Search results for: secure transmission
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2571

Search results for: secure transmission

1641 Sewer Culvert Installation Method to Accommodate Underground Construction in an Urban Area with Narrow Streets

Authors: Osamu Igawa, Hiroshi Kouchiwa, Yuji Ito

Abstract:

In recent years, a reconstruction project for sewer pipelines has been progressing in Japan with the aim of renewing old sewer culverts. However, it is difficult to secure a sufficient base area for shafts in an urban area because many streets are narrow with a complex layout. As a result, construction in such urban areas is generally very demanding. In urban areas, there is a strong requirement for a safe, reliable and economical construction method that does not disturb the public’s daily life and urban activities. With this in mind, we developed a new construction method called the 'shield switching type micro-tunneling method' which integrates the micro-tunneling method and shield method. In this method, pipeline is constructed first for sections that are gently curved or straight using the economical micro-tunneling method, and then the method is switched to the shield method for sections with a sharp curve or a series of curves without establishing an intermediate shaft. This paper provides the information, features and construction examples of this newly developed method.

Keywords: micro-tunneling method, secondary lining applied RC segment, sharp curve, shield method, switching type

Procedia PDF Downloads 383
1640 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 363
1639 Morphological and Optical Properties of (Al, In) Doped ZnO Thin ‎Films Textured (103) by Sol-Gel Method

Authors: S. Benzitouni, M. Zaabat, A. Mahdjoub, A. Benaboud, T.Saidani ‎

Abstract:

To improve the physical properties of ZnO nanostructures textured (103) by sol-gel ‎dip coating method, Al and In are used as dopant with different weight ratios (5%, 10%). ‎The comparative study between Al doped ZnO thin films (AZO) and In doped ZnO (IZO) ‎are made by different analysis technic. XRD showed that the films are Pollycristallins with ‎hexagonal wûrtzite structure and preferred orientation (002) and (103). UV-Vis ‎spectroscopy showed that all films have a high transmission (> 85%); the interference ‎fringes are only observed for IZO. The optical gap is reduced due to the introduction of In ‎‎(minimum value is 3.12 eV), but increased in the presence of Al (maximum value is 3.34 ‎eV). The thickness of the layers was obtained by modeling (using Forouhi Bloomer ‎method). AFM used to observe the surface texture of the films and determined grain size ‎and surface roughness (RMS) which varies in a small range [3.14 to 1.25] nm‎.

Keywords: ZnO, optical gap, roughness (RMS), nanostructures‎

Procedia PDF Downloads 310
1638 Indoor Visible Light Communication Channel Characterization for User Mobility: A Use-Case Study

Authors: Pooja Sanathkumar, Srinidhi Murali, Sethuraman TV, Saravanan M, Paventhan Arumugam, Ashwin Ashok

Abstract:

The last decade has witnessed a significant interest in visible light communication (VLC) technology, as VLC can potentially achieve high data rate links and secure communication channels. However, the use of VLC under mobile settings is fundamentally limited as its a line-of-sight (LOS) technology and there has been limited breakthroughs in realizing VLC for mobile settings. In this regard, this work targets to study the VLC channel under mobility. Through a use-case study analysis with experiment data traces this paper presents an empirical VLC channel study considering the application of VLC for smart lighting in an indoor room environment. This paper contributes a calibration study of a prototype VLC smart lighting system in an indoor environment and through the inferences gained from the calibration, and considering a user is carrying a mobile device fit with a VLC receiver, this work presents recommendations for user's position adjustments, with the goal to ensure maximum connectivity across the room.

Keywords: visible light communication, mobility, empirical study, channel characterization

Procedia PDF Downloads 116
1637 Poly (N-Isopropyl Acrylamide-Co-Acrylic Acid)-Graft-Polyaspartate Coated Magnetic Nanoparticles for Molecular Imaging and Therapy

Authors: Van Tran Thi Thuy, Dukjoon Kim

Abstract:

A series of pH- and thermosensitive poly(N-isopropyl acrylamide-co-acrylic acid) were synthesized by radical polymerization and grafted on poly succinimide backbones. The poly succinimide derivatives synthesized were coated on iron oxide magnetic nanoparticles for potential applications in drug delivery systems with theranostic and molecular imaging. The structure of polymer shell was confirmed by FT-IR, H-NMR spectroscopies. Its thermal behavior was tested by UV-Vis spectroscopy. The particle size and its distribution are measured by dynamic light scattering (DLS) and transmission electron microscope (TEM). The mean diameter of the core-shell structure is from 20 to 80 nm.

Keywords: magnetic, nano, PNIPAM, polysuccinimide

Procedia PDF Downloads 396
1636 The Juxtaposition of Home in Toni Morrison's Home: Ironic Functions as Trauma and Healing

Authors: Imas Istiani

Abstract:

The concept of home is usually closely related to the place of safety and security. For people who have travelled far and long, they long to be united with home to feel safe, secure and comfortable. However, for some people, especially for veterans, home cannot offer them those feelings, on the contrary, it can give them the sense of insecurity as well as guilty. Thus, its juxtaposed concept can also put home as an uncanny place that represses and haunt its occupant. As for veterans, 'survivor guilt' overpowers them in the way that it will be hard for them to embrace the comfort that home offers. In Home, Toni Morrison poignantly depicts Frank’s life upon returning from the war. Burdened with his traumatic experiences, Frank finds home full with terror, guilt, fear, grief, and loss. Using Dominick laCapra’s 'Trauma Theory,' the study finds that Frank works through his trauma by being able to distinguish between past and present so that he can overcome those repressed feelings. Aside from his inner healing power, Frank digests the process of working through with the help of home and community, as proposed by Evelyn Jaffe Schreiber claiming that community can help survivors to heal from traumatic experiences. Thus, Home has two juxtaposed functions; both as traumatizing and healing place.

Keywords: trauma, healing, home, trauma theory

Procedia PDF Downloads 249
1635 The Synthesis of AgInS₂/SnS₂ Nanocomposites with Enhanced Photocatalytic Degradation of Norfloxacin

Authors: Mingmei Zhang, Xinyong Li

Abstract:

AgInS₂/SnS₂ (AIS) nanocomposites were synthesized by a simple hydrothermal method. The morphology and composition of the fabricated AIS nanocomposites were investigated by field-emission scanning electron microscopy (SEM), X-ray diffraction (XRD), high resolution transmission electron microscopy (HRTEM) and X-ray photoelectron spectroscopy (XPS). Moreover, the as-prepared AIS photocatalysts exhibited excellent photocatalytic activities for the degradation of Norfloxacin (NOR), mainly due to its high optical absorption and separation efficiency of photogenerated electron-hole pairs, as evidenced by UV–vis diffusion reflection spectra (DRS) and Surface photovoltage (SPV) spectra. Furthermore, the interfacial charges transfer mechanism was also discussed by DFT calculations.

Keywords: AIS nanocomposites, electron-hole pairs, charges transfer, DFTcaculations

Procedia PDF Downloads 169
1634 Psychoeducation to Prevent Spread of HIV Among Men Who Have Sex with Men in Surabaya City

Authors: Christina Albertina Ludwinia Parung, I Gusti Ayu Maya Vratasti

Abstract:

Sexual transmission of HIV among Men who have Sex with Men (MSM) is believed to be one of the sources of the AIDS epidemic. Nowadays, government, communities, and NGOs are taking action to prevent its spread by assisting and educating groups of MSM in their countries. This assistance involves experts in many fields of study, including psychology. In the field of psychology, psychoeducation is believed to be one of the ways to assist the MSM groups. Just like in other countries, this psychoeducation assistance is also needed in Indonesia, where MSM groups are found in many cities within. Surabaya, as the second largest and densely populated city in Indonesia, is known to have a big number of MSM population. In September to December 2020, the author and a colleague conducted a mentoring effort to the MSM community at the MSM community gathering location called Gang Pattaya, in the city of Surabaya. The existence of this community is disguised by the general public, but is well known by NGOs. Community members do MSM out of their liking, although some do it in exchange for money. However, safety factors, such as using condoms for MSM, are not a priority for this community. They do MSM whether they receive a reward or not, just out of a boost of pleasure. There is no attempt to find out the health of the partner once they are attracted to each other. In general, they do not know whether they are infected with HIV. Most of them feel healthy and since they do not show any symptoms, they think it is not necessary to get tested. In the mentoring process, the researchers conduct psychoeducation, which begins with an approach to certain individuals so that they are comfortable with the researchers’ presence, then increasing awareness of safe sex behavior for HIV prevention for groups in the form of counseling using the Theory of Reasoned Action (TRA) approach. Counseling is carried out in various forms including roleplay, games, and seminars. The number of participants was 11 people, varying from 19-47 years old. Pretest related to knowledge of safe sex was carried out before conducting the intervention and post-test after the intervention. The normality test used is the Shapiro-Wilk analysis. Different tests on the data obtained were carried out using the non-parametric Wilcoxon Signed Ranks Test. None of the participants had lower post-test knowledge scores than the pre-test. Prestest and post test for safer sex behavior showed 2 participants with safer sex behavior did not change. Both belong to the senior group, while other participants have an improvement in their safer sex behavior. These findings suggest that intervention programs for MSM as an effort to reduce HIV transmission should pay attention to affective and cognitive coping strategies.

Keywords: HIV, men who have sex with men, psychoeducation, psychology health, safer sex behavior, theory of reasoned action

Procedia PDF Downloads 116
1633 Performance Analysis of Ad-Hoc Network Routing Protocols

Authors: I. Baddari, A. Riahla, M. Mezghich

Abstract:

Today in the literature, we discover a lot of routing algorithms which some have been the subject of normalization. Two great classes Routing algorithms are defined, the first is the class reactive algorithms and the second that of algorithms proactive. The aim of this work is to make a comparative study between some routing algorithms. Two comparisons are considered. The first will focus on the protocols of the same class and second class on algorithms of different classes (one reactive and the other proactive). Since they are not based on analytical models, the exact evaluation of some aspects of these protocols is challenging. Simulations have to be done in order to study their performances. Our simulation is performed in NS2 (Network Simulator 2). It identified a classification of the different routing algorithms studied in a metrics such as loss of message, the time transmission, mobility, etc.

Keywords: ad-hoc network routing protocol, simulation, NS2, delay, packet loss, wideband, mobility

Procedia PDF Downloads 383
1632 Burden of Dengue in Northern India

Authors: Ashutosh Biswas, Poonam Coushic, Kalpana Baruah, Paras Singla, A. C. Dhariwal, Pawana Murthy

Abstract:

Burden of Dengue in Northern India Ashutosh Biswas, Poonam Coushic, Kalpana Baruah, Paras Singla, AC Dhariwal, Pawana Murthy. All India Institute of Medical Sciences, NVBDCP,WHO New Delhi, India Aim: This study was conducted to estimate the burden of dengue in capital region of India. Methodology:Seropositivity of Dengue for IgM Ab, NS1 Ag and IgG Ab were performed among the blood donors’ samples from blood bank, those who were coming to donate blood for the requirement of blood for the admitted patients in hospital. Blood samplles were collected through out the year to estimate seroprevalance of dengue with or without outbreak season. All the subjects were asymptomatic at the time of blood donation. Results: A total of 1558 donors were screened for the study. On the basis of inclusion/ exclusion criteria, we enrolled 1531subjects for the study.Twenty seven donors were excluded from the study, out of which 6 were detected HIV +ve, 11 were positive for HBsAg and 10 were found positive for HCV.Mean age was 30.51 ± 7.75 years.Of 1531subjects, 18 (1.18%) had a past history of typhoid fever, 28 (1.83%) had chikungunya fever, 9 (0.59%) had malaria and 43 subjects (2.81%) had a past history of symptomatic dengue infection.About 2.22% (34) of subjects were found to have sero-positive for NS1 Ag with a peak point prevalence of 7.14% in the month of October and sero-positive of IgM Ab was observed about 5.49% (84)with a peak point prevalence of 14.29% in the month of October. Sero-prevalnce of IgGwas detected in about 64.21% (983) of subjects. Conclusion: Acute asymptomatic dengue (NS1 Ag+ve) was observed in 7.14%, as the subjects were having no symptoms at the time of sampling. This group of subjects poses a potential public health threat for transmitting dengue infection through blood transfusion (TTI) in the community as evident by presence of active viral infection due to NS1Ag +VE. Therefore a policy may be implemented in the blood bank for testing NS1 Ag to look for active dengue infection for preventing dengue transmission through blood transfusion (TTI). Acute or Subacute dengue infection ( IgM Ab+ve) was observed from 5.49% to 14.29% which is a peak point prevalence in the month of October. About 64.21% of the population were immunized by natural dengue infection ( IgG Ab+ve) in theNorthern province of India. This might be helpful for implementing the dengue vaccine in a region. Blood samples in blood banks should be tested for dengue before transfusion to any other person to prevent transfusion transmitted dengue infection as we estimated upto 7.14% positivity of NS1 Ag in our study which indicates presence of dengue virus in blood donors’ samples.

Keywords: Dengue Burden, Seroprevalance, Asymptomatic dengue, Dengue transmission through blood transfusion

Procedia PDF Downloads 129
1631 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 494
1630 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 111
1629 Development of Sb/MWCNT Free Standing Anode for Li-Ion Batteries

Authors: Indu Elizabeth

Abstract:

Antimony/Multi Walled Carbon nano tube nanocomposite (Sb/MWCNT) is synthesized using ethylene glycol mediated reduction process. Binder free, self-supporting and flexible Sb/MWCNT nanocomposite paper has been prepared by employing the vacuum filtration technique. The samples are characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), Raman spectroscopy (RS), and thermal gravimetric analysis (TGA) to evaluate the structure of anode and tested for its performance in a Lithium rechargeable cell. Electrochemical measurements demonstrate that the Sb/MWCNT composite paper anode delivers a specific discharge capacity of ~400 mAh g-1 up to a current density of 100 mA g-1.

Keywords: antimony, lithium ion battery, multiwalled carbon nanotube, specific capacity

Procedia PDF Downloads 388
1628 Synthesis, Structural and Magnetic Properties of CdFe2O4 Ferrite

Authors: Justice Zakhele Msomi

Abstract:

Nanoparticles of CdFe2O4 with particle size of about 10 nm have been synthesized by high energy ball milling and co-precipitation processes. The synthesis route appears to have some effects on the properties. The compounds have been characterized by X-ray diffraction, Fourier Transform Infrared (FTIR), transmission electron microscopy (TEM), Mössbauer and magnetization measurements. The XRD pattern of CdFe2O4 provides information about single-phase formation of spinel structure with cubic symmetry. The FTIR measurements between 400 and 4000 cm-1 indicate intrinsic cation vibration of the spinel structure. The Mössbauer spectra were recorded at 4 K and 300 K. The hyperfine fields appear to be highly sensitive on particle size. The evolution of the properties as a function of particle size is also presented.

Keywords: ferrite, nanoparticles, magnetization, Mössbauer

Procedia PDF Downloads 380
1627 Attachment Systems and Psychotherapy: An Internal Secure Caregiver to Heal and Protect the Parts of Our Clients: InCorporer Method

Authors: Julien Baillet

Abstract:

In light of 30 years of scientific research, InCorporer Method was created in 2019 as a new approach to heal traumatic, developmental, and dissociative injuries. Following natural nervous system functions, InCorporer aims to heal, develop, and update the different defensive mammalian subsystems: fight, flight, freeze, feign death, cry for help, & energy regulator. The dimensions taken into account are: (i) Heal the traumatic injuries who are still bleeding, (ii) Develop the systems that never received the security, attention, and affection they needed. (iii) Update the parts that stayed stuck in the past, ignoring for too long that they are out of danger now. Through the Present Part and its caregiving skills, InCorporer method enables a balanced, soothed, and collaborative personality system. To be as integrative as possible, InCorporer method has been designed according to several fields of research, such as structural dissociation theory, attachment theory, and information processing theory. In this paper, the author presents how the internal caregiver is developed and trained to heal all the different parts/subsystems of our clients through mindful attention and reflex movement integration.

Keywords: PTSD, attachment, dissociation, part work

Procedia PDF Downloads 56
1626 Ta-doped Nb2O5: Synthesis and Photocatalytic Activity

Authors: Mahendrasingh J. Pawar, M. D. Gaoner

Abstract:

Ta-doped Nb2O5 (Ta content 0.5-2% mole fraction) nanoparticles in the range of 20-40 nm were synthesized by combustion technique. The crystalline phase, morphology and size of the nanoparticles were characterized by X-ray diffraction (XRD), transmission electron microscopy (TEM) and UV-vis spectroscopy. The specific surface area of the nanoparticles was measured by nitrogen adsorption (BET analysis). The undoped Nb2O5 nanoparticles were found to have the particles size in the range of 50−80 nm. The photocatalytic performance of the samples was characterized by degrading 20 mg/L toluene under UV−Vis irradiation. The results show that the Ta-doped Nb2O5 nanoparticles exhibit a significant increase in photocatalytic performance over the undoped Nb2O5 nanoparticles, and the Nb2O5 nanoparticles doped with 1.5% Ta and calcined at 450°C show the best photocatalytic performance.

Keywords: Nb2O5, Ta-doped Nb2O5, photodegradation of Toluene, combustion method

Procedia PDF Downloads 546
1625 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 132
1624 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks

Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali

Abstract:

The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.

Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements

Procedia PDF Downloads 520
1623 An Ultra-Low Output Impedance Power Amplifier for Tx Array in 7-Tesla Magnetic Resonance Imaging

Authors: Ashraf Abuelhaija, Klaus Solbach

Abstract:

In Ultra high-field MRI scanners (3T and higher), parallel RF transmission techniques using multiple RF chains with multiple transmit elements are a promising approach to overcome the high-field MRI challenges in terms of inhomogeneity in the RF magnetic field and SAR. However, mutual coupling between the transmit array elements disturbs the desirable independent control of the RF waveforms for each element. This contribution demonstrates a 18 dB improvement of decoupling (isolation) performance due to the very low output impedance of our 1 kW power amplifier.

Keywords: EM coupling, inter-element isolation, magnetic resonance imaging (mri), parallel transmit

Procedia PDF Downloads 480
1622 1-Butyl-2,3-Dimethylimidazolium Bis (Trifluoromethanesulfonyl) Imide and Titanium Oxide Based Voltammetric Sensor for the Quantification of Flunarizine Dihydrochloride in Solubilized Media

Authors: Rajeev Jain, Nimisha Jadon, Kshiti Singh

Abstract:

Titanium oxide nanoparticles and 1-butyl-2,3-dimethylimidazolium bis (trifluoromethane- sulfonyl) imide modified glassy carbon electrode (TiO2/IL/GCE) has been fabricated for electrochemical sensing of flunarizine dihydrochloride (FRH). The electrochemical properties and morphology of the prepared nanocomposite were studied by electrochemical impedance spectroscopy (EIS) and transmission electron microscopy (TEM). The response of the electrochemical sensor was found to be proportional to the concentrations of FRH in the range from 0.5 µg mL-1 to 16 µg mL-1. The detection limit obtained was 0.03 µg mL-1. The proposed method was also applied to the determination of FRH in pharmaceutical formulation and human serum with good recoveries.

Keywords: flunarizine dihydrochloride, ionic liquid, nanoparticles, voltammetry, human serum

Procedia PDF Downloads 308
1621 Effect of the Applied Bias on Miniband Structures in Dimer Fibonacci Inas/Ga1-Xinxas Superlattices

Authors: Z. Aziz, S. Terkhi, Y. Sefir, R. Djelti, S. Bentata

Abstract:

The effect of a uniform electric field across multibarrier systems (InAs/InxGa1-xAs) is exhaustively explored by a computational model using exact airy function formalism and the transfer-matrix technique. In the case of biased DFHBSL structure a strong reduction in transmission properties was observed and the width of the miniband structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the miniband structure, which becomes increasingly important (Wannier-Stark Effect).

Keywords: dimer fibonacci height barrier superlattices, singular extended state, exact airy function, transfer matrix formalism

Procedia PDF Downloads 286
1620 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 376
1619 Cloning and Expression of Azurin: A Protein Having Antitumor and Cell Penetrating Ability

Authors: Mohsina Akhter

Abstract:

Cancer has become a wide spread disease around the globe and takes many lives every year. Different treatments are being practiced but all have potential side effects with somewhat less specificity towards target sites. Pseudomonas aeruginosa is known to secrete a protein azurin with special anti-cancer function. It has unique cell penetrating peptide comprising of 18 amino acids that have ability to enter cancer cells specifically. Reported function of Azurin is to stabilize p53 inside the tumor cells and induces apoptosis through Bax mediated cytochrome c release from mitochondria. At laboratory scale, we have made recombinant azurin through cloning rpTZ57R/T-azu vector into E.coli strain DH-5α and subcloning rpET28-azu vector into E.coli BL21-CodonPlus (DE3). High expression was ensured with IPTG induction at different concentrations then optimized high expression level at 1mM concentration of IPTG for 5 hours. Purification has been done by using Ni+2 affinity chromatography. We have concluded that azurin can be a remarkable improvement in cancer therapeutics if it produces on a large scale. Azurin does not enter into the normal cells so it will prove a safe and secure treatment for patients and prevent them from hazardous anomalies.

Keywords: azurin, pseudomonas aeruginosa, cancer, therapeutics

Procedia PDF Downloads 298
1618 Investigation of Clusters of MRSA Cases in a Hospital in Western Kenya

Authors: Lillian Musila, Valerie Oundo, Daniel Erwin, Willie Sang

Abstract:

Staphylococcus aureus infections are a major cause of nosocomial infections in Kenya. Methicillin resistant S. aureus (MRSA) infections are a significant burden to public health and are associated with considerable morbidity and mortality. At a hospital in Western Kenya two clusters of MRSA cases emerged within short periods of time. In this study we explored whether these clusters represented a nosocomial outbreak by characterizing the isolates using phenotypic and molecular assays and examining epidemiological data to identify possible transmission patterns. Specimens from the site of infection of the subjects were collected, cultured and S. aureus isolates identified phenotypically and confirmed by APIStaph™. MRSA were identified by cefoxitin disk screening per CLSI guidelines. MRSA were further characterized based on their antibiotic susceptibility patterns and spa gene typing. Characteristics of cases with MRSA isolates were compared with those with MSSA isolated around the same time period. Two cases of MRSA infection were identified in the two week period between 21 April and 4 May 2015. A further 2 MRSA isolates were identified on the same day on 7 September 2015. The antibiotic resistance patterns of the two MRSA isolates in the 1st cluster of cases were different suggesting that these were distinct isolates. One isolate had spa type t2029 and the other had a novel spa type. The 2 isolates were obtained from urine and an open skin wound. In the 2nd cluster of MRSA isolates, the antibiotic susceptibility patterns were similar but isolates had different spa types: one was t037 and the other a novel spa type different from the novel MRSA spa type in the first cluster. Both cases in the second cluster were admitted into the hospital but one infection was community- and the other hospital-acquired. Only one of the four MRSA cases was classified as an HAI from an infection acquired post-operatively. When compared to other S. aureus strains isolated within the same time period from the same hospital only one spa type t2029 was found in both MRSA and non-MRSA strains. None of the cases infected with MRSA in the two clusters shared any common epidemiological characteristic such as age, sex or known risk factors for MRSA such as prolonged hospitalization or institutionalization. These data suggest that the observed MRSA clusters were multi strain clusters and not an outbreak of a single strain. There was no clear relationship between the isolates by spa type suggesting that no transmission was occurring within the hospital between these cluster cases but rather that the majority of the MRSA strains were circulating in the community. There was high diversity of spa types among the MRSA strains with none of the isolates sharing spa types. Identification of disease clusters in space and time is critical for immediate infection control action and patient management. Spa gene typing is a rapid way of confirming or ruling out MRSA outbreaks so that costly interventions are applied only when necessary.

Keywords: cluster, Kenya, MRSA, spa typing

Procedia PDF Downloads 310
1617 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 335
1616 Additive Manufacturing of Microstructured Optical Waveguides Using Two-Photon Polymerization

Authors: Leonnel Mhuka

Abstract:

Background: The field of photonics has witnessed substantial growth, with an increasing demand for miniaturized and high-performance optical components. Microstructured optical waveguides have gained significant attention due to their ability to confine and manipulate light at the subwavelength scale. Conventional fabrication methods, however, face limitations in achieving intricate and customizable waveguide structures. Two-photon polymerization (TPP) emerges as a promising additive manufacturing technique, enabling the fabrication of complex 3D microstructures with submicron resolution. Objectives: This experiment aimed to utilize two-photon polymerization to fabricate microstructured optical waveguides with precise control over geometry and dimensions. The objective was to demonstrate the feasibility of TPP as an additive manufacturing method for producing functional waveguide devices with enhanced performance. Methods: A femtosecond laser system operating at a wavelength of 800 nm was employed for two-photon polymerization. A custom-designed CAD model of the microstructured waveguide was converted into G-code, which guided the laser focus through a photosensitive polymer material. The waveguide structures were fabricated using a layer-by-layer approach, with each layer formed by localized polymerization induced by non-linear absorption of the laser light. Characterization of the fabricated waveguides included optical microscopy, scanning electron microscopy, and optical transmission measurements. The optical properties, such as mode confinement and propagation losses, were evaluated to assess the performance of the additive manufactured waveguides. Conclusion: The experiment successfully demonstrated the additive manufacturing of microstructured optical waveguides using two-photon polymerization. Optical microscopy and scanning electron microscopy revealed the intricate 3D structures with submicron resolution. The measured optical transmission indicated efficient light propagation through the fabricated waveguides. The waveguides exhibited well-defined mode confinement and relatively low propagation losses, showcasing the potential of TPP-based additive manufacturing for photonics applications. The experiment highlighted the advantages of TPP in achieving high-resolution, customized, and functional microstructured optical waveguides. Conclusion: his experiment substantiates the viability of two-photon polymerization as an innovative additive manufacturing technique for producing complex microstructured optical waveguides. The successful fabrication and characterization of these waveguides open doors to further advancements in the field of photonics, enabling the development of high-performance integrated optical devices for various applications

Keywords: Additive Manufacturing, Microstructured Optical Waveguides, Two-Photon Polymerization, Photonics Applications

Procedia PDF Downloads 81
1615 Perspective and Challenge of Tidal Power in Bangladesh

Authors: Md. Alamgir Hossain, Md. Zakir Hossain, Md. Atiqur Rahman

Abstract:

Tidal power can play a vital role in integrating as new source of renewable energy to the off-grid power connection in isolated areas, namely Sandwip, in Bangladesh. It can reduce the present energy crisis and improve the social, environmental and economic perspective of Bangladesh. Tidal energy is becoming popular around the world due to its own facilities. The development of any country largely depends on energy sector improvement. Lack of energy sector is because of hampering progress of any country development, and the energy sector will be stable by only depend on sustainable energy sources. Renewable energy having environmental friendly is the only sustainable solution of secure energy system. Bangladesh has a huge potential of tidal power at different locations, but effective measures on this issue have not been considered sincerely. This paper summarizes the current energy scenario, and Bangladesh can produce power approximately 53.19 MW across the country to reduce the growing energy demand utilizing tidal energy as well as it is shown that Sandwip is highly potential place to produce tidal power, which is estimated approximately 16.49 MW by investing only US $10.37 million. Besides this, cost management for tidal power plant has been also discussed.

Keywords: sustainable energy, tidal power, cost analysis, power demand, gas crisis

Procedia PDF Downloads 480
1614 An Informed Application of Emotionally Focused Therapy with Immigrant Couples

Authors: Reihaneh Mahdavishahri

Abstract:

This paper provides a brief introduction to emotionally focused therapy (EFT) and its culturally sensitive and informed application when working with immigrant couples. EFT's grounding in humanistic psychology prioritizes a non-pathologizing and empathic understanding of individuals' experiences, creating a safe space for couples to explore and create new experiences without imposing judgment or prescribing the couple "the right way of interacting" with one another. EFT's emphasis on attachment, bonding, emotions, and corrective emotional experiences makes it a fitting approach to work with multicultural couples, allowing for the corrective emotional experience to be shaped and informed by the couples' unique cultural background. This paper highlights the challenges faced by immigrant couples and explores how immigration adds a complex layer to each partner’s sense of self, their attachment bond, and their sense of safety and security within their relationships. Navigating a new culture, creating a shared sense of purpose, and re-establishing emotional bonds can be daunting for immigrant couples, often leading to a deep sense of disconnection and vulnerability. Reestablishing and fostering secure attachment between the partners in the safety of the therapeutic space can be a protective factor for these couples.

Keywords: attachment, culturally informed care, emotionally focused therapy, immigration

Procedia PDF Downloads 60
1613 Ethnographic Exploration of Elderly Residents' Perceptions and Utilization of Health Care to Improve Their Quality of Life

Authors: Seyed Ziya Tabatabaei, Azimi Bin Hj Hamzah, Fatemeh Ebrahimi

Abstract:

The increase in proportion of older people in Malaysia has led to a significant growth of health care demands. The aim of this study is to explore how perceived health care needs influence on quality of life among elderly Malay residents who reside in a Malaysian residential home. This study employed a method known as ethnographic research from May 2011 to January 2012. Four data collection strategies were selected as the main data-collecting tools including participant observation, field notes, in-depth interviews, and review of related documents. The nine knowledgeable participants for the present study were selected using the purposive sampling method. Two themes were identified: (1) Medical concerns: Feeling secure, lack of information, inadequate medical staff; and (2) Health promotion: Body condition, health education, physiotherapy and rehabilitation. These results could evoke the attention of policy-makers and care providers to better meet elderly residents’ health care needs.

Keywords: ethnographic study, health care needs, Malay elderly people, Malaysia, Quality of life, Residential home

Procedia PDF Downloads 281
1612 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 176