Search results for: message splitting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 557

Search results for: message splitting

527 Effect of Noise Reduction Algorithms on Temporal Splitting of Speech Signal to Improve Speech Perception for Binaural Hearing Aids

Authors: Rajani S. Pujar, Pandurangarao N. Kulkarni

Abstract:

Increased temporal masking affects the speech perception in persons with sensorineural hearing impairment especially under adverse listening conditions. This paper presents a cascaded scheme, which employs a noise reduction algorithm as well as temporal splitting of the speech signal. Earlier investigations have shown that by splitting the speech temporally and presenting alternate segments to the two ears help in reducing the effect of temporal masking. In this technique, the speech signal is processed by two fading functions, complementary to each other, and presented to left and right ears for binaural dichotic presentation. In the present study, half cosine signal is used as a fading function with crossover gain of 6 dB for the perceptual balance of loudness. Temporal splitting is combined with noise reduction algorithm to improve speech perception in the background noise. Two noise reduction schemes, namely spectral subtraction and Wiener filter are used. Listening tests were conducted on six normal-hearing subjects, with sensorineural loss simulated by adding broadband noise to the speech signal at different signal-to-noise ratios (∞, 3, 0, and -3 dB). Objective evaluation using PESQ was also carried out. The MOS score for VCV syllable /asha/ for SNR values of ∞, 3, 0, and -3 dB were 5, 4.46, 4.4 and 4.05 respectively, while the corresponding MOS scores for unprocessed speech were 5, 1.2, 0.9 and 0.65, indicating significant improvement in the perceived speech quality for the proposed scheme compared to the unprocessed speech.

Keywords: MOS, PESQ, spectral subtraction, temporal splitting, wiener filter

Procedia PDF Downloads 314
526 Polystyrene Paste as a Substitute for a Portland Cement: A Solution to the Nigerian Dilemma

Authors: Lanre Oluwafemi Akinyemi

Abstract:

The reduction of limestone to cement in Nigeria is expensive and requires huge amounts of energy. This significantly affects the cost of cement. Concrete is heavy: a cubic foot of it weighs about 150 lbs. and a cubic yard is about 4000 lbs. Thus a ready-mix truck with 9 cubic yards is carrying 36,000 lbs excluding the weight of the truck itself, thereby accumulating cost for also manufacturers. Therein lies the need to find a substitute for cement by using the polystyrene paste that benefits both the manufactures and the consumers. Polystyrene Paste Constructional Cement (PPCC), a patented material obtained by dissolving Waste EPS in volatile organic solvent, has recently been identified as a suitable binder/cement for construction and building material production. This paper illustrates the procedures of a test experiment undertaken to determine the splitting tensile strength of PPCC mortar compared to that of OPC (Ordinary Portland Cement). Expanded polystyrene was dissolved in gasoline to form a paste referred to as Polystyrene Paste Constructional Cement (PPCC). Mortars of mix ratios 1:4, 1:5, 1:6, 1:7 (PPCC: fine aggregate) batched by volume were used to produce 50mm x 100mm cylindrical PPCC mortar splitting tensile strength specimens. The control experiment was done by creating another series of cylindrical OPC mortar splitting tensile strength specimens following the same mix ratio used earlier. The PPCC cylindrical splitting tensile strength specimens were left to air-set, and the ones made with Ordinary Portland Cement (OPC) were demoded after 24 hours and cured in water. The cylindrical PPCC splitting tensile strength specimens were tested at 28 days and compared with those of the Ordinary Portland cement splitting tensile strength specimens. The result shows that hence for this two mixes, PPCC exhibits a better binding property than the OPC. With this my new invention I recommend the use of PPCC as a substitute for a Portland cement.

Keywords: polystyrene paste, Portland cement, construction, mortar

Procedia PDF Downloads 144
525 How Message Framing and Temporal Distance Affect Word of Mouth

Authors: Camille Lacan, Pierre Desmet

Abstract:

In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth.

Keywords: construal levels, crowdfunding, message framing, word of mouth

Procedia PDF Downloads 240
524 Magnetic Field Effects on Parabolic Graphene Quantum Dots with Topological Defects

Authors: Defne Akay, Bekir S. Kandemir

Abstract:

In this paper, we investigate the low-lying energy levels of the two-dimensional parabolic graphene quantum dots (GQDs) in the presence of topological defects with long range Coulomb impurity and subjected to an external uniform magnetic field. The low-lying energy levels of the system are obtained within the framework of the perturbation theory. We theoretically demonstrate that a valley splitting can be controlled by geometrical parameters of the graphene quantum dots and/or by tuning a uniform magnetic field, as well as topological defects. It is found that, for parabolic graphene dots, the valley splitting occurs due to the introduction of spatial confinement. The corresponding splitting is enhanced by the introduction of a uniform magnetic field and it increases by increasing the angle of the cone in subcritical regime.

Keywords: coulomb impurity, graphene cones, graphene quantum dots, topological defects

Procedia PDF Downloads 283
523 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population

Authors: Colette Faucher

Abstract:

In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.

Keywords: military psychological operations, social identity, social network, emotion propagation

Procedia PDF Downloads 399
522 Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations

Authors: Karolina Ziembowicz, Andrzej Nowak

Abstract:

In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective.

Keywords: chat communication, online conversation, prosody, social synchronization, interaction incoherence, relationship building

Procedia PDF Downloads 133
521 Time Varying Crustal Anisotropy at Whakaari/White Island Volcano

Authors: M. Dagim Yoseph, M. K. Savage, A. D. Jolly, C. J. Ebinger

Abstract:

Whakaari/White Island has been the most active New Zealand volcano in the 21st century, producing small phreatic and phreatomagmatic eruptions, which are hard to predict. The most recent eruption occurred in 2019, tragically claiming the lives of 22 individuals and causing numerous injuries. We employed shear-wave splitting analyses to investigate variations in anisotropy between 2018 and 2020, during quiescence, unrest, and the eruption. We examined spatial and temporal variations in 3499 shear-wave splitting and 2656 V_p/V_s ratio measurements. Comparing shear-wave splitting parameters from similar earthquake paths across different times indicates that the observed temporal changes are unlikely to result from variations in earthquake paths through media with spatial variability. Instead, these changes may stem from variations in anisotropy over time, likely caused by changes in crack alignment due to stress or varying fluid content.

Keywords: background seismic waves, fast orientations, seismic anisotropy, V_p/V_s ratio

Procedia PDF Downloads 30
520 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 447
519 Evaluation of Fresh, Strength and Durability Properties of Self-Compacting Concrete Incorporating Bagasse Ash

Authors: Abdul Haseeb Wani, Shruti Sharma, Rafat Siddique

Abstract:

Self-compacting concrete is an engineered concrete that flows and de-airs without additional energy input. Such concrete requires a high slump which can be achieved by the addition of superplasticizers to the concrete mix. In the present work, bagasse ash is utilised as a replacement of cement in self-compacting concrete. This serves the purpose of both land disposal and environmental concerns related to the disposal of bagasse ash. Further, an experimental program was carried out to study the fresh, strength, and durability properties of self-compacting concrete made with bagasse ash. The mixes were prepared with four percentages (0, 5, 10 and 15) of bagasse ash as partial replacement of cement. Properties investigated were; Slump-flow, V-funnel and L-box, Compressive strength, Splitting tensile strength, Chloride-ion penetration resistance and Water absorption. Compressive and splitting tensile strength tests were conducted at the age of 7 and 28 days. Rapid chloride-ion permeability test was carried at the age of 28 days and water absorption test was carried out at the age of 7 days after initial curing of 28 days. Test results showed that there is an increase in the compressive strength and splitting tensile strength of the concrete specimens having up to 10% replacement level, however, there is a slight decrease at 15% level of replacement. Resistance to chloride-ion penetration of the specimens increased as the percentage of replacement was increased. The charge passed in all the specimens containing bagasse ash was lower than that of the specimen without bagasse ash. Water absorption of the specimens decreased up to 10% replacement level and increased at 15% level of replacement. Hence, it can be concluded that optimum level of replacement of cement with bagasse ash in self-compacting concrete comes out to be 10%; at which the self-compacting concrete has satisfactory flow characteristics (as per the European guidelines), improved compressive and splitting tensile strength and better durability properties as compared to the control mix.

Keywords: bagasse ash, compressive strength, self-compacting concrete, splitting tensile strength

Procedia PDF Downloads 344
518 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 440
517 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 398
516 Data Hiding in Gray Image Using ASCII Value and Scanning Technique

Authors: R. K. Pateriya, Jyoti Bharti

Abstract:

This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.

Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message

Procedia PDF Downloads 401
515 Effect of Time and Rate of Nitrogen Application on the Malting Quality of Barley Yield in Sandy Soil

Authors: A. S. Talaab, Safaa, A. Mahmoud, Hanan S. Siam

Abstract:

A field experiment was conducted during the winter season of 2013/2014 in the barley production area of Dakhala – New Valley Governorate, Egypt to assess the effect of nitrogen rate and time of N fertilizer application on barley grain yield, yield components and N use efficiency of barley and their association with grain yield. The treatments consisted of three levels of nitrogen (0, 70 and 100 kg N/acre) and five application times. The experiment was laid out as a randomized complete block design with three replication. Results revealed that barley grain yield and yield components increased significantly in response to N rate. Splitting N fertilizer amount at several times result in significant effect on grain yield, yield components, protein content and N uptake efficiency when compared with the entire N was applied at once. Application of N at rate of 100 kg N/acre resulted in accumulation of nitrate in the subsurface soil > 30cm. When N application timing considered, less NO3 was found in the soil profile with splitting N application compared with all preplans application.

Keywords: nitrogen use efficiency, splitting N fertilizer, barley, NO3

Procedia PDF Downloads 297
514 Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes

Authors: Kate Whitman, Zahra Murad, Joe Cox

Abstract:

Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages.

Keywords: piracy, reactance, persuasive-messages, TV/film, gender

Procedia PDF Downloads 78
513 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 383
512 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 321
511 CFD Simulation and Experimental Validation of the Bubble-Induced Flow during Electrochemical Water Splitting

Authors: Gabriel Wosiak, Jeyse da Silva, Sthefany S. Sena, Renato N. de Andrade, Ernesto Pereira

Abstract:

The bubble formation during hydrogen production by electrolysis and several electrochemical processes is an inherent phenomenon and can impact the energy consumption of the processes. In this work, it was reported both experimental and computational results describe the effect of bubble displacement, which, under the cases investigated, leads to the formation of a convective flow in the solution. The process is self-sustained, and a solution vortex is formed, which modifies the bubble growth and covering at the electrode surface. Using the experimental data, we have built a model to simulate it, which, with high accuracy, describes the phenomena. Then, it simulated many different experimental conditions and evaluated the effects of the boundary conditions on the bubble surface covering the surface. We have observed a position-dependent bubble covering the surface, which has an effect on the water-splitting efficiency. It was shown that the bubble covering is not uniform at the electrode surface, and using statistical analysis; it was possible to evaluate the influence of the gas type (H2 and O2), current density, and the bubble size (and cross-effects) on the covering fraction and the asymmetric behavior over the electrode surface.

Keywords: water splitting, bubble, electrolysis, hydrogen production

Procedia PDF Downloads 85
510 Chemical Fingerprinting of Complex Samples With the Aid of Parallel Outlet Flow Chromatography

Authors: Xavier A. Conlan

Abstract:

Speed of analysis is a significant limitation to current high-performance liquid chromatography/mass spectrometry (HPLC/MS) and ultra-high-pressure liquid chromatography (UHPLC)/MS systems both of which are used in many forensic investigations. The flow rate limitations of MS detection require a compromise in the chromatographic flow rate, which in turn reduces throughput, and when using modern columns, a reduction in separation efficiency. Commonly, this restriction is combated through the post-column splitting of flow prior to entry into the mass spectrometer. However, this results in a loss of sensitivity and a loss in efficiency due to the post-extra column dead volume. A new chromatographic column format known as 'parallel segmented flow' involves the splitting of eluent flow within the column outlet end fitting, and in this study we present its application in order to interrogate the provenience of methamphetamine samples with mass spectrometry detection. Using parallel segmented flow, column flow rates as high as 3 mL/min were employed in the analysis of amino acids without post-column splitting to the mass spectrometer. Furthermore, when parallel segmented flow chromatography columns were employed, the sensitivity was more than twice that of conventional systems with post-column splitting when the same volume of mobile phase was passed through the detector. These finding suggest that this type of column technology will particularly enhance the capabilities of modern LC/MS enabling both high-throughput and sensitive mass spectral detection.

Keywords: chromatography, mass spectrometry methamphetamine, parallel segmented outlet flow column, forensic sciences

Procedia PDF Downloads 475
509 Visual Intelligence: Perception, Image and Manipulation in Visual Communication

Authors: Poojitha Vemula

Abstract:

Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.

Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation

Procedia PDF Downloads 192
508 Long Term Strength Behavior of Hemp-Concrete

Authors: Elie Awwad, Bilal Hamad, Mounir Mabsout, Helmi Khatib

Abstract:

The paper reports test results on the long-term behavior of sustainable hemp-concrete material prepared in research work conducted at the American University of Beirut. The tests results are in terms of compressive and splitting tensile tests conducted on standard 150x300 mm cylinders. A control mix without fibers, one polypropylene-concrete mix, and ten hemp-concrete mixes were prepared with different percentages of industrial hemp fibers and reduced coarse aggregate contents. The objective was to investigate the strength properties of hemp-reinforced concrete at 1.5 years age as compared with control mixes. The results indicated that both the compressive strength and the splitting tensile strength results of all tested cylinders increased as compared with the 28-days values. Also, the difference between the hemp-concrete samples and the control samples at 28 days was maintained at 1.5 years age indicating that hemp fibers did not exhibit any negative effect on the long-term strength properties of concrete.

Keywords: hemp-reinforced concrete, natural fibers, compressive strength, splitting tensile strength

Procedia PDF Downloads 354
507 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 113
506 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

Authors: Che-Wei Lee, Bay-Erl Lai

Abstract:

A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.

Keywords: steganography, data hiding, secret authentication, secret sharing

Procedia PDF Downloads 230
505 Comparison of Physical and Chemical Properties of Micro-Silica and Locally Produced Metakaolin and Effect on the Properties of Concrete

Authors: S. U. Khan, T. Ayub, N. Shafiq

Abstract:

The properties of locally produced metakaolin (MK) as cement replacing material and the comparison of reactivity with commercially available micro-silica have been investigated. Compressive strength, splitting tensile strength, and load-deflection behaviour under bending are the properties that have been studied. The amorphous phase of MK with micro-silica was compared through X-ray diffraction (XRD) pattern. Further, interfacial transition zone of concrete with micro-silica and MK was observed through Field Emission Scanning Electron Microscopy (FESEM). Three mixes of concrete were prepared. One of the mix is without cement replacement as control mix, and the remaining two mixes are 10% cement replacement with micro-silica and MK. It has been found that MK, due to its irregular structure and amorphous phase, has high reactivity with portlandite in concrete. The compressive strength at early age is higher with MK as compared to micro-silica. MK concrete showed higher splitting tensile strength and higher load carrying capacity as compared to control and micro-silica concrete at all ages respectively.

Keywords: metakaolin, compressive strength, splitting tensile strength, load deflection, interfacial transition zone

Procedia PDF Downloads 195
504 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 378
503 Design of Photonic Crystal with Defect Layer to Eliminate Interface Corrugations for Obtaining Unidirectional and Bidirectional Beam Splitting under Normal Incidence

Authors: Evrim Colak, Andriy E. Serebryannikov, Pavel V. Usik, Ekmel Ozbay

Abstract:

Working with a dielectric photonic crystal (PC) structure which does not include surface corrugations, unidirectional transmission and dual-beam splitting are observed under normal incidence as a result of the strong diffractions caused by the embedded defect layer. The defect layer has twice the period of the regular PC segments which sandwich the defect layer. Although the PC has even number of rows, the structural symmetry is broken due to the asymmetric placement of the defect layer with respect to the symmetry axis of the regular PC. The simulations verify that efficient splitting and occurrence of strong diffractions are related to the dispersion properties of the Floquet-Bloch modes of the photonic crystal. Unidirectional and bi-directional splitting, which are associated with asymmetric transmission, arise due to the dominant contribution of the first positive and first negative diffraction orders. The effect of the depth of the defect layer is examined by placing single defect layer in varying rows, preserving the asymmetry of PC. Even for deeply buried defect layer, asymmetric transmission is still valid even if the zeroth order is not coupled. This transmission is due to evanescent waves which reach to the deeply embedded defect layer and couple to higher order modes. In an additional selected performance, whichever surface is illuminated, i.e., in both upper and lower surface illumination cases, incident beam is split into two beams of equal intensity at the output surface where the intensity of the out-going beams are equal for both illumination cases. That is, although the structure is asymmetric, symmetric bidirectional transmission with equal transmission values is demonstrated and the structure mimics the behavior of symmetric structures. Finally, simulation studies including the examination of a coupled-cavity defect for two different permittivity values (close to the permittivity values of GaAs or Si and alumina) reveal unidirectional splitting for a wider band of operation in comparison to the bandwidth obtained in the case of a single embedded defect layer. Since the dielectric materials that are utilized are low-loss and weakly dispersive in a wide frequency range including microwave and optical frequencies, the studied structures should be scalable to the mentioned ranges.

Keywords: asymmetric transmission, beam deflection, blazing, bi-directional splitting, defect layer, dual beam splitting, Floquet-Bloch modes, isofrequency contours, line defect, oblique incidence, photonic crystal, unidirectionality

Procedia PDF Downloads 175
502 Carbon Nitride Growth on ZnO Architectures for Enhanced Photoelectrochemical Water Splitting Application

Authors: Špela Hajduk, Sean P. Berglund, Matejka Podlogar, Goran Dražić, Fatwa F. Abdi, Zorica C. Orel, Menny Shalom

Abstract:

Graphitic carbon nitride materials (g-CN) have emerged as an attractive photocatalyst and electrocatalyst for photo and electrochemical water splitting reaction, due to their environmental benignity nature and suitable band gap. Many approaches were introduced to enhance the photoactivity and electronic properties of g-CN and resulted in significant changes in the electronic and catalytic properties. Here we demonstrate the synthesis of thin and homogenous g-CN layer on highly ordered ZnO nanowire (NW) substrate by growing a seeding layer of small supramolecular assemblies on the nanowires. The new synthetic approach leads to the formation of thin g-CN layer (~3 nm) without blocking all structure. Two different deposition methods of carbon nitride were investigated and will be presented. The amount of loaded carbon nitride significantly influences the PEC activity of hybrid material and all the ZnO/g-CNx electrodes show great improvement in photoactivity. The chemical structure, morphology and optical properties of the deposited g-CN were fully characterized by various techniques as X-ray powder spectroscopy (XRD), scanning electron microscopy (SEM), focused ion beam scanning electron microscopy (FIB-SEM), high-resolution scanning microscopy (HR-TEM) and X-ray photoelectron spectroscopy (XPS).

Keywords: carbon nitride, photoanode, solar water splitting, zinc oxide

Procedia PDF Downloads 182
501 Optical Bands Splitting in Tm₃Fe₅O₁₂ Thin Films

Authors: R. Vidyasagar, G. L. S. Vilela, B. M. Guiraldelli, A. B. Henriques, J. Moodera

Abstract:

Nano-scaled magnetic systems that can have both magnetic and optical transitions controlled and manipulated by external means have received enormous research attention for their potential applications in magneto-optics and spintronic devices. Among several ferrimagnetic insulators, the Tm₃Fe₅O₁₂ (TmIG) has become a prototype material displaying huge perpendicular magnetic anisotropy. Nevertheless, the optical properties of nano-scale TnIG films have not yet been investigated. We report the observation of giant splitting in the optical transitions of high-quality thin films of Tm₃Fe₅O₁₂ (TmIG) grown by rf sputtering on gadolinium gallium garnet substrates (GGG-111) substrate. The optical absorbance profiles measured with optical absorption spectroscopy show a dual optical transition in visible frequency regimes attributed to the transitions of electrons from the O-2p valence band to the Fe-3d conduction band and from the O-2p valence band to the Fe-2p⁵3d⁶ excitonic states at the Γ-symmetric point of the TmIG Brillouin zone. When the thickness of the film is reduced from 120 nm to 7.5 nm, the 1st optical transition energy shifted from 2.98 to 3.11 eV ( ~130 meV), and the 2nd transition energy shifted from 2.62 to 2.56 eV (~ 60 meV). The giant band splitting of both transitions can be attributed to the population of excited states associated with the atomic modification pertaining to the compressive or tensile strains.

Keywords: optical transitions, thin films, ferrimagnetic insulator, strains

Procedia PDF Downloads 30
500 Message Passing Neural Network (MPNN) Approach to Multiphase Diffusion in Reservoirs for Well Interconnection Assessments

Authors: Margarita Mayoral-Villa, J. Klapp, L. Di G. Sigalotti, J. E. V. Guzmán

Abstract:

Automated learning techniques are widely applied in the energy sector to address challenging problems from a practical point of view. To this end, we discuss the implementation of a Message Passing algorithm (MPNN)within a Graph Neural Network(GNN)to leverage the neighborhood of a set of nodes during the aggregation process. This approach enables the characterization of multiphase diffusion processes in the reservoir, such that the flow paths underlying the interconnections between multiple wells may be inferred from previously available data on flow rates and bottomhole pressures. The results thus obtained compare favorably with the predictions produced by the Reduced Order Capacitance-Resistance Models (CRM) and suggest the potential of MPNNs to enhance the robustness of the forecasts while improving the computational efficiency.

Keywords: multiphase diffusion, message passing neural network, well interconnection, interwell connectivity, graph neural network, capacitance-resistance models

Procedia PDF Downloads 133
499 Advanced Nanostructured Materials and Their Application for Solar Fuel

Authors: A. Hegazy, Ahmed Elsayed, Essam El Shenawy, N. Allam, Hala Handal, K. R. Mahmoud

Abstract:

Highly crystalline, TiO₂ pristine sub-10 nm anatase nanocrystals were fabricated at low temperatures by post hydrothermal treatment of the as-prepared TiO₂ nanoparticles. This treatment resulted in bandgap narrowing and increased photocurrent density value (3.8 mA/cm²) when this material was employed in water splitting systems. The achieved photocurrent values are among the highest reported ones so far for the fabricated nanoparticles at this low temperature. This might be explained by the increased surface defects of the prepared nanoparticles. It resulted in bandgap narrowing that was further investigated using positron annihilation experiments by measuring positron lifetime and Doppler broadening. Besides, homogeneous spherical TiO₂ nanoparticles were synthesized in large diameter and high surface area and the high percentage of (001) facet by sol-gel method using potassium persulfate (K₂S₂O₈) as an oxidizing agent. The fabricated particles exhibited high exposed surface area, high photoactivity and reduced band gap. Enhanced performance for water splitting applications was displayed by formed TiO₂ nanoparticles. Their morphological and structural properties were studied to optimize their synthesis parameters in an attempt to construct more applicable fuel cells in the industry for hydrogen fuel production.

Keywords: positron annihilation, solar energy, TiO2 nanoparticles, water splitting

Procedia PDF Downloads 126
498 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm

Authors: R. Kiruthika, A. Kannan

Abstract:

Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.

Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm

Procedia PDF Downloads 351