Search results for: blind signature protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1611

Search results for: blind signature protocol

981 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters

Authors: Shaban Guma, Naim Bajcinca

Abstract:

We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.

Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless

Procedia PDF Downloads 329
980 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 143
979 An Unusual Presentation of Uveal Melanoma

Authors: Natasha Goh, Sebastian Brown

Abstract:

Purpose: This case report describes an unusual presentation of uveal melanoma. Method: Case notes, imaging, and histopathological specimen were reviewed for this case report. Result: The patient is a 62-year-old lady of Chinese heritage who had been receiving follow-up at the eye clinic of a tertiary hospital. She had a longstanding history of poor vision in her right eye after sustaining trauma to the eye at age 3. She was found to have a carotid-cavernous sinus fistula in the right eye in 2009 and underwent stenting in China. Unfortunately, this was unsuccessful and resulted in a painful blind eye. She had represented with headaches, worsening eye pain, and ptosis in Sydney in 2016. Her CT angiogram showed a calcified vascular structure in the orbit and globe, and she was offered a digital subtraction angiography by the neurosurgical team, which she ultimately declined. She had since been followed up at the eye clinic for the pthisical eye. Due to chronic ocular pain and recurrent conjunctivitis, the decision was made for an evisceration in 2021. The specimen was sent for routine histopathological examination and returned positive for uveal melanoma. The patient was subsequently referred to a melanoma center for further follow-up, which comprised serial imaging and radiotherapy treatment. Conclusion: Clinicians should bear in mind that uveal melanomas may present in a longstanding phthisical eye and in patients with no or little apparent risk factors.

Keywords: uveal melanoma, pthisical eye, carotid cavernous fistula, uveal melanoma risk factors

Procedia PDF Downloads 80
978 Synthesis, Molecular Docking, and Cytotoxic Activity of Novel Triazolopyridazine Derivatives

Authors: Azza T. Tahera, Eman M. Ahmeda, Nadia A. Khalila, Yassin M. Nissanb

Abstract:

New 3-(pyridin-4-yl)-[1,2,4] triazolo [4,3-b] pyridazine derivatives 2a-i, 4a,b and 6a,b were designed, synthesized and evaluated as cytotoxic agents. All compounds were investigated for their in vitro cytotoxicity at a single dose 10-5M concentration towards 60 cancer cell lines according to USA NCI protocol. The preliminary screening results showed that the majority of tested compounds exhibited remarkable activity against SR (leukemia) cell panel. Molecular docking for all synthesized compounds was performed on the active site of c-Met kinase. The most active compounds, 2f and 4a were further evaluated at a seven dose level screening and their IC50 as a c-Met kinase inhibitors were determined in vitro.

Keywords: triazolopyridazines, pyridazines, cytotoxic activity, cell panel

Procedia PDF Downloads 532
977 Bile Salt Induced Microstructural Changes of Gemini Surfactant Micelles

Authors: Vijaykumar Patel, P. Bahadur

Abstract:

Microstructural evolution of a cationic gemini surfactant 12-4-12 micelles in the presence of bile salts has been investigated using different techniques. A negative value of interaction parameter evaluated from surface tension measurements is a signature of strong synergistic interaction between oppositely charged surfactants. Both the bile salts compete with each other in inducing the micellar transition of 12-4-12 micelles depending on their hydrophobicity. Viscosity measurements disclose that loading of bile salts induces morphological changes in 12-4-12 micelles; sodium deoxycholate is more efficient in altering the aggregation behaviour of 12-4-12 micelles compared to sodium cholate and presents pronounced increase in viscosity and micellar growth which is suppressed at elevated temperatures. A remarkable growth of 12-4-12 micelles in the presence of sodium deoxycholate at low pH has been ascribed to the solubilization of bile acids formed in acidic medium. Small angle neutron scattering experiments provided size and shape of 12-4-12/bile salt mixed micelles are explicated on the basis of hydrophobicity of bile salts. The location of bile salts in micelle was determined from nuclear overhauser effect spectroscopy. The present study characterizes 12-4-12 gemini-bile salt mixed systems which significantly enriches our knowledge, and such a structural transition provides an opportunity to use these bioamphiphiles as delivery vehicles and in some pharmaceutical formulations.

Keywords: gemini surfactants, bile salts, SANS (small angle neutron scattering), NOESY (nuclear overhauser effect spectroscopy)

Procedia PDF Downloads 149
976 Threshold (K, P) Quantum Distillation

Authors: Shashank Gupta, Carlos Cid, William John Munro

Abstract:

Quantum distillation is the task of concentrating quantum correlations present in N imperfect copies to M perfect copies (M < N) using free operations by involving all P the parties sharing the quantum correlation. We present a threshold quantum distillation task where the same objective is achieved but using lesser number of parties (K < P). In particular, we give an exact local filtering operations by the participating parties sharing high dimension multipartite entangled state to distill the perfect quantum correlation. Later, we bridge a connection between threshold quantum entanglement distillation and quantum steering distillation and show that threshold distillation might work in the scenario where general distillation protocol like DEJMPS does not work.

Keywords: quantum networks, quantum distillation, quantum key distribution, entanglement distillation

Procedia PDF Downloads 44
975 A Randomized Controlled Trial Study on the Effect of Adding Dexmedetomidine to Bupivacaine in Supraclavicular Block Using Ultrasound Guidance

Authors: Nazia Nazir

Abstract:

Background: The benefits of regional anesthetic techniques are well established. Use of additives to local anesthetics can prolong these benefits. The aim of this study was to observe the effect of adding dexmedetomidine to bupivacaine for the supraclavicular block. Methods (Design): In this randomized, double-blind study, seventy ASA I & II patients of either sex undergoing elective surgeries on the upper limb were given supraclavicular block under ultrasound guidance. Group C (n=35), received 38 mL 0.25% bupivacaine + 2mL normal saline and group D received 38 mL 0.25% bupivacaine + 1 µg/kg dexmedetomidine (2mL). Patients were observed for onset, duration of motor and sensory block, duration of analgesia, sedation score, hemodynamic changes and any adverse events. Results: In group D the onset was faster (P < 0.001), duration of sensory and motor block, as well as duration of analgesia, was prolonged as compared to group C (P < 0.0001). There was significant drop in heart rate (HR) from the baseline in group D (P < 0.05) at 30, 60, 90 and 120 min, however, none of the patients dropped HR below 50/min. Mean arterial Pressure (MAP) remained unaffected. The patients in group D were effectively sedated than those in group C (P < 0.05). No adverse event was reported in either group. Conclusion: Dexmedetomidine as adjuvant to bupivacaine in supraclavicular block resulted in faster action, prolonged motor and sensory block, prolonged analgesia with hemodynamic stability and adequate sedation.

Keywords: Analgesia, bupivacaine, dexmedetomidine, supraclavicular block

Procedia PDF Downloads 191
974 The Study about the New Monitoring System of Signal Equipment of Railways Using Radio Communication

Authors: Masahiko Suzuki, Takashi Kato , Masahiro Kobayashi

Abstract:

In our company, the monitoring system for signal equipment has already implemented. So, we can know the state of signal equipment, sitting in the control room or the maintenance center. But this system was installed over 20 years ago, so it cannot stand the needs such as 'more stable operation', 'broadband data transfer', 'easy construction and easy maintenance'. To satisfy these needs, we studied the monitoring system using radio communication as a new method which can realize the operation in the terrible environment along railroads. In these studies, we have developed the terminals and repeaters based on the ZigBee protocol and have implemented the application using two different radio bands simultaneously. At last, we got the good results from the fundamental examinations using the developed equipment.

Keywords: monitoring, radio communication, 2 bands, ZigBee

Procedia PDF Downloads 587
973 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 550
972 Time Parameter Based for the Detection of Catastrophic Faults in Analog Circuits

Authors: Arabi Abderrazak, Bourouba Nacerdine, Ayad Mouloud, Belaout Abdeslam

Abstract:

In this paper, a new test technique of analog circuits using time mode simulation is proposed for the single catastrophic faults detection in analog circuits. This test process is performed to overcome the problem of catastrophic faults being escaped in a DC mode test applied to the inverter amplifier in previous research works. The circuit under test is a second-order low pass filter constructed around this type of amplifier but performing a function that differs from that of the previous test. The test approach performed in this work is based on two key- elements where the first one concerns the unique square pulse signal selected as an input vector test signal to stimulate the fault effect at the circuit output response. The second element is the filter response conversion to a square pulses sequence obtained from an analog comparator. This signal conversion is achieved through a fixed reference threshold voltage of this comparison circuit. The measurement of the three first response signal pulses durations is regarded as fault effect detection parameter on one hand, and as a fault signature helping to hence fully establish an analog circuit fault diagnosis on another hand. The results obtained so far are very promising since the approach has lifted up the fault coverage ratio in both modes to over 90% and has revealed the harmful side of faults that has been masked in a DC mode test.

Keywords: analog circuits, analog faults diagnosis, catastrophic faults, fault detection

Procedia PDF Downloads 440
971 Contesting Blind Obedience in Islam within the Malay-Language Media: Case Study of 'I Want to Touch a Dog' Event

Authors: Aisya Zaharin

Abstract:

The reporting of Islam in the Malaysian government-controlled press is complicated and occurs almost daily. This is due to the Islamisation process that has been heavily politicized in recent years. This article analyses media representations of Islam in the Malaysian media through the social responsibility theory. A provocative case study of media reporting on the “I want to touch a dog” event was analysed since dog’s saliva is ritually considered unhygienic by Muslims. This paper will not question the Islamic ruling on the dog’s issue. Instead, it calls for discussions in relation to openness and maturity in religious discourse with respect to the dog’s saliva dialogue in 1937. It applies Hage’s “minor and major reality” to explain the increasing percentage of Muslim who define their own understandings of Islam vs the government’s dogmatic versions. This paper employs Alatas’s method of “sociological investigation in Southeast Asia” by using ethnographic examination on selected mass media. Through Asiacentricity approach, this paper revisited the local framework of Alatas’s New Man encouraging Muslims to engage in knowledge and to appreciate diversities in Islamic jurisprudences. Despite government’s control, findings showed that non-Malay languages and online media are more comprehensive in reporting the news about Islam. Clearly, there has to be a re-conceptualization of Islamic discourses in the Malay-language media.

Keywords: dog, Fiqh, Islamic jurisprudence, Malaysian media, New Man, social responsibility

Procedia PDF Downloads 317
970 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 324
969 pscmsForecasting: A Python Web Service for Time Series Forecasting

Authors: Ioannis Andrianakis, Vasileios Gkatas, Nikos Eleftheriadis, Alexios Ellinidis, Ermioni Avramidou

Abstract:

pscmsForecasting is an open-source web service that implements a variety of time series forecasting algorithms and exposes them to the user via the ubiquitous HTTP protocol. It allows developers to enhance their applications by adding time series forecasting functionalities through an intuitive and easy-to-use interface. This paper provides some background on time series forecasting and gives details about the implemented algorithms, aiming to enhance the end user’s understanding of the underlying methods before incorporating them into their applications. A detailed description of the web service’s interface and its various parameterizations is also provided. Being an open-source project, pcsmsForecasting can also be easily modified and tailored to the specific needs of each application.

Keywords: time series, forecasting, web service, open source

Procedia PDF Downloads 81
968 Internet Protocol Television: A Research Study of Undergraduate Students Analyze the Effects

Authors: Sabri Serkan Gulluoglu

Abstract:

The study is aimed at examining the effects of internet marketing with IPTV on human beings. Internet marketing with IPTV is emerging as an integral part of business strategies in today’s technologically advanced world and the business activities all over the world are influences with the emergence of this modern marketing tool. As the population of the Internet and on-line users’ increases, new research issues have arisen concerning the demographics and psychographics of the on-line user and the opportunities for a product or service. In recent years, we have seen a tendency of various services converging to the ubiquitous Internet Protocol based networks. Besides traditional Internet applications such as web browsing, email, file transferring, and so forth, new applications have been developed to replace old communication networks. IPTV is one of the solutions. In the future, we expect a single network, the IP network, to provide services that have been carried by different networks today. For finding some important effects of a video based technology market web site on internet, we determine to apply a questionnaire on university students. Recently some researches shows that in Turkey the age of people 20 to 24 use internet when they buy some electronic devices such as cell phones, computers, etc. In questionnaire there are ten categorized questions to evaluate the effects of IPTV when shopping. There were selected 30 students who are filling the question form after watching an IPTV channel video for 10 minutes. This sample IPTV channel is “buy.com”, it look like an e-commerce site with an integrated IPTV channel on. The questionnaire for the survey is constructed by using the Likert scale that is a bipolar scaling method used to measure either positive or negative response to a statement (Likert, R) it is a common system that is used is the surveys. By following the Likert Scale “the respondents are asked to indicate their degree of agreement with the statement or any kind of subjective or objective evaluation of the statement. Traditionally a five-point scale is used under this methodology”. For this study also the five point scale system is used and the respondents were asked to express their opinions about the given statement by picking the answer from the given 5 options: “Strongly disagree, Disagree, Neither agree Nor disagree, Agree and Strongly agree”. These points were also rates from 1-5 (Strongly disagree, Disagree, Neither disagree Nor agree, Agree, Strongly agree). On the basis of the data gathered from the questionnaire some results are drawn in order to get the figures and graphical representation of the study results that can demonstrate the outcomes of the research clearly.

Keywords: IPTV, internet marketing, online, e-commerce, video based technology

Procedia PDF Downloads 240
967 Classification of Hyperspectral Image Using Mathematical Morphological Operator-Based Distance Metric

Authors: Geetika Barman, B. S. Daya Sagar

Abstract:

In this article, we proposed a pixel-wise classification of hyperspectral images using a mathematical morphology operator-based distance metric called “dilation distance” and “erosion distance”. This method involves measuring the spatial distance between the spectral features of a hyperspectral image across the bands. The key concept of the proposed approach is that the “dilation distance” is the maximum distance a pixel can be moved without changing its classification, whereas the “erosion distance” is the maximum distance that a pixel can be moved before changing its classification. The spectral signature of the hyperspectral image carries unique class information and shape for each class. This article demonstrates how easily the dilation and erosion distance can measure spatial distance compared to other approaches. This property is used to calculate the spatial distance between hyperspectral image feature vectors across the bands. The dissimilarity matrix is then constructed using both measures extracted from the feature spaces. The measured distance metric is used to distinguish between the spectral features of various classes and precisely distinguish between each class. This is illustrated using both toy data and real datasets. Furthermore, we investigated the role of flat vs. non-flat structuring elements in capturing the spatial features of each class in the hyperspectral image. In order to validate, we compared the proposed approach to other existing methods and demonstrated empirically that mathematical operator-based distance metric classification provided competitive results and outperformed some of them.

Keywords: dilation distance, erosion distance, hyperspectral image classification, mathematical morphology

Procedia PDF Downloads 83
966 Investigating Student Behavior in Adopting Online Formative Assessment Feedback

Authors: Peter Clutterbuck, Terry Rowlands, Owen Seamons

Abstract:

In this paper we describe one critical research program within a complex, ongoing multi-year project (2010 to 2014 inclusive) with the overall goal to improve the learning outcomes for first year undergraduate commerce/business students within an Information Systems (IS) subject with very large enrolment. The single research program described in this paper is the analysis of student attitudes and decision making in relation to the availability of formative assessment feedback via Web-based real time conferencing and document exchange software (Adobe Connect). The formative assessment feedback between teaching staff and students is in respect of an authentic problem-based, team-completed assignment. The analysis of student attitudes and decision making is investigated via both qualitative (firstly) and quantitative (secondly) application of the Theory of Planned Behavior (TPB) with a two statistically-significant and separate trial samples of the enrolled students. The initial qualitative TPB investigation revealed that perceived self-efficacy, improved time-management, and lecturer-student relationship building were the major factors in shaping an overall favorable student attitude to online feedback, whilst some students expressed valid concerns with perceived control limitations identified within the online feedback protocols. The subsequent quantitative TPB investigation then confirmed that attitude towards usage, subjective norms surrounding usage, and perceived behavioral control of usage were all significant in shaping student intention to use the online feedback protocol, with these three variables explaining 63 percent of the variance in the behavioral intention to use the online feedback protocol. The identification in this research of perceived behavioral control as a significant determinant in student usage of a specific technology component within a virtual learning environment (VLE) suggests that VLEs could now be viewed not as a single, atomic entity, but as a spectrum of technology offerings ranging from the mature and simple (e.g., email, Web downloads) to the cutting-edge and challenging (e.g., Web conferencing and real-time document exchange). That is, that all VLEs should not be considered the same. The results of this research suggest that tertiary students have the technological sophistication to assess a VLE in this more selective manner.

Keywords: formative assessment feedback, virtual learning environment, theory of planned behavior, perceived behavioral control

Procedia PDF Downloads 397
965 The Use of Neuter in Oedipus Lines to Refer to Antigone in Phoenissae of Seneca

Authors: Cíntia Martins Sanches

Abstract:

In the first part of Phoenissae of Seneca, Antigone is a guide to Oedipus, and they leave Thebes: he is blind searching for death (inflicting the punishment himself wished on the killer of Laius, ie exile and death); she is trying to convince him to give up such punishment and bring him back to Thebes. Concerning Oedipus lines, we observed a high frequency of Latin neuter in the treatment the protagonist gave to his daughter Antigone. We considered in this study that such frequency may be related to the sanctification of the daughter, who is seen by him as an enlightened being and without defects, free of the human condition (which takes on the existence of failures by essence). This study, thus, puts forward an analysis of the passages the said feature is present, relating them to the effect of meaning found in each occurrence. As part of a doctorate, this study investigates the stylistic idiom of Seneca in the Oedipus and Phoenissae tragedies, aiming at translating both tragedies expressively. The concept of stylistic idiom concerns the stylistic affinity required for a translation to be equivalent to the source text. In this wise, this study inquires into how the Latin text is organized poetically, pointing out the expressive features frequently appearing in both dramas. The method we used is based on the Semiotics theory — observing how connotation, ie a language use in which prevails the poetic function, naturally polysemous, acts to achieve each expressive effect.

Keywords: antigone, neuter, Oedipus, Phoenissae, Seneca

Procedia PDF Downloads 287
964 Analytical Validity Of A Tech Transfer Solution To Internalize Genetic Testing

Authors: Lesley Northrop, Justin DeGrazia, Jessica Greenwood

Abstract:

ASPIRA Labs now offers an en-suit and ready-to-implement technology transfer solution to enable labs and hospitals that lack the resources to build it themselves to offer in-house genetic testing. This unique platform employs a patented Molecular Inversion Probe (MIP) technology that combines the specificity of a hybrid capture protocol with the ease of an amplicon-based protocol and utilizes an advanced bioinformatics analysis pipeline based on machine learning. To demonstrate its efficacy, two independent genetic tests were validated on this technology transfer platform: expanded carrier screening (ECS) and hereditary cancer testing (HC). The analytical performance of ECS and HC was validated separately in a blinded manner for calling three different types of variants: SNVs, short indels (typically, <50 bp), and large indels/CNVs defined as multi-exonic del/dup events. The reference set was constructed using samples from Coriell Institute, an external clinical genetic testing laboratory, Maine Molecular Quality Controls Inc. (MMQCI), SeraCare and GIAB Consortium. Overall, the analytical performance showed a sensitivity and specificity of >99.4% for both ECS and HC in detecting SNVs. For indels, both tests reported specificity of 100%, and ECS demonstrated a sensitivity of 100%, whereas HC exhibited a sensitivity of 96.5%. The bioinformatics pipeline also correctly called all reference CNV events resulting in a sensitivity of 100% for both tests. No additional calls were made in the HC panel, leading to a perfect performance (specificity and F-measure of 100%). In the carrier panel, however, three additional positive calls were made outside the reference set. Two of these calls were confirmed using an orthogonal method and were re-classified as true positives leaving only one false positive. The pipeline also correctly identified all challenging carrier statuses, such as positive cases for spinal muscular atrophy and alpha-thalassemia, resulting in 100% sensitivity. After confirmation of additional positive calls via long-range PCR and MLPA, specificity for such cases was estimated at 99%. These performance metrics demonstrate that this tech-transfer solution can be confidently internalized by clinical labs and hospitals to offer mainstream ECS and HC as part of their test catalog, substantially increasing access to quality germline genetic testing for labs of all sizes and resources levels.

Keywords: clinical genetics, genetic testing, molecular genetics, technology transfer

Procedia PDF Downloads 177
963 Collaboration of UNFPA and USAID to Mobilize Domestic Government Resources for Contraceptive Procurement in Madagascar

Authors: Josiane Yaguibou, Ngoy Kishimba, Issiaka v. Coulibaly, Sabrina Pestilli, Falinirina Razanalison, Hantanirina Andremanisa

Abstract:

Background: In recent years, Madagascar has faced a significant reduction in donors’ financial resources for the purchase of contraceptive products to meet the family planning needs of the population. In order to ensure the sustainability of the family planning program in the current context, UNFPA Madagascar engaged in a series of initiatives with the ultimate scope of identifying sustainable financing mechanisms for the program. Program intervention: UNFPA Madagascar established a strict collaboration with USAID to engage in a series of joint advocacy and resource mobilization activities with the government. The following initiatives were conducted: (i) Organization of a high-level Round Table to engage the government; (ii) Support to the government in renewing the FP2030 Commitments; (iii) Signature of the Country Compact 2022-2024; (iv) Allocation of government funds in 2022 and 2023 of over 829,222 USD; (v) Obtaining a Matching Fund of 1.5 million USD from UNFPA to encourage the government to allocate resources for the purchase of contraceptive products. Program Implications: The collaboration and the joint advocacy made it possible to (i) have budgetary allocations from the government to purchase products in 2022 and 2023 with a significant reduction in financing gaps; (ii) to convince the government to seek additional financing from partners such as the World Bank which granted more than 8 million USD for the purchase of products; (iii) reduce stock shortages from more than 30% to 15%.

Keywords: UNFPA, USAID, collaboration, contraceptives

Procedia PDF Downloads 67
962 Microbiological Analysis on Anatomical Specimens of Cats for Use in Veterinary Surgery

Authors: Raphael C. Zero, Marita V. Cardozo, Thiago A. S. S. Rocha, Mariana T. Kihara, Fernando A. Ávila, Fabrício S. Oliveira

Abstract:

There are several fixative and preservative solutions for use on cadavers, many of them using formaldehyde as the fixative or anatomical part preservative. In some countries, such as Brazil, this toxic agent has been increasingly restricted. The objective of this study was to microbiologically identify and quantify the key agents in tanks containing 96GL ethanol or sodium chloride solutions, used respectively as fixatives and preservatives of cat cadavers. Eight adult cat corpses, three females and five males, with an average weight of 4.3 kg, were used. After injection via the external common carotid artery (120 ml/kg, 95% 96GL ethyl alcohol and 5% pure glycerin), the cadavers were fixed in a plastic tank with 96GL ethanol for 60 days. After fixing, they were stored in a 30% sodium chloride aqueous solution for 120 days in a similar tank. Samples were collected at the start of the experiment - before the animals were placed in the ethanol tanks, and monthly thereafter. The bacterial count was performed by Pour Plate Method in BHI agar (Brain Heart Infusion) and the plates were incubated aerobically and anaerobically for 24h at 37ºC. MacConkey agar, SPS agar (Sulfite Polymyxin Sulfadizine) and MYP Agar Base were used to isolate the microorganisms. There was no microbial growth in the samples prior to alcohol fixation. After 30 days of fixation in the alcohol solution, total aerobic and anaerobic (<1.0 x 10 CFU/ml) were found and Pseudomonas sp., Staphylococcus sp., Clostridium sp. were the identified agents. After 60 days in the alcohol fixation solution, total aerobes (<1.0 x 10 CFU/ml) and total anaerobes (<2.2 x 10 CFU/mL) were found, and the identified agents were the same. After 30 days of storage in the aqueous solution of 30% sodium chloride, total aerobic (<5.2 x 10 CFU/ml) and total anaerobes (<3.7 x 10 CFU/mL) were found and the agents identified were Staphylococcus sp., Clostridium sp., and fungi. After 60 days of sodium chloride storage, total aerobic (<3.0 x 10 CFU / ml) and total anaerobes (<7.0 x 10 CFU/mL) were found and the identified agents remained the same: Staphylococcus sp., Clostridium sp., and fungi. The microbiological count was low and visual inspection did not reveal signs of contamination in the tanks. There was no strong odor or purification, which proved the technique to be microbiologically effective in fixing and preserving the cat cadavers for the four-month period in which they are provided to undergraduate students of University of Veterinary Medicine for surgery practice. All experimental procedures were approved by the Municipal Legal Department (protocol 02.2014.000027-1). The project was funded by FAPESP (protocol 2015-08259-9).

Keywords: anatomy, fixation, microbiology, small animal, surgery

Procedia PDF Downloads 289
961 A Study of Effectiveness of Topical Grapeseed Oil for Reducing Wrinkles on Periorbital Areas in Asian People in Thailand

Authors: Cherish Romina Prajitno, Sunisa Thaichinda

Abstract:

One indicator of facial aging is wrinkles. Not only that, but wrinkles are a key indicator in our world of facial aesthetics. Wrinkles occur where fault lines develop in aging skin. Nowadays, people are more motivated to keep up their appealing and young appearance. Many individuals are seeking a fast recovery time for their aesthetic procedures and are interested in non-invasive techniques that have a proven track record for successful outcomes. The purpose of this study is to see the efficacy of 100% (pure) grapeseed oil for reducing periorbital wrinkles. This study used the split-face, double-blind method, and this treatment was administered for three months at random to fifteen patients, with the grapeseed oil at one side of the face and the other side with the placebo. The main outcome measure was determined by conducting a comparative analysis of the participants' wrinkle results during each visit using the VIsioscan® VC98. Additionally, we evaluated the skin's elasticity and barrier function using the Cutometer® MP 530 and Tewameter® TM300. Furthermore, we administered a satisfaction score questionnaire to the patients in the 12th week. The findings of the study indicate that grapeseed oil exhibited a noteworthy effect in diminishing the appearance of wrinkles in the periorbital region, enhancing the viscoelastic properties of the periorbital skin, and improving the functionality of the skin barrier in the periorbital area.

Keywords: periorbital wrinkles, pure grapeseed oil, split-face method

Procedia PDF Downloads 69
960 Design of a Low Cost Motion Data Acquisition Setup for Mechatronic Systems

Authors: Baris Can Yalcin

Abstract:

Motion sensors have been commonly used as a valuable component in mechatronic systems, however, many mechatronic designs and applications that need motion sensors cost enormous amount of money, especially high-tech systems. Design of a software for communication protocol between data acquisition card and motion sensor is another issue that has to be solved. This study presents how to design a low cost motion data acquisition setup consisting of MPU 6050 motion sensor (gyro and accelerometer in 3 axes) and Arduino Mega2560 microcontroller. Design parameters are calibration of the sensor, identification and communication between sensor and data acquisition card, interpretation of data collected by the sensor.

Keywords: design, mechatronics, motion sensor, data acquisition

Procedia PDF Downloads 585
959 Prospective Study on the Efficacy of Bio Absorbable Screws in Treatment of Osteochondral Fractures

Authors: S. Anwar Sathik, K. Manoj Deepak, K. Venkatachalam

Abstract:

Our study is a prospective study on the use of bio absorbable pins for the treatment of osteochondral fractures after patellar dislocation.22 patients who presented with osteochondral fractures were treated in our institution. They were followed for a minimum of 12 months by regular radiological evaluation. Of the 22 patients, 2 had fragments that detached from the fracture site which was treated arthroscopically. All the patients underwent open reduction and fixation of the pins using bio absorbable crews. They were immobilized in the cast for a minimum of 6 weeks after which mobilization was started according to our protocol. Fracture consolidation was found to occur in 20 of the 22 patients. Thus, Bio absorbable screws can be used as a reliable method of fixation of the osteochondral fragments.

Keywords: osteochondral fracture, bio absorbable pins, patella dislocation, physiotherapy

Procedia PDF Downloads 310
958 Evaluating Viability of Solar Tubewell Irrigation Technology

Authors: Junaid N. Chauhdary, Bernard A. Engel, Allah Bakhsh

Abstract:

Solar powered tubewells can be a reliable and affordable source of supplying irrigation water compared with electric or diesel operated tubewells due to frequent load shedding and soaring energy prices. A study was conducted on a solar tubewell installed at the Water Management Research Center (WMRC), University of Agriculture, Faisalabad to investigate the viability of a solar powered tubewell in terms of discharge and benefit cost ratio. The tubewell discharge was 50 m3hr-1 with a total dynamic head of 30 m. The depth of bore was 31 m (14 m blind + 17 m screen) with a casing diameter of 15.2 cm (6 inches). A 3-stage submersible pump of 10.2 cm (4 inch) diameter was lowered in the casing to a depth of 22 m. The pump was powered from 21 solar panels of 200 W capacity each. The tubewell peak discharge was observed as 6 and 7 hr day-1 in winter and summer, respectively. The breakeven analysis of the solar tubewell showed that the payback period of the solar tubewell was 1.5 years of its 10 year usable life with an IRR (internal rate of return) of 69 %. The BCR (benefit cost ratio) of the solar tubewell at 2, 4, 6, and 8 percent discount rate were 3.75, 3.45, 3.19 and 2.96, respectively. The NPV (net present value) of the solar tubewell at 2, 4, 6, and 8 % discount rates were 1.89, 1.65, 1.45 and 1.27 million rupees, respectively. These results indicated that the solar powered tubewells are a viable option as well as environmentally friendly and can be adopted by the farmers due to their affordable payback period.

Keywords: benefit cost ratio, internal rate of return (IRR), net present value (NPV), solar tubewell

Procedia PDF Downloads 206
957 Characterization of Kopff Crater Using Remote Sensing Data

Authors: Shreekumari Patel, Prabhjot Kaur, Paras Solanki

Abstract:

Moon Mineralogy Mapper (M3), Miniature Radio Frequency (Mini-RF), Kaguya Terrain Camera images, Lunar Orbiter Laser Altimeter (LOLA) digital elevation model (DEM) and Lunar Reconnaissance Orbiter Camera (LROC)- Narrow angle camera (NAC) and Wide angle camera (WAC) images were used to study mineralogy, surface physical properties, and age of the 42 km diameter Kopff crater. M3 indicates the low albedo crater floor to be high-Ca pyroxene dominated associated with floor fracture suggesting the igneous activity of the gabbroic material. Signature of anorthositic material is sampled on the eastern edge as target material is excavated from ~3 km diameter impact crater providing access to the crustal composition. Several occurrences of spinel were detected in northwestern rugged terrain. Our observation can be explained by exposure of spinel by this crater that impacted onto the inner rings of Orientale basin. Spinel was part of the pre-impact target, an intrinsic unit of basin ring. Crater floor was dated by crater counts performed on Kaguya TC images. Nature of surface was studied in detail with LROC NAC and Mini-RF. Freshly exposed surface and boulder or debris seen in LROC NAC images have enhanced radar signal in comparison to mature terrain of Kopff crater. This multidisciplinary analysis of remote sensing data helps to assess lunar surface in detail.

Keywords: crater, mineralogy, moon, radar observations

Procedia PDF Downloads 159
956 Uncloaking Priceless Pieces of Evidence: Psychotherapy with an Older New Zealand Man; Contributions to Understanding Hidden Historical Phenomena and the Trans-Generation Transmission of Silent and Un-Witnessed Trauma

Authors: Joanne M. Emmens

Abstract:

This paper makes use of the case notes of a single psychoanalytically informed psychotherapy of a now 72-year-old man over a four-year period to explore the potential of qualitative data to be incorporated into a research methodology that can contribute theory and knowledge to the wider professional community involved in mental health care. The clinical material arising out of any psychoanalysis provides a potentially rich source of clinical data that could contribute valuably to our historical understanding of both individual and societal traumata. As psychoanalysis is primarily an investigation, it is argued that clinical case material is a rich source of qualitative data which has relevance for sociological and historical understandings and that it can potentially aluminate important ‘gaps’ and collective blind spots that manifest unconsciously and are a contributing factor in the transmission of trauma, silently across generations. By attending to this case material the hope is to illustrate the value of using a psychoanalytic centred methodology. It is argued that the study of individual defences and the manner in which they come into consciousness, allows an insight into group defences and the unconscious forces that contribute to the silencing or un-noticing of important sources (or originators) of mental suffering.

Keywords: dream furniture (Bion) and psychotic functioning, reverie, screen memories, selected fact

Procedia PDF Downloads 198
955 An Optimization Tool-Based Design Strategy Applied to Divide-by-2 Circuits with Unbalanced Loads

Authors: Agord M. Pinto Jr., Yuzo Iano, Leandro T. Manera, Raphael R. N. Souza

Abstract:

This paper describes an optimization tool-based design strategy for a Current Mode Logic CML divide-by-2 circuit. Representing a building block for output frequency generation in a RFID protocol based-frequency synthesizer, the circuit was designed to minimize the power consumption for driving of multiple loads with unbalancing (at transceiver level). Implemented with XFAB XC08 180 nm technology, the circuit was optimized through MunEDA WiCkeD tool at Cadence Virtuoso Analog Design Environment ADE.

Keywords: divide-by-2 circuit, CMOS technology, PLL phase locked-loop, optimization tool, CML current mode logic, RF transceiver

Procedia PDF Downloads 461
954 Generalization of Blom Key Predistribution Scheme

Authors: Abbas Cheraghi

Abstract:

A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user.

Keywords: key predistribution, blom’s scheme, secret sharing, unconditional secure

Procedia PDF Downloads 433
953 Optimization of Real Time Measured Data Transmission, Given the Amount of Data Transmitted

Authors: Michal Kopcek, Tomas Skulavik, Michal Kebisek, Gabriela Krizanova

Abstract:

The operation of nuclear power plants involves continuous monitoring of the environment in their area. This monitoring is performed using a complex data acquisition system, which collects status information about the system itself and values of many important physical variables e.g. temperature, humidity, dose rate etc. This paper describes a proposal and optimization of communication that takes place in teledosimetric system between the central control server responsible for the data processing and storing and the decentralized measuring stations, which are measuring the physical variables. Analyzes of ongoing communication were performed and consequently the optimization of the system architecture and communication was done.

Keywords: communication protocol, transmission optimization, data acquisition, system architecture

Procedia PDF Downloads 516
952 From Servicescape to Servicespace: Qualitative Research in a Post-Cartesian Retail Context

Authors: Chris Houliez

Abstract:

This study addresses the complex dynamics of the modern retail environment, focusing on how the ubiquitous nature of mobile communication technologies has reshaped the shopper experience and tested the limits of the conventional "servicescape" concept commonly used to describe retail experiences. The objective is to redefine the conceptualization of retail space by introducing an approach to space that aligns with a retail context where physical and digital interactions are increasingly intertwined. To offer a more shopper-centric understanding of the retail experience, this study draws from phenomenology, particularly Henri Lefebvre’s work on the production of space. The presented protocol differs from traditional methodologies by not making assumptions about what constitutes a retail space. Instead, it adopts a perspective based on Lefebvre’s seminal work, which posits that space is not a three-dimensional container commonly referred to as “servicescape” but is actively produced through shoppers’ spatial practices. This approach allows for an in-depth exploration of the retail experience by capturing the everyday spatial practices of shoppers without preconceived notions of what constitutes a retail space. The designed protocol was tested with eight participants during 209 hours of day-long field trips, immersing the researcher into the shopper's lived experience by combining multiple data collection methods, including participant observation, videography, photography, and both pre-fieldwork and post-fieldwork interviews. By giving equal importance to both locations and connections, this study unpacked various spatial practices that contribute to the production of retail space. These findings highlight the relative inadequacy of some traditional retail space conceptualizations, which often fail to capture the fluid nature of contemporary shopping experiences. The study's emphasis on the customization process, through which shoppers optimize their retail experience by producing a “fully lived retail space,” offers a more comprehensive understanding of consumer shopping behavior in the digital age. In conclusion, this research presents a significant shift in the conceptualization of retail space. By employing a phenomenological approach rooted in Lefebvre’s theory, the study provides a more efficient framework to understand the retail experience in the age of mobile communication technologies. Although this research is limited by its small sample size and the demographic profile of participants, it offers valuable insights into the spatial practices of modern shoppers and their implications for retail researchers and retailers alike.

Keywords: shopper behavior, mobile telecommunication technologies, qualitative research, servicescape, servicespace

Procedia PDF Downloads 20