Search results for: nerve message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 584

Search results for: nerve message

524 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 395
523 Data Hiding in Gray Image Using ASCII Value and Scanning Technique

Authors: R. K. Pateriya, Jyoti Bharti

Abstract:

This paper presents an approach for data hiding methods which provides a secret communication between sender and receiver. The data is hidden in gray-scale images and the boundary of gray-scale image is used to store the mapping information. In this an approach data is in ASCII format and the mapping is in between ASCII value of hidden message and pixel value of cover image, since pixel value of an image as well as ASCII value is in range of 0 to 255 and this mapping information is occupying only 1 bit per character of hidden message as compared to 8 bit per character thus maintaining good quality of stego image.

Keywords: ASCII value, cover image, PSNR, pixel value, stego image, secret message

Procedia PDF Downloads 398
522 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 325
521 Case Report: A Rare Case of Popliteal Artery Aneurysm Presenting with Foot Drop

Authors: John Yahng, Hansraj Riteesh Bookun

Abstract:

Popliteal artery aneurysms (PAAs) are the most common arterial aneurysm of the periphery. It is defined as focal dilation of the artery more than 50% of the normal vessel diameter which usually varies between 7 mm to 11 mm. The most common presentation for PAAs is claudication due to luminal stenosis secondary to mural thrombus or acute limb ischaemia due to occlusive thrombosis or distal thromboembolism. It is less common for patients to present with non-ischaemic symptoms secondary to mass effect and compression of adjacent structures, and of these, presentation with common peroneal nerve compression is particularly uncommon. We present a rare case of a 92-year-old female patient presenting with 4-month history of left foot drop with radiological evidence of common peroneal nerve compression secondary to PAA of 22 mm by 21mm in size. To the best of our knowledge, this is the smallest reported popliteal aneurysm presenting with foot drop. We also present the endovascular treatment option taken in our case.

Keywords: aneurysm, foot drop, peroneal nerve, popliteal

Procedia PDF Downloads 383
520 Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes

Authors: Kate Whitman, Zahra Murad, Joe Cox

Abstract:

Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages.

Keywords: piracy, reactance, persuasive-messages, TV/film, gender

Procedia PDF Downloads 75
519 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 378
518 Solitary Fibrous Tumor Presumed to Be a Peripheral Nerve Sheath Tumor Involving Right Branchial Plexus

Authors: Daniela Proca, Yuan Rong, Salvatore Luceno, Jalil Nasibli

Abstract:

Introduction: Solitary Fibrous Tumors (SFT) have many histologic mimickers and the only way to diagnose it, particularly in an unusual location, such as peripheral nerve trunks, is to use a comprehensive immunohistochemical staining panel. Monoclonal STAT6 immunostain is highly sensitive and specific for SFTs and particularly useful in the diagnosis of difficult SFT cases. Methods: We describe a solitary fibrous tumor (SFT) involving the right branchial plexus in a 66 yo female with 4-year history of slowly growing chest wall mass with recent dysesthesias in fingers 4th and 5th. MRI showed a well-circumscribed heterogenous mass measuring 5.4 x 3.8 x 4.0 cm and encircling peripheral nerves of the branchial plexus; no involvement of the bone or muscle was noted. A biopsy showed a bland spindled and epithelioid proliferation with no significant mitotic activity, no necrosis, and no atypia; peripheral nerve fascicles were encircled by the lesion. The main clinical and pathologic differential diagnosis included peripheral nerve sheath tumor, particularly schwannoma; HE microscopy didn’t show the classic Antoni A and B areas but showed focal subtle nuclear palisading, as well as prominent vessels with hyalinization. Immunohistochemical stains showed focal, weak cytoplasmic S100 positivity in the lesion; CD 34 and Vimentin were strongly and diffusely positive; the neoplastic cells were negative with AE1/AE3, EMA, CD31, SMA, Desmin, Calretinin, HMB-45, Melan A, PAX-8, NSE. The immunohistochemical and histologic pattern was not typical of peripheral nerve sheath tumor. On additional stains, the tumor was positive with STAT-6 and bcl-2 and focally positive with CD99. Given this profile, the final diagnosis was that of a solitary fibrous tumor. Results: NA Conclusion: Very few SFTs involving peripheral nerves and mimicking a peripheral nerve sheath tumor are described in the literature. Although histologically benign on this biopsy, long-term follow-up is required because of the risk of recurrence of these tumors and their uncertain biological behavior.

Keywords: solitary fibrous tumor, pathology, diagnosis, immunohistochemistry

Procedia PDF Downloads 175
517 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 277
516 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 318
515 Visual Intelligence: Perception, Image and Manipulation in Visual Communication

Authors: Poojitha Vemula

Abstract:

Understanding how we use image manipulation to communicate through an audience’s perceptions and conceive visual intelligence. With the use of many software and high-end skills, designers have developed a third eye to combine two different visuals and create the desired image by using photoshop and other software skills. The purpose of visual intelligence is to convey a message to the targeted audience. For instance, the images of models are retouched on their skin to make it more convincing and draw attention from the audience. There are many ways of manipulating an image, such as double exposure, retouching photography inks or paint airbrushing and piecing photos together, or enhancing the brightness and contrast. To understand visual intelligence, a questionnaire survey as well as research was conducted on how image manipulation is used by both the audience and the designers. This depends on the message that needs to be conveyed by the brands. For instance, Fair & Lovely, a brightening cream for ladies use a lot of retouching and effects to show the dramatic change the cream takes effect on dark or dusky faces. Thus the designer’s role is to use their third eye to incorporate the message into visuals. The research and questionnaire survey concludes the perceptions and manipulations used in visual communication. However this is all to make an effortless communication between the designer and the audience by using the skills of the designer and the features provided by the software. The objective of visual intelligence is to covet the message of the brands that advertise their products or services by using visuals through softwares. Conveying a message through visual intelligence requires an audiences perceptions and understanding from the visuals created by the artists or designers. Visual intelligence determines how we use our technical skills to retouch and manipulate an image for a better understanding to convey the message to the targeted audience. This also bridges the communication between the brand and the audience.

Keywords: graphic design, visual communication, convey messages, photoshop, image manipulation

Procedia PDF Downloads 179
514 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 107
513 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

Authors: Che-Wei Lee, Bay-Erl Lai

Abstract:

A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.

Keywords: steganography, data hiding, secret authentication, secret sharing

Procedia PDF Downloads 224
512 Stimulation of Nerve Tissue Differentiation and Development Using Scaffold-Based Cell Culture in Bioreactors

Authors: Simon Grossemy, Peggy P. Y. Chan, Pauline M. Doran

Abstract:

Nerve tissue engineering is the main field of research aimed at finding an alternative to autografts as a treatment for nerve injuries. Scaffolds are used as a support to enhance nerve regeneration. In order to successfully design novel scaffolds and in vitro cell culture systems, a deep understanding of the factors affecting nerve regeneration processes is needed. Physical and biological parameters associated with the culture environment have been identified as potentially influential in nerve cell differentiation, including electrical stimulation, exposure to extracellular-matrix (ECM) proteins, dynamic medium conditions and co-culture with glial cells. The mechanisms involved in driving the cell to differentiation in the presence of these factors are poorly understood; the complexity of each of them raises the possibility that they may strongly influence each other. Some questions that arise in investigating nerve regeneration include: What are the best protein coatings to promote neural cell attachment? Is the scaffold design suitable for providing all the required factors combined? What is the influence of dynamic stimulation on cell viability and differentiation? In order to study these effects, scaffolds adaptable to bioreactor culture conditions were designed to allow electrical stimulation of cells exposed to ECM proteins, all within a dynamic medium environment. Gold coatings were used to make the surface of viscose rayon microfiber scaffolds (VRMS) conductive, and poly-L-lysine (PLL) and laminin (LN) surface coatings were used to mimic the ECM environment and allow the attachment of rat PC12 neural cells. The robustness of the coatings was analyzed by surface resistivity measurements, scanning electron microscope (SEM) observation and immunocytochemistry. Cell attachment to protein coatings of PLL, LN and PLL+LN was studied using DNA quantification with Hoechst. The double coating of PLL+LN was selected based on high levels of PC12 cell attachment and the reported advantages of laminin for neural differentiation. The underlying gold coatings were shown to be biocompatible using cell proliferation and live/dead staining assays. Coatings exhibiting stable properties over time under dynamic fluid conditions were developed; indeed, cell attachment and the conductive power of the scaffolds were maintained over 2 weeks of bioreactor operation. These scaffolds are promising research tools for understanding complex neural cell behavior. They have been used to investigate major factors in the physical culture environment that affect nerve cell viability and differentiation, including electrical stimulation, bioreactor hydrodynamic conditions, and combinations of these parameters. The cell and tissue differentiation response was evaluated using DNA quantification, immunocytochemistry, RT-qPCR and functional analyses.

Keywords: bioreactor, electrical stimulation, nerve differentiation, PC12 cells, scaffold

Procedia PDF Downloads 222
511 A Computational Model of the Thermal Grill Illusion: Simulating the Perceived Pain Using Neuronal Activity in Pain-Sensitive Nerve Fibers

Authors: Subhankar Karmakar, Madhan Kumar Vasudevan, Manivannan Muniyandi

Abstract:

Thermal Grill Illusion (TGI) elicits a strong and often painful sensation of burn when interlacing warm and cold stimuli that are individually non-painful, excites thermoreceptors beneath the skin. Among several theories of TGI, the “disinhibition” theory is the most widely accepted in the literature. According to this theory, TGI is the result of the disinhibition or unmasking of the pain-sensitive HPC (Heat-Pinch-Cold) nerve fibers due to the inhibition of cold-sensitive nerve fibers that are responsible for masking HPC nerve fibers. Although researchers focused on understanding TGI throughexperiments and models, none of them investigated the prediction of TGI pain intensity through a computational model. Furthermore, the comparison of psychophysically perceived TGI intensity with neurophysiological models has not yet been studied. The prediction of pain intensity through a computational model of TGI can help inoptimizing thermal displays and understanding pathological conditions related to temperature perception. The current studyfocuses on developing a computational model to predict the intensity of TGI pain and experimentally observe the perceived TGI pain. The computational model is developed based on the disinhibition theory and by utilizing the existing popular models of warm and cold receptors in the skin. The model aims to predict the neuronal activity of the HPC nerve fibers. With a temperature-controlled thermal grill setup, fifteen participants (ten males and five females) were presented with five temperature differences between warm and cold grills (each repeated three times). All the participants rated the perceived TGI pain sensation on a scale of one to ten. For the range of temperature differences, the experimentally observed perceived intensity of TGI is compared with the neuronal activity of pain-sensitive HPC nerve fibers. The simulation results show a monotonically increasing relationship between the temperature differences and the neuronal activity of the HPC nerve fibers. Moreover, a similar monotonically increasing relationship is experimentally observed between temperature differences and the perceived TGI intensity. This shows the potential comparison of TGI pain intensity observed through the experimental study with the neuronal activity predicted through the model. The proposed model intends to bridge the theoretical understanding of the TGI and the experimental results obtained through psychophysics. Further studies in pain perception are needed to develop a more accurate version of the current model.

Keywords: thermal grill Illusion, computational modelling, simulation, psychophysics, haptics

Procedia PDF Downloads 150
510 A Rare Case of Atypical Guillian-Barre Syndrome Following Antecedent Dengue Infection

Authors: Amlan Datta

Abstract:

Dengue is an arboviral, vector borne infection, quite prevalent in tropical countries such as India. Approximately, 1 to 25% of cases may give rise to neurological complication, such as, seizure, delirium, Guillian-Barre syndrome (GBS), multiple cranial nerve palsies, intracranial thrombosis, stroke-like presentations, to name a few. Dengue fever, as an antecedent to GBS is uncommon, especially in adults.Here, we report a case about a middle aged lady who presented with an acute onset areflexic ascending type of polyradiculoneuropathy along with bilateral lower motor neuron type of facial nerve palsy, as well as abducens and motor component of trigeminal (V3) weakness. Her respiratory and neck muscles were spared. She had an established episode of dengue fever (NS1 and dengue IgM positive) 7 days prior to the weakness. Nerve conduction study revealed a demyelinating polyradiculopathy of both lower limbs and cerebrospinal fluid examination showed albuminocytological dissociation. She was treated with 5 days of intravenous immunoglobulin (IVIg), following which her limb weakness improved considerably. This case highlights GBS as a potential complication following dengue fever.

Keywords: areflexic, demyelinating, dengue, polyradiculoneuropathy

Procedia PDF Downloads 236
509 Central Retinal Venous Occlusion Associated O Bilateral Optic Nerve Infiltration Revealing Relapse Of An Acute Lymphoblastic Leukemia

Authors: Fendouli Ines, Zaafrane Nesrine, Mhamdi Hana, Knani Leila, Ghorbel Mohamed

Abstract:

Introduction: Ocular infiltration of leukemia can involve orbit, uveal tract, retina and optic nerve. It may result from direct ocular infiltration by leukemic cells or indirect ocular involvement resulting from secondary hematologic changes, opportunistic infections and complications of various modalities of therapy. We here in report a case of central venous retinal occlusion associated to optic nerve infiltration as presenting signs of a relapse of acute lymphoblastic leukemia. Case Report: A twelve-year-old male -patient of acute B lymphoblastic leukemia presented with headaches and bilateral blurred vision in the left ee. Ophthalmic examination showed a visual acuity reduced to counting fingers in the right eye and no light perception in the left eye. Funduscopy revealed a voluminous disc edema surrounded by retinal haemorrhages in the right eye, and venous tortusities, papillary edema, and hemorrages suggesting central retinal venous occlusion in the LE. Swept source optical coherence tomography revealed a serous retinal detachment in the RE and .hyperreflective inner layers with macular edema in the left eye. Cerebro-orbital MRI showed bilateral thickened left optic nerve. There were no radiological signs of true papillary edema due to intracranial hypertension secondary to central nervous system involvement. Myelogram and lumbar punction demonstrated blast infiltration and confirmed ocular relapse of the leukemia. Conclusion: Ocular involvement lymphoblastic acute leukemias decreased since the introduction of a systematic prophylactic treatment of central nervous system. Periodic ophthalmic examination is necessary to allow early diagnosis and treatment.

Keywords: acute leukemia, optic nerve, infiltration, relapse

Procedia PDF Downloads 71
508 Sympathetic Skin Response and Reaction Times in Chronic Autoimmune Thyroiditis; An Overlooked Electrodiagnostic Study

Authors: Oya Umit Yemisci, Nur Saracgil Cosar, Tubanur Ozturk Sisman, Selin Ozen

Abstract:

Chronic autoimmune thyroiditis (AIT) may result in a wide spectrum of reversible abnormalities in the neuromuscular function. Usually, proximal muscle-related symptoms and neuropathic findings such as mild axonal peripheral neuropathy have been reported. Sympathetic skin responses are useful in evaluating sudomotor activity of the unmyelinated sympathetic fibers of the autonomic nervous system. Neurocognitive impairment may also be a prominent feature of hypothyroidism, particularly in elderly patients. Electromyographic reaction times as a highly sensitive parameter provides. Objective data concerning cognitive and motor functions. The aim of this study was to evaluate peripheral nerve functions, sympathetic skin response and electroneuromyographic (ENMG) reaction times in euthyroid and subclinically hypothyroid patients with a diagnosis of AIT and compare to those of a control group. Thirty-five euthyroid, 19 patients with subclinical hypothyroidism and 35 age and sex-matched healthy subjects were included in the study. Motor and sensory nerve conduction studies, sympathetic skin responses recorded from hand and foot by stimulating contralateral median nerve and simple reaction times by stimulating tibial nerve and recording from extensor indicis proprius muscle were performed to all patients and control group. Only median nerve sensory conduction velocities of the forearm were slower in patients with AIT compared to the control group (p=0.019). Otherwise, nerve conduction studies and sympathetic skin responses showed no significant difference between the patients and the control group. However, reaction times were shorter in the healthy subjects compared to AIT patients. Prolongation in the reaction times may be considered as a parameter reflecting the alterations in the cognitive functions related to the primary disease process in AIT. Combining sympathetic skin responses with more quantitative tests such as cardiovascular tests and sudomotor axon reflex testing may allow us to determine higher rates of involvement of the autonomic nervous system in AIT.

Keywords: sympathetic skin response, simple reaction time, chronic autoimmune thyroiditis

Procedia PDF Downloads 126
507 Drastic Improvement in Vision Following Surgical Excision of Juvenile Nasopharyngeal Angiofibroma with Compressive Optic Neuropathy

Authors: Sweta Das

Abstract:

This case report is a 15-year-old male who presented with painless unilateral vision loss from left optic nerve compression due to juvenile nasopharyngeal angiofibroma. JNA is a rare, benign neoplasm that causes intracranial and intraorbital bone destruction and extends aggressively into surrounding soft tissues. It accounts for <1% of all head and neck tumors, is predominantly found in pediatric males and tends to affect indigenous population disproportionately. The most common presenting symptom for JNA is epistaxis and nasal obstruction. However, it can invade orbit, chiasm and pituitary gland, causing loss of vision and field. Visual acuity and function near normalized following surgical excision. Optometry plays an important role in the diagnosis and co-management of JNA with optic nerve compression by closely monitoring afferent optic nerve function and structure, and extraocular motility. Visual function and acuity in patients with short-term compressive neuropathy may drastically improve following surgical resection as this case demonstrates.

Keywords: orbital mass, painless monocular vision loss, compressive optic neuropathy, pediatric tumor

Procedia PDF Downloads 42
506 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 374
505 Message Passing Neural Network (MPNN) Approach to Multiphase Diffusion in Reservoirs for Well Interconnection Assessments

Authors: Margarita Mayoral-Villa, J. Klapp, L. Di G. Sigalotti, J. E. V. Guzmán

Abstract:

Automated learning techniques are widely applied in the energy sector to address challenging problems from a practical point of view. To this end, we discuss the implementation of a Message Passing algorithm (MPNN)within a Graph Neural Network(GNN)to leverage the neighborhood of a set of nodes during the aggregation process. This approach enables the characterization of multiphase diffusion processes in the reservoir, such that the flow paths underlying the interconnections between multiple wells may be inferred from previously available data on flow rates and bottomhole pressures. The results thus obtained compare favorably with the predictions produced by the Reduced Order Capacitance-Resistance Models (CRM) and suggest the potential of MPNNs to enhance the robustness of the forecasts while improving the computational efficiency.

Keywords: multiphase diffusion, message passing neural network, well interconnection, interwell connectivity, graph neural network, capacitance-resistance models

Procedia PDF Downloads 131
504 Heart-Rate Variability Moderates the Relation between Life Threatening Events and Cancer-Development: Making Cancer Less “Vague”

Authors: Yori Gidron, Laura Caton, Irit Ben-Aharon

Abstract:

Background: Many patients and even certain clinicians attribute cancer development to psychosocial factors. Yet, empirical data supports more the prognostic role, rather than the etiological role, of psychosocial factors in cancer. Part of the inconsistency may result from not considering possible moderating factors in the etiological role of psychosocial factors. One important candidate moderating factor is the vagal nerve, whose activity is indexed by heart-rate variability (HRV). The vagal nerve may prevent cancer since it reduces inflammation on the one hand, and since it increases anti-tumor immunity on the other hand. This study examined the moderating role of the vagus in the relation between life threatening events (LTE) and cancer development. Method: We re-analyzed data from the Lifelines Dutch longitudinal cohort study of over 150,000 people. The present study included 82,751 adults, who initially were cancer-free. We extracted information on background factors (e.g., age, gender, fat consumption), whether they ever experienced LTE, HRV and cancer diagnosis as reported by patients in annual clinic visits. HRV was derived from brief ECGs. Results: Of the full sample, 1011 people developed cancer during a follow-up. In the full sample, LTE significantly predicted cancer development (R.R = 1.063 p < .01) and HRV significantly predicted a reduced risk of cancer development (R.R = .506 p <.001). Importantly, LTE significantly predicted cancer only when HRV was low (R.R = 1.056, 95% CI: 1.007 - 1.108, p < .05) but not when HRV was high (R.R = 1.014; 95% CI: 0.916 - 1.122, p > 0.05), independent of confounders. Conclusions: To the best of our knowledge, this is the first study showing in a large sample that LTE predict cancer development, and that this occurs only when vagal nerve activity (HRV) is relatively low. These results could result from lack of vagal modulation of inflammation and also from lack of vagal modulation of stress responses. Results are in line with the cancer-protective role of the vagus. HRV needs to be routinely monitored in the population and future intervention trials need to examine whether vagal nerve activation can prevent cancer in people with LTE and with other cancer risk factors.

Keywords: cancer development, life-events, moderation, vagal nerve

Procedia PDF Downloads 157
503 Relatively High Heart-Rate Variability Predicts Greater Survival Chances in Patients with Covid-19

Authors: Yori Gidron, Maartje Mol, Norbert Foudraine, Frits Van Osch, Joop Van Den Bergh, Moshe Farchi, Maud Straus

Abstract:

Background: The worldwide pandemic of severe acute respiratory syndrome coronavirus 2 (SARS-COV2), which began in 2019, also known as Covid-19, has infected over 136 million people and tragically took the lives of over 2.9 million people worldwide. Many of the complications and deaths are predicted by the inflammatory “cytokine storm.” One way to progress in the prevention of death is by finding a predictive and protective factor that inhibits inflammation, on the one hand, and which also increases anti-viral immunity on the other hand. The vagal nerve does precisely both actions. This study examined whether vagal nerve activity, indexed by heart-rate variability (HRV), predicts survival in patients with Covid-19. Method: We performed a pseudo-prospective study, where we retroactively obtained ECGs of 271 Covid-19 patients arriving at a large regional hospital in The Netherlands. HRV was indexed by the standard deviation of the intervals between normal heartbeats (SDNN). We examined patients’ survival at 3 weeks and took into account multiple confounders and known prognostic factors (e.g., age, heart disease, diabetes, hypertension). Results: Patients’ mean age was 68 (range: 25-95) and nearly 22% of the patients had died by 3 weeks. Their mean SDNN (17.47msec) was far below the norm (50msec). Importantly, relatively higher HRV significantly predicted a higher chance of survival, after statistically controlling for patients’ age, cardiac diseases, hypertension and diabetes (relative risk, H.R, and 95% confidence interval (95%CI): H.R = 0.49, 95%CI: 0.26 – 0.95, p < 0.05). However, since HRV declines rapidly with age and since age is a profound predictor in Covid-19, we split the sample by median age (40). Subsequently, we found that higher HRV significantly predicted greater survival in patients older than 70 (H.R = 0.35, 95%CI: 0.16 – 0.78, p = 0.01), but HRV did not predict survival in patients below age 70 years (H.R = 1.11, 95%CI: 0.37 – 3.28, p > 0.05). Conclusions: To the best of our knowledge, this is the first study showing that higher vagal nerve activity, as indexed by HRV, is an independent predictor of higher chances for survival in Covid-19. The results are in line with the protective role of the vagal nerve in diseases and extend this to a severe infectious illness. Studies should replicate these findings and then test in controlled trials whether activating the vagus nerve may prevent mortality in Covid-19.

Keywords: Covid-19, heart-rate Variability, prognosis, survival, vagal nerve

Procedia PDF Downloads 157
502 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm

Authors: R. Kiruthika, A. Kannan

Abstract:

Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.

Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm

Procedia PDF Downloads 345
501 Message Framework for Disaster Management: An Application Model for Mines

Authors: A. Baloglu, A. Çınar

Abstract:

Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.

Keywords: crisis response and management, XML messaging, web services, XML compression, mining

Procedia PDF Downloads 323
500 Instructional Information Resources

Authors: Parveen Kumar

Abstract:

This article discusses institute information resources. Information, in its most restricted technical sense, is a sequence of symbols that can be interpreted as message information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message being conveyed. This concept has numerous other meanings in different contexts. Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.

Keywords: institutions, information institutions, information services for mission-oriented institute, pattern

Procedia PDF Downloads 359
499 The On-Board Critical Message Transmission Design for Navigation Satellite Delay/Disruption Tolerant Network

Authors: Ji-yang Yu, Dan Huang, Guo-ping Feng, Xin Li, Lu-yuan Wang

Abstract:

The navigation satellite network, especially the Beidou MEO Constellation, can relay data effectively with wide coverage and is applied in navigation, detection, and position widely. But the constellation has not been completed, and the amount of satellites on-board is not enough to cover the earth, which makes the data-relay disrupted or delayed in the transition process. The data-relay function needs to tolerant the delay or disruption in some extension, which make the Beidou MEO Constellation a delay/disruption-tolerant network (DTN). The traditional DTN designs mainly employ the relay table as the basic of data path schedule computing. But in practical application, especially in critical condition, such as the war-time or the infliction heavy losses on the constellation, parts of the nodes may become invalid, then the traditional DTN design could be useless. Furthermore, when transmitting the critical message in the navigation system, the maximum priority strategy is used, but the nodes still inquiry the relay table to design the path, which makes the delay more than minutes. Under this circumstances, it needs a function which could compute the optimum data path on-board in real-time according to the constellation states. The on-board critical message transmission design for navigation satellite delay/disruption-tolerant network (DTN) is proposed, according to the characteristics of navigation satellite network. With the real-time computation of parameters in the network link, the least-delay transition path is deduced to retransmit the critical message in urgent conditions. First, the DTN model for constellation is established based on the time-varying matrix (TVM) instead of the time-varying graph (TVG); then, the least transition delay data path is deduced with the parameters of the current node; at last, the critical message transits to the next best node. For the on-board real-time computing, the time delay and misjudges of constellation states in ground stations are eliminated, and the residual information channel for each node can be used flexibly. Compare with the minute’s delay of traditional DTN; the proposed transmits the critical message in seconds, which improves the re-transition efficiency. The hardware is implemented in FPGA based on the proposed model, and the tests prove the validity.

Keywords: critical message, DTN, navigation satellite, on-board, real-time

Procedia PDF Downloads 330
498 Improving Depression Symptoms and Antidepressant Medication Adherence Using Encrypted Short Message Service Text Message Reminders

Authors: Ogbonna Olelewe

Abstract:

This quality improvement project seeks to address the background and significance of promoting antidepressant (AD) medication adherence to reduce depression symptoms in patients diagnosed with major depression. This project aims to substantiate using daily encrypted short message service (SMS) text reminders to take prescribed antidepressant medications with the goal of increasing medication adherence to reduce depression scores in patients diagnosed with major depression, thereby preventing relapses and increasing remission rates. Depression symptoms were measured using the Patient Health Questionnaire-9 (PHQ-9) scale. The PHQ-9 provides a total score of depression symptoms from mild to severe, ranging from 0 to 27. A -pretest/post-test design was used, with a convenience sample size of 35 adult patients aged 18 years old to 45 years old, diagnosed with MDD, and prescribed at least one antidepressant for one year or more. Pre- and post-test PHQ-9 scores were conducted to compare depression scores before and after the four-week intervention period. The results indicated improved post-intervention PHQ-9 scores, improved AD medication adherence, and a significant reduction in depression symptoms.

Keywords: major depressive disorder, antidepressants, short message services, text reminders, Medication adherence/non-adherence, Patient Health Questionnaire 9

Procedia PDF Downloads 134
497 The Addition of Opioids to Bupivacaine in Bilateral Infraorbital Nerve Block for Postoperative Pain Relief in Paediatric Patients for Cleft Lip Repair-Comparative Effects of Pethidine and Fentanyl: A Prospective Randomized Double Blind Study

Authors: Mrudula Kudtarkar, Rajesh Mane

Abstract:

Introduction: Cleft lip repair is one of the common surgeries performed in India and the usual method used for post-operative analgesia is perioperative opioids and NSAIDs. There has been an increase in use of regional techniques and Opioids are the common adjuvants but their efficacy and safety have not been studied extensively in children. Aim: A prospective, randomized, double-blind study was done to compare the efficacy, duration and safety of intraoral infraorbital nerve block on post-operative pain relief using bupivacaine alone or in combination with fentanyl or pethidine in paediatric cleft lip repair. Methodology: 45 children between the age group 5 – 60 months undergoing cleft lip surgery randomly allocated into 3 groups of 15 each received bilateral intraoral infraorbital nerve block with 0.75ml of solution. Group B received 0.25% bupivacaine; group P received 0.25% bupivacaine with 0.25mg/kg pethidine, group F received 0.25% bupivacaine with 0.25microgm/kg fentanyl. Sedation after recovery, post-operative pain intensity and duration of post-operative analgesia were assessed using Modified Hannallah Pain Score. Results: The mean duration of analgesia was 17.8 hrs in Group B, 23.53 hrs in Group F and 35.13 hrs in Group P. There was statistically significant difference between the means of the three groups- ANOVA (p < 0.05). Conclusion: Thus we conclude that addition of fentanyl or pethidine to bupivacaine for Bilateral Intraoral Infraorbital Nerve Block prolong the duration of analgesia with no complications and can be used safely in paediatric patients.

Keywords: cleft lip, infraorbital block, NSAIDS, Opiods

Procedia PDF Downloads 222
496 The Philippines’ War on Drugs: a Pragmatic Analysis on Duterte's Commemorative Speeches

Authors: Ericson O. Alieto, Aprillete C. Devanadera

Abstract:

The main objective of the study is to determine the dominant speech acts in five commemorative speeches of President Duterte. This study employed Speech Act Theory and Discourse analysis to determine how the speech acts features connote the pragmatic meaning of Duterte’s speeches. Identifying the speech acts is significant in elucidating the underlying message or the pragmatic meaning of the speeches. From the 713 sentences or utterances from the speeches, assertive with 208 occurrences from the corpus or 29% is the dominant speech acts. It was followed by expressive with 177 or 25% occurrences, directive accounts for 152 or 15% occurrences. While commisive accounts for 104 or 15% occurrences and declarative got the lowest percentage of occurrences with 72 or 10% only. These sentences when uttered by Duterte carry a certain power of language to move or influence people. Thus, the present study shows the fundamental message perceived by the listeners. Moreover, the frequent use of assertive and expressive not only explains the pragmatic message of the speeches but also reflects the personality of President Duterte.

Keywords: commemorative speech, discourse analysis, duterte, pragmatics

Procedia PDF Downloads 268
495 Transforaminal Ligaments of the Lumbar Foramina: An Anatomic Study

Authors: Dušica L. Marić, Mirela Erić, Dušan M. Maić, Nebojša T. Milošević, Dragana Radošević, Nikola Vučinić

Abstract:

The anatomical existence of transforaminal ligaments has been studied widely. The crucial anatomic study of these structures describes the transforaminal ligaments as an anomalous structure. The ligaments associated with the intervertebral foramen were classified in the external, intraforaminal and internal foraminal ligaments. The external ligaments are the most frequently reported type of transforaminal ligaments in adult spine. The purpose of this study was to examine the appearance of the ligaments within the external space of the intervertebral foramen in adult cadavers. External transforaminal ligaments branch out forward from the root of the transverse process toward the vertebral body with superior, transverse and inferior directions. The ligament detected in the study was different from the other reported descriptions of L1 foraminal ligaments. This ligament extends from the root of the pedicle to the inferior border of the vertebral body below the level of the disc and forms the compartment through which pass the ventral root of the spinal nerve and a small branch of the spinal artery. The results of this study show that the external ligaments can be clearly macroscopic visualized, and it is very important to have prior knowledge of the cadaveric specimens, to identify these structures. The presence of these ligaments is clinically important. These ligaments could be the cause of nerve root compression and the low back syndrome.

Keywords: anatomy, ligaments, lumbar spine, spinal nerve roots

Procedia PDF Downloads 317