Search results for: data Integrity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24746

Search results for: data Integrity

24686 The Main Steamline Break Transient Analysis for Advanced Boiling Water Reactor Using TRACE, PARCS, and SNAP Codes

Authors: H. C. Chang, J. R. Wang, A. L. Ho, S. W. Chen, J. H. Yang, C. Shih, L. C. Wang

Abstract:

To confirm the reactor and containment integrity of the Advanced Boiling Water Reactor (ABWR), we perform the analysis of main steamline break (MSLB) transient by using the TRACE, PARCS, and SNAP codes. The process of the research has four steps. First, the ABWR nuclear power plant (NPP) model is developed by using the above codes. Second, the steady state analysis is performed by using this model. Third, the ABWR model is used to run the analysis of MSLB transient. Fourth, the predictions of TRACE and PARCS are compared with the data of FSAR. The results of TRACE/PARCS and FSAR are similar. According to the TRACE/PARCS results, the reactor and containment integrity of ABWR can be maintained in a safe condition for MSLB.

Keywords: advanced boiling water reactor, TRACE, PARCS, SNAP

Procedia PDF Downloads 187
24685 Increasing Number of NGOs and Their Conduct: A Case Study of Far Western Region of Nepal

Authors: Raju Thapa

Abstract:

Non-Governmental Organizations (NGOs) are conducting activities in Nepal with the overall objective to strengthen peace, progress and prosperity in the society. Based on the research objectives, this study has tried to trace out the reasons behind massive growth of NGOs and the trends that have shaped the handling and functioning of NGOs in the Kailali district. The outcomes of this research are quite embarrassing for NGOs officials. Based on the findings of this research, NGOs are expected to review their guiding principal, integrity and conduct for the betterment of the society.

Keywords: NGO, trends, increasing, conduct, integrity, guiding principle, legal, governance, human resources, public trust, financial, collaboration, networking

Procedia PDF Downloads 377
24684 Enhancing National Integrity through Teaching Secular Perspectives in Medieval Indian History Curricula: A Secular Paradigms

Authors: Deepak Deshpande, Vikas Minchekar

Abstract:

Day by day in modern India communal forces became stronger and stronger. Each and every caste group trying to show their strength through massive marches. Such kind of marches or ralliesruinous national integrity in India. To test this assumption present investigation has been carried out. This research was undertaken by using survey techniques. The study has been carried out in two phases. In the first stage, the students’ attitudes were collected while in the second phase the views of the members of the historical association were collected. The social dominance orientation scale and sources of social dominance inventory have been administered on 200 college students belonging to Maratha caste. Analyzed data revealed ahigh level of social dominance in Maratha caste students. Approximately, 80 percent students have reported that they have learned such dominance from the medieval history. The other sources disappear very less prominent. These results and present Indian social situation have been communicated with the members of the historical association of India. The majority members of this association agreed with this reality. The consensus also received on that Maratha caste person experiencing dominance due to the misinterpretation of the King Shivaji Empire; synchronize by politicians. The survey monkey app was used through electronic mail to collect the views on ‘The attitude towards the modification of curricula questionnaire’. The maximum number of members of the historical association agreed to employ to teach the medieval Indian history accordingly the secular perspectives.

Keywords: social dominance orientation, secular perceptive, national integrity, Maratha caste and medieval Indian history

Procedia PDF Downloads 227
24683 Gonadotoxic and Cytotoxic Effect of Induced Obesity via Monosodium Glutamate on Mus musculus Testis Cytoarchitecture and Sperm Parameter

Authors: I. Nur Hilwani, R. Nasibah, S. Nurdiana, M. J. Norashirene

Abstract:

Impaired fertility may be the result of indirect consumption of anti-fertility agents through food. Monosodium glutamate (MSG) has been widely used as food additive, flavour enhancer and included in vaccines. This study focuses in determining the gonadotoxic and cytotoxic effect of MSG on selected sperm parameters such as sperm viability, sperm membrane integrity and testes cytoarchitecture of male mice via histological examination to determine its effect on spermatogenesis. Twenty-four Mus musculus were randomly divided into 4 groups and given intraperitoneal injections (IP) daily for 14 days of different MSG concentrations at 250, 500 and 1000mg/kg MSG to body weight to induce obesity. Saline was given to control group. Mice were sacrificed and analysis revealed abnormalities in values for sperm parameters and damages to testes cytoarchitecture of male mice. The results recorded decreased viability (p<0.05) and integrity of sperm membrane (p>0.05) with degenerative structures in seminiferous tubule of testes. The results indicated various implications of MSG on male mice reproductive system which has consequences in fertility potential.

Keywords: sperm parameter, testes histology, sperm viability, sperm membrane integrity

Procedia PDF Downloads 326
24682 Exfoliation of Functionalized High Structural Integrity Graphene Nanoplatelets at Extremely Low Temperature

Authors: Mohannad N. H. Al-Malichi

Abstract:

Because of its exceptional properties, graphene has become the most promising nanomaterial for the development of a new generation of advanced materials from battery electrodes to structural composites. However, current methods to meet requirements for the mass production of high-quality graphene are limited by harsh oxidation, high temperatures, and tedious processing steps. To extend the scope of the bulk production of graphene, herein, a facile, reproducible and cost-effective approach has been developed. This involved heating a specific mixture of chemical materials at an extremely low temperature (70 C) for a short period (7 minutes) to exfoliate functionalized graphene platelets with high structural integrity. The obtained graphene platelets have an average thickness of 3.86±0.71 nm and a lateral size less than ~2 µm with a low defect intensity ID/IG ~0.06. The thin film (~2 µm thick) exhibited a low surface resistance of ~0.63 Ω/sq⁻¹, confirming its high electrical conductivity. Additionally, these nanoplatelets were decorated with polar functional groups (epoxy and carboxyl groups), thus have the potential to toughen and provide multifunctional polymer nanocomposites. Moreover, such a simple method can be further exploited for the novel exfoliation of other layered two-dimensional materials such as MXenes.

Keywords: functionalized graphene nanoplatelets, high structural integrity graphene, low temperature exfoliation of graphene, functional graphene platelets

Procedia PDF Downloads 96
24681 Anti-Corruption, an Important Challenge for the Construction Industry!

Authors: Ahmed Stifi, Sascha Gentes, Fritz Gehbauer

Abstract:

The construction industry is perhaps one of the oldest industry of the world. The ancient monuments like the egyptian pyramids, the temples of Greeks and Romans like Parthenon and Pantheon, the robust bridges, old Roman theatres, the citadels and many more are the best testament to that. The industry also has a symbiotic relationship with other . Some of the heavy engineering industry provide construction machineries, chemical industry develop innovative construction materials, finance sector provides fund solutions for complex construction projects and many more. Construction Industry is not only mammoth but also very complex in nature. Because of the complexity, construction industry is prone to various tribulations which may have the propensity to hamper its growth. The comparitive study of this industry with other depicts that it is associated with a state of tardiness and delay especially when we focus on the managerial aspects and the study of triple constraint (time, cost and scope). While some institutes says the complexity associated with it as a major reason, others like lean construction, refers to the wastes produced across the construction process as the prime reason. This paper introduces corruption as one of the prime factors for such delays.To support this many international reports and studies are available depicting that construction industry is one of the most corrupt sectors worldwide, and the corruption can take place throught the project cycle comprising project selection, planning, design, funding, pre-qualification, tendering, execution, operation and maintenance, and even through the reconstrction phase. It also happens in many forms such as bribe, fraud, extortion, collusion, embezzlement and conflict of interest and the self-sufficient. As a solution to cope the corruption in construction industry, the paper introduces the integrity as a key factor and build a new integrity framework to develop and implement an integrity management system for construction companies and construction projects.

Keywords: corruption, construction industry, integrity, lean construction

Procedia PDF Downloads 348
24680 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 296
24679 Probabilistic Fracture Evaluation of Reactor Pressure Vessel Subjected to Pressurized Thermal Shock

Authors: Jianguo Chen, Fenggang Zang, Yu Yang, Liangang Zheng

Abstract:

Reactor Pressure Vessel (RPV) is an important security barrier in nuclear power plant. Crack like defects may be produced on RPV during the whole operation lifetime due to the harsh operation condition and irradiation embrittlement. During the severe loss of coolant accident, thermal shock happened as the injection of emergency cooling water into RPV, which results in re-pressurization of the vessel and very high tension stress on the vessel wall, this event called Pressurized Thermal Shock (PTS). Crack on the vessel wall may propagate even penetrate the vessel, so the safety of the RPV would undergo great challenge. Many assumptions in structure integrity evaluation make the result of deterministic fracture mechanics very conservative, which affect the operation lifetime of the plant. Actually, many parameters in the evaluation process, such as fracture toughness and nil-ductility transition temperature, have statistical distribution characteristics. So it is necessary to assess the structural integrity of RPV subjected to PTS event by means of Probabilistic Fracture Mechanics (PFM). Structure integrity evaluation methods of RPV subjected to PTS event are summarized firstly, then evaluation method based on probabilistic fracture mechanics are presented by considering the probabilistic characteristics of material and structure parameters. A comprehensive analysis example is carried out at last. The results show that the probability of crack penetrates through wall increases gradually with the growth of fast neutron irradiation flux. The results give advice for reactor life extension.

Keywords: fracture toughness, integrity evaluation, pressurized thermal shock, probabilistic fracture mechanics, reactor pressure vessel

Procedia PDF Downloads 225
24678 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 452
24677 Quality of Chilled Indigenous Ram Semen Using Multi-Species Skim Milk Based Extenders

Authors: Asaduzzaman Rimon, Pankaj Kumar Jha, Abdullah Al Mansur, Mohammad Mofizul Islam, Nasrin Sultana Juyena, Farida Yeasmin Bari

Abstract:

This study was conducted to determine the effects of multi-species skim milk based extenders on sperm quality at 5ºC with the advancement of preservation time. Altogether forty ejaculates, 8 ejaculates for each of the 5 home-made semen extenders: cow skim milk (CSM), goat skim milk (GSM), sheep skim milk (SSM), buffalo skim milk (BSM) and commercial dried skim milk (CDSM) were examined for motility, plasma membrane integrity and normal morphology % of sperm at 0, 24, 48, 72, 96 and 120 hours, respectively. Sperm motility was significantly decreased (P < 0.05) with the increase of preservation time. There were no significant difference in motility % among CSM (84.0±1.4, 82.3±2.1), GSM (84.5±1.0, 82.5±0.6) and CDSM (85.0±80.3±1.3) extenders at 0 and 24 hours, respectively. However, the motility in GSM extender was significantly higher than BSM, SSM and CDSM extender at 48, 72, 96 and 120 hours. The plasma membrane integrity % at 0 hour had no significant difference among the extenders. But, the plasma membrane integrity % in GSM (84.3±0.9, 81.8±1.3, 78.0±2.2, 74.8±0.5, 72.0±1.4) and CSM (82.8±0.5, 80.8±1.0, 78.0±1.4, 73.5±1.7, 70.3±0.5) extenders were significantly higher than BSM (81.0±1.4, 76.3±2.5, 72.5±1.7, 63.8±2.5, 54.0±4.6), SSM (78.5±1.5, 75.0±1.6, 71.5±2.4, 64.3±1.7, 56.5±2.4) and CDSM extenders (78.3±2.4, 75.8±3.9, 72.5±3.3, 64.8±1.0, 60.5±3.3) at 24, 48, 72, 96 and 120 hours, respectively. The sperm morphology % had no significant difference at 0 hour among the extenders but were significantly higher in GSM (83.0±0.8, 81.3±1.5, 79.3±1.3, 73.0±2.2, 70.3±1.3) and CSM (81.5±1.7, 79.3±1.5, 75.8±1.5, 70.3±1.3, 66.3±1.5) than BSM (79.0±1.2, 75.0±1.4, 69.5±1.7, 64.5±3.1, 56.8±2.2), SSM (79.8±1.3, 76.8±2.1, 71.3±3.0, 66.0±2.7, 60.3±4.5) and CDSM (80.0±1.6, 77.0±2.2, 72.0±2.5, 66.3±2.5, 62.0±4.0) extenders at 24, 48, 72, 96 and 120 hours, respectively. The motility, plasma membrane integrity and normal morphology % of sperm had shown no significant difference between GSM and CSM but were found to be higher in GSM extenders. In the end, we concluded from the above study that the goat milk based extenders (GSM) had optimum sperm preserving quality. However, further studies are required to validate followed by fertility rate.

Keywords: chilled semen, indigenous ram, multi-species skim milk based extenders, preservation

Procedia PDF Downloads 393
24676 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 330
24675 Humanising Digital Healthcare to Build Capacity by Harnessing the Power of Patient Data

Authors: Durhane Wong-Rieger, Kawaldip Sehmi, Nicola Bedlington, Nicole Boice, Tamás Bereczky

Abstract:

Patient-generated health data should be seen as the expression of the experience of patients, including the outcomes reflecting the impact a treatment or service had on their physical health and wellness. We discuss how the healthcare system can reach a place where digital is a determinant of health - where data is generated by patients and is respected and which acknowledges their contribution to science. We explore the biggest barriers facing this. The International Experience Exchange with Patient Organisation’s Position Paper is based on a global patient survey conducted in Q3 2021 that received 304 responses. Results were discussed and validated by the 15 patient experts and supplemented with literature research. Results are a subset of this. Our research showed patient communities want to influence how their data is generated, shared, and used. Our study concludes that a reasonable framework is needed to protect the integrity of patient data and minimise abuse, and build trust. Results also demonstrated a need for patient communities to have more influence and control over how health data is generated, shared, and used. The results clearly highlight that the community feels there is a lack of clear policies on sharing data.

Keywords: digital health, equitable access, humanise healthcare, patient data

Procedia PDF Downloads 54
24674 Optimal Design of Propellant Grain Shape Based on Structural Strength Analysis

Authors: Chen Xiong, Tong Xin, Li Hao, Xu Jin-Sheng

Abstract:

Experiment and simulation researches on the structural integrity of propellant grain in solid rocket motor (SRM) with high volumetric fraction were conducted. First, by using SRM parametric modeling functions with secondary development tool Python of ABAQUS, the three dimensional parameterized modeling programs of star shaped grain, wheel shaped grain and wing cylindrical grain were accomplished. Then, the mechanical properties under different loads for star shaped grain were obtained with the application of automatically established finite element model in ABAQUS. Next, several optimization algorithms are introduced to optimize the star shaped grain, wheel shaped grain and wing cylindrical grain. After meeting the demands of burning surface changes and volumetric fraction, the optimum three dimensional shapes of grain were obtained. Finally, by means of parametric modeling functions, pressure data of SRM’s cold pressurization test was directly applied to simulation of grain in terms of mechanical performance. The results verify the reliability and practical of parameterized modeling program of SRM.

Keywords: cold pressurization test, ğarametric modeling, structural integrity, propellant grain, SRM

Procedia PDF Downloads 331
24673 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 445
24672 ED Machining of Particulate Reinforced Metal Matrix Composites

Authors: Sarabjeet Singh Sidhu, Ajay Batish, Sanjeev Kumar

Abstract:

This paper reports the optimal process conditions for machining of three different types of metal matrix composites (MMCs): 65vol%SiC/A356.2; 10vol%SiC-5vol%quartz/Al and 30vol%SiC/A359 using PMEDM process. Metal removal rate (MRR), tool wear rate (TWR), surface roughness (SR) and surface integrity (SI) were evaluated after each trial and contributing process parameters were identified. The four responses were then collectively optimized using the technique for order preference by similarity to ideal solution (TOPSIS) and optimal process conditions were identified for each type of MMCS. The density of reinforced particles shields the matrix material from spark energy hence the high MRR and SR was observed with lowest reinforced particle. TWR was highest with Cu-Gr electrode due to disintegration of the weakly bonded particles in the composite electrode. Each workpiece was examined for surface integrity and ranked as per severity of surface defects observed and their rankings were used for arriving at the most optimal process settings for each workpiece.

Keywords: metal matrix composites (MMCS), metal removal rate (MRR), surface roughness (SR), surface integrity (SI), tool wear rate (TWR), technique for order preference by similarity to ideal solution (TOPSIS)

Procedia PDF Downloads 264
24671 Remanufacturing and Integrity Assessment of a 27-Year-Old 25kV Gas Insulated Switchgear: A Comprehensive Study on Dismantling, Inspection, and Testing

Authors: Yechan Kim, Bonhyuk Ku, Minkyung Jung, Hyoungku Kang

Abstract:

This study presents the remanufacturing of a 25kV gas insulated switchgear (GIS) that operated indoors for 27 years before being decommissioned due to aging. The research involved a detailed process of dismantling, visual inspection, component-wise examination, and various testing methodologies to assess the equipment's condition. The focus was on evaluating the GIS's integrity and feasibility for remanufacturing. The results highlight the potential of remanufacturing in extending the life of electrical power equipment, offering insights into the best practices, challenges, and technical considerations of such an undertaking. This contributes to a sustainable approach in the power industry, emphasizing the reuse and restoration of aging equipment.

Keywords: remanufacturing, dismantling, gas insulated switchgear, sustainability, life extension

Procedia PDF Downloads 45
24670 Optimization of a Method of Total RNA Extraction from Mentha piperita

Authors: Soheila Afkar

Abstract:

Mentha piperita is a medicinal plant that contains a large amount of secondary metabolite that has adverse effect on RNA extraction. Since high quality of RNA is the first step to real time-PCR, in this study optimization of total RNA isolation from leaf tissues of Mentha piperita was evaluated. From this point of view, we researched two different total RNA extraction methods on leaves of Mentha piperita to find the best one that contributes the high quality. The methods tested are RNX-plus, modified RNX-plus (1-5 numbers). RNA quality was analyzed by agarose gel 1.5%. The RNA integrity was also assessed by visualization of ribosomal RNA bands on 1.5% agarose gels. In the modified RNX-plus method (number 2), the integrity of 28S and 18S rRNA was highly satisfactory when analyzed in agarose denaturing gel, so this method is suitable for RNA isolation from Mentha piperita.

Keywords: Mentha piperita, polyphenol, polysaccharide, RNA extraction

Procedia PDF Downloads 162
24669 The Implementation of the Human Right of Self-Determination: the Example of Nagorno-Karabakh Republic

Authors: S. Vlasyan

Abstract:

The article deals with the implementation of the right to self-determination of peoples on the example of Nagorno-Karabakh Republic. The problem of correlation of two fundamental principles of international law i. e. territorial integrity and the right to self-determination of peoples is considered to be one of the vital issues in the field of international law for several decades. So, in this article, the author analyzes the decision of the Supreme Court of Canada regarding specific issues of secession of Quebec from Canada, as well as the decision of the International Court of Justice in the case concerning East Timor (Portugal v. Australia), and in the case of Western Sahara. The author formulates legal conditions of Nagorno-Karabakh secession.

Keywords: right of self-determination, territorial integrity, the principles of International Law, Nagorno-Karabakh Republic

Procedia PDF Downloads 379
24668 Signal Integrity Performance Analysis in Capacitive and Inductively Coupled Very Large Scale Integration Interconnect Models

Authors: Mudavath Raju, Bhaskar Gugulothu, B. Rajendra Naik

Abstract:

The rapid advances in Very Large Scale Integration (VLSI) technology has resulted in the reduction of minimum feature size to sub-quarter microns and switching time in tens of picoseconds or even less. As a result, the degradation of high-speed digital circuits due to signal integrity issues such as coupling effects, clock feedthrough, crosstalk noise and delay uncertainty noise. Crosstalk noise in VLSI interconnects is a major concern and reduction in VLSI interconnect has become more important for high-speed digital circuits. It is the most effectively considered in Deep Sub Micron (DSM) and Ultra Deep Sub Micron (UDSM) technology. Increasing spacing in-between aggressor and victim line is one of the technique to reduce the crosstalk. Guard trace or shield insertion in-between aggressor and victim is also one of the prominent options for the minimization of crosstalk. In this paper, far end crosstalk noise is estimated with mutual inductance and capacitance RLC interconnect model. Also investigated the extent of crosstalk in capacitive and inductively coupled interconnects to minimizes the same through shield insertion technique.

Keywords: VLSI, interconnects, signal integrity, crosstalk, shield insertion, guard trace, deep sub micron

Procedia PDF Downloads 157
24667 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 449
24666 Investigating the Effects of Hydrogen on Wet Cement for Underground Hydrogen Storage Applications in Oil and Gas Wells

Authors: Hamoud Al-Hadrami, Hossein Emadi, Athar Hussain

Abstract:

Green hydrogen is quickly emerging as a new source of renewable energy for the world. Hydrogen production using water electrolysis is deemed as an environmentally friendly and safe source of energy for transportation and other industries. However, storing a high volume of hydrogen seems to be a significant challenge. Abandoned hydrocarbon reservoirs are considered as viable hydrogen storage options because of the availability of the required infrastructure such as wells and surface facilities. However, long-term wellbore integrity in these wells could be a serious challenge. Hydrogen reduces the compressive strength of a set cement if it gets in contact with the cement slurry. Also, mixing hydrogen with cement slurry slightly increases its density and rheological properties, which need to be considered to have a successful primary cementing operation.

Keywords: hydrogen, well bore integrity, clean energy, cementing

Procedia PDF Downloads 185
24665 Cryoinjuries in Sperm Cells: Effect of Adaptation of Steps in Cryopreservation Protocol for Boar Semen upon Post-Thaw Sperm Quality

Authors: Aftab Ali

Abstract:

Cryopreservation of semen is one of the key factors for a successful breeding business along with other factors. To achieve high fertility in boar, one should know about spermatozoa response to different treatments proceeds during cryopreservation. The running project is highly focused on cryopreservation and its effects on sperm quality parameters in both boar and bull semen. Semen sample from A, B, C, and D, were subjected to different thawing conditions and were analyzed upon different treatments in the study. Parameters like sperm cell motility, viability, acrosome, DNA integrity, and phospholipase C zeta were detected by different established methods. Different techniques were used to assess different parameters. Motility was detected using computer assisted sperm analysis, phospholipase C zeta using luminometry while viability, acrosome integrity, and DNA integrity were analyzed using flow cytometry. Thawing conditions were noted to have an effect on sperm quality parameters with motility being the most critical parameter. The results further indicated that the most critical step during cryopreservation of boar semen is when sperm cells are subjected to freezing and thawing. The findings of the present study provide insight that; boar semen cryopreservation is still suboptimal in comparison to bull semen cryopreservation. Thus, there is a need to conduct more research to improve the fertilizing potential of cryopreserved boar semen.

Keywords: cryopreservation, computer assisted sperm, flow cytometry, luminometry

Procedia PDF Downloads 124
24664 Denoising Transient Electromagnetic Data

Authors: Lingerew Nebere Kassie, Ping-Yu Chang, Hsin-Hua Huang, , Chaw-Son Chen

Abstract:

Transient electromagnetic (TEM) data plays a crucial role in hydrogeological and environmental applications, providing valuable insights into geological structures and resistivity variations. However, the presence of noise often hinders the interpretation and reliability of these data. Our study addresses this issue by utilizing a FASTSNAP system for the TEM survey, which operates at different modes (low, medium, and high) with continuous adjustments to discretization, gain, and current. We employ a denoising approach that processes the raw data obtained from each acquisition mode to improve signal quality and enhance data reliability. We use a signal-averaging technique for each mode, increasing the signal-to-noise ratio. Additionally, we utilize wavelet transform to suppress noise further while preserving the integrity of the underlying signals. This approach significantly improves the data quality, notably suppressing severe noise at late times. The resulting denoised data exhibits a substantially improved signal-to-noise ratio, leading to increased accuracy in parameter estimation. By effectively denoising TEM data, our study contributes to a more reliable interpretation and analysis of underground structures. Moreover, the proposed denoising approach can be seamlessly integrated into existing ground-based TEM data processing workflows, facilitating the extraction of meaningful information from noisy measurements and enhancing the overall quality and reliability of the acquired data.

Keywords: data quality, signal averaging, transient electromagnetic, wavelet transform

Procedia PDF Downloads 64
24663 Supplementation of Citrulline with Lactic Acid Bacteria Protects Foodborne Pathogens Adhesion and Improves the Cell Integrity on the Intestinal Epithelial Cell

Authors: Sze Wing Ho, Nagendra P. Shah

Abstract:

Lactic acid bacteria (LAB) have shown the beneficial effects on human gastrointestinal tract, such as protects diarrhea induced by lactose intolerance or enteric pathogens. Citrulline is a non-protein amino acid and also the precursors of arginine and nitric oxide, it has shown to enhance intestinal barrier function. Citrulline has shown to improve the growth of some strains of LAB, it is important for LAB to have a sufficient cell concentration to contribute the effects. Therefore, the aims of this study were to investigate the effect of combining citrulline with LAB on the anti-adhesion effect against pathogens and the effect on the cell integrity. The effect of citrulline on selected LAB was determined by incubating in 0%, 0.1% or 0.2% citrulline enriched MRS broth for 18 h. The adhesion ability of LAB and the anti-adhesion effect of LAB and citrulline against pathogens were performed on IPEC-J2 cell line. Transepithelial electrical resistance (TEER) assay was used to measure the tight junction (TJ) integrity. TJ proteins (claudin-1, occludin and zonula occluden-1 (ZO-1)) were determined by western blot analysis. It found that the growth of Lactobacillus helveticus ASCC 511 was significantly stimulated by 0.2% citrulline compared with control during 18 h fermentation. The adhesion of L. helveticus ASCC 511 and Lactobacillus delbrueckii ssp. bulgaricus (L. bulgaricus) ASCC 756 was increased when supplemented with citrulline. Citrulline has shown significant inhibitory effect on the adhesion of Escherichia coli PELI0480 (O157:H7), Shigella sonnei ATCC 25931, Staphyloccocus aureus CMCC26003 and Cronobacter sakazakii ATCC 29544. The anti-adhesion effect of L. helveticus ASCC 511, L. bulgaricus ASCC 756 and Lactobacillus paracasei ASCC 276 against Cronobacter sakazakii ATCC 29544 was significantly enhanced with citrulline supplementation. Treatments with citrulline and LAB were able to maintain the TEER of IPEC-J2 cell and shown the positive effect on the TJ proteins. In conclusion, citrulline had stimulating effect on some strains of LAB and determined to improve the adhesion of LAB on intestinal epithelial cell, to enhance the inhibitory effect on enteric pathogens adhesion as well as had beneficial effects on maintaining cell integrity. It implied LAB supplemented with citrulline might have advantageous effects on gastrointestinal tracts.

Keywords: citrulline, lactic acid bacteria, amino acid, anti-adhesion effect, cell integrity

Procedia PDF Downloads 220
24662 Effect of CSL Tube Type on the Drilled Shaft Axial Load Carrying Capacity

Authors: Ali Motevalli, Shahin Nayyeri Amiri

Abstract:

Cross-Hole Sonic Logging (CSL) is a common type of Non-Destructive Testing (NDT) method, which is currently used to check the integrity of placed drilled shafts. CSL evaluates the integrity of the concrete inside the cage and between the access tubes based on propagation of ultrasonic waves between two or more access tubes. A number of access tubes are installed inside the reinforcing cage prior to concrete placement as guides for sensors. The access tubes can be PVC or steel galvanized based on ASTM6760. The type of the CSL tubes can affect the axial strength of the drilled shaft. The objective of this study is to compare the amount of axial load capacity of drilled shafts due to using a different type of CSL tubes inside the caging. To achieve this, three (3) large-scale drilled shaft samples were built and tested using a hydraulic actuator at the Florida International University’s (FIU) Titan America Structures and Construction Testing (TASCT) laboratory. During the static load test, load-displacement curves were recorded by the data acquisition system (MegaDAC). Three drilled shaft samples were built to evaluate the effect of the type of the CSL tube on the axial load capacity in drilled shaft foundations.

Keywords: drilled shaft foundations, axial load capacity, cage, PVC, galvanized tube, CSL tube

Procedia PDF Downloads 382
24661 Blockchain-Based Assignment Management System

Authors: Amogh Katti, J. Sai Asritha, D. Nivedh, M. Kalyan Srinivas, B. Somnath Chakravarthi

Abstract:

Today's modern education system uses Learning Management System (LMS) portals for the scoring and grading of student performances, to maintain student records, and teachers are instructed to accept assignments through online submissions of .pdf,.doc,.ppt, etc. There is a risk of data tampering in the traditional portals; we will apply the Blockchain model instead of this traditional model to avoid data tampering and also provide a decentralized mechanism for overall fairness. Blockchain technology is a better and also recommended model because of the following features: consensus mechanism, decentralized system, cryptographic encryption, smart contracts, Ethereum blockchain. The proposed system ensures data integrity and tamper-proof assignment submission and grading, which will be helpful for both students and also educators.

Keywords: education technology, learning management system, decentralized applications, blockchain

Procedia PDF Downloads 52
24660 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 442
24659 Calculational-Experimental Approach of Radiation Damage Parameters on VVER Equipment Evaluation

Authors: Pavel Borodkin, Nikolay Khrennikov, Azamat Gazetdinov

Abstract:

The problem of ensuring of VVER type reactor equipment integrity is now most actual in connection with justification of safety of the NPP Units and extension of their service life to 60 years and more. First of all, it concerns old units with VVER-440 and VVER-1000. The justification of the VVER equipment integrity depends on the reliability of estimation of the degree of the equipment damage. One of the mandatory requirements, providing the reliability of such estimation, and also evaluation of VVER equipment lifetime, is the monitoring of equipment radiation loading parameters. In this connection, there is a problem of justification of such normative parameters, used for an estimation of the pressure vessel metal embrittlement, as the fluence and fluence rate (FR) of fast neutrons above 0.5 MeV. From the point of view of regulatory practice, a comparison of displacement per atom (DPA) and fast neutron fluence (FNF) above 0.5 MeV has a practical concern. In accordance with the Russian regulatory rules, neutron fluence F(E > 0.5 MeV) is a radiation exposure parameter used in steel embrittlement prediction under neutron irradiation. However, the DPA parameter is a more physically legitimate quantity of neutron damage of Fe based materials. If DPA distribution in reactor structures is more conservative as neutron fluence, this case should attract the attention of the regulatory authority. The purpose of this work was to show what radiation load parameters (fluence, DPA) on all VVER equipment should be under control, and give the reasonable estimations of such parameters in the volume of all equipment. The second task is to give the conservative estimation of each parameter including its uncertainty. Results of recently received investigations allow to test the conservatism of calculational predictions, and, as it has been shown in the paper, combination of ex-vessel measured data with calculated ones allows to assess unpredicted uncertainties which are results of specific unique features of individual equipment for VVER reactor. Some results of calculational-experimental investigations are presented in this paper.

Keywords: equipment integrity, fluence, displacement per atom, nuclear power plant, neutron activation measurements, neutron transport calculations

Procedia PDF Downloads 138
24658 Leveraging Multimodal Neuroimaging Techniques to in vivo Address Compensatory and Disintegration Patterns in Neurodegenerative Disorders: Evidence from Cortico-Cerebellar Connections in Multiple Sclerosis

Authors: Efstratios Karavasilis, Foteini Christidi, Georgios Velonakis, Agapi Plousi, Kalliopi Platoni, Nikolaos Kelekis, Ioannis Evdokimidis, Efstathios Efstathopoulos

Abstract:

Introduction: Advanced structural and functional neuroimaging techniques contribute to the study of anatomical and functional brain connectivity and its role in the pathophysiology and symptoms’ heterogeneity in several neurodegenerative disorders, including multiple sclerosis (MS). Aim: In the present study, we applied multiparametric neuroimaging techniques to investigate the structural and functional cortico-cerebellar changes in MS patients. Material: We included 51 MS patients (28 with clinically isolated syndrome [CIS], 31 with relapsing-remitting MS [RRMS]) and 51 age- and gender-matched healthy controls (HC) who underwent MRI in a 3.0T MRI scanner. Methodology: The acquisition protocol included high-resolution 3D T1 weighted, diffusion-weighted imaging and echo planar imaging sequences for the analysis of volumetric, tractography and functional resting state data, respectively. We performed between-group comparisons (CIS, RRMS, HC) using CAT12 and CONN16 MATLAB toolboxes for the analysis of volumetric (cerebellar gray matter density) and functional (cortico-cerebellar resting-state functional connectivity) data, respectively. Brainance suite was used for the analysis of tractography data (cortico-cerebellar white matter integrity; fractional anisotropy [FA]; axial and radial diffusivity [AD; RD]) to reconstruct the cerebellum tracts. Results: Patients with CIS did not show significant gray matter (GM) density differences compared with HC. However, they showed decreased FA and increased diffusivity measures in cortico-cerebellar tracts, and increased cortico-cerebellar functional connectivity. Patients with RRMS showed decreased GM density in cerebellar regions, decreased FA and increased diffusivity measures in cortico-cerebellar WM tracts, as well as a pattern of increased and mostly decreased functional cortico-cerebellar connectivity compared to HC. The comparison between CIS and RRMS patients revealed significant GM density difference, reduced FA and increased diffusivity measures in WM cortico-cerebellar tracts and increased/decreased functional connectivity. The identification of decreased WM integrity and increased functional cortico-cerebellar connectivity without GM changes in CIS and the pattern of decreased GM density decreased WM integrity and mostly decreased functional connectivity in RRMS patients emphasizes the role of compensatory mechanisms in early disease stages and the disintegration of structural and functional networks with disease progression. Conclusions: In conclusion, our study highlights the added value of multimodal neuroimaging techniques for the in vivo investigation of cortico-cerebellar brain changes in neurodegenerative disorders. An extension and future opportunity to leverage multimodal neuroimaging data inevitably remain the integration of such data in the recently-applied mathematical approaches of machine learning algorithms to more accurately classify and predict patients’ disease course.

Keywords: advanced neuroimaging techniques, cerebellum, MRI, multiple sclerosis

Procedia PDF Downloads 118
24657 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 170