Search results for: differential privacy
1467 Mathematical Modeling of Nonlinear Process of Assimilation
Authors: Temur Chilachava
Abstract:
In work the new nonlinear mathematical model describing assimilation of the people (population) with some less widespread language by two states with two various widespread languages, taking into account demographic factor is offered. In model three subjects are considered: the population and government institutions with the widespread first language, influencing by means of state and administrative resources on the third population with some less widespread language for the purpose of their assimilation; the population and government institutions with the widespread second language, influencing by means of state and administrative resources on the third population with some less widespread language for the purpose of their assimilation; the third population (probably small state formation, an autonomy), exposed to bilateral assimilation from two rather powerful states. Earlier by us it was shown that in case of zero demographic factor of all three subjects, the population with less widespread language completely assimilates the states with two various widespread languages, and the result of assimilation (redistribution of the assimilated population) is connected with initial quantities, technological and economic capabilities of the assimilating states. In considered model taking into account demographic factor natural decrease in the population of the assimilating states and a natural increase of the population which has undergone bilateral assimilation is supposed. At some ratios between coefficients of natural change of the population of the assimilating states, and also assimilation coefficients, for nonlinear system of three differential equations are received the two first integral. Cases of two powerful states assimilating the population of small state formation (autonomy), with different number of the population, both with identical and with various economic and technological capabilities are considered. It is shown that in the first case the problem is actually reduced to nonlinear system of two differential equations describing the classical model "predator - the victim", thus, naturally a role of the victim plays the population which has undergone assimilation, and a predator role the population of one of the assimilating states. The population of the second assimilating state in the first case changes in proportion (the coefficient of proportionality is equal to the relation of the population of assimilators in an initial time point) to the population of the first assimilator. In the second case the problem is actually reduced to nonlinear system of two differential equations describing type model "a predator – the victim", with the closed integrated curves on the phase plane. In both cases there is no full assimilation of the population to less widespread language. Intervals of change of number of the population of all three objects of model are found. The considered mathematical models which in some approach can model real situations, with the real assimilating countries and the state formations (an autonomy or formation with the unrecognized status), undergone to bilateral assimilation, show that for them the only possibility to avoid from assimilation is the natural demographic increase in population and hope for natural decrease in the population of the assimilating states.Keywords: nonlinear mathematical model, bilateral assimilation, demographic factor, first integrals, result of assimilation, intervals of change of number of the population
Procedia PDF Downloads 4711466 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment
Authors: Y. Xu, L. Xiong, Z. Xu
Abstract:
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing
Procedia PDF Downloads 4861465 Record Peak Current Density in AlN/GaN Double-Barrier Resonant Tunneling Diodes on Free-Standing Gan Substrates by Modulating Barrier Thickness
Authors: Fang Liu, Jia Jia Yao, Guan Lin Wu, Ren Jie Liu, Zhuang Guo
Abstract:
Leveraging plasma-assisted molecular beam epitaxy (PA-MBE) on c-plane free-standing GaN substrates, this work demonstrates high-performance AlN/GaN double-barrier resonant tunneling diodes (RTDs) featuring stable and repeatable negative differential resistance (NDR) characteristics at room temperature. By scaling down the barrier thickness of AlN and the lateral mesa size of collector, a record peak current density of 1551 kA/cm2 is achieved, accompanied by a peak-to-valley current ratio (PVCR) of 1.24. This can be attributed to the reduced resonant tunneling time under thinner AlN barrier and the suppressed external incoherent valley current by reducing the dislocation number contained in the RTD device with the smaller size of collector. Statistical analysis of the NDR performance of RTD devices with different AlN barrier thicknesses reveals that, as the AlN barrier thickness decreases from 1.5 nm to 1.25 nm, the average peak current density increases from 145.7 kA/cm2 to 1215.1 kA/cm2, while the average PVCR decreases from 1.45 to 1.1, and the peak voltage drops from 6.89 V to 5.49 V. The peak current density obtained in this work represents the highest value reported for nitride-based RTDs to date, while maintaining a high PVCR value simultaneously. This illustrates that an ultra-scaled RTD based on a vertical quantum-well structure and lateral collector size is a valuable approach for the development of nitride-based RTDs with excellent NDR characteristics, revealing their great potential applications in high-frequency oscillation sources and high-speed switch circuits.Keywords: GaN resonant tunneling diode, peak current density, peak-to-valley current ratio, negative differential resistance
Procedia PDF Downloads 631464 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 3561463 Measurements of Scattering Cross Sections for 5.895 keV Photons in Various Polymers
Authors: H. Duggal, G. Singh, G. Singh, A. Bhalla, S. Kumar, J. S. Shahi, D. Mehta
Abstract:
The total differential cross section for scattering of the 5.895 keV photons by various polymers has been measured at scattering angle of 135o. The experimental measurements were carried out using the energy dispersive setup involving annular source of the 55Fe radioisotope and a low energy germanium (LEGe) detector. The cross section values are measured for 20 polymer targets namely, Paraffin Wax, Polytetrafluoro ethylene (PTFE), Cellulose, Silicone oil, Polyvinyl alcohol (PVA), Polyvinyl purrolidone (PVP), Polymethyl methacrylate (PMMA), Kapton, Mylar, Chitosan, Polyvinyl chloride (PVC), Bakelite, Carbopol, Chlorobutyl rubber (CBR), Polyetylene glycol (PEG), Polysorbate-20, Nylon-6, Cetyl alcohol, Carboxyl methyl sodium cellulose and Sodium starch glucolate. The measurements were performed in vacuum so as to avoid scattering contribution due to air and strong absorption of low energy photons in the air column. In the present investigations, the geometrical factor and efficiency of the detector were determined by measuring the K x-rays emitted from the 22Ti and 23V targets excited by the Mn K x-rays in the same experimental set up. The measured scattering cross sections have been compared with the sum of theoretically calculated elastic and inelastic scattering cross sections. The theoretical elastic (Rayleigh) scattering cross sections based on the various form factor approximations, namely, non-relativistic form factor (NF), relativistic form factor (RF), modified form factor (MF), and MF with anomalous scattering factor (ASF) as well as the second order S-matrix formalisms, and the inelastic scattering differential cross sections based on the Klein-Nishina formula after including the inelastic scattering function (KN+ISF) have been calculated. The experimental results show fairly good agreement with theoretical cross sections.Keywords: photon, polymers, elastic and inelastic, scattering cross sections
Procedia PDF Downloads 6911462 Exploring De-Fi through 3 Case Studies: Transparency, Social Impact, and Regulation
Authors: Dhaksha Vivekanandan
Abstract:
DeFi is a network that avoids reliance on financial intermediaries through its peer-to-peer financial network. DeFi operates outside of government control; hence it is important for us to understand its impacts. This study employs a literature review to understand DeFi and its emergence, as well as its implications on transparency, social impact, and regulation. Further, 3 case studies are analysed within the context of these categories. DeFi’s provision of increased transparency poses environmental and storage costs and can lead to user privacy being endangered. DeFi allows for the provision of entrepreneurial incentives and protection against monetary censorship and capital control. Despite DeFi's transparency issues and volatility costs, it has huge potential to reduce poverty; however, regulation surrounding DeFi still requires further tightening by governments.Keywords: DeFi, transparency, regulation, social impact
Procedia PDF Downloads 841461 Testing of Complicated Bus Bar Protection Using Smart Testing Methodology
Authors: K. N. Dinesh Babu
Abstract:
In this paper, the protection of a complicated bus arrangement with a dual bus coupler and bus sectionalizer using low impedance differential protection applicable for very high voltages like 220kV and 400kV is discussed. In many power generation stations, several operational procedures are implemented to utilize the transfer bus as the main bus and to facilitate the maintenance of circuit breakers and current transformers (in each section) without shutting down the bay(s). Owing to this fact, the complications in operational philosophy have thrown challenges for the bus bar protection implementation. Many bus topologies allow any one of the main buses available in the station to be used as an auxiliary bus. In such a system, pre-defined precautions and procedures are made as guidelines, which are followed before assigning any bus as an auxiliary bus. The procedure involves shifting of links, changing rotary switches, insertion of test block, and so on, thereby causing unreliable operation. This kind of unreliable operation or inadvertent procedural lapse may result in the isolation of the bus bar from the grid due to the unpredictable operation of the bus bar protection relay, which is a commonly occurring phenomenon due to manual mistakes. With the sophisticated configuration and implementation of logic in modern intelligent electronic devices, the operator is free to select the transfer arrangement without sacrificing the protection required by a bus differential system for a reliable operation, and labor-intensive processes are completely eliminated. This paper deals with the procedure to test the security logic for such special scenarios using Megger make SMRT, bus bar protection relay to assure system stability and get rid of all the specific operational precautions/procedure.Keywords: bus bar protection, by-pass isolator, blind spot, breaker failure, intelligent electronic device, end fault, bus unification, directional principle, zones of protection, breaker re-trip, under voltage security, smart megger relay tester
Procedia PDF Downloads 691460 Radio Based Location Detection
Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw
Abstract:
Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost
Procedia PDF Downloads 5191459 Analysis of Thermal Effect on Functionally Graded Micro-Beam via Mixed Finite Element Method
Authors: Cagri Mollamahmutoglu, Ali Mercan, Aykut Levent
Abstract:
Studies concerning the microstructures are becoming more important as the utilization of various micro-electro mechanical systems (MEMS) are increasing. Thus in recent years, thermal buckling and vibration analysis of microstructures have been subject to many investigations that are utilizing different numerical methods. In this study, thermal effects on mechanical response of a functionally graded (FG) Timoshenko micro-beam are presented in the framework of a mixed finite element formulation. Size effects are taken into consideration via modified couple stress theory. The mixed formulation is based on a function which in turn is derived via Gateaux Differential scientifically. After the resolution of all field equations of the beam, a potential operator is carefully constructed. Then this operator is used for the manufacturing of the functional. Usual procedures of finite element approximation are utilized for the derivation of the mixed finite element equations once the potential is obtained. Resulting finite element formulation allows usage of C₀ type simple linear shape functions and avoids shear-locking phenomena, which is a common shortcoming of the displacement-based formulations of moderately thick beams. The developed numerical scheme is used to obtain the effects of thermal loads on the static bending, free vibration and buckling of FG Timoshenko micro-beams for different power-law parameters, aspect ratios and boundary conditions. The versatility of the mixed formulation is presented over other numerical methods such as generalized differential quadrature method (GDQM). Another attractive property of the formulation is that it allows direct calculation of the contribution of micro effects on the overall mechanical response.Keywords: micro-beam, functionally graded materials, thermal effect, mixed finite element method
Procedia PDF Downloads 1401458 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 3851457 Abnormality Detection of Persons Living Alone Using Daily Life Patterns Obtained from Sensors
Authors: Ippei Kamihira, Takashi Nakajima, Taiyo Matsumura, Hikaru Miura, Takashi Ono
Abstract:
In this research, the goal was construction of a system by which multiple sensors were used to observe the daily life behavior of persons living alone (while respecting their privacy). Using this information to judge such conditions as a bad physical condition or falling in the home, etc., so that these abnormal conditions can be made known to relatives and third parties. The daily life patterns of persons living alone are expressed by the number of responses of sensors each time that a set time period has elapsed. By comparing data for the prior two weeks, it was possible to judge a situation as 'normal' when the person was in a good physical condition or as 'abnormal' when the person was in a bad physical condition.Keywords: sensors, elderly living alone, abnormality detection, iifestyle habit
Procedia PDF Downloads 2541456 Comparative Proteomic Analysis of Rice bri1 Mutant Leaves at Jointing-Booting Stage
Authors: Jiang Xu, Daoping Wang, Yinghong Pan
Abstract:
The jointing-booting stage is a critical period of both vegetative growth and reproductive growth in rice. Therefore, the proteomic analysis of the mutant Osbri1, whose corresponding gene OsBRI1 encodes the putative BRs receptor OsBRI1, at jointing-booting stage is very important for understanding the effects of BRs on vegetative and reproductive growth. In this study, the proteomes of leaves from an allelic mutant of the DWARF 61 (D61, OsBRI1) gene, Fn189 (dwarf54, d54) and its wild-type variety T65 (Taichung 65) at jointing-booting stage were analysed by using a Q Exactive plus orbitrap mass spectrometer, and more than 3,100 proteins were identified in each sample. Ontology analysis showed that these proteins distribute in various space of the cells, such as the chloroplast, mitochondrion, and nucleus, they functioned as structural components and/or catalytic enzymes and involved in many physiological processes. Moreover, quantitative analysis displayed that 266 proteins were differentially expressed in two samples, among them, 77 proteins decreased and 189 increased more than two times in Fn189 compared with T65, the proteins whose content decreased in Fn189 including b5-like Heme/Steroid binding domain containing protein, putative retrotransposon protein, putative glutaminyl-tRNA synthetase, and higher content proteins such as mTERF, putative Oligopeptidase homologue, zinc knuckle protein, and so on. A former study founded that the transcription level of a mTERF was up-regulated in the leaves of maize seedling after EBR treatment. In our experiments, it was interesting that one mTERF protein increased, but another mTERF decreased in leaves of Fn189 at jointing-booting stage, which suggested that BRs may have differential regulation mechanisms on the expression of various mTERF proteins. The relationship between other differential proteins with BRs is still unclear, and the effects of BRs on rice protein contents and its regulation mechanisms still need further research.Keywords: bri1 mutant, jointing-booting stage, proteomic analysis, rice
Procedia PDF Downloads 2481455 Influence of Hygro-Thermo-Mechanical Loading on Buckling and Vibrational Behavior of FG-CNT Composite Beam with Temperature Dependent Characteristics
Authors: Puneet Kumar, Jonnalagadda Srinivas
Abstract:
The authors report here vibration and buckling analysis of functionally graded carbon nanotube-polymer composite (FG-CNTPC) beams under hygro-thermo-mechanical environments using higher order shear deformation theory. The material properties of CNT and polymer matrix are often affected by temperature and moisture content. A micromechanical model with agglomeration effect is employed to compute the elastic, thermal and moisture properties of the composite beam. The governing differential equation of FG-CNTRPC beam is developed using higher-order shear deformation theory to account shear deformation effects. The elastic, thermal and hygroscopic strain terms are derived from variational principles. Moreover, thermal and hygroscopic loads are determined by considering uniform, linear and sinusoidal variation of temperature and moisture content through the thickness. Differential equations of motion are formulated as an eigenvalue problem using appropriate displacement fields and solved by using finite element modeling. The obtained results of natural frequencies and critical buckling loads show a good agreement with published data. The numerical illustrations elaborate the dynamic as well as buckling behavior under uniaxial load for different environmental conditions, boundary conditions and volume fraction distribution profile, beam slenderness ratio. Further, comparisons are shown at different boundary conditions, temperatures, degree of moisture content, volume fraction as well as agglomeration of CNTs, slenderness ratio of beam for different shear deformation theories.Keywords: hygrothermal effect, free vibration, buckling load, agglomeration
Procedia PDF Downloads 2641454 Magneto-Hydrodynamic Mixed Convective Fluid Flow through Two Parallel Vertical Plates Channel with Hall, Chemical Reaction, and Thermal Radiation Effects
Authors: Okuyade Ighoroje Wilson Ata
Abstract:
Magneto-hydrodynamic mixed convective chemically reacting fluid flow through two parallel vertical plates channel with Hall, radiation, and chemical reaction effects are examined. The fluid is assumed to be chemically reactive, electrically conducting, magnetically susceptible, viscous, incompressible, and Newtonian; the plates are porous, electrically conductive, and heated to a high-temperature regime to generate thermal rays. The flow system is highly interactive, such that cross/double diffusion is present. The governing equations are partial differential equations transformed into ordinary differential equations using similarity transformation and solved by the method of Homotopy Perturbation. Expressions for the concentration, temperature, velocity, Nusselt number, Sherwood number, and Wall shear stress are obtained, computed, and presented graphically and tabularly. The analysis of results shows, amongst others, that an increase in the Raleigh number increases the main velocity and temperature but decreases the concentration. More so, an increase in chemical reaction rate increases the main velocity, temperature, rate of heat transfer from the terminal plate, the rate of mass transfer from the induced plate, and Wall shear stress on both the induced and terminal plates, decreasing the concentration, and the mass transfer rate from the terminal plate. Some of the obtained results are benchmarked with those of existing literature and are in consonance.Keywords: chemical reaction, hall effect, magneto-hydrodynamic, radiation, vertical plates channel
Procedia PDF Downloads 771453 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 3301452 Use of Cloud Computing and Smart Devices in Healthcare
Authors: Nikunj Agarwal, M. P. Sebastian
Abstract:
Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.Keywords: cloud computing, smart devices, healthcare, telemedicine
Procedia PDF Downloads 3971451 Data Centers’ Temperature Profile Simulation Optimized by Finite Elements and Discretization Methods
Authors: José Alberto García Fernández, Zhimin Du, Xinqiao Jin
Abstract:
Nowadays, data center industry faces strong challenges for increasing the speed and data processing capacities while at the same time is trying to keep their devices a suitable working temperature without penalizing that capacity. Consequently, the cooling systems of this kind of facilities use a large amount of energy to dissipate the heat generated inside the servers, and developing new cooling techniques or perfecting those already existing would be a great advance in this type of industry. The installation of a temperature sensor matrix distributed in the structure of each server would provide the necessary information for collecting the required data for obtaining a temperature profile instantly inside them. However, the number of temperature probes required to obtain the temperature profiles with sufficient accuracy is very high and expensive. Therefore, other less intrusive techniques are employed where each point that characterizes the server temperature profile is obtained by solving differential equations through simulation methods, simplifying data collection techniques but increasing the time to obtain results. In order to reduce these calculation times, complicated and slow computational fluid dynamics simulations are replaced by simpler and faster finite element method simulations which solve the Burgers‘ equations by backward, forward and central discretization techniques after simplifying the energy and enthalpy conservation differential equations. The discretization methods employed for solving the first and second order derivatives of the obtained Burgers‘ equation after these simplifications are the key for obtaining results with greater or lesser accuracy regardless of the characteristic truncation error.Keywords: Burgers' equations, CFD simulation, data center, discretization methods, FEM simulation, temperature profile
Procedia PDF Downloads 1711450 A Hybrid Block Multistep Method for Direct Numerical Integration of Fourth Order Initial Value Problems
Authors: Adamu S. Salawu, Ibrahim O. Isah
Abstract:
Direct solution to several forms of fourth-order ordinary differential equations is not easily obtained without first reducing them to a system of first-order equations. Thus, numerical methods are being developed with the underlying techniques in the literature, which seeks to approximate some classes of fourth-order initial value problems with admissible error bounds. Multistep methods present a great advantage of the ease of implementation but with a setback of several functions evaluation for every stage of implementation. However, hybrid methods conventionally show a slightly higher order of truncation for any k-step linear multistep method, with the possibility of obtaining solutions at off mesh points within the interval of solution. In the light of the foregoing, we propose the continuous form of a hybrid multistep method with Chebyshev polynomial as a basis function for the numerical integration of fourth-order initial value problems of ordinary differential equations. The basis function is interpolated and collocated at some points on the interval [0, 2] to yield a system of equations, which is solved to obtain the unknowns of the approximating polynomial. The continuous form obtained, its first and second derivatives are evaluated at carefully chosen points to obtain the proposed block method needed to directly approximate fourth-order initial value problems. The method is analyzed for convergence. Implementation of the method is done by conducting numerical experiments on some test problems. The outcome of the implementation of the method suggests that the method performs well on problems with oscillatory or trigonometric terms since the approximations at several points on the solution domain did not deviate too far from the theoretical solutions. The method also shows better performance compared with an existing hybrid method when implemented on a larger interval of solution.Keywords: Chebyshev polynomial, collocation, hybrid multistep method, initial value problems, interpolation
Procedia PDF Downloads 1241449 Gas Flow, Time, Distance Dynamic Modelling
Authors: A. Abdul-Ameer
Abstract:
The equations governing the distance, pressure- volume flow relationships for the pipeline transportation of gaseous mixtures, are considered. A derivation based on differential calculus, for an element of this system model, is addressed. Solutions, yielding the input- output response following pressure changes, are reviewed. The technical problems associated with these analytical results are identified. Procedures resolving these difficulties providing thereby an attractive, simple, analysis route are outlined. Computed responses, validating thereby calculated predictions, are presented.Keywords: pressure, distance, flow, dissipation, models
Procedia PDF Downloads 4751448 Aquaporin-1 as a Differential Marker in Toxicant-Induced Lung Injury
Authors: Ekta Yadav, Sukanta Bhattacharya, Brijesh Yadav, Ariel Hus, Jagjit Yadav
Abstract:
Background and Significance: Respiratory exposure to toxicants (chemicals or particulates) causes disruption of lung homeostasis leading to lung toxicity/injury manifested as pulmonary inflammation, edema, and/or other effects depending on the type and extent of exposure. This emphasizes the need for investigating toxicant type-specific mechanisms to understand therapeutic targets. Aquaporins, aka water channels, are known to play a role in lung homeostasis. Particularly, the two major lung aquaporins AQP5 and AQP1 expressed in alveolar epithelial and vasculature endothelia respectively allow for movement of the fluid between the alveolar air space and the associated vasculature. In view of this, the current study is focused on understanding the regulation of lung aquaporins and other targets during inhalation exposure to toxic chemicals (Cigarette smoke chemicals) versus toxic particles (Carbon nanoparticles) or co-exposures to understand their relevance as markers of injury and intervention. Methodologies: C57BL/6 mice (5-7 weeks old) were used in this study following an approved protocol by the University of Cincinnati Institutional Animal Care and Use Committee (IACUC). The mice were exposed via oropharyngeal aspiration to multiwall carbon nanotube (MWCNT) particles suspension once (33 ugs/mouse) followed by housing for four weeks or to Cigarette smoke Extract (CSE) using a daily dose of 30µl/mouse for four weeks, or to co-exposure using the combined regime. Control groups received vehicles following the same dosing schedule. Lung toxicity/injury was assessed in terms of homeostasis changes in the lung tissue and lumen. Exposed lungs were analyzed for transcriptional expression of specific targets (AQPs, surfactant protein A, Mucin 5b) in relation to tissue homeostasis. Total RNA from lungs extracted using TRIreagent kit was analyzed using qRT-PCR based on gene-specific primers. Total protein in bronchoalveolar lavage (BAL) fluid was determined by the DC protein estimation kit (BioRad). GraphPad Prism 5.0 (La Jolla, CA, USA) was used for all analyses. Major findings: CNT exposure alone or as co-exposure with CSE increased the total protein content in the BAL fluid (lung lumen rinse), implying compromised membrane integrity and cellular infiltration in the lung alveoli. In contrast, CSE showed no significant effect. AQP1, required for water transport across membranes of endothelial cells in lungs, was significantly upregulated in CNT exposure but downregulated in CSE exposure and showed an intermediate level of expression for the co-exposure group. Both CNT and CSE exposures had significant downregulating effects on Muc5b, and SP-A expression and the co-exposure showed either no significant effect (Muc5b) or significant downregulating effect (SP-A), suggesting an increased propensity for infection in the exposed lungs. Conclusions: The current study based on the lung toxicity mouse model showed that both toxicant types, particles (CNT) versus chemicals (CSE), cause similar downregulation of lung innate defense targets (SP-A, Muc5b) and mostly a summative effect when presented as co-exposure. However, the two toxicant types show differential induction of aquaporin-1 coinciding with the corresponding differential damage to alveolar integrity (vascular permeability). Interestingly, this implies the potential of AQP1 as a differential marker of toxicant type-specific lung injury.Keywords: aquaporin, gene expression, lung injury, toxicant exposure
Procedia PDF Downloads 1841447 Ethical, Legal and Societal Aspects of Unmanned Aircraft in Defence
Authors: Henning Lahmann, Benjamyn I. Scott, Bart Custers
Abstract:
Suboptimal adoption of AI in defence organisations carries risks for the protection of the freedom, safety, and security of society. Despite the vast opportunities that defence AI-technology presents, there are also a variety of ethical, legal, and societal concerns. To ensure the successful use of AI technology by the military, ethical, legal, and societal aspects (ELSA) need to be considered, and their concerns continuously addressed at all levels. This includes ELSA considerations during the design, manufacturing and maintenance of AI-based systems, as well as its utilisation via appropriate military doctrine and training. This raises the question how defence organisations can remain strategically competitive and at the edge of military innovation, while respecting the values of its citizens. This paper will explain the set-up and share preliminary results of a 4-year research project commissioned by the National Research Council in the Netherlands on the ethical, legal, and societal aspects of AI in defence. The project plans to develop a future-proof, independent, and consultative ecosystem for the responsible use of AI in the defence domain. In order to achieve this, the lab shall devise a context-dependent methodology that focuses on the ‘analysis’, ‘design’ and ‘evaluation’ of ELSA of AI-based applications within the military context, which include inter alia unmanned aircraft. This is bolstered as the Lab also recognises and complements the existing methods in regards to human-machine teaming, explainable algorithms, and value-sensitive design. Such methods will be modified for the military context and applied to pertinent case-studies. These case-studies include, among others, the application of autonomous robots (incl. semi- autonomous) and AI-based methods against cognitive warfare. As the perception of the application of AI in the military context, by both society and defence personnel, is important, the Lab will study how these perceptions evolve and vary in different contexts. Furthermore, the Lab will monitor – as they may influence people’s perception – developments in the global technological, military and societal spheres. Although the emphasis of the research project is on different forms of AI in defence, it focuses on several case studies. One of these case studies is on unmanned aircraft, which will also be the focus of the paper. Hence, ethical, legal, and societal aspects of unmanned aircraft in the defence domain will be discussed in detail, including but not limited to privacy issues. Typical other issues concern security (for people, objects, data or other aircraft), privacy (sensitive data, hindrance, annoyance, data collection, function creep), chilling effects, PlayStation mentality, and PTSD.Keywords: autonomous weapon systems, unmanned aircraft, human-machine teaming, meaningful human control, value-sensitive design
Procedia PDF Downloads 931446 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
Authors: Somayeh Sobati Moghadam
Abstract:
Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy
Procedia PDF Downloads 2721445 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution
Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang
Abstract:
Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution
Procedia PDF Downloads 1601444 Calculating Asphaltenes Precipitation Onset Pressure by Using Cardanol as Precipitation Inhibitor: A Strategy to Increment the Oil Well Production
Authors: Camilo A. Guerrero-Martin, Erik Montes Paez, Marcia C. K. Oliveira, Jonathan Campos, Elizabete F. Lucas
Abstract:
Asphaltenes precipitation is considered as a formation damage problem, which can reduce the oil recovery factor. It fouls piping and surface installations, as well as cause serious flow assurance complications and decline oil well production. Therefore, researchers have shown an interest in chemical treatments to control this phenomenon. The aim of this paper is to assess the asphaltenes precipitation onset of crude oils in the presence of cardanol, by titrating the crude with n-heptane. Moreover, based on this results obtained at atmosphere pressure, the asphaltenes precipitation onset pressure were calculated to predict asphaltenes precipitation in the reservoir, by using differential liberation and refractive index data of the oils. The influence of cardanol concentrations in the asphaltenes stabilization of three Brazilian crude oils samples (with similar API densities) was studied. Therefore, four formulations of cardanol in toluene were prepared: 0, 3, 5, 10 and 15 m/m%. The formulations were added to the crude at 2:98 ratio. The petroleum samples were characterized by API density, elemental analysis and differential liberation test. The asphaltenes precipitation onset (APO) was determined by titrating with n-heptane and monitoring with near-infrared (NIR). UV-Vis spectroscopy experiments were also done to assess the precipitate asphaltenes content. The asphaltenes precipitation envelopes (APE) were also determined by numerical simulation (Multiflash). In addition, the adequate artificial lift systems (ALS) for the oils were selected. It was based on the downhole well profile and a screening methodology. Finally, the oil flowrates were modelling by NODAL analysis production system in the PIPESIM software. The results of this study show that the asphaltenes precipitation onset of the crude oils were 2.2, 2.3 and 6.0 mL of n-heptane/g of oil. The cardanol was an effective inhibitor of asphaltenes precipitation for the crude oils used in this study, since it displaces the precipitation pressure of the oil to lower values. This indicates that cardanol can increase the oil wells productivity.Keywords: asphaltenes, NODAL analysis production system, precipitation pressure onset, inhibitory molecule
Procedia PDF Downloads 1761443 Differential Diagnosis of Malaria and Dengue Fever on the Basis of Clinical Findings and Laboratory Investigations
Authors: Aman Ullah Khan, Muhammad Younus, Aqil Ijaz, Muti-Ur-Rehman Khan, Sayyed Aun Muhammad, Asif Idrees, Sanan Raza, Amar Nasir
Abstract:
Dengue fever and malaria are important vector-borne diseases of public health significance affecting millions of people around the globe. Dengue fever is caused by Dengue virus while malaria is caused by plasmodium protozoan. Generally, the consequences of Malaria are less severe compared to dengue fever. This study was designed to differentiate dengue fever and malaria on the basis of clinical and laboratory findings and to compare the changes in both diseases having different causative agents transmitted by the common vector. A total of 200 patients of dengue viral infection (120 males, 80 females) were included in this prospective descriptive study. The blood samples of the individuals were first screened for malaria by blood smear examination and then the negative samples were tested by anti-dengue IgM strip. The strip positive cases were further screened by IgM capture ELISA and their complete blood count including hemoglobin estimation (Hb), total and differential leukocyte counts (TLC and DLC), erythrocyte sedimentation rate (ESR) and platelet counts were performed. On the basis of the severity of signs and symptoms, dengue virus infected patients were subdivided into dengue fever (DF) and dengue hemorrhagic fever (DHF) comprising 70 and 100 confirmed patients, respectively. On the other hand, 30 patients were found infected with Malaria while overall 120 patients showed thrombocytopenia. The patients of DHF were found to have more leucopenia, raised hemoglobin level and thrombocytopenia < 50,000/µl compared to the patients belonging to DF and malaria. On the basis of the outcomes of the study, it was concluded that patients affected by DF were at a lower risk of undergoing haematological disturbance than suffering from DHF. While, the patients infected by Malaria were found to have no significant change in their blood components.Keywords: dengue fever, blood, serum, malaria, ELISA
Procedia PDF Downloads 3931442 Improved Estimation Strategies of Sensitive Characteristics Using Scrambled Response Techniques in Successive Sampling
Authors: S. Suman, G. N. Singh
Abstract:
This research work is an effort to analyse the consequences of scrambled response technique to estimate the current population mean in two-occasion successive sampling when the characteristic of interest is sensitive in nature. The generalized estimation procedures have been proposed using sensitive auxiliary variables under additive and multiplicative scramble models. The properties of resultant estimators have been deeply examined. Simulation, as well as empirical studies, are carried out to evaluate the performances of the proposed estimators with respect to other competent estimators. The results of our studies suggest that the proposed estimation procedures are highly effective under the presence of non-response situation. The result of this study also suggests that additive scrambled response model is a better choice in the perspective of cost of the survey and privacy of the respondents.Keywords: scrambled response, sensitive characteristic, successive sampling, optimum replacement strategy
Procedia PDF Downloads 1791441 Rich 3-Tori Dynamics in Small-Aspect-Ratio Highly Counter-Rotating Taylor-Couette Flow with Reversal of Spiraling Vortices
Authors: S. Altmeyer, B. Hof, F. Marques, J. M. Lopez
Abstract:
We present numerical simulations concerning the reversal of spiraling vortices in short highly counter-rotating cylinders. Increasing the differential cylinder rotation results in global flow-inversion is which develops various different and complex flow dynamics of several quasi-periodic solutions that differ in their number of vortex cells in the bulk. The dynamics change from being dominated of the inner cylinder boundary layer with ’passive’ only responding outer one to be dominated by the outer cylinder boundary layer with only responding inner one. Solutions exist on either two or three tori invariant manifolds whereby they appear as symmetric or asymmetric states. We find for either moderate and high inner cylinder rotation speed the quasiperiodic flow to consist of only two vortex cells but differ as the vortices has opposite spiraling direction. These both flows live on 2-tori but differ in number of symmetries. While for the quasi-periodic flow (q^a_2) at lower rotation speed a pair of symmetrically related 2-tori T2 exists the quasi-periodic flow (q^s_2) at higher rotation speeds is symmetric living on a single 2-torus T2. In addition these both flows differ due to their dominant azimuthal m modes. The first is dominated by m=1 whereas for the latter m=3 contribution is largest. The 2-tori states are separated by a further quasi-periodic flow (q^a_3) living on pair of symmetrically related 3-tori T3. This flow offers a ’periodical’ competition between a two and three vortex cell states in the bulk. This flow is also an m=1 solution as for the quasiperiodic flows living on the pair of symmetrically-related 2-tori states. Moreover we find hysteresis resulting in coexisting regions of different quasiperiodic flows q^s_2 and q^a_3 with increasing and decreasing the differential rotation.Keywords: transition, bifurcation, torus, symmetries
Procedia PDF Downloads 3581440 Structural and Functional Characterization of the Transcriptional Regulator Rv1176 of Mycobacterium tuberculosis H37Rv
Authors: Vikash Yadav, Ashish Arora
Abstract:
Microorganisms have self-defense mechanisms to protect themselves from toxic environments. Phenolic acid decarboxylase(pad) is responsible for the defense against toxicity caused by phenolic acids, converting them into less toxic vinyl derivatives. The transcription of the pad gene is regulated by a negative transcription factor, phenolic acid decarboxylase regulators (PadR), in a substrate-inducible manner. The PadR family members share the conserved DNA-binding features and interact with the operator DNA using a winged helix-turn-helix (wHTH) motif, which contains a three-helix motif and a β-stranded wing. The members of this family function as transcriptional regulators that are involved in various cellular survival processes, such as toxin production, detoxification, multidrug resistance, antibiotic biosynthesis, and carbon catabolism. Rv1176 of Mycobacterium tuberculosis H37Rv has been assigned to the PadR family protein that remains to be structurally and functionally uncharacterized. To reveal the structural mechanism by which Rv1176 could regulates effector-responsive transcription, several experiments were performed, including Electrophoretic Mobility Shift Assay (EMSA) for DNA protein interaction, differential scanning calorimetry (DSC) and Differential Scanning Fluorimetry (DSF) for temperature and ligand-dependent protein stability, Circular Dichroism (CD) spectroscopy for secondary structure analysis. Further, to evaluate the functional role of Rv1176, the intracellular survival of recombinant M. smegmatis was examined in murine macrophage cell line J774A.1 and different stressed conditions like oxidative, pH, and nutritive stress. All these studies demonstrated that Rv1176 could behave as a transcription regulator and its expression in recombinant M. smegmatis increases intracellular survival.Keywords: EMSA, Mycobacterium tuberculosis, PadR family protein, transcriptional regulator
Procedia PDF Downloads 801439 Real Time PCR Analysis of microRNA Expression in Oral Cancer
Authors: Karl Kingsley
Abstract:
Many mechanisms are involved in the control of cellular differentiation and growth, which are often dysregulated in many cancers. Many distinct pathways are involved in these mechanisms of control, including deoxyribonuclease (DNA) methyltransferase and histone deacetylase (HDAC) activation that controls both genetic and epigenetic modifications and micro ribonucleic acid (RNA) expression. Less is known about the expression of DNA methyltransferase (DNMT) and HDAC in oral cancers and the effect on microRNA expression. The primary objective of this study was to evaluate the expression of DNMT and HDAC family members in oral cancer and the concomitant expression of cancer-associated microRNAs. Using commercially available oral cancers, including squamous cell carcinoma (SCC)-4, SCC-9, SCC-15, and SCC-25, RNA was extracted and screened for DNMT, HDAC, and microRNA expression using highly-specific primers and quantitative polymerase chain reaction (qPCR). These data revealed low or absent expression of DNMT-1, which is associated with cellular differentiation but increased expression of DNMT-3a and DNMT-3b in all SCC cell lines compared with normal non-cancerous cell controls. In addition, no expression of HDAC1 and HDAC2 expression was found among the normal, non-cancerous cells but was highly expressed in each of the SCC cell lines examined. Differential expression of oncogenic and cancer-associated microRNAs was also observed among the SCC cell lines, including miR-21, miR-133, miR-149, miR-155, miR-365, and miR-720. These findings also appeared to vary according to observed growth rates among these cells. These data may be the first to demonstrate the expression and association between HDAC and DNMT3 family members among oral cancers. In addition, the differential expression of these epigenetic modifiers may be associated with the expression of specific microRNAs in these cancers, which have not previously been observed to the best of the author's knowledge. In addition, some associations and relationships may exist between the expression of these biomarkers and the rates of growth and proliferation, which may suggest that these expression patterns might represent potentially useful biomarkers to determine tumor aggressiveness and other phenotypic behaviors among oral cancers.Keywords: oral cancer, DNA methyltransferase, histone deacetylase, microRNA
Procedia PDF Downloads 1411438 Existence Solutions for Three Point Boundary Value Problem for Differential Equations
Authors: Mohamed Houas, Maamar Benbachir
Abstract:
In this paper, under weak assumptions, we study the existence and uniqueness of solutions for a nonlinear fractional boundary value problem. New existence and uniqueness results are established using Banach contraction principle. Other existence results are obtained using scheafer and krasnoselskii's fixed point theorem. At the end, some illustrative examples are presented.Keywords: caputo derivative, boundary value problem, fixed point theorem, local conditions
Procedia PDF Downloads 429