Search results for: dynamic host client protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6197

Search results for: dynamic host client protocol

6167 Design and Implementation of Partial Denoising Boundary Image Matching Using Indexing Techniques

Authors: Bum-Soo Kim, Jin-Uk Kim

Abstract:

In this paper, we design and implement a partial denoising boundary image matching system using indexing techniques. Converting boundary images to time-series makes it feasible to perform fast search using indexes even on a very large image database. Thus, using this converting method we develop a client-server system based on the previous partial denoising research in the GUI (graphical user interface) environment. The client first converts a query image given by a user to a time-series and sends denoising parameters and the tolerance with this time-series to the server. The server identifies similar images from the index by evaluating a range query, which is constructed using inputs given from the client, and sends the resulting images to the client. Experimental results show that our system provides much intuitive and accurate matching result.

Keywords: boundary image matching, indexing, partial denoising, time-series matching

Procedia PDF Downloads 137
6166 Internet Optimization by Negotiating Traffic Times

Authors: Carlos Gonzalez

Abstract:

This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.

Keywords: internet optimization, video download, future demands, secure storage

Procedia PDF Downloads 136
6165 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 284
6164 Agent Based Location Management Protocol for Mobile Adhoc Networks

Authors: Mallikarjun B. Channappagoudar, Pallapa Venkataram

Abstract:

The dynamic nature of Mobile adhoc network (MANET) due to mobility and disconnection of mobile nodes, leads to various problems in predicting the movement of nodes and their location information updation, for efficient interaction among the application specific nodes. Location management is one of the main challenges to be considered for an efficient service provision to the applications of a MANET. In this paper, we propose a location management protocol, for locating the nodes of a MANET and to maintain uninterrupted high-quality service for distributed applications by intelligently anticipating the change of location of its nodes. The protocol predicts the node movement and application resource scarcity, does the replacement with the chosen nodes nearby which have less mobility and rich in resources, with the help of both static and mobile agents, and maintains the application continuity by providing required network resources. The protocol has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. It consumes much less time (response time), gives better location accuracy, utilize less network resources, and reduce location management overhead.

Keywords: mobile agent, location management, distributed applications, mobile adhoc network

Procedia PDF Downloads 394
6163 Species Composition of Alticinae Newman, 1834 (Coleoptera, Chrysomelidae): Distribution and Host Plants in Eastern Upper Plains (Setif, Algeria)

Authors: M. Bounechada, M. Fenni, S. Bouharati, S. E. Doumandji

Abstract:

The study was taken in Setif region (36° 11' 29 N and 5° 24' 34 E) located at the north-eastern of Algeria. This paper recorded and discusses zoogeography and host plant relationships of Setifian species Alticinae subfamily. A total of 50 species belonging to Alticinae subfamily of Chrysomelidae which is the economically important familty, were recorded from differentes localities of Setif region. They are included in 10 genera. Genera Longitarsus Berthold, 1827 is less species-rich than the other Alticinae genera captured. It represens about 38% of the all species collected. Cruciferae and Compositae were the mostly prefered host plant families representing Alticinae species. For each species we mentioned the collecting sites, geographical distribution and the host plants.

Keywords: Algeria, Alticinae, Chrysomelidae, Coleoptera, distribution, host plants, species composition, Setif

Procedia PDF Downloads 234
6162 Enhanced Planar Pattern Tracking for an Outdoor Augmented Reality System

Authors: L. Yu, W. K. Li, S. K. Ong, A. Y. C. Nee

Abstract:

In this paper, a scalable augmented reality framework for handheld devices is presented. The presented framework is enabled by using a server-client data communication structure, in which the search for tracking targets among a database of images is performed on the server-side while pixel-wise 3D tracking is performed on the client-side, which, in this case, is a handheld mobile device. Image search on the server-side adopts a residual-enhanced image descriptors representation that gives the framework a scalability property. The tracking algorithm on the client-side is based on a gravity-aligned feature descriptor which takes the advantage of a sensor-equipped mobile device and an optimized intensity-based image alignment approach that ensures the accuracy of 3D tracking. Automatic content streaming is achieved by using a key-frame selection algorithm, client working phase monitoring and standardized rules for content communication between the server and client. The recognition accuracy test performed on a standard dataset shows that the method adopted in the presented framework outperforms the Bag-of-Words (BoW) method that has been used in some of the previous systems. Experimental test conducted on a set of video sequences indicated the real-time performance of the tracking system with a frame rate at 15-30 frames per second. The presented framework is exposed to be functional in practical situations with a demonstration application on a campus walk-around.

Keywords: augmented reality framework, server-client model, vision-based tracking, image search

Procedia PDF Downloads 275
6161 Cognitive Behavior Therapy with a Migrant Pakistani in Malaysia: A Single Case Study of Conversion Disorder

Authors: Fahad R. Choudhry., Khadeeja Munawar

Abstract:

This clinical case presents a 24 years old, Muslim Pakistani girl with a history of conversion disorder. Her symptoms comprised fits, restlessness, numbness in legs, poor coordination and balance, burning during urination and retention. A cognitive-behavioral model was used for conceptualizing her problem and devising a management plan based on cognitive behavioral therapy (CBT) and culturally adapted coping statements. She took 13 therapy sessions and was presented with idiosyncratic case conceptualization. Psychoeducation, coping statements, extinction, verbal challenging, and behavioral activation techniques were practiced in a collaborative way for cognitive restructuring of the client. Focus of terminal sessions was on anger management. The client needed a couple of more sessions in order to help her manage her anger. However, the therapy was terminated on the part of the client after attainment of short term goals. The client reported to have a 75 % improvement in her overall condition and remained compliant throughout the therapy.

Keywords: cognitive behavioral therapy, conversion disorder, female, Muslim, Pakistani

Procedia PDF Downloads 194
6160 An Enhanced Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks

Authors: Ahmadu Maidorawa, Kamalrulnizam Abu Bakar

Abstract:

This paper proposed an Enhanced Connectivity Aware Routing (ECAR) protocol for Vehicular Ad hoc Network (VANET). The protocol uses a control broadcast to reduce the number of overhead packets needed in a route discovery process. It is also equipped with an alternative backup route that is used whenever a primary path to destination failed, which highly reduces the frequent launching and re-launching of the route discovery process that waste useful bandwidth and unnecessarily prolonging the average packet delay. NS2 simulation results show that the performance of ECAR protocol outperformed the original connectivity aware routing (CAR) protocol by reducing the average packet delay by 28%, control overheads by 27% and increased the packet delivery ratio by 22%.

Keywords: alternative path, primary path, protocol, routing, VANET, vehicular ad hoc networks

Procedia PDF Downloads 402
6159 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271
6158 The Existence of Field Corn Networks on the Thailand-Burma Border under the Patron-Client Contract Farming System

Authors: Kettawa Boonprakarn, Jedsarid Sangkaphan, Bejapornd Deekhuntod, Nuntharat Suriyo

Abstract:

This study aimed to investigate the existence of field corn networks on the Thailand-Burma border under the patron-client contract farming system. The data of this qualitative study were collected through in-depth interviews with nine key informants. The results of the study revealed that the existence of the field corn networks was associated with the relationship where farmers had to share their crops with protectors in the areas under the influence of the KNU (Karen National Union) and the DKBA (Democratic Karen Buddhist Army) or Burmese soldiers. A Mae Liang, the person who starts a network has a connection with a Thaokae, Luk Rai Hua Chai or the head of a group of farmers, and farmers. They are under the patron-client system with trust and loyalty that enable the head of the group and the farmers in the Burma border side to remain under the same Mae Liang even though the business has been passed down to later generations.

Keywords: existence, field-corn networks, patron-client system, contract farming

Procedia PDF Downloads 270
6157 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 305
6156 Evaluation of Routing Protocols in Mobile Adhoc Networks

Authors: Anu Malhotra

Abstract:

An Ad-hoc network is one that is an autonomous, self configuring network made up of mobile nodes connected via wireless links. Ad-hoc networks often consist of nodes, mobile hosts (MH) or mobile stations (MS, also serving as routers) connected by wireless links. Different routing protocols are used for data transmission in between the nodes in an adhoc network. In this paper two protocols (OLSR and AODV) are analyzed on the basis of two parameters i.e. time delay and throughput with different data rates. On the basis of these analysis, we observed that with same data rate, AODV protocol is having more time delay than the OLSR protocol whereas throughput for the OLSR protocol is less compared to the AODV protocol.

Keywords: routing adhoc, mobile hosts, mobile stations, OLSR protocol, AODV protocol

Procedia PDF Downloads 506
6155 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network

Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang

Abstract:

Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.

Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving

Procedia PDF Downloads 330
6154 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
6153 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 332
6152 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 183
6151 Quality Determinants of Client Satisfaction: A Case Study of ACE-Australian Consulting Engineers, Sydney, Australia

Authors: Elham S. Hasham, Anthony S. Hasham

Abstract:

The construction industry is one of Australia’s fastest growing industries and its success is a result of a firm’s client satisfaction with focus on product determinants such as price and quality. Ensuring quality at every phase is a must and building rapport with the client will go a long way. To capitalise on the growing demand for Engineering Consulting Firms (ECFs), we should “redefine the bottom line by allowing client satisfaction, high-quality standards, and profits to be the top priorities”. Consequently, the emphasis should be on improving employee skills through various training provisions. Clients seek consistency and thus expect that all services should be similar in respect to quality and the ability of the service to meet their needs. This calls for empowerment and comfortable work conditions to motivate employees and give them incentive to deliver quality and excellent output. The methodology utilized is triangulation-a combination of both quantitative and qualitative research. The case study-Australian Consulting Engineers (ACE) was established in 1995 and has operations throughout Australia, the Philippines, Europe, U.A.E., K.S.A., and Lebanon. ACE is affiliated with key agencies and support organizations in the engineering industry with International Organization for Standardization (ISO) certifications in Safety and Quality Management. The objective of this study is significant as it sheds light on employee motivation and client satisfaction as imperative determinants of the success of an organization.

Keywords: leadership, motivation, organizational behavior, satisfaction

Procedia PDF Downloads 65
6150 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs

Authors: Navneet Kaur, Amarpreet Singh

Abstract:

In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.

Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network

Procedia PDF Downloads 348
6149 Critical Role of Lipid Rafts in Influenza a Virus Binding to Host Cell

Authors: Dileep Kumar Verma, Sunil Kumar Lal

Abstract:

Influenza still remains one of the most challenging diseases posing significant threat to public health causing seasonal epidemics and pandemics. Influenza A Virus (IAV) surface protein hemagglutinin is known to play an important role in viral attachment to the host sialic acid receptors and concentrate in lipid rafts for efficient viral fusion. Selective nature of Influenza A virus to utilize rafts micro-domain for efficient virus assembly and budding has been explored in depth. However, the detailed mechanism of IAV binding to host cell membrane and entry into the host remains elusive. In the present study we investigated the role of lipid rafts in early life cycle events of IAV. Role of host lipid rafts was studied using raft disruption method by extraction of cholesterol by Methyl-β-Cyclodextrin. Using GM1, a well-known lipid raft marker, we were able to observe co-localization of IAV on lipid rafts on the host cell membrane. This experiment suggests a direct involvement of lipid rafts in the initiation of the IAV life cycle. Upon disruption of lipid rafts by Methyl-b-cyclodextrin, we observed a significant reduction in IAV binding on the host cell surface indicating a significant decrease in virus attachment to coherent membrane rafts. Our results provide proof that host lipid rafts and their constituents play an important role in the adsorption of IAV. This study opens a new avenues in IAV virus-host interactions to combat infection at a very early steps of the viral lifecycle.

Keywords: lipid raft, adsorption, cholesterol, methyl-β-cyclodextrin, GM1

Procedia PDF Downloads 365
6148 Exploration of Professional Skepticism among Entry-level Auditors in China from Psychological and Cultural Perspectives

Authors: Sammy Xiaoyan Ying

Abstract:

Professional skepticism remains one of the most important and controversial topics in auditing. This study examines the influence of client cooperativeness and fraud risk on judgments of professional skepticism among Chinese entry-level auditors in the context of evaluation of client-provided audit evidence. Given that the essence of auditors’ PS rests on distrust of clients, this study invokes trust-related theories from psychological and cultural perspectives. Specifically, invoking psychology theories of trust concerning positive relationship between risk and distrust, this study hypothesizes that professional skepticism is likely to be positively associated with client fraud risk. The results support the hypothesis and show that lower (higher) levels of client fraud risk lead to lower (higher) levels of professional skepticism. Furthermore, drawing on analysis of relationship between cooperation and trust, with particular reference to guanxi dynamics in the Chinese culture, this study hypothesizes that professional skepticism is likely to be negatively associated with client cooperativeness. The results support the hypothesis and show that higher (lower) levels of client cooperativeness lead to lower (higher) levels of professional skepticism. The findings may assist audit firms and auditing educators in improving training and education programs and enhancing entry-level auditors’ abilities to maintain professional skepticism. Also, practitioners and regulators may benefit from increasing awareness of psychological factors in influencing professional skepticism.

Keywords: audit judgment, Chinese culture, entry-level auditor, professional skepticism

Procedia PDF Downloads 292
6147 Host Cell Membrane Lipid Rafts Are Required for Influenza A Virus Adsorption to Host Cell Surface

Authors: Dileep K. Verma, Sunil K. Lal

Abstract:

Influenza still remains one of the most challenging diseases posing significant threat to public health causing seasonal epidemics and pandemics. Previous studies suggest that influenza hemagglutinin is essential for viral attachment to host sialic acid receptors and concentrate in lipid rafts for efficient viral fusion. Studies also reported selective nature of Influenza virus to utilize rafts micro-domain for efficient virus assembly and budding. However, the detailed mechanism of Influenza A Virus (IAV) binding to host cell membrane and entry inside the host remains elusive. In the present study, we investigated if host membrane lipid rafts play any significant role in early life cycle events of influenza A virus. Role of host lipid rafts was studied using raft disruption method by extraction of cholesterol and Methyl-β-Cyclodextrin was used to remove membrane cholesterol. We observed co-localization of Influenza A Virus to lipid rafts by visualization of known lipid raft marker GM1 on host cell membrane. Co-localization suggest direct involvement of these micro-domain in initiation of IAV life cycle. We found significant reduction in influenza A virus adsorption in raft disrupted target host cells indicating poor binding and attachment in absence of coherent membrane rafts. Taken together, the results of present study provide evidence for critical involvement of host lipid rafts and its constituents in adsorption process of Influenza A Virus and suggests crucial involvement in other early events of IAV life cycle. The present study opens a new domain to study influenza virus-host interaction and to combat flu at the very early steps of viral life cycle.

Keywords: lipid raft, adsorption, cholesterol, methyl-β-cyclodextrin, GM1

Procedia PDF Downloads 297
6146 Protocol for Consumer Research in Academia for Community Marketing Campaigns

Authors: Agnes J. Otjen, Sarah Keller

Abstract:

A Montana university has used applied consumer research in experiential learning with non-profit clients for over a decade. Through trial and error, a successful protocol has been established from problem statement through formative research to integrated marketing campaign execution. In this paper, we describe the protocol and its applications. Analysis was completed to determine the effectiveness of the campaigns and the results of how pre- and post-consumer research mark societal change because of media.

Keywords: consumer, research, marketing, communications

Procedia PDF Downloads 137
6145 Path-Spin to Spin-Spin Hybrid Quantum Entanglement: A Conversion Protocol

Authors: Indranil Bayal, Pradipta Panchadhyayee

Abstract:

Path-spin hybrid entanglement generated and confined in a single spin-1/2 particle is converted to spin-spin hybrid interparticle entanglement, which finds its important applications in quantum information processing. This protocol uses beam splitter, spin flipper, spin measurement, classical channel, unitary transformations, etc., and requires no collective operation on the pair of particles whose spin variables share complete entanglement after the accomplishment of the protocol. The specialty of the protocol lies in the fact that the path-spin entanglement is transferred between spin degrees of freedom of two separate particles initially possessed by a single party.

Keywords: entanglement, path-spin entanglement, spin-spin entanglement, CNOT operation

Procedia PDF Downloads 198
6144 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 385
6143 Preparation and Properties of Self-Healing Polyurethanes Utilizing the Host-Guest Interaction between Cyclodextrin and Adamantane Moieties

Authors: Kaito Sugane, Mitsuhiro Shibata

Abstract:

Self-healing polymers have attracted attention because their physical damage and cracks can be effectively repaired, thereby extending the lifetime of the materials. Self-healing polymers using host-guest interaction have the advantage that they are quickly repaired under mild temperature conditions when compared with self-healing polymer using dynamic covalent bonds such as Diels-Alder (DA)/retro-DA and disulfide metathesis reactions. Especially, it is known that hydrogels utilizing the host-guest interaction between cyclodextrin and various guest molecules are repeatedly self-repaired at room temperature. However, most of the works deal with hydrogels, and little attention has been paid for thermosetting resins as polyurethane, epoxy and unsaturated polyester resins. In this study, polyetherurethane networks (PUN-CD-Ads) incorporating cyclodextrin and adamantane moieties were prepared by the crosslinking reactions of β-cyclodextrin (CD), 1-adamantanol (AdOH), glycerol ethoxylate (GCE) and hexamethylene diisocyanate (HDI), and thermal, mechanical and self-healing properties of the polymer network films were investigated. Our attention was focused on the influences of molar ratio of CD/AdOH, GCE/CD and OH/NCO on the properties. The FT-IR, and gel fraction analysis revealed that the urethanization reaction smoothly progress to form polyurethane networks. When two cut pieces of the films were contacted at the cross-section at room temperature for 30 seconds, the two pieces adhered to produce a self-healed film. Especially, the PUN-CD-Ad prepared at GCE/CD = 5/1, CD/AdOH = 1/1, and OH/NCO = 1/1 film exhibited the highest healing efficiency for tensile strength. Most of the PUN-CD-Ads were successfully self-healed at room temperature.

Keywords: host-guest interaction, network polymer, polyurethane, self-healing

Procedia PDF Downloads 186
6142 The Maximum Throughput Analysis of UAV Datalink 802.11b Protocol

Authors: Inkyu Kim, SangMan Moon

Abstract:

This IEEE 802.11b protocol provides up to 11Mbps data rate, whereas aerospace industry wants to seek higher data rate COTS data link system in the UAV. The Total Maximum Throughput (TMT) and delay time are studied on many researchers in the past years This paper provides theoretical data throughput performance of UAV formation flight data link using the existing 802.11b performance theory. We operate the UAV formation flight with more than 30 quad copters with 802.11b protocol. We may be predicting that UAV formation flight numbers have to bound data link protocol performance limitations.

Keywords: UAV datalink, UAV formation flight datalink, UAV WLAN datalink application, UAV IEEE 802.11b datalink application

Procedia PDF Downloads 392
6141 The Effectiveness of Dialectical Behavior Therapy in Developing Emotion Regulation Skill for Adolescent with Intellectual Disability

Authors: Shahnaz Safitri, Rose Mini Agoes Salim, Pratiwi Widyasari

Abstract:

Intellectual disability is characterized by significant limitations in intellectual functioning and adaptive behavior that appears before the age of 18 years old. The prominent impacts of intellectual disability in adolescents are failure to establish interpersonal relationships as socially expected and lower academic achievement. Meanwhile, it is known that emotion regulation skills have a role in supporting the functioning of individual, either by nourishing the development of social skills as well as by facilitating the process of learning and adaptation in school. This study aims to look for the effectiveness of Dialectical Behavior Therapy (DBT) in developing emotion regulation skills for adolescents with intellectual disability. DBT's special consideration toward clients’ social environment and their biological condition is foreseen to be the key for developing emotion regulation capacity for subjects with intellectual disability. Through observations on client's behavior, conducted before and after the completion of DBT intervention program, it was found that there is an improvement in client's knowledge and attitudes related to the mastery of emotion regulation skills. In addition, client's consistency to actually practice emotion regulation techniques over time is largely influenced by the support received from the client's social circles.

Keywords: adolescent, dialectical behavior therapy, emotion regulation, intellectual disability

Procedia PDF Downloads 304
6140 A Multilevel Authentication Protocol: MAP in VANET for Human Safety

Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed

Abstract:

Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.

Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay

Procedia PDF Downloads 296
6139 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 115
6138 Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony

Authors: A. B. R. Hazarika

Abstract:

In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps.

Keywords: encryption, decryption, internet protocol, microwave, mobile telephony, quantum key encryption, quantum dots

Procedia PDF Downloads 173