Search results for: hardware impairment
256 Clean Sky 2 Project LiBAT: Light Battery Pack for High Power Applications in Aviation – Simulation Methods in Early Stage Design
Authors: Jan Dahlhaus, Alejandro Cardenas Miranda, Frederik Scholer, Maximilian Leonhardt, Matthias Moullion, Frank Beutenmuller, Julia Eckhardt, Josef Wasner, Frank Nittel, Sebastian Stoll, Devin Atukalp, Daniel Folgmann, Tobias Mayer, Obrad Dordevic, Paul Riley, Jean-Marc Le Peuvedic
Abstract:
Electrical and hybrid aerospace technologies pose very challenging demands on the battery pack – especially with respect to weight and power. In the Clean Sky 2 research project LiBAT (funded by the EU), the consortium is currently building an ambitious prototype with state-of-the art cells that shows the potential of an intelligent pack design with a high level of integration, especially with respect to thermal management and power electronics. For the latter, innovative multi-level-inverter technology is used to realize the required power converting functions with reduced equipment. In this talk the key approaches and methods of the LiBat project will be presented and central results shown. Special focus will be set on the simulative methods used to support the early design and development stages from an overall system perspective. The applied methods can efficiently handle multiple domains and deal with different time and length scales, thus allowing the analysis and optimization of overall- or sub-system behavior. It will be shown how these simulations provide valuable information and insights for the efficient evaluation of concepts. As a result, the construction and iteration of hardware prototypes has been reduced and development cycles shortened.Keywords: electric aircraft, battery, Li-ion, multi-level-inverter, Novec
Procedia PDF Downloads 165255 Accessible Tourism: A Novel Idea for Promoting Tourism in Nepal
Authors: Pankaj Pradhananga
Abstract:
Inclusive Tourism is a relatively new topic in Nepal. Though the effort of creating accessible and inclusive tourism has already begun, it is still in its infancy. A major concern for Destination Nepal is the lack of awareness and absence of mandatory law in place to encourage Tourism operating sectors for coming up with accessible Tourism products. Given the number economic and social benefits to may be derived from inclusive tourism, it is a critical time for the tourism industry to understand and develop measures towards inclusivity in the gateway to Himalaya. Nepal was struck with a devastating earthquake on April 25th, 2015 which concurrently left more than 4,000 Nepalese with physical disabilities. Nepal has had to rebuild and is continuing to rebuild a lot of infrastructure and the process of rebuilding should be barrier free and use universal design measures. With universal design in place, this would allow access for minority groups such as people with disabilities and the elderly to the historic monuments in Kathmandu valley. Four Seasons Travel ( 4ST) has been a key player in not only creating accessible tourism experiences in Nepal, but also promoting accessible tourism to other tourism operators. Dr. Scott Rains had worked closely with 4ST on accessible tourism. Additionally, it organised an accessible trek which was field tested with a traveler with vision impairment in August 2015. Another accessible trekking experience, in partnership with Washington DC based International Development Institute, was coined as ‘Wounded Heroes Trek to Nepal’, where a group of Veterans that are amputees went trekking in the Annapurna Region. The event made it to the list of UNWTO World Tourism Day celebrations. Such initiatives led by private sector in partnership with various organizations have worked to create a ‘Destination Nepal for all’. However, there is still a lot of work that needs to be done to make Nepal a truly inclusive destination. Partnerships between the private sector and DPOs ( Disabled People’s Organizations) as well as the government are also a sound opportunity for employment creation for people with disabilities. Further, partnerships between the state, tourism service providers and DPOs need to be fostered to create job opportunities for people with disabilities. This can be exemplified through the social Entrepreneurship model with the help of accessible Tourism.Keywords: accessible tourism, disability, earthquake, inclusion
Procedia PDF Downloads 472254 The Impact of Gold Mining on Disability: Experiences from the Obuasi Municipal Area
Authors: Mavis Yaa Konadu Agyemang
Abstract:
Despite provisions to uphold and safeguard the rights of persons with disability in Ghana, there is evidence that they still encounter several challenges which limit their full and effective involvement in mainstream society, including the gold mining sector. The study sought to explore how persons with physical disability (PWPDs) experience gold mining in the Obuasi Municipal Area. A qualitative research design was used to discover and understand the experiences of PWPDs regarding mining. The purposive sampling technique was used to select five key informants for the study with the age range of (24-52 years) while snowball sampling aided the selection of 16 persons with various forms of physical disability with the age range of (24-60 years). In-depth interviews were used to gather data. The interviews lasted from forty-five minutes to an hour. In relation to the setting, the interviews of thirteen (13) of the participants with disability were done in their houses, two (2) were done on the phone, and one (1) was done in the office. Whereas the interviews of the five (5) key informants were all done in their offices. Data were analyzed using Creswell’s (2009) concept of thematic analysis. The findings suggest that even though land degradation affected everyone in the area, persons with mobility and visual impairment experienced many difficulties trekking the undulating land for long distances in search of arable land. Also, although mining activities are mostly labour-intensive, PWPDs were not employed even in areas where they could work. Further, the cost of items, in general, was high, affecting PWPDs more due to their economic immobility and paying for other sources of water due to land degradation and water pollution. The study also discovered that the peculiar conditions of PWPDs were not factored into compensation payments, and neither were females with physical disability engaged in compensation negotiations. Also, although some of the infrastructure provided by the gold mining companies in the area was physically accessible to some extent, it was not accessible in terms of information delivery. There is a need to educate the public on the effects of mining on PWPDs, their needs as well as disability issues in general. The Minerals and Mining Act (703) should be amended to include provisions that would consider the peculiar needs of PWPDs in compensation payment.Keywords: mining, resettlement, compensation, environmental, social, disability
Procedia PDF Downloads 54253 Co-Design of Accessible Speech Recognition for Users with Dysarthric Speech
Authors: Elizabeth Howarth, Dawn Green, Sean Connolly, Geena Vabulas, Sara Smolley
Abstract:
Through the EU Horizon 2020 Nuvoic Project, the project team recruited 70 individuals in the UK and Ireland to test the Voiceitt speech recognition app and provide user feedback to developers. The app is designed for people with dysarthric speech, to support communication with unfamiliar people and access to speech-driven technologies such as smart home equipment and smart assistants. Participants with atypical speech, due to a range of conditions such as cerebral palsy, acquired brain injury, Down syndrome, stroke and hearing impairment, were recruited, primarily through organisations supporting disabled people. Most had physical or learning disabilities in addition to dysarthric speech. The project team worked with individuals, their families and local support teams, to provide access to the app, including through additional assistive technologies where needed. Testing was user-led, with participants asked to identify and test use cases most relevant to their daily lives over a period of three months or more. Ongoing technical support and training were provided remotely and in-person throughout the testing period. Structured interviews were used to collect feedback on users' experiences, with delivery adapted to individuals' needs and preferences. Informal feedback was collected through ongoing contact between participants, their families and support teams and the project team. Focus groups were held to collect feedback on specific design proposals. User feedback shared with developers has led to improvements to the user interface and functionality, including faster voice training, simplified navigation, the introduction of gamification elements and of switch access as an alternative to touchscreen access, with other feature requests from users still in development. This work offers a case-study in successful and inclusive co-design with the disabled community.Keywords: co-design, assistive technology, dysarthria, inclusive speech recognition
Procedia PDF Downloads 110252 Effect of Blood Sugar Levels on Short Term and Working Memory Status in Type 2 Diabetics
Authors: Mythri G., Manjunath ML, Girish Babu M., Shireen Swaliha Quadri
Abstract:
Background: The increase in diabetes among the elderly is of concern because in addition to the wide range of traditional diabetes complications, evidence has been growing that diabetes is associated with increased risk of cognitive decline. Aims and Objectives: To find out if there is any association between blood sugar levels and short-term and working memory status in patients of type 2 diabetes. Materials and Methods: The study was carried out in 200 individuals aged between 40-65 years consisting of 100 diagnosed cases of Type 2 Diabetes Mellitus and 100 non-diabetics from OPD of Mc Gann Hospital, Shivamogga. Rye’s Auditory Verbal Learning Test, Verbal Fluency Test and Visual Reproduction Test, Working Digit Span Test and Validation Span Test were used to assess short-term and working memory. Fasting and Post Prandial blood sugar levels were estimated. Statistical analysis was done using SPSS 21. Results: Memory test scores of type 2 diabetics were significantly reduced (p < 0.001) when compared to the memory scores of age and gender matched non-diabetics. Fasting blood sugar levels were found to have a negative correlation with memory scores for all 5 tests: AVLT (r=-0.837), VFT (r=-0.888), VRT(r=-0.787), WDST (r=-0.795) and VST (r=-0.943). Post- Prandial blood sugar levels were found to have a negative correlation with memory scores for all 5 tests: AVLT (r=-0.922), VFT (r=-0.848), VRT(r=-0.707),WDST (r=-0.729) and VST (r=-0.880) Memory scores in all 5 tests were found to be negatively correlated with the FBS and PPBS levels in diabetic patients (p < 0.001). Conclusion: The decreased memory status in diabetic patients may be due to many factors like hyperglycemia, vascular disease, insulin resistance, amyloid deposition and also some of the factor combine to produce additive effects like, type of diabetes, co-morbidities, age of onset, duration of the disease and type of therapy. These observed effects of blood sugar levels of diabetics on memory status are of potential clinical importance because even mild cognitive impairment could interfere with todays’ activities.Keywords: diabetes, cognition, diabetes, HRV, respiratory medicine
Procedia PDF Downloads 282251 Classic Modelled Hybrid Electric Vehicles Using The Power of Internet Of Things
Authors: Venkatesh Krishna Murthy
Abstract:
The era before government-regulated automotive designs gave us some astonishing vehicles that are well worth to keep on the road. The fact that restoring an automobile in 2015 does not mean it will perform like one designed in 2021. This is one of the reasons that manufacturers continue to turn to vintage hardware for future enhancements in their vehicles. Now we need to understand that a modern chassis could possibly allow manufacturers to give vintage performance cars a level of braking capability, compatibility with tires, chassis rigidity, suspension sophistication, and steering response, an experience only racers got until now. However, half a century of advancements in engineering can have a great impact on design in any field, and the automotive realm which holds no exception. In the current situation, a growing number of companies offer chassis and braking components to onboard manufacturers to retrofit contemporary technology for their vintage vehicles to modernize them at the foundation level. The recent question arises on performance on lithium batteries, as opposed to simply bolting upgraded components, for ex. lithium batteries with graphene as superconductive material to enhance performance, an area deeply investigated. Serving as the “bones” of the vehicle, the chassis and frame play a central role in dictating how that automobile will perform. While the desire to maintain originality is alluring for many, the benefits of a modern chassis are vast. In some situations, it also allows builders to put cars back on the road that might otherwise be too far gone. “There’s a couple of different factors at play here – one of them being that these older cars from the ’40s, ’50s, and ’60s have seen a lot of weather and a lot of road miles over the years, more often than not,” says Craig Morrison of Art Morrison Enterprises.Keywords: hybrid electric vehicles, internet of things, lithium graphene batteries, classic car chassis
Procedia PDF Downloads 171250 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 116249 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 350248 Demographic Variations of Multiple Sclerosis Patients between Britain and Kuwait
Authors: Ali Fuad Ashour
Abstract:
Introduction: Multiple sclerosis (MS) is a chronic, progressive and degenerative disease that affects the central nervous system (CNS). MS has been described to result in the debilitating symptom of the disease. It is reported to have a negative impact on the patient’s mental activities, brings a lower quality of life, leads to unemployment, causes distress and psychological disorders, generates low levels of motivation and self-esteem, and result in disability and neurological impairment. The aim of this study was to compare the effects of MS on patients from Britain and Kuwait. Methodology: A questionnaire was distributed to 200 individuals with MS (100 Kuwaiti and 100 British). The questionnaire consists of three parts; 1. General demographics, 2. Disease-specific data (symptoms, severity levels, relapse frequency, and support system), and 3. Attitudes towards physical exercise. Results: A response rate of 62% from the British sample and 50% from the Kuwaiti sample was achieved. 84% of the sample (n=52) were 41 years old or over. The duration of the disease was less than 10 years in 43.4% of British and 68% of Kuwaiti respondents. The majority of British respondents (56.5%) reported the disease severity to be moderate, while the majority of Kuwaitis was mild (72%). The annual relapse rates in Kuwait were relatively low, with 82% of the Kuwaiti sample had one relapse per year, compared to the 64.5% of British. The most common symptoms reported by British respondents were balance (75.8%), fatigue (74.2%), and weakness (71%), and by Kuwaiti respondents were fatigue (86%), balance (76%), and weakness (66%). The help and support for MS were by far more diverse for the British than Kuwaiti respondents. Discussion: The results unveiled marked differences between two groups of British and Kuwaiti MS patients in terms of patients’ age and disease duration, and severity. The overwhelming majority of Kuwaiti patients are young individuals who have been with the disease for a relatively short period of time, and their MS in most cases was mild. On the other hand, British patients were relatively older, many have been with the disease for a long period of time, and their average MS condition was more serious than that of their Kuwaiti counterparts. The main support in Kuwait comes from the neurologist, who primarily prescribe medications and advise patients to try to be active. The Kuwaiti respondents thought that lack of encouragement was the main reason for them not to engage in social activities.Keywords: multiple sclerosis, Kuwait, exercise, demographic
Procedia PDF Downloads 118247 Diagnosing and Treating Breast Cancer during Pregnancy: Neonatal Outcomes after Chemotherapy
Authors: Elyce Cardonick, Shistri Dhar, Linsdey Seidman
Abstract:
Background: When breast cancer is diagnosed during pregnancy, the prognosis is comparable to non-pregnant women matched for prognostic indicators when pregnant women receive treatment without delay. Chemotherapy, including taxanes, can be given during pregnancy with normal neonatal development in exposed fetuses. Methods: Cases of primary breast cancer were extracted from the Cancer and Pregnancy Registry and longitudinal study at Cooper Medical School, which collects cases of pregnant women diagnosed and treated for cancer into a single database. Obstetrical, oncology and pediatric records were reviewed, including annual neonatal developmental, behavioral and medical assessments. Results: 270 pregnant women were diagnosed with primary breast cancer at a mean gestational age of 14.7+9weeks. Mean maternal age at diagnosis 34.5+4.5 years. Receptor status is comparable to non-pregnant women of reproductive age. Forty-nine women were advised to terminate. Two hundred two women underwent surgery;244 women received chemotherapy in pregnancy after the first trimester; the majority of Doxorubucin/Cytoxan; 81 of the cases included a taxane. At a mean of 90 months, follow up obtained on 255 newborns.192/255 newborns are meeting developmental milestones. Respiratory illnesses, including asthma, and bronchiolitis, were reported in 64 newborns, the most common medical condition reported. Thirty-one children are undergoing treatment for GERD, 11 for urinary tract infections, and 7 are undergoing treatment for anemia. Twenty-six children with expressive or articulation language delays, 21/26 are mild. Eleven children with gross/ 7 with fine motor delays. Eight children are treated for ADHD, 4 for anxiety and 4 have social skill impairment. The majority of children with developmental, language or motor delays were born preterm. Conclusion: After chemotherapy exposure in utero for breast cancer, the majority of newborns are meeting developmental milestones and are medically healthy. The goal for treating pregnant women with breast cancer is to aim for delivery close to the term.Keywords: breast cancer, pregnancy, chemotherapy, newborn
Procedia PDF Downloads 117246 ChaQra: A Cellular Unit of the Indian Quantum Network
Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh
Abstract:
Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.Keywords: quantum network, quantum key distribution, quantum security, quantum information
Procedia PDF Downloads 56245 Importance of Detecting Malingering Patients in Clinical Setting
Authors: Sakshi Chopra, Harsimarpreet Kaur, Ashima Nehra
Abstract:
Objectives: Malingering is fabricating or exaggerating the symptoms of mental or physical disorders for a variety of secondary gains or motives, which may include financial compensation; avoiding work; getting lighter criminal sentences; or simply to attract attention or sympathy. Malingering is different from somatization disorder and factitious disorder. The prevalence of malingering is unknown and difficult to determine. In an estimated study in forensic population, it can reach up to 17% cases. But the accuracy of such estimates is questionable as successful malingerers are not detected and thus, not included. Methods: The case study of a 58 years old, right handed, graduate, pre-morbidly working in a national company with reported history of stroke leading to head injury; cerebral infarction/facial palsy and dementia. He was referred for disability certification so that his job position can be transferred to his son as he could not work anymore. A series of Neuropsychological tests were administered. Results: With a mental age of < 2.5 years; social adaptive functioning was overall < 20 showing profound Mental Retardation, less than 1 year social age in abilities of self-help, eating, dressing, locomotion, occupation, communication, self-direction, and socialization; severely impaired verbal and performance ability, 96% impairment in Activities of Daily Living, with an indication of very severe depression. With inconsistent and fluctuating medical findings and problem descriptions to different health professionals forming the board for his disability, it was concluded that this patient was malingering. Conclusions: Even though it can be easily defined, malingering can be very challenging to diagnosis. Cases of malingering impose a substantial economic burden on the health care system and false attribution of malingering imposes a substantial burden of suffering on a significant proportion of the patient population. Timely, tactful diagnosis and management can help ease this patient burden on the healthcare system. Malingering can be detected by only trained mental health professionals in the clinical setting.Keywords: disability, India, malingering, neuropsychological assessment
Procedia PDF Downloads 419244 Evaluation of Model-Based Code Generation for Embedded Systems–Mature Approach for Development in Evolution
Authors: Nikolay P. Brayanov, Anna V. Stoynova
Abstract:
Model-based development approach is gaining more support and acceptance. Its higher abstraction level brings simplification of systems’ description that allows domain experts to do their best without particular knowledge in programming. The different levels of simulation support the rapid prototyping, verifying and validating the product even before it exists physically. Nowadays model-based approach is beneficial for modelling of complex embedded systems as well as a generation of code for many different hardware platforms. Moreover, it is possible to be applied in safety-relevant industries like automotive, which brings extra automation of the expensive device certification process and especially in the software qualification. Using it, some companies report about cost savings and quality improvements, but there are others claiming no major changes or even about cost increases. This publication demonstrates the level of maturity and autonomy of model-based approach for code generation. It is based on a real live automotive seat heater (ASH) module, developed using The Mathworks, Inc. tools. The model, created with Simulink, Stateflow and Matlab is used for automatic generation of C code with Embedded Coder. To prove the maturity of the process, Code generation advisor is used for automatic configuration. All additional configuration parameters are set to auto, when applicable, leaving the generation process to function autonomously. As a result of the investigation, the publication compares the quality of generated embedded code and a manually developed one. The measurements show that generally, the code generated by automatic approach is not worse than the manual one. A deeper analysis of the technical parameters enumerates the disadvantages, part of them identified as topics for our future work.Keywords: embedded code generation, embedded C code quality, embedded systems, model-based development
Procedia PDF Downloads 244243 Smart Help at the Workplace for Persons with Disabilities (SHW-PWD)
Authors: Ghassan Kbar, Shady Aly, Ibrahim Alsharawy, Akshay Bhatia, Nur Alhasan, Ronaldo Enriquez
Abstract:
The Smart Help for persons with disability (PWD) is a part of the project SMARTDISABLE which aims to develop relevant solution for PWD that target to provide an adequate workplace environment for them. It would support PWD needs smartly through smart help to allow them access to relevant information and communicate with other effectively and flexibly, and smart editor that assist them in their daily work. It will assist PWD in knowledge processing and creation as well as being able to be productive at the work place. The technical work of the project involves design of a technological scenario for the Ambient Intelligence (AmI) - based assistive technologies at the workplace consisting of an integrated universal smart solution that suits many different impairment conditions and will be designed to empower the Physically disabled persons (PDP) with the capability to access and effectively utilize the ICTs in order to execute knowledge rich working tasks with minimum efforts and with sufficient comfort level. The proposed technology solution for PWD will support voice recognition along with normal keyboard and mouse to control the smart help and smart editor with dynamic auto display interface that satisfies the requirements for different PWD group. In addition, a smart help will provide intelligent intervention based on the behavior of PWD to guide them and warn them about possible misbehavior. PWD can communicate with others using Voice over IP controlled by voice recognition. Moreover, Auto Emergency Help Response would be supported to assist PWD in case of emergency. This proposed technology solution intended to make PWD very effective at the work environment and flexible using voice to conduct their tasks at the work environment. The proposed solution aims to provide favorable outcomes that assist PWD at the work place, with the opportunity to participate in PWD assistive technology innovation market which is still small and rapidly growing as well as upgrading their quality of life to become similar to the normal people at the workplace. Finally, the proposed smart help solution is applicable in all workplace setting, including offices, manufacturing, hospital, etc.Keywords: ambient intelligence, ICT, persons with disability PWD, smart application, SHW
Procedia PDF Downloads 423242 Virtual Reality and Avatars in Education
Authors: Michael Brazley
Abstract:
Virtual Reality (VR) and 3D videos are the most current generation of learning technology today. Virtual Reality and 3D videos are being used in professional offices and Schools now for marketing and education. Technology in the field of design has progress from two dimensional drawings to 3D models, using computers and sophisticated software. Virtual Reality is being used as collaborative means to allow designers and others to meet and communicate inside models or VR platforms using avatars. This research proposes to teach students from different backgrounds how to take a digital model into a 3D video, then into VR, and finally VR with multiple avatars communicating with each other in real time. The next step would be to develop the model where people from three or more different locations can meet as avatars in real time, in the same model and talk to each other. This research is longitudinal, studying the use of 3D videos in graduate design and Virtual Reality in XR (Extended Reality) courses. The research methodology is a combination of quantitative and qualitative methods. The qualitative methods begin with the literature review and case studies. The quantitative methods come by way of student’s 3D videos, survey, and Extended Reality (XR) course work. The end product is to develop a VR platform with multiple avatars being able to communicate in real time. This research is important because it will allow multiple users to remotely enter your model or VR platform from any location in the world and effectively communicate in real time. This research will lead to improved learning and training using Virtual Reality and Avatars; and is generalizable because most Colleges, Universities, and many citizens own VR equipment and computer labs. This research did produce a VR platform with multiple avatars having the ability to move and speak to each other in real time. Major implications of the research include but not limited to improved: learning, teaching, communication, marketing, designing, planning, etc. Both hardware and software played a major role in project success.Keywords: virtual reality, avatars, education, XR
Procedia PDF Downloads 98241 The Fragility of Sense: The Twofold Temporality of Embodiment and Its Role for Depression
Authors: Laura Bickel
Abstract:
This paper aims to investigate to what extent Merleau-Ponty’s philosophy of body memory serves as a viable resource for the enactive approach to cognitive science and its first-person experience-based research on ‘recurrent depressive disorder’ coded F33 in ICD-10. In pursuit of this goal, the analysis begins by revisiting the neuroreductive paradigm. This paradigm serves biological psychiatry to explain the condition of vital contact in terms of underlying neurophysiological mechanisms. It is demonstrated that the neuroreductive model cannot sufficiently account for the depressed person’s episodical withdrawal in causal terms. The analysis of the irregular loss of vital resonance requires integrating the body as the subject of experience and its phenomenological time. Then, it is shown that the enactive approach to depression as disordered sense-making is a promising alternative. The enactive model of perception implies that living beings do not register pre-existing meaning ‘out there’ but unfold ‘sense’ in their action-oriented response to the world. For the enactive approach, Husserl’s passive synthesis of inner time consciousness is fundamental for what becomes perceptually present for action. It seems intuitive to bring together the enactive approach to depression with the long-standing view in phenomenological psychopathology that explains the loss of vital contact by appealing to the disruption of the temporal structure of consciousness. However, this paper argues that the disruption of the temporal structure is not justified conceptually. Instead, one may integrate Merleau-Ponty’s concept of the past as the unconscious into the enactive approach to depression. From this perspective, the living being’s experiential and biological past inserts itself in the form of habit and bodily skills and ensures action-oriented responses to the environment. Finally, it is concluded that the depressed person’s withdrawal indicates the impairment of this application process. The person suffering from F33 cannot actualize sedimented meaning to respond to the valences and tasks of a given situation.Keywords: depression, enactivism, neuroreductionsim, phenomenology, temporality
Procedia PDF Downloads 132240 The h3r Antagonist E159 Alleviates Neuroinflammation and Autistic-Like Phenotypes in BTBR T+ tf/J Mouse Model of Autism
Authors: Shilu Deepa Thomas, P. Jayaprakash, Dorota Łazewska, Katarzyna Kieć-Kononowicz, B. Sadek
Abstract:
A large body of evidence suggests the involvement of cognitive impairment, increased levels of inflammation and oxidative stress in the pathogenesis of autism spectrum disorder (ASD). ASD commonly coexists with psychiatric conditions like anxiety and cognitive challenges, and individuals with ASD exhibit significant levels of inflammation and immune system dysregulation. Previous Studies have identified elevated levels of pro-inflammatory markers such as IL-1β, IL-6, IL-2 and TNF-α, particularly in young children with ASD. The current therapeutic options for ASD show limited effectiveness, signifying the importance of exploring an efficient drugs to address the core symptoms. The role of histamine H3 receptors (H3Rs) in memory and the prospective role of H3R antagonists in pharmacological control of neurodegenerative disorders, e.g., ASD, is well-accepted. Hence, the effects of chronic systemic administration of H3R antagonist E159 on autistic-like repetitive behaviors, social deficits, memory and anxiety parameters, as well as neuroinflammation in Black and Tan BRachyury (BTBR) mice, were evaluated using Y maze, Barnes maze, self-grooming, open field and three chamber social test. E159 (2.5, 5 and 10 mg/kg, i.p.) dose-dependently ameliorated repetitive and compulsive behaviors by reducing the increased time spent in self-grooming and improved reduced spontaneous alternation in BTBR mice. Moreover, treatment with E159 attenuated disturbed anxiety levels and social deficits in tested male BTBR mice. Furthermore, E159 attenuated oxidative stress by significantly increasing GSH, CAT, and SOD and decreasing the increased levels of MDA in the cerebellum as well as the hippocampus. In addition, E159 decreased the elevated levels of proinflammatory cytokines (tumor necrosis factor (TNF-α), interleukin-1β (IL-1β), and IL-6). The observed results show that H3R antagonists like E159 may represent a promising novel pharmacological strategy for the future treatment of ASD.Keywords: histamine H3 receptors, antagonist E159, autism, behaviors, mice
Procedia PDF Downloads 64239 Immune Modulation and Cytomegalovirus Reactivation in Sepsis-Induced Immunosuppression
Authors: G. Lambe, D. Mansukhani, A. Shetty, S. Khodaiji, C. Rodrigues, F. Kapadia
Abstract:
Introduction: Sepsis is known to cause impairment of both innate and adaptive immunity and involves an early uncontrolled inflammatory response, followed by a protracting immunosuppression phase, which includes decreased expression of cell receptors, T cell anergy and exhaustion, impaired cytokine production, which may cause high risk for secondary infections due to reduced response to antigens. Although human cytomegalovirus (CMV) is widely recognized as a serious viral pathogen in sepsis and immunocompromised patients, the incidence of CMV reactivation in patients with sepsis lacking strong evidence of immunosuppression is not well defined. Therefore, it is important to determine an association between CMV reactivation and sepsis-induced immunosuppression. Aim: To determine the association between incidence of CMV reactivation and immune modulation in sepsis-induced immunosuppression with time. Material and Methods: Ten CMV-seropositive adult patients with severe sepsis were included in this study. Blood samples were collected on Day 0, and further weekly up to 21 days. CMV load was quantified by real-time PCR using plasma. The expression of immunosuppression markers, namely, HLA-DR, PD-1, and regulatory T cells, were determined by flow cytometry using whole blood. Results: At Day 0, no CMV reactivation was observed in 6/10 patients. In these patients, the median length for reactivation was 14 days (range, 7-14 days). The remaining four patients, at Day 0, had a mean viral load of 1802+2599 copies/ml, which increased with time. At Day 21, the mean viral load for all 10 patients was 60949+179700 copies/ml, indicating that viremia increased with the length of stay in the hospital. HLA-DR expression on monocytes significantly increased from Day 0 to Day 7 (p = 0.001), following which no significant change was observed until Day 21, for all patients except 3. In these three patients, HLA-DR expression on monocytes showed a decrease at elevated viral load (>5000 copies/ml), indicating immune suppression. However, the other markers, PD-1 and regulatory T cells, did not show any significant changes. Conclusion: These preliminary findings suggest that CMV reactivation can occur in patients with severe sepsis. In fact, the viral load continued to increase with the length of stay in the hospital. Immune suppression, indicated by decreased expression of HLA-DR alone, was observed in three patients with elevated viral load.Keywords: CMV reactivation, immune suppression, sepsis immune modulation, CMV viral load
Procedia PDF Downloads 150238 Numerical Studies for Standard Bi-Conjugate Gradient Stabilized Method and the Parallel Variants for Solving Linear Equations
Authors: Kuniyoshi Abe
Abstract:
Bi-conjugate gradient (Bi-CG) is a well-known method for solving linear equations Ax = b, for x, where A is a given n-by-n matrix, and b is a given n-vector. Typically, the dimension of the linear equation is high and the matrix is sparse. A number of hybrid Bi-CG methods such as conjugate gradient squared (CGS), Bi-CG stabilized (Bi-CGSTAB), BiCGStab2, and BiCGstab(l) have been developed to improve the convergence of Bi-CG. Bi-CGSTAB has been most often used for efficiently solving the linear equation, but we have seen the convergence behavior with a long stagnation phase. In such cases, it is important to have Bi-CG coefficients that are as accurate as possible, and the stabilization strategy, which stabilizes the computation of the Bi-CG coefficients, has been proposed. It may avoid stagnation and lead to faster computation. Motivated by a large number of processors in present petascale high-performance computing hardware, the scalability of Krylov subspace methods on parallel computers has recently become increasingly prominent. The main bottleneck for efficient parallelization is the inner products which require a global reduction. The resulting global synchronization phases cause communication overhead on parallel computers. The parallel variants of Krylov subspace methods reducing the number of global communication phases and hiding the communication latency have been proposed. However, the numerical stability, specifically, the convergence speed of the parallel variants of Bi-CGSTAB may become worse than that of the standard Bi-CGSTAB. In this paper, therefore, we compare the convergence speed between the standard Bi-CGSTAB and the parallel variants by numerical experiments and show that the convergence speed of the standard Bi-CGSTAB is faster than the parallel variants. Moreover, we propose the stabilization strategy for the parallel variants.Keywords: bi-conjugate gradient stabilized method, convergence speed, Krylov subspace methods, linear equations, parallel variant
Procedia PDF Downloads 163237 Identification of Risks Associated with Process Automation Systems
Authors: J. K. Visser, H. T. Malan
Abstract:
A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.Keywords: distributed control system, identification of risks, information technology, process automation system
Procedia PDF Downloads 139236 Multi-Scale Modelling of the Cerebral Lymphatic System and Its Failure
Authors: Alexandra K. Diem, Giles Richardson, Roxana O. Carare, Neil W. Bressloff
Abstract:
Alzheimer's disease (AD) is the most common form of dementia and although it has been researched for over 100 years, there is still no cure or preventive medication. Its onset and progression is closely related to the accumulation of the neuronal metabolite Aβ. This raises the question of how metabolites and waste products are eliminated from the brain as the brain does not have a traditional lymphatic system. In recent years the rapid uptake of Aβ into cerebral artery walls and its clearance along those arteries towards the lymph nodes in the neck has been suggested and confirmed in mice studies, which has led to the hypothesis that interstitial fluid (ISF), in the basement membranes in the walls of cerebral arteries, provides the pathways for the lymphatic drainage of Aβ. This mechanism, however, requires a net reverse flow of ISF inside the blood vessel wall compared to the blood flow and the driving forces for such a mechanism remain unknown. While possible driving mechanisms have been studied using mathematical models in the past, a mechanism for net reverse flow has not been discovered yet. Here, we aim to address the question of the driving force of this reverse lymphatic drainage of Aβ (also called perivascular drainage) by using multi-scale numerical and analytical modelling. The numerical simulation software COMSOL Multiphysics 4.4 is used to develop a fluid-structure interaction model of a cerebral artery, which models blood flow and displacements in the artery wall due to blood pressure changes. An analytical model of a layer of basement membrane inside the wall governs the flow of ISF and, therefore, solute drainage based on the pressure changes and wall displacements obtained from the cerebral artery model. The findings suggest that an active role in facilitating a reverse flow is played by the components of the basement membrane and that stiffening of the artery wall during age is a major risk factor for the impairment of brain lymphatics. Additionally, our model supports the hypothesis of a close association between cerebrovascular diseases and the failure of perivascular drainage.Keywords: Alzheimer's disease, artery wall mechanics, cerebral blood flow, cerebral lymphatics
Procedia PDF Downloads 526235 Fire Safety Assessment of At-Risk Groups
Authors: Naser Kazemi Eilaki, Carolyn Ahmer, Ilona Heldal, Bjarne Christian Hagen
Abstract:
Older people and people with disabilities are recognized as at-risk groups when it comes to egress and travel from hazard zone to safe places. One's disability can negatively influence her or his escape time, and this becomes even more important when people from this target group live alone. This research deals with the fire safety of mentioned people's buildings by means of probabilistic methods. For this purpose, fire safety is addressed by modeling the egress of our target group from a hazardous zone to a safe zone. A common type of detached house with a prevalent plan has been chosen for safety analysis, and a limit state function has been developed according to the time-line evacuation model, which is based on a two-zone and smoke development model. An analytical computer model (B-Risk) is used to consider smoke development. Since most of the involved parameters in the fire development model pose uncertainty, an appropriate probability distribution function has been considered for each one of the variables with indeterministic nature. To achieve safety and reliability for the at-risk groups, the fire safety index method has been chosen to define the probability of failure (causalities) and safety index (beta index). An improved harmony search meta-heuristic optimization algorithm has been used to define the beta index. Sensitivity analysis has been done to define the most important and effective parameters for the fire safety of the at-risk group. Results showed an area of openings and intervals to egress exits are more important in buildings, and the safety of people would improve with increasing dimensions of occupant space (building). Fire growth is more critical compared to other parameters in the home without a detector and fire distinguishing system, but in a home equipped with these facilities, it is less important. Type of disabilities has a great effect on the safety level of people who live in the same home layout, and people with visual impairment encounter more risk of capturing compared to visual and movement disabilities.Keywords: fire safety, at-risk groups, zone model, egress time, uncertainty
Procedia PDF Downloads 103234 Quality of Life in People with Hearing Loss: A Study of Patients Referred to an Audiological Service
Authors: Peder O. Laugen Heggdal, Oyvind Nordvik, Jonas Brannstrom, Flemming Vassbotn, Anne Kari Aarstad, Hans Jorgen Aarstad
Abstract:
Background: Hearing loss (HL) affect people of all ages and stages in life. To author's best knowledge, if patients with an HL have reduced Generic Quality of life (QoL), has yet not been answered. Aim: The aim of the present study was to investigate the relationship between HL and generic and disease-specific Health Related Quality of Life (HRQoL) in adult patients (aged 18–78 years) with an HL, seeking Hearing Aid (HA). Material and Methods: 158 adult (aged 18-78 years) patients with HL, referred for HA fitting at Haukeland University Hospital in western Norway, participated in the study. Both first-time users, as well as patients referred for HA renewals, were included. First-time users had been pre-examined by an Ear Nose and Throat specialist. The questionnaires were answered before the actual HA fitting procedure. The pure-tone average (PTA; frequencies 0.5, 1, 2 and 4 kHz) was determined for each ear. The generic European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Questionnaire general part and a shortened version of the Abbreviated Profile of Hearing Aid Benefit (APHAB) were answered. In addition, EORTC HRQoL answers from a general population and patients with former head and neck cancer served as comparison. Results: In general, no lowered HRQoL scores were determined among HL patients compared to the general population. Patients with unilateral HL to some extent showed lower HRQoL than those with bilateral HL (social function and fatigue). The APHAB scores correlated significantly with the EORTC HRQoL scores. By stepwise linear regression analysis, the APHAB scores were scored secondary to PTA (best ear), cognitive and physical function. Conclusion: HRQoL scores in HL patients, in general, seems to be at the population level, but the unilateral HL patients scored to some extent lower than the bilateral HI patients. APHAB and generic QoL scores levels are associated. Both HRQoL and APHAB scores are generated more complexly than anticipated.Keywords: quality of life, hearing loss, hearing impairment, distress, depression, anxiety, hearing aid
Procedia PDF Downloads 293233 Development of an Autonomous Automated Guided Vehicle with Robot Manipulator under Robot Operation System Architecture
Authors: Jinsiang Shaw, Sheng-Xiang Xu
Abstract:
This paper presents the development of an autonomous automated guided vehicle (AGV) with a robot arm attached on top of it within the framework of robot operation system (ROS). ROS can provide libraries and tools, including hardware abstraction, device drivers, libraries, visualizers, message-passing, package management, etc. For this reason, this AGV can provide automatic navigation and parts transportation and pick-and-place task using robot arm for typical industrial production line use. More specifically, this AGV will be controlled by an on-board host computer running ROS software. Command signals for vehicle and robot arm control and measurement signals from various sensors are transferred to respective microcontrollers. Users can operate the AGV remotely through the TCP / IP protocol and perform SLAM (Simultaneous Localization and Mapping). An RGBD camera and LIDAR sensors are installed on the AGV, using these data to perceive the environment. For SLAM, Gmapping is used to construct the environment map by Rao-Blackwellized particle filter; and AMCL method (Adaptive Monte Carlo localization) is employed for mobile robot localization. In addition, current AGV position and orientation can be visualized by ROS toolkit. As for robot navigation and obstacle avoidance, A* for global path planning and dynamic window approach for local planning are implemented. The developed ROS AGV with a robot arm on it has been experimented in the university factory. A 2-D and 3-D map of the factory were successfully constructed by the SLAM method. Base on this map, robot navigation through the factory with and without dynamic obstacles are shown to perform well. Finally, pick-and-place of parts using robot arm and ensuing delivery in the factory by the mobile robot are also accomplished.Keywords: automated guided vehicle, navigation, robot operation system, Simultaneous Localization and Mapping
Procedia PDF Downloads 149232 Exercise and Social Activities for Elderly with an Impairment Who Are Living Alone in the Community: Effects and Influencing Factors of a Dutch Program
Authors: Renate Verkaik, Mieke Rijken, Hennie Boeije
Abstract:
Elderly who are living alone and who are having one or more impairments are vulnerable for a loss of wellbeing and institutionalization. Physical exercise and social activities together with peers have the potential to make them more resilient. The Dutch program ‘More Resilience, Longer at Home’ initiated by FNO funded 126 local projects to stimulate vulnerable older citizens to participate in exercise and social activities, and as such to improve wellbeing and independent living. The program evaluation addressed the following questions: (1) what are the effects of the program on older (65+) participants exercise behavior, social activities and what is the relationship with wellbeing?, (2) which factors contribute to successful implementation of the projects and their outcomes? A mixed method approach was used. Effects on participants were assessed with a short survey, containing questions on exercise, social engagement, daily functioning, loneliness and life satisfaction. Results of the participants were compared with those of a reference group from the Dutch national population. Perceived influencing factors were investigated with a questionnaire for project leaders. This questionnaire was based on site visits and interviews with project leaders, volunteers and participating elderly. Preliminary results show that social engagement of the participating elderly rises significantly (p ≤ .05) as do their exercise levels and daily functioning. They experience less social loneliness, but not less emotional loneliness. Additionally, there is a positive association between daily functioning and life satisfaction and between exercise and life satisfaction. Perceived influencing factors that contribute to successful implementation of the projects can be categorized in 4 types: (1) characteristics of the activities; (2) profiles of the involved staff (professionals and volunteers), (3) characteristics of the organization, (4) the social political environment. Conclusions are that local projects have been successful in stimulating older citizens to participate in exercise and social activities. Multiple factors need to be addressed to ensure sustainability and scaling-up of the good practices.Keywords: elderly living alone in the community, exercise and social activities, resilience, quality of life
Procedia PDF Downloads 136231 Combined Effect of Gender Differences and Fatiguing Task on Unipedal Postural Balance and Functional Mobility in Adults with Multiple Sclerosis
Authors: Sonda Jallouli, Omar Hammouda, Imen Ben Dhia, Salma Sakka, Chokri Mhiri, Mohamed Habib Elleuch, Abedlmoneem Yahia, Sameh Ghroubi
Abstract:
Multiple sclerosis (MS) is characterized by gender differences with affecting women two to four times more than men, but the disease progression is faster and more severe in men. Fatigue represents one of the most frequent and disabling symptoms related to MS. Results of previous studies regarding gender differences in fatigue perception in MS persons are contradictory. Besides, fatigue has been shown to affect negatively postural balance and functional mobility in MS persons. However, no study has taken into account gender differences in the response of these physical parameters to a fatiguing protocol in MS persons. Given the reduction of autonomy due to the alteration of these parameters induced by fatigue and the importance of gender differences in postural balance training programs in fatigued men and women with MS, the aim of this study was to investigate the effect of gender difference on unipedal postural balance and functional mobility after performing a fatiguing task in MS adults. Methods: Eleven women (30.29 ± 7.99 years) and seven men (30.91 ± 8.19 years) with relapsing-remitting MS performed a fatiguing protocol: three sets of the 5×sit to stand test (5-STST), six-minute walk test (6MWT) followed by three sets of the 5-STST. Unipedal balance, functional mobility, and fatigue perception were measured prefatigue (T0) and post fatigue (T3) using a clinical unipedal balance test, timed up and go test (TUGT), and analogic visual scale of fatigue (VASF), respectively. Heart rate (HR) and rate of perceived exertion (RPE) were recorded before, during and after the fatiguing task. Results: Compared to women, men showed an impairment of unipedal balance on the dominant leg (p<0.001, d=0.52) and mobility (p<0.001, d=3) via reducing unipedal stance time and increasing duration of TUGT execution, respectively. No gender differences were observed in 6MWT, 5-STST, HR, RPE and VASF scores. Conclusion: Fatiguing protocol negatively affected unipedal postural balance and mobility only in men. These gender differences were inconclusive but can be taken into account in postural balance rehabilitation programs for persons with MS.Keywords: functional mobility, fatiguing exercises, multiple sclerosis, sex differences, unipedal balance
Procedia PDF Downloads 138230 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 99229 Ensuring Safe Operation by Providing an End-To-End Field Monitoring and Incident Management Approach for Autonomous Vehicle Based on ML/Dl SW Stack
Authors: Lucas Bublitz, Michael Herdrich
Abstract:
By achieving the first commercialization approval in San Francisco the Autonomous Driving (AD) industry proves the technology maturity of the SAE L4 AD systems and the corresponding software and hardware stack. This milestone reflects the upcoming phase in the industry, where the focus is now about scaling and supervising larger autonomous vehicle (AV) fleets in different operation areas. This requires an operation framework, which organizes and assigns responsibilities to the relevant AV technology and operation stakeholders from the AV system provider, the Remote Intervention Operator, the MaaS provider and regulatory & approval authority. This holistic operation framework consists of technological, processual, and organizational activities to ensure safe operation for fully automated vehicles. Regarding the supervision of large autonomous vehicle fleets, a major focus is on the continuous field monitoring. The field monitoring approach must reflect the safety and security criticality of incidents in the field during driving operation. This includes an automatic containment approach, with the overall goal to avoid safety critical incidents and reduce downtime by a malfunction of the AD software stack. An End-to-end (E2E) field monitoring approach detects critical faults in the field, uses a knowledge-based approach for evaluating the safety criticality and supports the automatic containment of these E/E faults. Applying such an approach will ensure the scalability of AV fleets, which is determined by the handling of incidents in the field and the continuous regulatory compliance of the technology after enhancing the Operational Design Domain (ODD) or the function scope by Functions on Demand (FoD) over the entire digital product lifecycle.Keywords: field monitoring, incident management, multicompliance management for AI in AD, root cause analysis, database approach
Procedia PDF Downloads 75228 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 427227 How Did a Blind Child Begin Understanding Her “Blind Self”?: A Longitudinal Analysis Of Conversation between Her and Adults
Authors: Masahiro Nochi
Abstract:
This study explores the process in which a Japanese child with congenital blindness deepens understanding of the condition of being “unable to see” and develops the idea of “blind self,” despite having no direct experience of vision. The rehabilitation activities of a child with a congenital visual impairment that were video-recorded from 1 to 6 years old were analyzed qualitatively. The duration of the video was about 80 hours. The recordings were transcribed verbatim, and the episodes in which the child used the words related to the act of “looking” were extracted. Detailed transcripts were constructed referencing the notations of conversation analysis. Characteristics of interactions in those episodes were identified and compared longitudinally. Results showed that the child used the expression "look" under certain interaction patterns and her body expressions and interaction with adults developed in conjunction with the development of language use. Four stages were identified. At the age of 1, interactions involving “look” began to occur. The child said "Look" in the sequence: the child’s “Look,” an adult’s “I’m looking,” certain performances by the child, and the adult’s words of praise. At the age of 3, the child began to behave in accordance with the spatial attributes of the act of "looking," such as turning her face to the adult’s voice before saying, “Look.” She also began to use the expression “Keep looking,” which seemed to reflect her understanding of the temporality of the act of “looking.” At the age of 4, the use of “Look” or “Keep looking” became three times more frequent. She also started to refer to the act of looking in the future, such as “Come and look at my puppy someday.” At the age of 5, she moved her hands toward the adults when she was holding something she wanted to show them. She seemed to understand that people could see the object more clearly when it was in close priximity. About that time, she began to say “I cannot see” to her mother, which suggested a heightened understanding of her own blindness. The findings indicate that as she grew up, the child came to utilize nonverbal behavior before and after the order "Look" to make the progress of the interaction with adults even more certain. As a result, actions that reflect the characteristics of the sighted person's visual experience were incorporated into the interaction chain. The purpose of "Look," with which she intended to attract the adult's attention at first, changed and became something that requests a confirmation she was unable to make herself. It is considered that such a change in the use of the word as well as interaction with sighted adults reflected her heightened self-awareness as someone who could not do what sighted people could do easily. A blind child can gradually deepen their understanding of their own characteristics of blindness among sighted people around them. The child can also develop “blind self” by learning how to interact with others even without direct visual experiences.Keywords: blindness, child development, conversation analysis, self-concept
Procedia PDF Downloads 121