Search results for: panel regression techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10153

Search results for: panel regression techniques

3733 Chemical Reaction Method for Growing Uniform Photomechanical Organic Crystlas

Authors: Rabih O. Al-Kaysi, Lingyan Zhu, Muhannah K. Al-Muhannah, Christopher J. Bardeen

Abstract:

(E)-3-(Anthracen-9-yl)acrylic acid (9-AYAA) 1 exhibits a strong photomechanical response in bulk crystals but is challenging to grow in microcrystalline form. High quality microcrystals of this molecule could not be grown using techniques like sublimation, reprecipitation, and the floating drop method. If the tertbutyl ester of 9-AYAA is used as a starting material, however, high quality, size-uniform microwires could be grown via acid catalyzed hydrolysis. 9-AYAA microwires with uniform length and thickness were produced after a suspension of (E)-tert-butyl 3-(anthracen-9-yl)acrylate ester 2 microparticles was tumble-mixed in a mixture of phosphoric acid and sodium dodecyl sulfate at 35 °C. The dependence of the results on temperature, surfactant and precursor concentration, and mixing mode was investigated. This chemical reaction-growth method was extended to grow microplates of 9-anthraldehyde 3 using the corresponding acylal 4 as the starting material. Under 475 nm irradiation, the 9-AYAA microwires undergo a photoinduced coiling–uncoiling transition, while the 9-anthraldehyde microplates undergo a folding–unfolding transition.

Keywords: photomechanical, surfactant, organic crystals, uniform

Procedia PDF Downloads 391
3732 Spatial Assessment of Soil Contamination from Informal E-Waste Recycling Site in Agbogbloshie, Ghana

Authors: Kyere Vincent Nartey, Klaus Greve, Atiemo Sampson

Abstract:

E-waste is discarded electrical electronic equipment inclusive of all components, sub-assemblies and consumables which are part of the product at the time of discarding and known to contain both hazardous and valuable fractions. E-waste is recycled within the proposed ecological restoration of the Agbogbloshie enclave using crude and rudimental recycling procedures such as open burning and manual dismantling which result in pollution and contamination of soil, water and air. Using GIS, this study was conducted to examine the spatial distribution and extent of soil contamination by heavy metals from the e-waste recycling site in Agbogbloshie. From the month of August to November 2013, 146 soil samples were collected in addition to their coordinates using GPS. Elemental analysis performed on the collected soil samples using X-Ray fluorescence revealed over 30 elements including, Ni, Cr, Zn, Cu, Pb and Mn. Using geostatistical techniques in ArcGIS 10.1 spatial assessment and distribution maps were generated. Mathematical models or equations were used to estimate the degree of contamination and pollution index. Results from soil analysis from the Agbogbloshie enclave showed that levels of measured or observed elements were significantly higher than the Canadian EPA and Dutch environmental standards.

Keywords: e-waste, geostatistics, soil contamination, spatial distribution

Procedia PDF Downloads 503
3731 Prevalence and Associated Factors of Overweight and Obesity in Children with Intellectual Disability: A Cross-Sectional Study among Chinese Children

Authors: Jing-Jing Wang, Yang Gao, Heather H. M. Kwok, Wendy Y. J. Huang

Abstract:

Objectives: Intellectual disability (ID) ranks among the top 20 most costly disorders. A child with ID creates a wide set of challenges to the individual, family, and society, and overweight and obesity aggravate those challenges. People with ID have the right to attain optimal health like the rest of the population. They should be given priority to eliminate existing health inequities. Childhood obesity epidemic and associated factors among children, in general, has been well documented, while knowledge about overweight and obesity in children with ID is scarce. Methods: A cross-sectional study was conducted among 524 Chinese children with ID (males: 68.9%, mean age: 12.2 years) in Hong Kong in 2015. Children’s height and weight were measured at school. Parents, in the presence of their children, completed a self-administered questionnaire at home about the children’s physical activity (PA), eating habits, and sleep duration in a typical week as well as parenting practices regarding children’s eating and PA, and their socio-demographic characteristics. Multivariate logistic regression estimated the potential risk factors for children being overweight. Results: The prevalence of overweight and obesity in children with ID was 31.3%, which was higher than their general counterparts (18.7%-19.9%). Multivariate analyses revealed that the risk factors of overweight and obese in children with ID included: comorbidity with autism, the maternal side being overweight or obese, parenting practices with less pressure to eat more, children having shorter sleep duration, longer periods of sedentary behavior, and higher intake frequencies of sweetened food, fried food, and meats, fish, and eggs. Children born in other places, having snacks more frequently, and having irregular meals were also more likely to be overweight or obese, with marginal significance. Conclusions: Children with ID are more vulnerable to being overweight or obese than their typically developing counterparts. Identified risk factors in this study highlight a multifaceted approach to the involvement of parents as well as the modification of some children’s questionable behaviors to help them achieve a healthy weight.

Keywords: prevalence, risk factors, obesity, children with disability

Procedia PDF Downloads 123
3730 A Theorem Related to Sample Moments and Two Types of Moment-Based Density Estimates

Authors: Serge B. Provost

Abstract:

Numerous statistical inference and modeling methodologies are based on sample moments rather than the actual observations. A result justifying the validity of this approach is introduced. More specifically, it will be established that given the first n moments of a sample of size n, one can recover the original n sample points. This implies that a sample of size n and its first associated n moments contain precisely the same amount of information. However, it is efficient to make use of a limited number of initial moments as most of the relevant distributional information is included in them. Two types of density estimation techniques that rely on such moments will be discussed. The first one expresses a density estimate as the product of a suitable base density and a polynomial adjustment whose coefficients are determined by equating the moments of the density estimate to the sample moments. The second one assumes that the derivative of the logarithm of a density function can be represented as a rational function. This gives rise to a system of linear equations involving sample moments, the density estimate is then obtained by solving a differential equation. Unlike kernel density estimation, these methodologies are ideally suited to model ‘big data’ as they only require a limited number of moments, irrespective of the sample size. What is more, they produce simple closed form expressions that are amenable to algebraic manipulations. They also turn out to be more accurate as will be shown in several illustrative examples.

Keywords: density estimation, log-density, polynomial adjustments, sample moments

Procedia PDF Downloads 153
3729 Psychological Factors Predicting Social Distance during the COVID-19 Pandemic: An Empirical Investigation

Authors: Calogero Lo Destro

Abstract:

Numerous nations around the world are facing exceptional challenges in employing measures to stop the spread of COVID-19. Following the recommendations of the World Health Organization, a series of preventive measures have been adopted. However, individuals must comply with these rules and recommendations in order to make these measures effective. While COVID-19 was climaxing, it seemed of crucial importance to analyze which psychosocial factors contribute to the acceptance of such preventive behavior, thus favoring the management of COVID-19 worldwide health crisis. In particular, the identification of aspects related to obstacles and facilitation of adherence to social distancing has been considered crucial in the containment of the virus spread. Since the virus was firstly detected in China, Asian people could be considered a relevant outgroup targeted for exclusion. We also hypothesized social distance could be influenced by characteristics of the target, such as smiling or coughing. 260 participants participated in this research on a voluntary basis. They filled a survey designed to explore a series of COVID-19 measures (such as exposure to virus and fear of infection). We also assessed participants state and trait anxiety. The dependent variable was social distance, based on a measure of seating distance designed ad hoc for the present work. Our hypothesis that participants could report greater distance in response to Asian people was not confirmed. On the other hand, significantly lower distance in response to smiling compared to coughing targets was reported. Adopting a regression analysis model, we found that participants' social distance, in response to both coughing and smiling targets, was predicted by fear of infection and by the perception COVID-19 could become a pandemic. Social distance in response to the coughing target was also significantly and positively predicted by age and state anxiety. In summary, the present work has sought to identify a set of psychological variables, which may still be predictive of social distancing.

Keywords: COVID-19, social distancing, health, preventive behaviors, risk of infection

Procedia PDF Downloads 112
3728 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 121
3727 Mapping of Arenga Pinnata Tree Using Remote Sensing

Authors: Zulkiflee Abd Latif, Sitinor Atikah Nordin, Alawi Sulaiman

Abstract:

Different tree species possess different and various benefits. Arenga Pinnata tree species own several potential uses that is valuable for the economy and the country. Mapping vegetation using remote sensing technique involves various process, techniques and consideration. Using satellite imagery, this method enables the access of inaccessible area and with the availability of near infra-red band; it is useful in vegetation analysis, especially in identifying tree species. Pixel-based and object-based classification technique is used as a method in this study. Pixel-based classification technique used in this study divided into unsupervised and supervised classification. Object based classification technique becomes more popular another alternative method in classification process. Using spectral, texture, color and other information, to classify the target make object-based classification is a promising technique for classification. Classification of Arenga Pinnata trees is overlaid with elevation, slope and aspect, soil and river data and several other data to give information regarding the tree character and living environment. This paper will present the utilization of remote sensing technique in order to map Arenga Pinnata tree species

Keywords: Arenga Pinnata, pixel-based classification, object-based classification, remote sensing

Procedia PDF Downloads 359
3726 Irrigation Water Quality Evaluation Based on Multivariate Statistical Analysis: A Case Study of Jiaokou Irrigation District

Authors: Panpan Xu, Qiying Zhang, Hui Qian

Abstract:

Groundwater is main source of water supply in the Guanzhong Basin, China. To investigate the quality of groundwater for agricultural purposes in Jiaokou Irrigation District located in the east of the Guanzhong Basin, 141 groundwater samples were collected for analysis of major ions (K+, Na+, Mg2+, Ca2+, SO42-, Cl-, HCO3-, and CO32-), pH, and total dissolved solids (TDS). Sodium percentage (Na%), residual sodium carbonate (RSC), magnesium hazard (MH), and potential salinity (PS) were applied for irrigation water quality assessment. In addition, multivariate statistical techniques were used to identify the underlying hydrogeochemical processes. Results show that the content of TDS mainly depends on Cl-, Na+, Mg2+, and SO42-, and the HCO3- content is generally high except for the eastern sand area. These are responsible for complex hydrogeochemical processes, such as dissolution of carbonate minerals (dolomite and calcite), gypsum, halite, and silicate minerals, the cation exchange, as well as evaporation and concentration. The average evaluation levels of Na%, RSC, MH, and PS for irrigation water quality are doubtful, good, unsuitable, and injurious to unsatisfactory, respectively. Therefore, it is necessary for decision makers to comprehensively consider the indicators and thus reasonably evaluate the irrigation water quality.

Keywords: irrigation water quality, multivariate statistical analysis, groundwater, hydrogeochemical process

Procedia PDF Downloads 128
3725 SPR Immunosensor for the Detection of Staphylococcus aureus

Authors: Muhammad Ali Syed, Arshad Saleem Bhatti, Chen-zhong Li, Habib Ali Bokhari

Abstract:

Surface plasmon resonance (SPR) biosensors have emerged as a promising technique for bioanalysis as well as microbial detection and identification. Real time, sensitive, cost effective, and label free detection of biomolecules from complex samples is required for early and accurate diagnosis of infectious diseases. Like many other types of optical techniques, SPR biosensors may also be successfully utilized for microbial detection for accurate, point of care, and rapid results. In the present study, we have utilized a commercially available automated SPR biosensor of BI company to study the microbial detection form water samples spiked with different concentration of Staphylococcus aureus bacterial cells. The gold thin film sensor surface was functionalized to react with proteins such as protein G, which was used for directed immobilization of monoclonal antibodies against Staphylococcus aureus. The results of our work reveal that this immunosensor can be used to detect very small number of bacterial cells with higher sensitivity and specificity. In our case 10^3 cells/ml of water have been successfully detected. Therefore, it may be concluded that this technique has a strong potential to be used in microbial detection and identification.

Keywords: surface plasmon resonance (SPR), Staphylococcus aureus, biosensors, microbial detection

Procedia PDF Downloads 461
3724 The Association between Antimicrobial Usage and Biosecurity Practices on Commercial Chicken Farms in Bangladesh

Authors: Tasneem Imam, Justine S. Gibson, Mohammad Foysal, Shetu B. Das, Rashed Mahmud, Suman D. Gupta, Ahasanul Hoque, Guillaume Fournie, Joerg Henning

Abstract:

Commercial chicken production is an import livestock industry in Bangladesh. Antimicrobials are commonly used to control and prevent infectious diseases. It was hypothesized that inadequate biosecurity practices might promote antimicrobial usage on commercial chicken farms. A cross-sectional study was carried out to evaluate antimicrobial usage and farm biosecurity practices implemented on 57 layer and 83 broiler farms in eight sub-districts of the Chattogram district in Bangladesh. A questionnaire was used to collect data on antimicrobial usage and biosecurity practices on these farms. A causal framework was used to guide the development of a multi-level mixed-effects logistic regression analysis to evaluate the total and direct effects of practiced biosecurity management on prophylactic and therapeutic administration of antimicrobials. A total of 24 antimicrobials were administered in the current production cycle at the time of the survey. The most administered antimicrobials on layer farms were ciprofloxacin (37.0% of farms), amoxicillin (33.3%), and tiamulin (31.5%); however, on broiler farms, colistin (56.6% of farms), doxycycline (50.6%), and neomycin (38.6%) were most used. Only 15.3% of commercial farmers used antimicrobials entirely for therapeutic purposes, whereas 84.7% administered antimicrobials prophylactically. Inadequate biosecurity practices were more common among commercial broiler farmers compared to layer farmers. For example, only 2.4% of broiler farmers used footbaths before entering sheds compared to 22.2% of the layer farmers (p < 0.001). Farms that used antimicrobials only for therapeutic purposes (vs prophylactic) implemented more frequently adequate disease control measures, such as separating sick birds from healthy birds. This research highlighted that the prophylactic application of antimicrobials is often conducted to substitute poor biosecurity practices on commercial chicken farms. Awareness programs for farmers are crucial to inform them about the risk associated with antimicrobial usage and to highlight the economic benefits of implementing cost-effective biosecurity measures to control infectious poultry diseases.

Keywords: antimicrobial, biosecurity, broiler, layer

Procedia PDF Downloads 147
3723 Diabetes Diagnosis Model Using Rough Set and K- Nearest Neighbor Classifier

Authors: Usiobaifo Agharese Rosemary, Osaseri Roseline Oghogho

Abstract:

Diabetes is a complex group of disease with a variety of causes; it is a disorder of the body metabolism in the digestion of carbohydrates food. The application of machine learning in the field of medical diagnosis has been the focus of many researchers and the use of recognition and classification model as a decision support tools has help the medical expert in diagnosis of diseases. Considering the large volume of medical data which require special techniques, experience, and high diagnostic skill in the diagnosis of diseases, the application of an artificial intelligent system to assist medical personnel in order to enhance their efficiency and accuracy in diagnosis will be an invaluable tool. In this study will propose a diabetes diagnosis model using rough set and K-nearest Neighbor classifier algorithm. The system consists of two modules: the feature extraction module and predictor module, rough data set is used to preprocess the attributes while K-nearest neighbor classifier is used to classify the given data. The dataset used for this model was taken for University of Benin Teaching Hospital (UBTH) database. Half of the data was used in the training while the other half was used in testing the system. The proposed model was able to achieve over 80% accuracy.

Keywords: classifier algorithm, diabetes, diagnostic model, machine learning

Procedia PDF Downloads 324
3722 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 140
3721 Sperm Flagellum Center-Line Tracing in 4D Stacks Using an Iterative Minimal Path Method

Authors: Paul Hernandez-Herrera, Fernando Montoya, Juan Manuel Rendon, Alberto Darszon, Gabriel Corkidi

Abstract:

Intracellular calcium ([Ca2+]i) regulates sperm motility. The analysis of [Ca2+]i has been traditionally achieved in two dimensions while the real movement of the cell takes place in three spatial dimensions. Due to optical limitations (high speed cell movement and low light emission) important data concerning the three dimensional movement of these flagellated cells had been neglected. Visualizing [Ca2+]i in 3D is not a simple matter since it requires complex fluorescence microscopy techniques where the resulting images have very low intensity and consequently low SNR (Signal to Noise Ratio). In 4D sequences, this problem is magnified since the flagellum oscillates (for human sperm) at least at an average frequency of 15 Hz. In this paper, a novel approach to extract the flagellum’s center-line in 4D stacks is presented. For this purpose, an iterative algorithm based on the fast-marching method is proposed to extract the flagellum’s center-line. Quantitative and qualitative results are presented in a 4D stack to demonstrate the ability of the proposed algorithm to trace the flagellum’s center-line. The method reached a precision and recall of 0.96 as compared with a semi-manual method.

Keywords: flagellum, minimal path, segmentation, sperm

Procedia PDF Downloads 272
3720 Internal Power Recovery in Cryogenic Cooling Plants Part I: Expander Development

Authors: Ambra Giovannelli, Erika Maria Archilei

Abstract:

The amount of the electrical power required by refrigeration systems is relevant worldwide. It is evaluated in the order of 15% of the total electricity production taking refrigeration and air-conditioning into consideration. For this reason, in the last years several energy saving techniques have been proposed to reduce the power demand of such plants. The paper deals with the development of an innovative internal recovery system for cryogenic cooling plants. Such a system consists in a Compressor-Expander Group (CEG) designed on the basis of the automotive turbocharging technology. In particular, the paper is focused on the design of the expander, the critical component of the CEG system. Due to the low volumetric flow entering the expander and the high expansion ratio, a commercial turbocharger expander wheel was strongly modified. It was equipped with a transonic nozzle, designed to have a radially inflow full admission. To verify the performance of such a machine and suggest improvements, two different set of nozzles have been designed and modelled by means of the commercial Ansys-CFX software. steady-state 3D CFD simulations of the second-generation prototype are presented and compared with the initial ones.

Keywords: vapour cCompression systems, energy saving, refrigeration plant, organic fluids, radial turbine

Procedia PDF Downloads 195
3719 An Overview of Bioclimatic Design Strategies for Energy Efficient Buildings: A Case Study of Semi-Arid Climate, Lahore

Authors: Beenish Mujahid, Sana Malik

Abstract:

Bioclimatic design Strategies plays a dynamic role in construction of Sustainable Buildings. This approach leads to reduction in the mechanical cooling of building which provides comfort to the occupants in sustainable manner. Such bioclimatic measures provide a complete framework of building design through responding to climatic features of particular site. The featured Passive cooling techniques for hot climatic region provides comfortable indoor temperature with ecological and financial benefits. The study is based on highlighting this approach to produce energy efficient buildings for Semi-Arid climate like Lahore, Pakistan. Being part of developing country, energy savings in Lahore city would help the Power Sector and resolves the World Issues of Global Warming and Ozone Layer Depletion. This article reviews the bioclimatic design strategies and their critical analysis to drive guidelines for Sustainable buildings in Lahore. The study shows that the demand for mechanical cooling systems including air conditioning, fans, and air coolers can be reduced through regional climatic design.

Keywords: bioclimatic design, buildings, comfort, energy efficient, Lahore

Procedia PDF Downloads 247
3718 Development of a Microfluidic Device for Low-Volume Sample Lysis

Authors: Abbas Ali Husseini, Ali Mohammad Yazdani, Fatemeh Ghadiri, Alper Şişman

Abstract:

We developed a microchip device that uses surface acoustic waves for rapid lysis of low level of cell samples. The device incorporates sharp-edge glass microparticles for improved performance. We optimized the lysis conditions for high efficiency and evaluated the device's feasibility for point-of-care applications. The microchip contains a 13-finger pair interdigital transducer with a 30-degree focused angle. It generates high-intensity acoustic beams that converge 6 mm away. The microchip operates at a frequency of 16 MHz, exciting Rayleigh waves with a 250 µm wavelength on the LiNbO3 substrate. Cell lysis occurs when Candida albicans cells and glass particles are placed within the focal area. The high-intensity surface acoustic waves induce centrifugal forces on the cells and glass particles, resulting in cell lysis through lateral forces from the sharp-edge glass particles. We conducted 42 pilot cell lysis experiments to optimize the surface acoustic wave-induced streaming. We varied electrical power, droplet volume, glass particle size, concentration, and lysis time. A regression machine-learning model determined the impact of each parameter on lysis efficiency. Based on these findings, we predicted optimal conditions: electrical signal of 2.5 W, sample volume of 20 µl, glass particle size below 10 µm, concentration of 0.2 µg, and a 5-minute lysis period. Downstream analysis successfully amplified a DNA target fragment directly from the lysate. The study presents an efficient microchip-based cell lysis method employing acoustic streaming and microparticle collisions within microdroplets. Integration of a surface acoustic wave-based lysis chip with an isothermal amplification method enables swift point-of-care applications.

Keywords: cell lysis, surface acoustic wave, micro-glass particle, droplet

Procedia PDF Downloads 66
3717 Military Leadership: Emotion Culture and Emotion Coping in Morally Stressful Situations

Authors: Sofia Nilsson, Alicia Ohlsson, Linda-Marie Lundqvist, Aida Alvinius, Peder Hyllengren, Gerry Larsson

Abstract:

In irregular warfare contexts, military personnel are often presented with morally ambiguous situations where they are aware of the morally correct choice but may feel prevented to follow through with it due to organizational demands. Moral stress and/or injury can be the outcome of the individual’s experienced dissonance. These types of challenges put a large demand on the individual to manage their own emotions and the emotions of others, particularly in the case of a leader. Both the ability and inability for emotional regulation can result in different combinations of short and long term reactions after morally stressful events, which can be either positive or negative. Our study analyzed the combination of these reactions based upon the types of morally challenging events that were described by the subjects. 1)What institutionalized norms concerning emotion regulation are favorable in short-and long-term perspectives after a morally stressful event? 2)What individual emotion-focused coping strategies are favorable in short-and long-perspectives after a morally stressful? To address these questions, we conducted a quantitative study in military contexts in Sweden and Norway on upcoming or current military officers (n=331). We tested a theoretical model built upon a recently developed qualitative study. The data was analyzed using factor analysis, multiple regression analysis and subgroup analyses. The results indicated that an individual’s restriction of emotion in order to achieve an organizational goal, which results in emotional dissonance, can be an effective short term strategy for both the individual and the organization; however, it appears to be unfavorable in a long-term perspective which can result in negative reactions. Our results are intriguing because they showed an increased percentage of reported negative long term reactions (13%), which indicated PTSD-related symptoms in comparison to previous Swedish studies which indicated lower PTSD symptomology.

Keywords: emotion culture, emotion coping, emotion management, military

Procedia PDF Downloads 582
3716 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 376
3715 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 59
3714 Influence of Pressure from Compression Textile Bands: Their Using in the Treatment of Venous Human Leg Ulcers

Authors: Bachir Chemani, Rachid Halfaoui

Abstract:

The aim of study was to evaluate pressure distribution characteristics of the elastic textile bandages using two instrumental techniques: a prototype Instrument and a load Transference. The prototype instrument which simulates shape of real leg has pressure sensors which measure bandage pressure. Using this instrument, the results show that elastic textile bandages presents different pressure distribution characteristics and none produces a uniform distribution around lower limb. The load transference test procedure is used to determine whether a relationship exists between elastic textile bandage structure and pressure distribution characteristics. The test procedure assesses degree of load, directly transferred through a textile when loads series are applied to bandaging surface. A range of weave fabrics was produced using needle weaving machine and a sewing technique. A textile bandage was developed with optimal characteristics far superior pressure distribution than other bandages. From results, we find that theoretical pressure is not consistent exactly with practical pressure. It is important in this study to make a practical application for specialized nurses in order to verify the results and draw useful conclusions for predicting the use of this type of elastic band.

Keywords: textile, cotton, pressure, venous ulcers, elastic

Procedia PDF Downloads 348
3713 Application of Container Technique to High-Risk Children: Its Effect on Their Levels of Stress, Anxiety and Depression

Authors: Nguyen Thi Loan, Phan Ngoc Thanh Tra

Abstract:

Container is one of the techniques used in Eye Movement Desensitization and Reprocessing (EDMR) Therapy. This paper presents the positive results of applying Container technique to “high risk children”. The sample for this research is composed of 60 “high risk children” whose ages range from 11 to 18 years old, housed in Ho Chi Minh City Youth Center. They have been under the program of the Worldwide Orphans Foundation since August 2015 for various reasons such as, loss of parents, anti-social behaviors, homelessness, child labor among others. These “high risk children” are under high levels of stress, anxiety and depression. The subjects were divided into two groups: the control and the experimental with 30 members each. The experimental group was applied Container Technique and the instruments used to measure their levels of stress, anxiety, and depression are DASS-42 and ASEBA. Results show that after applying the Container Technique to the experimental group, there are significant differences between the two groups’ levels of stress, anxiety and depression. The experimental group’s levels of stress, anxiety and depression decreased significantly. The results serve as a basis for the researchers to make an appeal to psychologists to apply Container Technique in doing psychological treatment in a suitable context.

Keywords: anxiety, depression, container technique, EMDR

Procedia PDF Downloads 287
3712 Age Related Changes in the Neural Substrates of Emotion Regulation: Mechanisms, Consequences, and Interventions

Authors: Yasaman Mohammadi

Abstract:

Emotion regulation is a complex process that allows individuals to manage and modulate their emotional responses in order to adaptively respond to environmental demands. As individuals age, emotion regulation abilities may decline, leading to an increased vulnerability to mood disorders and other negative health outcomes. Advances in neuroimaging techniques have greatly enhanced our understanding of the neural substrates underlying emotion regulation and age-related changes in these neural systems. Additionally, genetic research has identified several candidate genes that may influence age-related changes in emotion regulation. In this paper, we review recent findings from neuroimaging and genetic research on age-related changes in the neural substrates of emotion regulation, highlighting the mechanisms and consequences of these changes. We also discuss potential interventions, including cognitive and behavioral approaches, that may be effective in mitigating age-related declines in emotion regulation. We propose that a better understanding of the mechanisms underlying age-related changes in emotion regulation may lead to the development of more targeted interventions aimed at promoting healthy emotional functioning in older adults. Overall, this paper highlights the importance of studying age-related changes in emotion regulation and provides a roadmap for future research in this field.

Keywords: emotion regulation, aging, neural substrates, neuroimaging, emotional functioning, healthy aging

Procedia PDF Downloads 93
3711 Enhanced Decolourization and Biodegradation of Textile Azo and Xanthene Dyes by Using Bacterial Isolates

Authors: Gimhani Madhushika Hewayalage, Thilini Ariyadasa, Sanja Gunawardena

Abstract:

In Sri Lanka, the largest contribution for the industrial export earnings is governed by textile and apparel industry. However, this industry generates huge quantities of effluent consists of unfixed dyes which enhance the effluent colour and toxicity thereby leading towards environmental pollution. Therefore, the effluent should properly be treated prior to the release into the environment. The biological technique has now captured much attention as an environmental-friendly and cost-competitive effluent decolourization method due to the drawbacks of physical and chemical treatment techniques. The present study has focused on identifying dye decolourizing potential of several bacterial isolates obtained from the effluent of the local textile industry. Yellow EXF, Red EXF, Blue EXF, Nova Black WNN and Nylosan-Rhodamine-EB dyes have been selected for the study to represent different chromophore groups such as Azo and Xanthene. The rates of decolorization of each dye have been investigated by employing distinct bacterial isolates. Bacterial isolate which exhibited effective dye decolorizing potential was identified as Proteus mirabilis using 16S rRNA gene sequencing analysis. The high decolorizing rates of identified bacterial strain indicate its potential applicability in the treatment of dye-containing wastewaters.

Keywords: azo, bacterial, biological, decolourization, xanthene

Procedia PDF Downloads 241
3710 An Efficient FPGA Realization of Fir Filter Using Distributed Arithmetic

Authors: M. Iruleswari, A. Jeyapaul Murugan

Abstract:

Most fundamental part used in many Digital Signal Processing (DSP) application is a Finite Impulse Response (FIR) filter because of its linear phase, stability and regular structure. Designing a high-speed and hardware efficient FIR filter is a very challenging task as the complexity increases with the filter order. In most applications the higher order filters are required but the memory usage of the filter increases exponentially with the order of the filter. Using multipliers occupy a large chip area and need high computation time. Multiplier-less memory-based techniques have gained popularity over past two decades due to their high throughput processing capability and reduced dynamic power consumption. This paper describes the design and implementation of highly efficient Look-Up Table (LUT) based circuit for the implementation of FIR filter using Distributed arithmetic algorithm. It is a multiplier less FIR filter. The LUT can be subdivided into a number of LUT to reduce the memory usage of the LUT for higher order filter. Analysis on the performance of various filter orders with different address length is done using Xilinx 14.5 synthesis tool. The proposed design provides less latency, less memory usage and high throughput.

Keywords: finite impulse response, distributed arithmetic, field programmable gate array, look-up table

Procedia PDF Downloads 448
3709 Role of Web Graphics and Interface in Creating Visitor Trust

Authors: Pramika J. Muthya

Abstract:

This paper investigates the impact of web graphics and interface design on building visitor trust in websites. A quantitative survey approach was used to examine how aesthetic and usability elements of website design influence user perceptions of trustworthiness. 133 participants aged 18-25 who live in urban Bangalore and engage in online transactions were recruited via convenience sampling. Data was collected through an online survey measuring trust levels based on website design, using validated constructs like the Visual Aesthetic of Websites Inventory (VisAWI). Statistical analysis, including ordinal regression, was conducted to analyze the results. The findings show a statistically significant relationship between web graphics and interface design and the level of trust visitors place in a website. The goodness-of-fit statistics and highly significant model fitting information provide strong evidence for rejecting the null hypothesis of no relationship. Well-designed visual aesthetics like simplicity, diversity, colorfulness, and craftsmanship are key drivers of perceived credibility. Intuitive navigation and usability also increase trust. The results emphasize the strategic importance for companies to invest in appealing graphic design, consistent with existing theoretical frameworks. There are also implications for taking a user-centric approach to web design and acknowledging the reciprocal link between pre-existing user trust and perception of visuals. While generalizable, limitations include possible sampling and self-report biases. Further research can build on these findings to deepen understanding of nuanced cultural and temporal factors influencing online trust. Overall, this study makes a significant contribution by providing empirical evidence that reinforces the crucial impact of thoughtful graphic design in fostering lasting user trust in websites.

Keywords: web graphics, interface design, visitor trust, website design, aesthetics, user experience, online trust, visual design, graphic design, user perceptions, user expectations

Procedia PDF Downloads 41
3708 Intestacy and Business Continuity among Entrepreneurs in Ondo State, Nigeria

Authors: Igbekoyi Olusola Esther, Olurankinse Felix

Abstract:

This paper examined the factors that militate against Will writing among entrepreneurs in Ondo State Nigeria and the effect of intestate death on business continuity after the exit of the entrepreneurs. The paper was written with a view to providing information on the reasons why intestate death is common among entrepreneurs in Ondo State and the effects on continuity of business after death of the initial owners. Data were obtained from primary source through the administration of questionnaires to entrepreneurs drawn from 50 registered manufacturing companies. These companies have been in existence for a minimum of 10 years with minimum staff strength of 20 workers each. These companies were selected using the purposive random sampling technique in order to capture firms that meet the requirements of this paper. Data obtained were analyzed using descriptive statistics, chi-square and regression analysis. The findings of the paper revealed that administration of Will, traditional beliefs, Will execution procedures, age and non- admissibility of Wills in court are the major factors that militates against Will writing among entrepreneurs in Ondo State. It was also discovered that chaos and instability in business, reduction in sales and productivity, poor succession planning, polygamous nature of marriages, difficulty in sourcing for funds and gender preference are joint predictors of business continuity in event intestate death which is evident in the result where R2 =.954;(F 6, 26)= 89.644; (P < 0.01). The individual beta co-efficient, t- statistics and significance of each variable revealed that gender preference (.735; 7.031; .000) and poor succession plan (.402; 2.840; .009) have significant positive effect on business continuity; while reduction in sales and productivity (-.059; -.335; .740) and difficulty in sourcing for funds (-.217; -1.367; .188) have negative effect; other variables also have positive relationship but they are not significant. It is therefore concluded that business continuity after the exit of the entrepreneur is highly dependent on the rebuilding of confidence on Wills administration in ondo state Nigeria, proper succession planning and elimination of gender preferences.

Keywords: intestacy, business continuity, entrepreneurs, will, succession planning

Procedia PDF Downloads 316
3707 Gender Equality and Career Opportunities among Female Civil Servants for Better Public Services in West Java, Indonesia

Authors: Nefi Aris Ambar Asmara

Abstract:

This paper discusses gender equality and career opportunities among female civil servants for better public services in a regency in West Java, Indonesia. Those two areas have not been considered comprehensively in terms of the goals of gender equality and career opportunities. The purposes of this paper are to describe (1) the number of available positions in relation to the number of female civil servants, (2) the socio-cultural outlook on female civil servants in relation to gender equality and career opportunities, and (3) socio-cultural views on gender equality and a career in politics. To achieve these three objectives, this paper used a qualitative approach with survey and interview techniques. The results showed that (1) only 37% of the official positions were presided by female civil servants. In contrast, male civil servants occupy 63% of the available positions, (2) the sociocultural view of female civil servants affirms that they are still regarded as male companions; (3) in addition, female civil servants do not need to compete with gender opponents, including the fact that women enter politics because the political world is considered dirty for women.

Keywords: gender equality, career opportunities, female civil servants, Indonesia

Procedia PDF Downloads 128
3706 Gender Equality and Career Opportunities Among Female Civil Servants for Better Public Services in West Java - Indonesia

Authors: Nefi Aris Ambar Asmara

Abstract:

This paper discusses gender equality and career opportunities among female civil servants for better public services in a regency in West Java, Indonesia. Those two areas have not been considered comprehensively in terms of the goals of gender equality and career opportunities. The purposes of this paper are to describe (1) the number of available positions in relation to the number of female civil servants, (2) the socio-cultural outlook on female civil servants in relation to gender equality and career opportunities and (3) socio-cultural views on gender equality and a career in politics. To achieve these three objectives, this paper used a qualitative approach with survey and interview techniques. The results showed that (1) only 37% of the official positions were presided by female civil servants. In contrast, male civil servants occupy 63% of the available positions, (2) the sociocultural view of female civil servants affirms that they are still regarded as male companions; (3) in addition, female civil servants do not need to compete with gender opponents, including the fact that women enter politics because the political world is considered dirty for women.

Keywords: gender equality, career opportunities, female civil servants, indonesia

Procedia PDF Downloads 71
3705 Local and Systemic Complications after Resection of Rectal Cancer in the Department of General and Abdominal Surgery University Clinical Center Maribor between 2004 and 2014

Authors: Nuhi Arslani, Stojan Potrc, Timotej Mikuljan

Abstract:

Background: In Department of Abdominal and General Surgery of University Medical Centre Maribor, we treated 578 patients for rectal cancer between 2004 and 2014. During and after treatment we especially concentrated on monitoring local and systemic complications. Methods: For analysis, we used data gathered from preoperative diagnostic tests, reports gathered during operation, reports from the pathohistologic review, and reports on complications after surgery and follow up. Results: In the case of 573 (out of 578) patients (99.1%) we performed resection. R0 was achieved in 551 patients (96,1%). R1 was achieved in 8 patients (1,4%). R2 was achieved in 14 patients (2,4%). Local complications were reported in 78 (13.5%) patients and systemic complications were reported in 68 (11.7%). We would like to point out the low number of local and systemic complications. Conclusions: With advances in surgical techniques, with a multimodal-multidisciplinary approach and with the use of total mesorectal excision we experienced a significant improvement in reducing the number of local and systemic complications in patients with rectal cancer. However, there still remains the question for truly optimal care for each patient with rectal cancer and his quality of life after surgical treatment.

Keywords: local complications, rectal cancer, resection, systemic complications

Procedia PDF Downloads 149
3704 Insecurity and Insurgency on Economic Development of Nigeria

Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi

Abstract:

Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.

Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria

Procedia PDF Downloads 88