers with ability to shrink the unnecessary features. Then, after extracting the insight from the raw features, a novel biased-kernel layer is applied to reinforce the gradient of the minority class and cause the network to be trained better comparing the current methods. Finally, the performance and advantages of our proposed model over the existing models are examined for predicting patient survival after thoracic surgery using a real-life clinical data for lung cancer patients.

Keywords: deep learning, ensemble models, imbalanced classification, lung cancer, TS patient selection

Procedia PDF Downloads 144
6290 Effective Health Promotion Interventions Help Young Children to Maximize Their Future Well-Being by Early Childhood Development

Authors: Nadeesha Sewwandi, Dilini Shashikala, R. Kanapathy, S. Viyasan, R. M. S. Kumara, Duminda Guruge

Abstract:

Early childhood development is important to the emotional, social, and physical development of young children and it has a direct effect on their overall development and on the adult they become. Play is so important to optimal child developments including skill development, social development, imagination, creativity and it fulfills a baby’s inborn need to learn. So, health promotion approach empowers people about the development of early childhood. Play area is a new concept and this study focus how this play areas helps to the development of early childhood of children in rural villages in Sri Lanka. This study was conducted with a children society in a rural village called Welankulama in Sri Lanka. Survey was conducted with children society about emotional, social and physical development of young children (Under age eight) in this village using questionnaires. It described most children under eight years age have poor level of emotional, social and physical development in this village. Then children society wanted to find determinants for this problem and among them they prioritized determinants like parental interactions, learning environment and social interaction and address them using an innovative concept called play area. In this village there is a common place as play area under a big tamarind tree. It consists of a playhouse, innovative playing toys, mobile library, etc. Twice a week children, parents, grandparents gather to this nice place. Collective feeding takes place in this area once a week and it was conducted by several mothers groups in this village. Mostly grandparents taught about handicrafts and this is a very nice place to share their experiences with all. Healthy competitions were conducted in this place through playing to motivate the children. Happy calendar (mood of the children) was marked by children before and after coming to the play area. In terms of results qualitative changes got significant place in this study. By learning about colors and counting through playing the thinking and reasoning skills got developed among children. Children were widening their imagination by means of storytelling. We observed there were good developments of fine and gross motor skills of two differently abled children in this village. Children learn to empathize with other people, sharing, collaboration, team work and following of rules. And also children gain knowledge about fairness, through role playing, obtained insight on the right ways of displaying emotions such as stress, fear, anger, frustration, and develops knowledge of how they can manage their feelings. The reading and writing ability of the children got improved by 83% because of the mobile library. The weight of children got increased by 81% in the village. Happiness was increased by 76% among children in the society. Playing is very important for learning during early childhood period of a person. Health promotion interventions play a major role to the development of early childhood and it help children to adjust to the school setting and even to enhance children’s learning readiness, learning behaviors and problem solving skills.

Keywords: early childhood development, health promotion approach, play and learning, working with children

Procedia PDF Downloads 137
6289 School Administrators’ Perspectives on Child Neglect and Abuse and Intervention Methods

Authors: Eylem G. Cengiz, Ersin Çilek, Gözde Başkaya, Havva Nur Taş

Abstract:

It is possible to define the abuse and neglect of the child as a social problem. Such adverse experiences of the child are witnessed by wider social circles as well as his or her immediate environment. The most effective institution among these social circles is the school. The awareness of teachers, administrators, and even auxiliary personnel on this issue can act as a protective and preventive buffer because teachers have the opportunity to be with children every day and constantly observe them; therefore, they can notice the physical and mental changes in students. Furthermore, school administrators have an undeniable role in recognizing and responding to the risk of neglect and abuse. This study aims to evaluate the awareness of school administrators on the risk factors, clues, and ways of intervention towards abuse and neglect through the scenarios given to them. Data were collected from 37 primary, secondary, and high school administrators working in various provinces of Turkey through descriptive and scenario-based questions to determine their general knowledge of the concepts of neglect and abuse and their general tendencies towards practice. Descriptive questions were evaluated with content analysis, and scenario-based questions were evaluated with numerical qualitative data analysis. Concepts and themes were tried to be reached by content analysis from the descriptive data collected. When the results are evaluated in general, it is striking that the concept of child abuse means only sexual abuse for some school administrators. There is an important uncertainty for school administrators in the content of the idea of neglect. When the views on the causes of neglect and abuse are examined, the family factor was seen as the primary source of both neglect and abuse. In addition, among the prevention strategies applied by school administrators, intervention for the family -interviewing and informing- was recommended by only 9 (29%) out of 31 administrators. When the responses to the physical, emotional, and sexual abuse scenarios are examined, it is revealed that the administrators generally realize the abuse but fail to develop an appropriate/whole intervention method. The research results show that school administrators' awareness should be increased. Although administrators have sensitivity towards children, they should be empowered to recognize all types of neglect and abuse and develop appropriate intervention tools.

Keywords: assessment child abuse and neglect, child abuse, child neglect, school administrators

Procedia PDF Downloads 131
6288 A Study of Safety of Data Storage Devices of Graduate Students at Suan Sunandha Rajabhat University

Authors: Komol Phaisarn, Natcha Wattanaprapa

Abstract:

This research is a survey research with an objective to study the safety of data storage devices of graduate students of academic year 2013, Suan Sunandha Rajabhat University. Data were collected by questionnaire on the safety of data storage devices according to CIA principle. A sample size of 81 was drawn from population by purposive sampling method. The results show that most of the graduate students of academic year 2013 at Suan Sunandha Rajabhat University use handy drive to store their data and the safety level of the devices is at good level.

Keywords: security, safety, storage devices, graduate students

Procedia PDF Downloads 350
6287 Electrode Performance of Carbon Coated Nanograined LiFePO4 in Lithium Batteries

Authors: Princess Stephanie P. Llanos, Rinlee Butch M. Cervera

Abstract:

Lithium iron phosphate (LiFePO4) is a potential cathode material for lithium-ion batteries due to its promising characteristics. In this study, carbon-coated nanograined LiFePO4 is synthesized via wet chemistry method at a low temperature of 400 °C and investigated its performance as a cathode in Lithium battery. The X-ray diffraction pattern of the synthesized samples can be indexed to an orthorhombic LiFePO4 structure. Agglomerated particles that range from 200 nm to 300 nm are observed from scanning electron microscopy images. Transmission electron microscopy images confirm the crystalline structure of LiFePO4 and coating of amorphous carbon layer. Elemental mapping using Energy dispersive spectroscopy analysis revealed the homogeneous dispersion of Fe, P, O, and C elements. On the other hand, the electrochemical performances of the synthesized cathodes were investigated using cyclic voltammetry, galvanostatic charge/discharge tests with different C-rates, and cycling performances. Galvanostatic charge and discharge measurements revealed that the sample sintered at 400 °C for 3 hours with carbon coating demonstrated the highest capacity among the samples which reaches up to 160 mAhg⁻¹ at 0.1C rate.

Keywords: cathode, charge-discharge, electrochemical, lithium batteries

Procedia PDF Downloads 329
6286 Speaker Recognition Using LIRA Neural Networks

Authors: Nestor A. Garcia Fragoso, Tetyana Baydyk, Ernst Kussul

Abstract:

This article contains information from our investigation in the field of voice recognition. For this purpose, we created a voice database that contains different phrases in two languages, English and Spanish, for men and women. As a classifier, the LIRA (Limited Receptive Area) grayscale neural classifier was selected. The LIRA grayscale neural classifier was developed for image recognition tasks and demonstrated good results. Therefore, we decided to develop a recognition system using this classifier for voice recognition. From a specific set of speakers, we can recognize the speaker’s voice. For this purpose, the system uses spectrograms of the voice signals as input to the system, extracts the characteristics and identifies the speaker. The results are described and analyzed in this article. The classifier can be used for speaker identification in security system or smart buildings for different types of intelligent devices.

Keywords: extreme learning, LIRA neural classifier, speaker identification, voice recognition

Procedia PDF Downloads 176
6285 Product Feature Modelling for Integrating Product Design and Assembly Process Planning

Authors: Baha Hasan, Jan Wikander

Abstract:

This paper describes a part of the integrating work between assembly design and assembly process planning domains (APP). The work is based, in its first stage, on modelling assembly features to support APP. A multi-layer architecture, based on feature-based modelling, is proposed to establish a dynamic and adaptable link between product design using CAD tools and APP. The proposed approach is based on deriving “specific function” features from the “generic” assembly and form features extracted from the CAD tools. A hierarchal structure from “generic” to “specific” and from “high level geometrical entities” to “low level geometrical entities” is proposed in order to integrate geometrical and assembly data extracted from geometrical and assembly modelers to the required processes and resources in APP. The feature concept, feature-based modelling, and feature recognition techniques are reviewed.

Keywords: assembly feature, assembly process planning, feature, feature-based modelling, form feature, ontology

Procedia PDF Downloads 307
6284 Low Overhead Dynamic Channel Selection with Cluster-Based Spatial-Temporal Station Reporting in Wireless Networks

Authors: Zeyad Abdelmageid, Xianbin Wang

Abstract:

Choosing the operational channel for a WLAN access point (AP) in WLAN networks has been a static channel assignment process initiated by the user during the deployment process of the AP, which fails to cope with the dynamic conditions of the assigned channel at the station side afterward. However, the dramatically growing number of Wi-Fi APs and stations operating in the unlicensed band has led to dynamic, distributed, and often severe interference. This highlights the urgent need for the AP to dynamically select the best overall channel of operation for the basic service set (BSS) by considering the distributed and changing channel conditions at all stations. Consequently, dynamic channel selection algorithms which consider feedback from the station side have been developed. Despite the significant performance improvement, existing channel selection algorithms suffer from very high feedback overhead. Feedback latency from the STAs, due to the high overhead, can cause the eventually selected channel to no longer be optimal for operation due to the dynamic sharing nature of the unlicensed band. This has inspired us to develop our own dynamic channel selection algorithm with reduced overhead through the proposed low-overhead, cluster-based station reporting mechanism. The main idea behind the cluster-based station reporting is the observation that STAs which are very close to each other tend to have very similar channel conditions. Instead of requesting each STA to report on every candidate channel while causing high overhead, the AP divides STAs into clusters then assigns each STA in each cluster one channel to report feedback on. With the proper design of the cluster based reporting, the AP does not lose any information about the channel conditions at the station side while reducing feedback overhead. The simulation results show equal performance and, at times, better performance with a fraction of the overhead. We believe that this algorithm has great potential in designing future dynamic channel selection algorithms with low overhead.

Keywords: channel assignment, Wi-Fi networks, clustering, DBSCAN, overhead

Procedia PDF Downloads 116
6283 Educational Institutional Approach for Livelihood Improvement and Sustainable Development

Authors: William Kerua

Abstract:

The PNG University of Technology (Unitech) has mandatory access to teaching, research and extension education. Given such function, the Agriculture Department has established the ‘South Pacific Institute of Sustainable Agriculture and Rural Development (SPISARD)’ in 2004. SPISARD is established as a vehicle to improve farming systems practiced in selected villages by undertaking pluralistic extension method through ‘Educational Institutional Approach’. Unlike other models, SPISARD’s educational institutional approach stresses on improving the whole farming systems practiced in a holistic manner and has a two-fold focus. The first is to understand the farming communities and improve the productivity of the farming systems in a sustainable way to increase income, improve nutrition and food security as well as livelihood enhancement trainings. The second is to enrich the Department’s curriculum through teaching, research, extension and getting inputs from farming community. SPISARD has established number of model villages in various provinces in Papua New Guinea (PNG) and with many positive outcome and success stories. Adaption of ‘educational institutional approach’ thus binds research, extension and training into one package with the use of students and academic staff through model village establishment in delivering development and extension to communities. This centre (SPISARD) coordinates the activities of the model village programs and linkages. The key to the development of the farming systems is establishing and coordinating linkages, collaboration, and developing partnerships both within and external institutions, organizations and agencies. SPISARD has a six-point step strategy for the development of sustainable agriculture and rural development. These steps are (i) establish contact and identify model villages, (ii) development of model village resource centres for research and trainings, (iii) conduct baseline surveys to identify problems/needs of model villages, (iv) development of solution strategies, (v) implementation and (vi) evaluation of impact of solution programs. SPISARD envisages that the farming systems practiced being improved if the villages can be made the centre of SPISARD activities. Therefore, SPISARD has developed a model village approach to channel rural development. The model village when established become the conduit points where teaching, training, research, and technology transfer takes place. This approach is again different and unique to the existing ones, in that, the development process take place in the farmers’ environment with immediate ‘real time’ feedback mechanisms based on the farmers’ perspective and satisfaction. So far, we have developed 14 model villages and have conducted 75 trainings in 21 different areas/topics in 8 provinces to a total of 2,832 participants of both sex. The aim of these trainings is to directly participate with farmers in the pursuit to improving their farming systems to increase productivity, income and to secure food security and nutrition, thus to improve their livelihood.

Keywords: development, educational institutional approach, livelihood improvement, sustainable agriculture

Procedia PDF Downloads 153
6282 Maturity Classification of Oil Palm Fresh Fruit Bunches Using Thermal Imaging Technique

Authors: Shahrzad Zolfagharnassab, Abdul Rashid Mohamed Shariff, Reza Ehsani, Hawa Ze Jaffar, Ishak Aris

Abstract:

Ripeness estimation of oil palm fresh fruit is important processes that affect the profitableness and salability of oil palm fruits. The adulthood or ripeness of the oil palm fruits influences the quality of oil palm. Conventional procedure includes physical grading of Fresh Fruit Bunches (FFB) maturity by calculating the number of loose fruits per bunch. This physical classification of oil palm FFB is costly, time consuming and the results may have human error. Hence, many researchers try to develop the methods for ascertaining the maturity of oil palm fruits and thereby, deviously the oil content of distinct palm fruits without the need for exhausting oil extraction and analysis. This research investigates the potential of infrared images (Thermal Images) as a predictor to classify the oil palm FFB ripeness. A total of 270 oil palm fresh fruit bunches from most common cultivar of oil palm bunches Nigresens according to three maturity categories: under ripe, ripe and over ripe were collected. Each sample was scanned by the thermal imaging cameras FLIR E60 and FLIR T440. The average temperature of each bunches were calculated by using image processing in FLIR Tools and FLIR ThermaCAM researcher pro 2.10 environment software. The results show that temperature content decreased from immature to over mature oil palm FFBs. An overall analysis-of-variance (ANOVA) test was proved that this predictor gave significant difference between underripe, ripe and overripe maturity categories. This shows that the temperature as predictors can be good indicators to classify oil palm FFB. Classification analysis was performed by using the temperature of the FFB as predictors through Linear Discriminant Analysis (LDA), Mahalanobis Discriminant Analysis (MDA), Artificial Neural Network (ANN) and K- Nearest Neighbor (KNN) methods. The highest overall classification accuracy was 88.2% by using Artificial Neural Network. This research proves that thermal imaging and neural network method can be used as predictors of oil palm maturity classification.

Keywords: artificial neural network, maturity classification, oil palm FFB, thermal imaging

Procedia PDF Downloads 360
6281 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 231
6280 The Synopsis of the AI-Powered Therapy Web Platform ‘Free AI Therapist'

Authors: Arwa Alnowaiser, Hala Shoukri

Abstract:

The ‘FreeAITherapist’ is an artificial intelligence application that uses the power of AI to offer advice and mental health counseling to its users through its chatbot services. The AI therapist is designed to understand users' issues, concerns, and problems and respond appropriately; it provides empathy and guidance and uses evidence-based therapeutic techniques. With its user-friendly platform, it ensures accessibility for individuals in need, regardless of their geographical location. This website was created in direct response to the growing demand for mental health support, aiming to provide a cost-effective and confidential solution. Through promising confidentiality, it considers user privacy and data security. The ‘FreeAITherapist’ strives to bridge the gap in mental health services, offering a reliable resource for individuals seeking guidance and counseling to improve their overall well-being.

Keywords: artificial intelligence, mental health, AI therapist, website, counseling

Procedia PDF Downloads 43
6279 Experimental Investigation of Boundary Layer Transition on Rotating Cones in Axial Flow in 0 and 35 Degrees Angle of Attack

Authors: Ali Kargar, Kamyar Mansour

Abstract:

In this paper, experimental results of using hot wire anemometer and smoke visualization are presented. The results obtained on the hot wire anemometer for critical Reynolds number and transitional Reynolds number are compared by previous results. Excellent agreement is found for the transitional Reynolds number. The results for the transitional Reynolds number are also compared by previous linear stability results. The results of the smoke visualization clearly show the cross flow vortices which arise in the transition process from a laminar to a turbulent flow. A non-zero angle of attack is also considered. We compare our results by linear stability theory which was done by Garret et. Al (2007). We just emphasis, Also the visualization and hot wire anemometer results have been compared graphically. The goal in this paper is to check reliability of using hot wire anemometer and smoke visualization in transition problems and check reliability of linear stability theory for this case and compare our results with some trusty experimental works.

Keywords: transitional reynolds number, wind tunnel, rotating cone, smoke visualization

Procedia PDF Downloads 305