Search results for: simple sequence repeats
3274 A Small Signal Model for Resonant Tunneling Diode
Authors: Rania M. Abdallah, Ahmed A. S. Dessouki, Moustafa H. Aly
Abstract:
This paper has presented a new simple small signal model for a resonant tunnelling diode device. The resonant tunnelling diode equivalent circuit elements were calculated and the results led to good agreement between the calculated equivalent circuit elements and the measurement results.Keywords: resonant tunnelling diode, small signal model, negative differential conductance, electronic engineering
Procedia PDF Downloads 4433273 Transfer Learning for Protein Structure Classification at Low Resolution
Authors: Alexander Hudson, Shaogang Gong
Abstract:
Structure determination is key to understanding protein function at a molecular level. Whilst significant advances have been made in predicting structure and function from amino acid sequence, researchers must still rely on expensive, time-consuming analytical methods to visualise detailed protein conformation. In this study, we demonstrate that it is possible to make accurate (≥80%) predictions of protein class and architecture from structures determined at low (>3A) resolution, using a deep convolutional neural network trained on high-resolution (≤3A) structures represented as 2D matrices. Thus, we provide proof of concept for high-speed, low-cost protein structure classification at low resolution, and a basis for extension to prediction of function. We investigate the impact of the input representation on classification performance, showing that side-chain information may not be necessary for fine-grained structure predictions. Finally, we confirm that high resolution, low-resolution and NMR-determined structures inhabit a common feature space, and thus provide a theoretical foundation for boosting with single-image super-resolution.Keywords: transfer learning, protein distance maps, protein structure classification, neural networks
Procedia PDF Downloads 1363272 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography
Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway
Abstract:
This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.Keywords: steganography, stego, LSB, crop
Procedia PDF Downloads 2693271 Task Based Language Learning: A Paradigm Shift in ESL/EFL Teaching and Learning: A Case Study Based Approach
Authors: Zehra Sultan
Abstract:
The study is based on the task-based language teaching approach which is found to be very effective in the EFL/ESL classroom. This approach engages learners to acquire the usage of authentic language skills by interacting with the real world through sequence of pedagogical tasks. The use of technology enhances the effectiveness of this approach. This study throws light on the historical background of TBLT and its efficacy in the EFL/ESL classroom. In addition, this study precisely talks about the implementation of this approach in the General Foundation Programme of Muscat College, Oman. It furnishes the list of the pedagogical tasks embedded in the language curriculum of General Foundation Programme (GFP) which are skillfully allied to the College Graduate Attributes. Moreover, the study also discusses the challenges pertaining to this approach from the point of view of teachers, students, and its classroom application. Additionally, the operational success of this methodology is gauged through formative assessments of the GFP, which is apparent in the students’ progress.Keywords: task-based language teaching, authentic language, communicative approach, real world activities, ESL/EFL activities
Procedia PDF Downloads 1243270 Monitoring the Fiscal Health of Taiwan’s Local Government: Application of the 10-Point Scale of Fiscal Distress
Authors: Yuan-Hong Ho, Chiung-Ju Huang
Abstract:
This article presents a monitoring indicators system that predicts whether a local government in Taiwan is heading for fiscal distress and identifies a suitable fiscal policy that would allow the local government to achieve fiscal balance in the long run. This system is relevant to stockholders’ interest, simple for national audit bodies to use, and provides an early warning of fiscal distress that allows preventative action to be taken.Keywords: fiscal health, fiscal distress, monitoring signals, 10-point scale
Procedia PDF Downloads 4593269 Study on the Model Predicting Post-Construction Settlement of Soft Ground
Authors: Pingshan Chen, Zhiliang Dong
Abstract:
In order to estimate the post-construction settlement more objectively, the power-polynomial model is proposed, which can reflect the trend of settlement development based on the observed settlement data. It was demonstrated by an actual case history of an embankment, and during the prediction. Compared with the other three prediction models, the power-polynomial model can estimate the post-construction settlement more accurately with more simple calculation.Keywords: prediction, model, post-construction settlement, soft ground
Procedia PDF Downloads 4253268 Optimization of the Numerical Fracture Mechanics
Authors: H. Hentati, R. Abdelmoula, Li Jia, A. Maalej
Abstract:
In this work, we present numerical simulations of the quasi-static crack propagation based on the variation approach. We perform numerical simulations of a piece of brittle material without initial crack. An alternate minimization algorithm is used. Based on these numerical results, we determine the influence of numerical parameters on the location of crack. We show the importance of trying to optimize the time of numerical computation and we present the first attempt to develop a simple numerical method to optimize this time.Keywords: fracture mechanics, optimization, variation approach, mechanic
Procedia PDF Downloads 6063267 The Distribution of HLA-B*15:01 and HLA-B*51:01 Alleles in Thai Population: Clinical Implementation and Diagnostic Process of COVID-19 Severity
Authors: Aleena Rena Onozuka, Patompong Satapornpong
Abstract:
Introduction: In a Human Leukocyte Antigen (HLA)’s immune response, HLA alleles (HLA class I and class II) play a crucial role in fighting against pathogens. HLA-B*15:01 allele had a significant association with asymptomatic COVID-19 infection (p-value = 5.67 x 10-5 ; OR = 2.40 and 95% CI = 1.54 - 3.64). There was also a notable linkage between HLA-B*51:01 allele and critically ill patients with COVID-19 (p-value = 0.007 and OR = 3.38). This study has described the distribution of HLA marker alleles in Thais and sub-groups. Objective: We want to investigate the prevalence of HLA-B*15:01 and HLA-B*51:01 alleles in the Thai population. Materials and Methods: 200 healthy Thai population were included in this study from the College of Pharmacy, Rangsit University. HLA-B alleles were genotyped using the sequence-specific oligonucleotides process (PCR-SSOs). Results: We found out that HLA-B*46:01 (12.00%), HLA-B*15:02 (9.25%), HLA-B*40:01 (6.50%), HLA-B*13:01 (6.25%), and HLA-B* 38:02 (5.50%) alleles were more common than other alleles in Thai population. HLA-B*46:01 and HLA-B*15:02 were the most common allele found across four regions. Moreover, the frequency of HLA-B*15:01 and HLA-B*51:01 alleles were similarly distributed in Thai population (0.50, 5.25 %) and (p-value > 0.05), respectively. The frequencies of HLA-B*15:01 and HLA-B*51:01 alleles were not significantly different from other populations compared to the Thai population. Conclusions: We can screen for HLA-B*15:01 and HLA-B*51:01 alleles to determine the symptoms of COVID-19 since they are universal HLA-B markers. Importantly, the database of HLA markers indicates the association between HLA frequency and populations. However, we need further research on larger numbers of COVID-19 patients and in different populations.Keywords: HLA-B*15:01, HLA-B*51:01, COVID-19, HLA-B alleles
Procedia PDF Downloads 1203266 Protein Remote Homology Detection by Using Profile-Based Matrix Transformation Approaches
Authors: Bin Liu
Abstract:
As one of the most important tasks in protein sequence analysis, protein remote homology detection has been studied for decades. Currently, the profile-based methods show state-of-the-art performance. Position-Specific Frequency Matrix (PSFM) is widely used profile. However, there exists noise information in the profiles introduced by the amino acids with low frequencies. In this study, we propose a method to remove the noise information in the PSFM by removing the amino acids with low frequencies called Top frequency profile (TFP). Three new matrix transformation methods, including Autocross covariance (ACC) transformation, Tri-gram, and K-separated bigram (KSB), are performed on these profiles to convert them into fixed length feature vectors. Combined with Support Vector Machines (SVMs), the predictors are constructed. Evaluated on two benchmark datasets, and experimental results show that these proposed methods outperform other state-of-the-art predictors.Keywords: protein remote homology detection, protein fold recognition, top frequency profile, support vector machines
Procedia PDF Downloads 1253265 Molecular Characterization of Echinococcus granulosus through Amplification of 12S rRNA Gene and Cox1 Gene Fragments from Cattle in Chittagong, Bangladesh
Authors: M. Omer Faruk, A. M. A. M. Zonaed Siddiki, M. Fazal Karim, Md. Masuduzzaman, S. Chowdhury, Md. Shafiqul Islam, M. Alamgir Hossain
Abstract:
The dog tapeworms Echinococcus granulosus develop hydatid cysts in various organs in human and domestic animals worldwide including Bangladesh. The aim of this study was to identify and characterize the genotype of E. granulosus isolated from cattle using 12S rRNA and Cytochrome oxidase 1 (COX 1) genes. A total of 43 hydatid cyst samples were collected from 390 examined cattle samples derived from slaughterhouses. Among them, three cysts were fertile. Genomic DNA was extracted from germinal membrane and/or protoscoleces followed by PCR amplification of mitochondrial 12S rRNA and Cytochrome oxidase 1 gene fragments. The sequence data revealed existence of G1 (64.28%) and possible G3 (21.43%) genotypes for the first time in Bangladesh. The study indicates that common sheep strain G1 is the dominant subtype of E. granulosus in Chittagong region of Bangladesh. This will increase our understanding of the epidemiology of hydatidosis in the southern part of the country and will be useful to plan suitable control measures in the long run.Keywords: Echinococcus granulosus, Cox1, 12S rRNA, molecular characterization, Bangladesh
Procedia PDF Downloads 3443264 New Isolate of Cucumber Mosaic Virus Infecting Banana
Authors: Abdelsabour G. A. Khaled, Ahmed W. A. Abdalla And Sabry Y. M. Mahmoud
Abstract:
Banana plants showing typical mosaic and yellow stripes on leaves as symptoms were collected from Assiut Governorate in Egypt. The causal agent was identified as Cucumber mosaic virus (CMV) on the basis of symptoms, transmission, serology, transmission electron microscopy and reverse transcription polymerase chain reaction (RT-PCR). Coat protein (CP) gene was amplified using gene specific primers for coat protein (CP), followed by cloning into desired cloning vector for sequencing. In this study the CMV was transmitted into propagation host either by aphid or mechanically. The transmission was confirmed through Direct Antigen Coating Enzyme Linked Immuno Sorbent Assay (DAC-ELISA). Analysis of the 120 deduced amino acid sequence of the coat protein gene revealed that the EG-A strain of CMV shared from 97.50 to 98.33% with those strains belonging to subgroup IA. The cluster analysis grouped the Egyptian isolate with strains Fny and Ri8 belonging sub-group IA. It appears that there occurs a high incidence of CMV infecting banana belonging to IA subgroup in most parts of Egypt.Keywords: banana, CMV, transmission, CP gene, RT-PCR
Procedia PDF Downloads 3413263 Mentorship and Feelings of Identify and Self-Efficacy in Women Returning to the Workforce after an Extended Child-Rearing Leave
Authors: Jacquelyn Irene Eidson
Abstract:
Women who leave the workforce due to motherhood and wish to return are a valuable, untapped resource for organizations. Levinson’s theory of adult development defines life as a sequence of transitions requiring difficult decisions that prompt humans to question their identity and their self-efficacy. The experience of being a working mother and the experience of workplace mentorship have received extensive research attention. Merging the two experiences and focusing on feelings of identity and self-efficacy provides a unique and focused opportunity for learning. Through one-on-one interviews and focus group discussion with working mothers that had previously left the workforce for an extended leave due to child-rearing, a meaningful description of their experiences will be obtained. Data is currently being collected via a collaboration with state banking associations in the United States. Results from the study will enable organizations worldwide to more effectively provide mentorship opportunities built around a culture of understanding while more effectively recruiting, supporting, developing, and retaining this valuable talent pool.Keywords: identity, mentorship, self-efficacy, working mother
Procedia PDF Downloads 1933262 Automated CNC Part Programming and Process Planning for Turned Components
Authors: Radhey Sham Rajoria
Abstract:
Pressure to increase the competitiveness in the manufacturing sector and for the survival in the market has led to the development of machining centres, which enhance productivity, improve quality, shorten the lead time, and reduce the manufacturing cost. With the innovation of machining centres in the manufacturing sector the production lines have been replaced by these machining centers, having the ability to machine various processes and multiple tooling with automatic tool changer (ATC) for the same part. Also the process plans can be easily generated for complex components. Some means are required to utilize the machining center at its best. The present work is concentrated on the automated part program generation, and in turn automated process plan generation for the turned components on Denford “MIRAC” 8 stations ATC lathe machining centre. A package in C++ on DOS platform is developed which generates the complete CNC part program, process plan and process sequence for the turned components. The input to this system is in the form of a blueprint in graphical format with machining parameters and variables, and the output is the CNC part program which is stored in a .mir file, ready for execution on the machining centre.Keywords: CNC, MIRAC, ATC, process planning
Procedia PDF Downloads 2693261 DNA Vaccine Study against Vaccinia Virus Using In vivo Electroporation
Authors: Jai Myung Yang, Na Young Kim, Sung Ho Shin
Abstract:
The adverse reactions of current live smallpox vaccines and potential use of smallpox as a bioterror weapon have heightened the development of new effective vaccine for this infectious disease. In the present study, DNA vaccine vector was produced which was optimized for expression of the vaccinia virus L1 antigen in the mouse model. A plasmid IgM-tL1R, which contains codon-optimized L1R gene, was constructed and fused with an IgM signal sequence under the regulation of a SV40 enhancer. The expression and secretion of recombinant L1 protein was confirmed in vitro 293 T cell. Mice were administered the DNA vaccine by electroporation and challenged with vaccinia virus. We observed that immunization with IgM-tL1R induced potent neutralizing antibody responses and provided complete protection against lethal vaccinia virus challenge. Isotyping studies reveal that immunoglobulin G2 (IgG2) antibody predominated after the immunization, indicative of a T helper type 1 response. Our results suggest that an optimized DNA vaccine, IgM-tL1R, can be effective in stimulating anti-vaccinia virus immune response and provide protection against lethal orthopoxvirus challenge.Keywords: DNA vaccine, electroporation, L1R, vaccinia virus
Procedia PDF Downloads 2663260 A Novel PWM/PFM Controller for PSR Fly-Back Converter Using a New Peak Sensing Technique
Authors: Sanguk Nam, Van Ha Nguyen, Hanjung Song
Abstract:
For low-power applications such as adapters for portable devices and USB chargers, the primary side regulation (PSR) fly-back converter is widely used in lieu of the conventional fly-back converter using opto-coupler because of its simpler structure and lower cost. In the literature, there has been studies focusing on the design of PSR circuit; however, the conventional sensing method in PSR circuit using RC delay has a lower accuracy as compared to the conventional fly-back converter using opto-coupler. In this paper, we propose a novel PWM/PFM controller using new sensing technique for the PSR fly-back converter which can control an accurate output voltage. The conventional PSR circuit can sense the output voltage information from the auxiliary winding to regulate the duty cycle of the clock that control the output voltage. In the sensing signal waveform, there has two transient points at time the voltage equals to Vout+VD and Vout, respectively. In other to sense the output voltage, the PSR circuit must detect the time at which the current of the diode at the output equals to zero. In the conventional PSR flyback-converter, the sensing signal at this time has a non-sharp-negative slope that might cause a difficulty in detecting the output voltage information since a delay of sensing signal or switching clock may exist which brings out an unstable operation of PSR fly-back converter. In this paper instead of detecting output voltage at a non-sharp-negative slope, a sharp-positive slope is used to sense the proper information of the output voltage. The proposed PRS circuit consists of a saw-tooth generator, a summing circuit, a sample and hold circuit and a peak detector. Besides, there is also the start-up circuit which protects the chip from high surge current when the converter is turned on. Additionally, to reduce the standby power loss, a second mode which operates in a low frequency is designed beside the main mode at high frequency. In general, the operation of the proposed PSR circuit can be summarized as following: At the time the output information is sensed from the auxiliary winding, a saw-tooth signal from the saw-tooth generator is generated. Then, both of these signals are summed using a summing circuit. After this process, the slope of the peak of the sensing signal at the time diode current is zero becomes positive and sharp that make the peak easy to detect. The output of the summing circuit then is fed into a peak detector and the sample and hold circuit; hence, the output voltage can be properly sensed. By this way, we can sense more accurate output voltage information and extend margin even circuit is delayed or even there is the existence of noise by using only a simple circuit structure as compared with conventional circuits while the performance can be sufficiently enhanced. Circuit verification was carried out using 0.35μm 700V Magnachip process. The simulation result of sensing signal shows a maximum error of 5mV under various load and line conditions which means the operation of the converter is stable. As compared to the conventional circuit, we achieved very small error only used analog circuits compare with conventional circuits. In this paper, a PWM/PFM controller using a simple and effective sensing method for PSR fly-back converter has been presented in this paper. The circuit structure is simple as compared with the conventional designs. The gained results from simulation confirmed the idea of the designKeywords: primary side regulation, PSR, sensing technique, peak detector, PWM/PFM control, fly-back converter
Procedia PDF Downloads 3383259 Integral Image-Based Differential Filters
Authors: Kohei Inoue, Kenji Hara, Kiichi Urahama
Abstract:
We describe a relationship between integral images and differential images. First, we derive a simple difference filter from conventional integral image. In the derivation, we show that an integral image and the corresponding differential image are related to each other by simultaneous linear equations, where the numbers of unknowns and equations are the same, and therefore, we can execute the integration and differentiation by solving the simultaneous equations. We applied the relationship to an image fusion problem, and experimentally verified the effectiveness of the proposed method.Keywords: integral images, differential images, differential filters, image fusion
Procedia PDF Downloads 5063258 Structural and Optical Study of Cu doped ZnS Thin Films Nanocrystalline by Chemical Bath Deposition Method
Authors: Hamid Merzouk, D. T. Talantikite, H. Haddad, Amel Tounsi
Abstract:
ZnS is an important II-VI binary compound with large band-gap energy at room temperature. We present in this work preparation and characterization of ZnS and Cu doped ZnS thin films. The depositions are performed by a simple chemical bath deposition route. Structural properties are carried out by X-ray diffraction (XRD) and scanning electron microscopy (SEM). Optical transmittance is investigated by the UV-visible spectroscopy at room temperature.Keywords: chemical, bath, method, Cu, doped, ZnS, thin, films
Procedia PDF Downloads 5543257 Human Gait Recognition Using Moment with Fuzzy
Authors: Jyoti Bharti, Navneet Manjhi, M. K.Gupta, Bimi Jain
Abstract:
A reliable gait features are required to extract the gait sequences from an images. In this paper suggested a simple method for gait identification which is based on moments. Moment values are extracted on different number of frames of gray scale and silhouette images of CASIA database. These moment values are considered as feature values. Fuzzy logic and nearest neighbour classifier are used for classification. Both achieved higher recognition.Keywords: gait, fuzzy logic, nearest neighbour, recognition rate, moments
Procedia PDF Downloads 7583256 Frequent Itemset Mining Using Rough-Sets
Authors: Usman Qamar, Younus Javed
Abstract:
Frequent pattern mining is the process of finding a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set. It was proposed in the context of frequent itemsets and association rule mining. Frequent pattern mining is used to find inherent regularities in data. What products were often purchased together? Its applications include basket data analysis, cross-marketing, catalog design, sale campaign analysis, Web log (click stream) analysis, and DNA sequence analysis. However, one of the bottlenecks of frequent itemset mining is that as the data increase the amount of time and resources required to mining the data increases at an exponential rate. In this investigation a new algorithm is proposed which can be uses as a pre-processor for frequent itemset mining. FASTER (FeAture SelecTion using Entropy and Rough sets) is a hybrid pre-processor algorithm which utilizes entropy and rough-sets to carry out record reduction and feature (attribute) selection respectively. FASTER for frequent itemset mining can produce a speed up of 3.1 times when compared to original algorithm while maintaining an accuracy of 71%.Keywords: rough-sets, classification, feature selection, entropy, outliers, frequent itemset mining
Procedia PDF Downloads 4373255 Simple Ways to Enhance the Security of Web Services
Authors: Majid Azarniush, Soroush Mokallaei
Abstract:
Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.Keywords: firewalls, security, web services, software
Procedia PDF Downloads 5123254 Physical Education Teacher's Interpretation toward Teaching Games for Understanding Model
Authors: Soni Nopembri
Abstract:
The objective of this research is to evaluate the implementation of teaching games for Understanding model by conducting action to physical education teacher who have got long teaching experience. The research applied Participatory Action Research. The subjects of this research were 19 physical education teachers who had got training of Teaching Games for Understanding. Data collection was conducted intensively through a questionnaire, in-depth interview, Focus Group Discussion (FGD), observation, and documentation. The collected data was analysis zed qualitatively and quantitatively. The result showed that physical education teachers had got an appropriate interpretation on TGfU model. Some indicators that were the focus of this research indicated this points; they are: (1) physical education teachers had good understanding toward TGfU model, (2) PE teachers’ competence in applying TGfU model on Physical Education at school were adequate, though some improvement were needed, (3) the influence factors in the implementation of TGfU model, in sequence, were teacher, facilities, environment, and students factors, (4) PE teachers’ perspective toward TGfU model were positively good, although some teachers were less optimistic toward the development of TGfU model in the future.Keywords: TGfU, physical education teacher, teaching games, FGD
Procedia PDF Downloads 5473253 Site Effect Observations after 2016 Amatrice Earthquake, Central Italy
Authors: Giovanni Forte, Melania De Falco, Antonio Santo
Abstract:
On 24th August 2016, central Italy was affected by a Mw 6.0 earthquake, representing the main shock of a long seismic sequence, which had a second shock Mw 6.6 on 26th October and lasts still nowadays. After the event, several field survey were carried out in the affected areas, which is made of historical masonry buildings. The post event reconnaissance missions were aimed at collecting information on the damage states of the buildings, the triggering of the landslides and the relationships with site effects. In this paper, the data collected after the event are analyzed considering the role of the geological and geomorphological setting and the ground motion scenario. The buildings displayed an uneven damage distribution, which was affected by both topographic and stratigraphic amplification. As pertains the landslides, which were the most recurrent among the ground failures, consisted mainly of rock falls and subordinately of translational slides. Finally, the collected knowledge showed a strong contribution of the local geological and geomorphological site condition on the resulting damage.Keywords: Amatrice earthquake, damage states, landslides, site effects
Procedia PDF Downloads 3233252 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic
Authors: Muhammad Luqman, Yusuf Kurniawan
Abstract:
S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process
Procedia PDF Downloads 3633251 An Insight into Early Stage Detection of Malignant Tumor by Microwave Imaging
Authors: Muhammad Hassan Khalil, Xu Jiadong
Abstract:
Detection of malignant tumor inside the breast of women is a challenging field for the researchers. MWI (Microwave imaging) for breast cancer diagnosis has been of interest for last two decades, newly it suggested for finding cancerous tissues of women breast. A simple and basic idea of the mathematical modeling is used throughout this paper for imaging of malignant tumor. In this paper, the authors explained inverse scattering method in the microwave imaging and also present some simulation results.Keywords: breast cancer detection, microwave imaging, tomography, tumor
Procedia PDF Downloads 4113250 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 2683249 Quantum Confinement in LEEH Capped CdS Nanocrystalline
Authors: Mihir Hota, Namita Jena, S. N. Sahu
Abstract:
LEEH (L-cysteine ethyl ester hydrochloride) capped CdS semiconductor nanocrystals are grown at 800C using a simple chemical route. Photoluminescence (PL), Optical absorption (UV) and Transmission Electron Microscopy (TEM) have been carried out to evaluate the structural and optical properties of the nanocrystal. Optical absorption studies have been carried out to optimize the sample. XRD and TEM analysis shows that the nanocrystal belongs to FCC structure having average size of 3nm while a bandgap of 2.84eV is estimated from Photoluminescence analysis. The nanocrystal emits bluish light when excited with 355nm LASER.Keywords: cadmium sulphide, nanostructures, luminescence, optical properties
Procedia PDF Downloads 3963248 On the Zeros of the Degree Polynomial of a Graph
Authors: S. R. Nayaka, Putta Swamy
Abstract:
Graph polynomial is one of the algebraic representations of the Graph. The degree polynomial is one of the simple algebraic representations of graphs. The degree polynomial of a graph G of order n is the polynomial Deg(G, x) with the coefficients deg(G,i) where deg(G,i) denotes the number of vertices of degree i in G. In this article, we investigate the behavior of the roots of some families of Graphs in the complex field. We investigate for the graphs having only integral roots. Further, we characterize the graphs having single roots or having real roots and behavior of the polynomial at the particular value is also obtained.Keywords: degree polynomial, regular graph, minimum and maximum degree, graph operations
Procedia PDF Downloads 2493247 Real-Time Radiological Monitoring of the Atmosphere Using an Autonomous Aerosol Sampler
Authors: Miroslav Hyza, Petr Rulik, Vojtech Bednar, Jan Sury
Abstract:
An early and reliable detection of an increased radioactivity level in the atmosphere is one of the key aspects of atmospheric radiological monitoring. Although the standard laboratory procedures provide detection limits as low as few µBq/m³, their major drawback is the delayed result reporting: typically a few days. This issue is the main objective of the HAMRAD project, which gave rise to a prototype of an autonomous monitoring device. It is based on the idea of sequential aerosol sampling using a carrousel sample changer combined with a gamma-ray spectrometer. In our hardware configuration, the air is drawn through a filter positioned on the carrousel so that it could be rotated into the measuring position after a preset sampling interval. Filter analysis is performed via a 50% HPGe detector inside an 8.5cm lead shielding. The spectrometer output signal is then analyzed using DSP electronics and Gamwin software with preset nuclide libraries and other analysis parameters. After the counting, the filter is placed into a storage bin with a capacity of 250 filters so that the device can run autonomously for several months depending on the preset sampling frequency. The device is connected to a central server via GPRS/GSM where the user can view monitoring data including raw spectra and technological data describing the state of the device. All operating parameters can be remotely adjusted through a simple GUI. The flow rate is continuously adjustable up to 10 m³/h. The main challenge in spectrum analysis is the natural background subtraction. As detection limits are heavily influenced by the deposited activity of radon decay products and the measurement time is fixed, there must exist an optimal sample decay time (delayed spectrum acquisition). To solve this problem, we adopted a simple procedure based on sequential spectrum acquisition and optimal partial spectral sum with respect to the detection limits for a particular radionuclide. The prototyped device proved to be able to detect atmospheric contamination at the level of mBq/m³ per an 8h sampling.Keywords: aerosols, atmosphere, atmospheric radioactivity monitoring, autonomous sampler
Procedia PDF Downloads 1503246 Switched System Diagnosis Based on Intelligent State Filtering with Unknown Models
Authors: Nada Slimane, Foued Theljani, Faouzi Bouani
Abstract:
The paper addresses the problem of fault diagnosis for systems operating in several modes (normal or faulty) based on states assessment. We use, for this purpose, a methodology consisting of three main processes: 1) sequential data clustering, 2) linear model regression and 3) state filtering. Typically, Kalman Filter (KF) is an algorithm that provides estimation of unknown states using a sequence of I/O measurements. Inevitably, although it is an efficient technique for state estimation, it presents two main weaknesses. First, it merely predicts states without being able to isolate/classify them according to their different operating modes, whether normal or faulty modes. To deal with this dilemma, the KF is endowed with an extra clustering step based fully on sequential version of the k-means algorithm. Second, to provide state estimation, KF requires state space models, which can be unknown. A linear regularized regression is used to identify the required models. To prove its effectiveness, the proposed approach is assessed on a simulated benchmark.Keywords: clustering, diagnosis, Kalman Filtering, k-means, regularized regression
Procedia PDF Downloads 1823245 Understanding and Political Participation in Constitutional Monarchy of Dusit District Residents
Authors: Sudaporn Arundee
Abstract:
The purposes of this research were to study in three areas: (1) to study political understanding and participating of the constitutional monarchy, (2) to study the level of participation. This paper drew upon data collected from 395 Dusit residents by using questionnaire. In addition, a simple random sampling was utilized to collect data. The findings revealed that 94 percent of respondents had a very good understanding of constitution monarchy with a mean of 4.8. However, the respondents overall had a very low level of participation with the mean score of 1.69 and standard deviation of .719.Keywords: political participation, constitutional monarchy, management and social sciences
Procedia PDF Downloads 251