Search results for: ESD protocols
586 Generation of Symmetric Key Using Randomness of Hash Function
Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar
Abstract:
In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation
Procedia PDF Downloads 162585 Exploring Error-Minimization Protocols for Upper-Limb Function During Activities of Daily Life in Chronic Stroke Patients
Authors: M. A. Riurean, S. Heijnen, C. A. Knott, J. Makinde, D. Gotti, J. VD. Kamp
Abstract:
Objectives: The current study is done in preparation for a randomized controlled study investigating the effects of an implicit motor learning protocol implemented using an extension-supporting glove. It will explore different protocols to find out which is preferred when studying motor learn-ing in the chronic stroke population that struggles with hand spasticity. Design: This exploratory study will follow 24 individuals who have a chronic stroke (> 6 months) during their usual care journey. We will record the results of two 9-Hole Peg Tests (9HPT) done during their therapy ses-sions with a physiotherapist or in their home before and after 4 weeks of them wearing an exten-sion-supporting glove used to employ the to-be-studied protocols. The participants will wear the glove 3 times/week for one hour while performing their activities of daily living and record the times they wore it in a diary. Their experience will be monitored through telecommunication once every week. Subjects: Individuals that have had a stroke at least 6 months prior to participation, hand spasticity measured on the modified Ashworth Scale of maximum 3, and finger flexion motor control measured on the Motricity Index of at least 19/33. Exclusion criteria: extreme hemi-neglect. Methods: The participants will be randomly divided into 3 groups: one group using the glove in a pre-set way of decreasing support (implicit motor learning), one group using the glove in a self-controlled way of decreasing support (autonomous motor learning), and the third using the glove with constant support (as control). Before and after the 4-week period, there will be an intake session and a post-assessment session. Analysis: We will compare the results of the two 9HPTs to check whether the protocols were effective. Furthermore, we will compare the results between the three groups to find the preferred one. A qualitative analysis will be run of the experience of participants throughout the 4-week period. Expected results: We expect that the group using the implicit learning protocol will show superior results.Keywords: implicit learning, hand spasticity, stroke, error minimization, motor task
Procedia PDF Downloads 59584 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 96583 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules
Authors: Gagandeep Singh, Navdeep Singh
Abstract:
Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.Keywords: WSN, I-Leach, MATLAB, sensor
Procedia PDF Downloads 275582 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 228581 Communication of Sensors in Clustering for Wireless Sensor Networks
Authors: Kashish Sareen, Jatinder Singh Bal
Abstract:
The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.Keywords: clustering, DLCC, MLCC, wireless sensor networks
Procedia PDF Downloads 483580 Arc Flash Analysis: Technique to Mitigate Fire Incidents in Substations
Authors: M. H. Saeed, M. Rasool, M. A. Jawed
Abstract:
Arc Flash Analysis has been a subject of great interest since the electrical fire incidents have been reduced to a great extent after the implementation of arc flash study at different sites. An Arc flash in substations is caused by short circuits over the air or other melted conductors and small shrapnel. Arc flash incidents result in the majority of deaths in substations worldwide. Engro Fertilizers Limited (EFERT) site having a mix of vintage non-internal arc rated and modern arc rated switchgears, carried out an arc flash study of the whole site in accordance with NFPA70E standard. The results not only included optimizing site protection coordination settings but also included marking of Shock and Arc flash protection boundaries in all switchgear rooms. Work permit procedures upgradation is also done in accordance with this study to ensure proper arc rated PPEs and arc flash boundaries protocols are fully observed and followed. With the new safety, protocols working on electrical equipment will be much safer than ever before.Keywords: Arc flash, non-internal arc rated, protection coordination, shock boundary
Procedia PDF Downloads 179579 Surface Sterilization of Aquatic Plant, Cryptopcoryne affinis by Using Clorox and Mercury Chloride
Authors: Sridevi Devadas
Abstract:
This study was aimed to examine the combination efficiency of Clorox (5.25% Sodium Hypochlorite) and mercury chloride (HgCl2) as reagent for surface sterilization process of aquatic plant, Cryptocoryne affinis (C. affinis). The treatment applied 10% of the Clorox and 0.1 ppm of mercury chloride. The maximum exposure time for Clorox and mercury chloride was 10 min and 60 sec respectively. After exposed to the treatments protocols (T1-T15) the explants were transferred to culture room under control temperature at 25°C ± 2°C and subjected to 16 hours fluorescence light (2000 lumens) for 30 days. The both sterilizing agents were not applied on control specimens. Upon analysis, the result indicates all of the treatments protocols produced sterile explants at range of minimum 1.5 ± 0.7 (30%) to maximum 5.0 ± 0.0 (100%). Meanwhile, maximum 1.0 ± 0.7 numbers of leaves and 1.4 ± 0.6 numbers of roots have been produced. The optimized exposure time was 0 to 15 min for Clorox and 30 sec for HgCl2 whereby 90% to 100% sterilization was archived at this condition.Keywords: Cryptocoryne affinis, surface sterilization, tissue culture, clorox, mercury chloride
Procedia PDF Downloads 601578 Surface Sterilization Of Aquatic Plant, Cryptocoryne affinis by Using Clorox and Mercury Chloride
Authors: Sridevi Devadas
Abstract:
This study was aimed to examine the combination efficiency of Clorox (5.25% Sodium Hypochlorite) and mercury chloride (HgCl2) as a reagent for surface sterilization process of aquatic plant and cryptocoryne affinis (C. affinis). The treatment applied 10% of the Clorox and 0.1ppm of mercury chloride. The maximum exposure time for clorox and mercury chloride was 10min and 60sec respectively. After exposed to the treatments protocols (T1-T15) the explants were transferred to culture room under control temperature at 25°C ± 2°C and subjected to 16 hours fluorescence light (2000 lumens) for 30 days. The both sterilizing agents were not applied on control specimens. Upon analysis, The result indicates all of the treatments protocols produced sterile explants at range of minimum 1.5 ± 0.7 (30%) to maximum 5.0 ± 0.0 (100%). Meanwhile, maximum 1.0 ± 0.7 numbers of leaves and 1.4 ± 0.6 numbers of roots have been produced. The optimized exposure time was 0 to 15 min for Clorox and 30 sec for HgCl2 whereby 90% to 100% sterilization was archived at this condition.Keywords: Cryptocoryne affinis, surface sterilization, tissue culture, clorox, mercury chloride
Procedia PDF Downloads 382577 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 164576 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks
Authors: Anusha M., V. Srikanth
Abstract:
Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios
Procedia PDF Downloads 562575 An Implementation of a Configurable UART-to-Ethernet Converter
Authors: Jungho Moon, Myunggon Yoon
Abstract:
This paper presents an implementation of a configurable UART-to-Ethernet converter using an ARM-based 32-bit microcontroller as well as a dedicated configuration program running on a PC for configuring the operating parameters of the converter. The program was written in Python. Various parameters pertaining to the operation of the converter can be modified by the configuration program through the Ethernet interface of the converter. The converter supports 3 representative asynchronous serial communication protocols, RS-232, RS-422, and RS-485 and supports 3 network modes, TCP/IP server, TCP/IP client, and UDP client. The TCP/IP and UDP protocols were implemented on the microcontroller using an open source TCP/IP protocol stack called lwIP (A lightweight TCP/IP) and FreeRTOS, a free real-time operating system for embedded systems. Due to the use of a real-time operating system, the firmware of the converter was implemented as a multi-thread application and as a result becomes more modular and easier to develop. The converter can provide a seamless bridge between a serial port and an Ethernet port, thereby allowing existing legacy apparatuses with no Ethernet connectivity to communicate using the Ethernet protocol.Keywords: converter, embedded systems, ethernet, lwIP, UART
Procedia PDF Downloads 708574 Film Dosimetry – An Asset for Collaboration Between Cancer Radiotherapy Centers at Established Institutions and Those Located in Low- and Middle-Income Countries
Authors: A. Fomujong, P. Mobit, A. Ndlovu, R. Teboh
Abstract:
Purpose: Film’s unique qualities, such as tissue equivalence, high spatial resolution, near energy independence and comparatively less expensive dosimeter, ought to make it the preferred and widely used in radiotherapy centers in low and middle income countries (LMICs). This, however, is not always the case, as other factors that are often maybe taken for granted in advanced radiotherapy centers remain a challenge in LMICs. We explored the unique qualities of film dosimetry that can make it possible for one Institution to benefit from another’s protocols via collaboration. Methods: For simplicity, two Institutions were considered in this work. We used a single batch of films (EBT-XD) and established a calibration protocol, including scan protocols and calibration curves, using the radiotherapy delivery system at Institution A. We then proceeded and performed patient-specific QA for patients treated on system A (PSQA-A-A). Films from the same batch were then sent to a remote center for PSQA on radiotherapy delivery system B. Irradiations were done at Institution B and then returned to Institution A for processing and analysis (PSQA-B-A). The following points were taken into consideration throughout the process (a) A reference film was irradiated to a known dose on the same system irradiating the PSQA film. (b) For calibration, we utilized the one-scan protocol and maintained the same scan orientation of the calibration, PSQA and reference films. Results: Gamma index analysis using a dose threshold of 10% and 3%/2mm criteria showed a gamma passing rate of 99.8% and 100% for the PSQA-A-A and PSQA-B-A, respectively. Conclusion: This work demonstrates that one could use established film dosimetry protocols in one Institution, e.g., an advanced radiotherapy center and apply similar accuracies to irradiations performed at another institution, e.g., a center located in LMIC, which thus encourages collaboration between the two for worldwide patient benefits.Keywords: collaboration, film dosimetry, LMIC, radiotherapy, calibration
Procedia PDF Downloads 75573 Comparison of Power Consumption of WiFi Inbuilt Internet of Things Device with Bluetooth Low Energy
Authors: Darshana Thomas, Edward Wilkie, James Irvine
Abstract:
The Internet of things (IoT) is currently a highly researched topic, especially within the context of the smart home. These are small sensors that are capable of gathering data and transmitting it to a server. The majority of smart home products use protocols such as ZigBee or Bluetooth Low Energy (BLE). As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The high power consumption is the reason that holds these small sensors back from using other protocols such as the most ubiquitous form of communication, WiFi. Comparing the power consumption of existing transmission technologies to one with WiFi inbuilt, would provide a better understanding for choosing between these technologies. We have developed a small IoT device with WiFi capability and proven that it is much more efficient than the first protocol, 433 MHz. We extend our work in this paper and compare WiFi power consumption with the other most widely used protocol BLE. The experimental results in this paper would conclude whether the developed prototype is capable in terms of power consumption to replace the existing protocol BLE with WiFi.Keywords: bluetooth, internet of things (IoT), power consumption, WiFi
Procedia PDF Downloads 267572 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks
Authors: Antonio Pizzarello, Oris Friesen
Abstract:
Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition
Procedia PDF Downloads 225571 Guidelines to Designing Generic Protocol for Responding to Chemical, Biological, Radiological and Nuclear Incidents
Authors: Mohammad H. Yarmohammadian, Mehdi Nasr Isfahani, Elham Anbari
Abstract:
Introduction: The awareness of using chemical, biological, and nuclear agents in everyday industrial and non-industrial incidents has increased recently; release of these materials can be accidental or intentional. Since hospitals are the forefronts of confronting Chemical, Biological, Radiological and Nuclear( CBRN) incidents, the goal of the present research was to provide a generic protocol for CBRN incidents through a comparative review of CBRN protocols and guidelines of different countries and reviewing various books, handbooks and papers. Method: The integrative approach or research synthesis was adopted in this study. First a simple narrative review of programs, books, handbooks, and papers about response to CBRN incidents in different countries was carried out. Then the most important and functional information was discussed in the form of a generic protocol in focus group sessions and subsequently confirmed. Results: Findings indicated that most of the countries had various protocols, guidelines, and handbooks for hazardous materials or CBRN incidents. The final outcome of the research synthesis was a 50 page generic protocol whose main topics included introduction, definition and classification of CBRN agents, four major phases of incident and disaster management cycle, hospital response management plan, equipment, and recommended supplies and antidotes for decontamination (radiological/nuclear, chemical, biological); each of these also had subtopics. Conclusion: In the majority of international protocols, guidelines, handbooks and also international and Iranian books and papers, there is an emphasis on the importance of incident command system, determining the safety degree of decontamination zones, maps of decontamination zones, decontamination process, triage classifications, personal protective equipment, and supplies and antidotes for decontamination; these are the least requirements for such incidents and also consistent with the provided generic protocol.Keywords: hospital, CBRN, decontamination, generic protocol, CBRN Incidents
Procedia PDF Downloads 298570 Parametric Evaluation for the Optimization of Gastric Emptying Protocols Used in Health Care Institutions
Authors: Yakubu Adamu
Abstract:
The aim of this research was to assess the factors contributing to the need for optimisation of the gastric emptying protocols in nuclear medicine and molecular imaging (SNMMI) procedures. The objective is to suggest whether optimisation is possible and provide supporting evidence for the current imaging protocols of gastric emptying examination used in nuclear medicine. The research involved the use of some selected patients with 30 dynamic series for the image processing using ImageJ, and by so doing, the calculated half-time, retention fraction to the 60 x1 minute, 5 minute and 10-minute protocol, and other sampling intervals were obtained. Results from the study IDs for the gastric emptying clearance half-time were classified into normal, abnormal fast, and abnormal slow categories. In the normal category, which represents 50% of the total gastric emptying image IDs processed, their clearance half-time was within the range of 49.5 to 86.6 minutes of the mean counts. Also, under the abnormal fast category, their clearance half-time fell between 21 to 43.3 minutes of the mean counts, representing 30% of the total gastric emptying image IDs processed, and the abnormal slow category had clearance half-time within the range of 138.6 to 138.6 minutes of the mean counts, representing 20%. The results indicated that the calculated retention fraction values from the 1, 5, and 10-minute sampling curves and the measured values of gastric emptying retention fraction from sampling curves of the study IDs had a normal retention fraction of <60% and decreased exponentially with an increase in time and it was evident with low percentages of retention fraction ratios of < 10% after the 4 hours. Thus, this study does not change categories suggesting that these values could feasibly be used instead of having to acquire actual images. Findings from the study suggest that the current gastric emptying protocol can be optimized by acquiring fewer images. The study recommended that the gastric emptying studies should be performed with imaging at a minimum of 0, 1, 2, and 4 hours after meal ingestion.Keywords: gastric emptying, retention fraction, clearance halftime, optimisation, protocol
Procedia PDF Downloads 10569 Implementation of Enhanced Recovery after Surgery (ERAS) Protocols in Laparoscopic Sleeve Gastrectomy (LSG); A Systematic Review and Meta-analysis
Authors: Misbah Nizamani, Saira Malik
Abstract:
Introduction: Bariatric surgery is the most effective treatment for patients suffering from morbid obesity. Laparoscopic sleeve gastrectomy (LSG) accounts for over 50% of total bariatric procedures. The aim of our meta-analysis is to investigate the effectiveness and safety of Enhanced Recovery After Surgery (ERAS) protocols for patients undergoing laparoscopic sleeve gastrectomy. Method: To gather data, we searched PubMed, Google Scholar, ScienceDirect, and Cochrane Central. Eligible studies were randomized controlled trials and cohort studies involving adult patients (≥18 years) undergoing bariatric surgeries, i.e., Laparoscopic sleeve gastrectomy. Outcome measures included LOS, postoperative narcotic usage, postoperative pain score, postoperative nausea and vomiting, postoperative complications and mortality, emergency department visits and readmission rates. RevMan version 5.4 was used to analyze outcomes. Results: Three RCTs and three cohorts with 1522 patients were included in this study. ERAS group and control group were compared for eight outcomes. LOS was reduced significantly in the intervention group (p=0.00001), readmission rates had borderline differences (p=0.35) and higher postoperative complications in the control group, but the result was non-significant (p=0.68), whereas postoperative pain score was significantly reduced (p=0.005). Total MME requirements became significant after performing sensitivity analysis (p= 0.0004). Postoperative mortality could not be analyzed on account of invalid data showing 0% mortality in two cohort studies. Conclusion: This systemic review indicated the effectiveness of the application of ERAS protocols in LSG in reducing the length of stay, post-operative pain and total MME requirements postoperatively, indicating the feasibility and assurance of its application.Keywords: eras protocol, sleeve gastrectomy, bariatric surgery, enhanced recovery after surgery
Procedia PDF Downloads 45568 The Effect of Artificial Intelligence on Mobile Phones and Communication Systems
Authors: Ibram Khalafalla Roshdy Shokry
Abstract:
This paper gives service feel multiple get entry to (CSMA) verbal exchange model based totally totally on SoC format method. Such model can be used to guide the modelling of the complex c084d04ddacadd4b971ae3d98fecfb2a communique systems, consequently use of such communication version is an crucial method in the creation of excessive general overall performance conversation. SystemC has been selected as it gives a homogeneous format drift for complicated designs (i.e. SoC and IP based format). We use a swarm device to validate CSMA designed version and to expose how advantages of incorporating communication early within the layout process. The wireless conversation created via the modeling of CSMA protocol that may be used to attain conversation among all of the retailers and to coordinate get proper of entry to to the shared medium (channel).The device of automobiles with wi-fiwireless communique abilities is expected to be the important thing to the evolution to next era intelligent transportation systems (ITS). The IEEE network has been continuously operating at the development of an wireless vehicular communication protocol for the enhancement of wi-fi get admission to in Vehicular surroundings (WAVE). Vehicular verbal exchange systems, known as V2X, help car to car (V2V) and automobile to infrastructure (V2I) communications. The wi-ficiencywireless of such communication systems relies upon on several elements, amongst which the encircling surroundings and mobility are prominent. as a result, this observe makes a speciality of the evaluation of the actual performance of vehicular verbal exchange with unique cognizance on the effects of the actual surroundings and mobility on V2X verbal exchange. It begins by wi-fi the actual most range that such conversation can guide and then evaluates V2I and V2V performances. The Arada LocoMate OBU transmission device changed into used to check and evaluate the effect of the transmission range in V2X verbal exchange. The evaluation of V2I and V2V communique takes the real effects of low and excessive mobility on transmission under consideration.Multiagent systems have received sizeable attention in numerous wi-fields, which include robotics, independent automobiles, and allotted computing, where a couple of retailers cooperate and speak to reap complicated duties. wi-figreen communication among retailers is a critical thing of these systems, because it directly influences their usual performance and scalability. This scholarly work gives an exploration of essential communication factors and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of those protocols across diverse situations. The studies additionally sheds light on rising tendencies within verbal exchange protocols for multiagent systems, together with the incorporation of device mastering strategies and the adoption of blockchain-based totally solutions to make sure comfy communique. those developments offer valuable insights into the evolving landscape of multiagent structures and their verbal exchange protocols.Keywords: communication, multi-agent systems, protocols, consensussystemC, modelling, simulation, CSMA
Procedia PDF Downloads 28567 Revolutionizing RNA Extraction: A Unified, Sustainable, and Rapid Protocol for High-Quality Isolation from Diverse Tissues
Authors: Ying Qi Chan, Chunyu Li, Xu Rou Yoyo Ma, Yaya Li, Saber Khederzadeh
Abstract:
In the ever-evolving landscape of genome extraction protocols, the existing methodologies grapple with issues ranging from sub-optimal yields and compromised quality to time-intensive procedures and reliance on hazardous reagents, often necessitating substantial tissue quantities. This predicament is particularly challenging for scientists in developing countries, where resources are limited. Our investigation presents a protocol for the efficient extraction of high-yield RNA from various tissues such as muscle, insect, and plant samples. Noteworthy for its advantages, our protocol stands out as the safest, swiftest (completed in just 38 minutes), most cost-effective (coming in at a mere US$0.017), and highly efficient method in comparison to existing protocols. Notably, our method avoids the use of hazardous or toxic chemicals such as chloroform and phenol and enzymatic agents like RNase and Proteinase K. Our RNA extraction protocol has demonstrated clear advantages over other methods, including commercial kits, in terms of yield. This nucleic acid extraction protocol is more environmentally and research-friendly, suitable for a range of tissues, even in tiny volumes, hence facilitating various genetic diagnosis and researches across the globe.Keywords: RNA extraction, rapid protocol, universal method, diverse tissues
Procedia PDF Downloads 74566 Animal-Assisted Therapy: A Perspective From Singapore
Authors: Julia Wong, Hua Beng Lim, Petrina Goh, Johanna Foo, Caleb Ng, Nurul ‘Aqilah Bte Mohd Taufek
Abstract:
Animal-assisted therapy (AAT) utilizes human-animal interaction to achieve specific therapeutic goals, and its efficacy has been demonstrated across various settings overseas. The use of AAT in Singapore, however, is still limited. Ang Mo Kio-Thye Hua Kwan (AMKH) is one of the first community hospitals in Singapore to use AAT to complement its occupational therapy services with elderly patients. This study explored the perspectives of AMKH’s occupational therapists (OTs) in relation to AAT to understand barriers and enablers in implementing and practising AAT. We also examined how OTs at-large across practice settings perceive AAT. A mixed method design was used. 64 OTs at-large participated in on online survey, and 7 AMKH OTs were interviewed individually via Zoom. Survey results were analysed with descriptive and Mann-Whitney U tests. Interviews were thematically analysed. AMKH OTs perceived various benefits of AAT articulated in overseas studies in domains such as motivation and participation, emotional, social interaction, sensory tactile stimulation, and cognition. Interestingly, this perception was also supported by 67% of OTs who had responded to the survey, even though most of the OTs who had participated in the survey had no experience in AAT. Despite the perceived benefits of AAT, both OTs from AMKH and those at-large articulated concerns on risks pertaining to AAT (e.g., allergies, unexpected animal behaviour, infections, etc). However, AMKH OTs shared several ways to mitigate these risks, demonstrating their ability to develop a safe program. For e.g., volunteers and their dogs must meet specific recruitment criteria, stringent protocols are used to screen and match dogs with patients, and there are strict exclusion criteria for patients participating in AAT. AMKH OTs’ experience suggests that additional skills and knowledge are required to implement AAT, therefore, healthcare institutions should first consider improving their staff training and risk mitigation knowledge before implementing AAT. They can also refer to AMKH’s AAT protocols and those found in overseas studies, but institutions must adapt the protocols to fit their institutional settings and patients’ profiles.Keywords: animal-assisted therapy, dog-assisted therapy, occupational therapy, complementary therapy
Procedia PDF Downloads 152565 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks
Authors: Chothmal
Abstract:
In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces
Procedia PDF Downloads 250564 Performance Evaluation of Hierarchical Location-Based Services Coupled to the Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks
Authors: Rania Khadim, Mohammed Erritali, Abdelhakim Maaden
Abstract:
Nowadays Wireless Sensor Networks have attracted worldwide research and industrial interest, because they can be applied in various areas. Geographic routing protocols are very suitable to those networks because they use location information when they need to route packets. Obviously, location information is maintained by Location-Based Services provided by network nodes in a distributed way. In this paper we choose to evaluate the performance of two hierarchical rendezvous location based-services, GLS (Grid Location Service) and HLS (Hierarchical Location Service) coupled to the GPSR routing protocol (Greedy Perimeter Stateless Routing) for Wireless Sensor Network. The simulations were performed using NS2 simulator to evaluate the performance and power of the two services in term of location overhead, the request travel time (RTT) and the query Success ratio (QSR). This work presents also a new scalability performance study of both GLS and HLS, specifically, what happens if the number of nodes N increases. The study will focus on three qualitative metrics: The location maintenance cost, the location query cost and the storage cost.Keywords: location based-services, routing protocols, scalability, wireless sensor networks
Procedia PDF Downloads 373563 Genetic Determinants of Ovarian Response to Gonadotropin Stimulation in Women Undergoing Assisted Reproductive Treatment
Authors: D. Tohlob, E. Abo Hashem, N. Ghareeb, M. Ghanem, R. Elfarahaty, S. A. Roberts, P. Pemberton, L. Mohiyiddeen, W. G. Newman
Abstract:
Gonadotropin stimulation is used in females undergoing assisted reproductive treatment for ovulation induction, but ovarian response is variable and unpredictable in these women. More effective protocols and individualization of treatment are needed to increase the success rate of IVF/ICSI cycles. We genotyped seven variants reported in previous studies to be associated with ovarian response (number of ova retrieved and total gonadotropin dose) in women undergoing IVF treatment including FSHR variants Asn 680 Ser (c.2039 A > G), Thr 307 Ala (c. 919 > A), -29 G > A, HRG c.610 C > T gene, BMP15 -9 C > G, AMH Ile 49 Ser (c.146 G > T), and AMHR -489A˃G in 118 Egyptian females attending Mansoura Integrated Fertility Center in Egypt, these females were undergoing their first cycle of controlled ovarian hyper stimulation for IVF/ICSI treatment. They were analyzed by TaqMan allelic discrimination assay in Manchester Center of Genomic Medicine. We found no evidence of any significant difference (p value < 0.05) in the number of eggs retrieved or the gonadotropin dose used between individuals in all genotypes except for HRG c.610 C > T gene polymorphism where regression analysis gives a p value of 0.04 with a fewer eggs number in TT genotyped females. These results indicate that these variants do not provide sufficient clinically relevant data to individualize the treatment protocols.Keywords: controlled ovarian hyperstimulation, gene variants, ovarian response, assisted reproduction
Procedia PDF Downloads 319562 Asylum Seekers' Legal Limbo under the Migrant Protection Protocols: Implications from a US-Mexico Border Project
Authors: Tania M. Guerrero, Ileana Cortes Santiago
Abstract:
Estamos Unidos Asylum Project has served more than 2,000 asylum seekers and migrants who are under the Migrant Protection Protocols (MPP) policy in Ciudad Juarez, Mexico. The U.S. policy, implemented in January 2019, has stripped asylum seekers of their rights—forcing people fleeing violence and discrimination to wait in similar or worse conditions from which they fled and navigate their entire asylum process in a different country. Several civil rights groups, including the American Civil Liberties Union (ACLU), challenged MPP in U.S. federal courts in February 2019, arguing a violation of international U.S. obligations towards refugees and asylum-seekers under the 1951 Refugee Convention and the Refugee Act of 1980 in regards to the non-refoulement principle. MPP has influenced Mexico's policies, enforcement, and prioritization of the presence of asylum seekers and migrants; it has also altered the way international non-governmental organizations work at the Mexican Northern border. Estamos Unidos is a project situated in a logistical conundrum, as it provides needed legal services to a population in a legal and humanitarian void, i.e., a liminal space. The liminal space occupied by asylum seekers living under MPP is one that, in today's world, should not be overlooked; it dilutes asylum law and U.S. commitments to international protections. This paper provides analysis of and broader implications from a project whose main goal is to uphold the protections of asylum seekers and international refugee law. The authors identified and analyzed four critical points based on field work conducted since August 2019: (1) strategic coalition building with international, local, and national organizations; (2) brokering between domestic and international contexts and critical legal constraints; (3) flexibility to sudden policy changes and the diverse needs of the multiethnic groups of migrants and asylum seekers served by the project; and (4) the complexity of providing legal assistance to asylum seekers who are survivors of trauma. The authors concur with scholarship when highlighting the erosion of protections of asylum seekers and migrants as a dangerous and unjust global phenomenon.Keywords: asylum, human rights, migrant protection protocols, refugees law
Procedia PDF Downloads 135561 Formal Implementation of Routing Information Protocol Using Event-B
Authors: Jawid Ahmad Baktash, Tadashi Shiroma, Tomokazu Nagata, Yuji Taniguchi, Morikazu Nakamura
Abstract:
The goal of this paper is to explore the use of formal methods for Dynamic Routing, The purpose of network communication with dynamic routing is sending a massage from one node to others by using pacific protocols. In dynamic routing connections are possible based on protocols of Distance vector (Routing Information Protocol, Border Gateway protocol), Link State (Open Shortest Path First, Intermediate system Intermediate System), Hybrid (Enhanced Interior Gateway Routing Protocol). The responsibility for proper verification becomes crucial with Dynamic Routing. Formal methods can play an essential role in the Routing, development of Networks and testing of distributed systems. Event-B is a formal technique consists of describing rigorously the problem; introduce solutions or details in the refinement steps to obtain more concrete specification, and verifying that proposed solutions are correct. The system is modeled in terms of an abstract state space using variables with set theoretic types and the events that modify state variables. Event-B is a variant of B, was designed for developing distributed systems. In Event-B, the events consist of guarded actions occurring spontaneously rather than being invoked. The invariant state properties must be satisfied by the variables and maintained by the activation of the events.Keywords: dynamic rout RIP, formal method, event-B, pro-B
Procedia PDF Downloads 403560 Improving Functionality of Radiotherapy Department Through: Systemic Periodic Clinical Audits
Authors: Kamal Kaushik, Trisha, Dandapni, Sambit Nanda, A. Mukherjee, S. Pradhan
Abstract:
INTRODUCTION: As complexity in radiotherapy practice and processes are increasing, there is a need to assure quality control to a greater extent. At present, no international literature available with regards to the optimal quality control indicators for radiotherapy; moreover, few clinical audits have been conducted in the field of radiotherapy. The primary aim is to improve the processes that directly impact clinical outcomes for patients in terms of patient safety and quality of care. PROCEDURE: A team of an Oncologist, a Medical Physicist and a Radiation Therapist was formed for weekly clinical audits of patient’s undergoing radiotherapy audits The stages for audits include Pre planning audits, Simulation, Planning, Daily QA, Implementation and Execution (with image guidance). Errors in all the parts of the chain were evaluated and recorded for the development of further departmental protocols for radiotherapy. EVALUATION: The errors at various stages of radiotherapy chain were evaluated and recorded for comparison before starting the clinical audits in the department of radiotherapy and after starting the audits. It was also evaluated to find the stage in which maximum errors were recorded. The clinical audits were used to structure standard protocols (in the form of checklist) in department of Radiotherapy, which may lead to further reduce the occurrences of clinical errors in the chain of radiotherapy. RESULTS: The aim of this study is to perform a comparison between number of errors in different part of RT chain in two groups (A- Before Audit and B-After Audit). Group A: 94 pts. (48 males,46 female), Total no. of errors in RT chain:19 (9 needed Resimulation) Group B: 94 pts. (61 males,33 females), Total no. of errors in RT chain: 8 (4 needed Resimulation) CONCLUSION: After systematic periodic clinical audits percentage of error in radiotherapy process reduced more than 50% within 2 months. There is a great need in improving quality control in radiotherapy, and the role of clinical audits can only grow. Although clinical audits are time-consuming and complex undertakings, the potential benefits in terms of identifying and rectifying errors in quality control procedures are potentially enormous. Radiotherapy being a chain of various process. There is always a probability of occurrence of error in any part of the chain which may further propagate in the chain till execution of treatment. Structuring departmental protocols and policies helps in reducing, if not completely eradicating occurrence of such incidents.Keywords: audit, clinical, radiotherapy, improving functionality
Procedia PDF Downloads 88559 Assessing the Competence of Junior Pediatric Doctors in Managing Pediatric Diabetic Ketoacidosis: An Exploration Across Pediatric Care Units
Authors: Mai Ali
Abstract:
Advancing beyond the junior stage of a paediatrician’s career is a crucial step where they accumulate essential skills and knowledge. This process prepares them for the challenges they'll encounter throughout their profession, particularly in dealing with paediatric emergencies. This can be especially demanding for trainees specializing in fields like endocrinology, particularly in the management of Diabetic Ketoacidosis (DKA) in the UK. In different societal contexts, junior doctors, whether specializing in pediatrics or other medical fields, are generally expected to possess a fundamental level of knowledge and skills necessary for managing diabetic ketoacidosis (DKA) emergencies. These physicians consistently concurred in recognizing prevalent problems in the healthcare facilities they examined. Such issues include the lack of established guidelines for DKA treatment and the inadequate availability of comprehensive training opportunities. The abstract underscores the critical importance of junior paediatricians acquiring expertise in managing paediatric emergencies, with a specific focus on DKA. Commonly, issues like the lack of standardized protocols and training deficiencies are recurring themes across healthcare facilities. This research proposal aims to conduct a thematic analysis of the proficiency of paediatric trainees in the United Kingdom when handling DKA in various clinical contexts. The primary goal is to assess their competency and suggest effective strategies for comprehensive DKA training improvement.Keywords: junior pediatrician, DKA, standardized protocols, level of competence
Procedia PDF Downloads 85558 Verification Protocols for the Lightning Protection of a Large Scale Scientific Instrument in Harsh Environments: A Case Study
Authors: Clara Oliver, Oibar Martinez, Jose Miguel Miranda
Abstract:
This paper is devoted to the study of the most suitable protocols to verify the lightning protection and ground resistance quality in a large-scale scientific facility located in a harsh environment. We illustrate this work by reviewing a case study: the largest telescopes of the Northern Hemisphere Cherenkov Telescope Array, CTA-N. This array hosts sensitive and high-speed optoelectronics instrumentation and sits on a clear, free from obstacle terrain at around 2400 m above sea level. The site offers a top-quality sky but also features challenging conditions for a lightning protection system: the terrain is volcanic and has resistivities well above 1 kOhm·m. In addition, the environment often exhibits humidities well below 5%. On the other hand, the high complexity of a Cherenkov telescope structure does not allow a straightforward application of lightning protection standards. CTA-N has been conceived as an array of fourteen Cherenkov Telescopes of two different sizes, which will be constructed in La Palma Island, Spain. Cherenkov Telescopes can provide valuable information on different astrophysical sources from the gamma rays reaching the Earth’s atmosphere. The largest telescopes of CTA are called LST’s, and the construction of the first one was finished in October 2018. The LST has a shape which resembles a large parabolic antenna, with a 23-meter reflective surface supported by a tubular structure made of carbon fibers and steel tubes. The reflective surface has 400 square meters and is made of an array of segmented mirrors that can be controlled individually by a subsystem of actuators. This surface collects and focuses the Cherenkov photons into the camera, where 1855 photo-sensors convert the light in electrical signals that can be processed by dedicated electronics. We describe here how the risk assessment of direct strike impacts was made and how down conductors and ground system were both tested. The verification protocols which should be applied for the commissioning and operation phases are then explained. We stress our attention on the ground resistance quality assessment.Keywords: grounding, large scale scientific instrument, lightning risk assessment, lightning standards and safety
Procedia PDF Downloads 124557 Training Volume and Myoelectric Responses of Lower Body Muscles with Differing Foam Rolling Periods
Authors: Humberto Miranda, Haroldo G. Santana, Gabriel A. Paz, Vicente P. Lima, Jeffrey M. Willardson
Abstract:
Foam rolling is a practice that has increased in popularity before and after strength training. The purpose of this study was to compare the acute effects of different foam rolling periods for the lower body muscles on subsequent performance (total repetitions and training volume), myoelectric activity and rating of perceived exertion in trained men. Fourteen trained men (26.2 ± 3.2 years, 178 ± 0.04 cm height, 82.2 ± 10 kg weight and body mass index 25.9 ± 3.3kg/m2) volunteered for this study. Four repetition maximum (4-RM) loads were determined for hexagonal bar deadlift and 45º angled leg press during test and retest sessions over two nonconsecutive days. Five experimental protocols were applied in a randomized design, which included: a traditional protocol (control)—a resistance training session without prior foam rolling; or resistance training sessions performed following one (P1), two (P2), three (P3), or four (P4) sets of 30 sec. foam rolling for the lower extremity musculature. Subjects were asked to roll over the medial and lateral aspects of each muscle group with as much pressure as possible. All foam rolling was completed at a cadence of 50 bpm. These procedures were performed on both sides unilaterally as described below. Quadriceps: between the apex of the patella and the ASIS; Hamstring: between the gluteal fold and popliteal fossa; Triceps surae: between popliteal fossa and calcaneus tendon. The resistance training consisted of five sets with 4-RM loads and two-minute rest intervals between sets, and a four-minute rest interval between the hexagonal bar deadlift and the 45º angled leg press. The number of repetitions completed, the myoelectric activity of vastus lateralis (VL), vastus medialis oblique (VMO), semitendinosus (SM) and medial gastrocnemius (GM) were recorded, as well as the rating of perceived exertion for each protocol. There were no differences between the protocols in the total repetitions for the hexagonal bar deadlift (Control - 16.2 ± 5.9; P1 - 16.9 ± 5.5; P2 - 19.2 ± 5.7; P3 - 19.4 ± 5.2; P4 - 17.2 ± 8.2) (p > 0.05) and 45º angled leg press (Control - 23.3 ± 9.7; P1 - 25.9 ± 9.5; P2 - 29.1 ± 13.8; P3 - 28.0 ± 11.7; P4 - 30.2 ± 11.2) exercises. Similar results between protocols were also noted for myoelectric activity (p > 0.05) and rating of perceived exertion (p > 0.05). Therefore, the results of the present study indicated no deleterious effects on performance, myoelectric activity and rating of perceived exertion responses during lower body resistance training.Keywords: self myofascial release, foam rolling, electromyography, resistance training
Procedia PDF Downloads 226