Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14017

Search results for: communication with physical layer security

13027 Consumers’ Responses to Non-Traditional Marketing Communication Strategies for Advertising Herbal Products

Authors: Chioma Ifeoma Agbasimelo, Stephen Afam Kenechukwu

Abstract:

The study examined consumers’ responses to non-traditional marketing communication strategies in advertising herbal products. The study identified the following non-traditional marketing communication strategies: (a) trado-instrumental marketing strategy, (b) trado-demonstrative marketing strategy, and (c) trado-iconographic marketing strategy. Anchored on the Black Box Theory, it adopted the survey design of three metropolises (Awka, Onitsha, and Nnewi) in Anambra State, Nigeria. Major findings indicated that among the identified strategies, the trado-instrumental marketing strategy is the most dominant strategy. Other strategies: (b) trado-demonstrative marketing strategy and (c) trado-iconographic marketing strategy are sparingly used in semi-urban cities. It also found that consumers’ preferences and adoption of non-traditional marketing communication were minimal. Based on the findings, there is a need to create a unified system of integration of both traditional and non-traditional marketing communication strategies due to technology interfaces.

Keywords: advertising, consumers’ responses, herbal products, non-traditional marketing communication strategies

Procedia PDF Downloads 82
13026 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 129
13025 Characterization of Optical Communication Channels as Non-Deterministic Model

Authors: Valentina Alessandra Carvalho do Vale, Elmo Thiago Lins Cöuras Ford

Abstract:

Increasingly telecommunications sectors are adopting optical technologies, due to its ability to transmit large amounts of data over long distances. However, as in all systems of data transmission, optical communication channels suffer from undesirable and non-deterministic effects, being essential to know the same. Thus, this research allows the assessment of these effects, as well as their characterization and beneficial uses of these effects.

Keywords: optical communication, optical fiber, non-deterministic effects, telecommunication

Procedia PDF Downloads 782
13024 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 106
13023 Facile Synthesis of Metal Nanoparticles on Graphene via Galvanic Displacement Reaction for Sensing Application

Authors: Juree Hong, Sanggeun Lee, Jungmok Seo, Taeyoon Lee

Abstract:

We report a facile synthesis of metal nano particles (NPs) on graphene layer via galvanic displacement reaction between graphene-buffered copper (Cu) and metal ion-containing salts. Diverse metal NPs can be formed on graphene surface and their morphologies can be tailored by controlling the concentration of metal ion-containing salt and immersion time. The obtained metal NP-decorated single-layer graphene (SLG) has been used as hydrogen gas (H2) sensing material and exhibited highly sensitive response upon exposure to 2% of H2.

Keywords: metal nanoparticle, galvanic displacement reaction, graphene, hydrogen sensor

Procedia PDF Downloads 414
13022 Detection of Atrial Fibrillation Using Wearables via Attentional Two-Stream Heterogeneous Networks

Authors: Huawei Bai, Jianguo Yao, Fellow, IEEE

Abstract:

Atrial fibrillation (AF) is the most common form of heart arrhythmia and is closely associated with mortality and morbidity in heart failure, stroke, and coronary artery disease. The development of single spot optical sensors enables widespread photoplethysmography (PPG) screening, especially for AF, since it represents a more convenient and noninvasive approach. To our knowledge, most existing studies based on public and unbalanced datasets can barely handle the multiple noises sources in the real world and, also, lack interpretability. In this paper, we construct a large- scale PPG dataset using measurements collected from PPG wrist- watch devices worn by volunteers and propose an attention-based two-stream heterogeneous neural network (TSHNN). The first stream is a hybrid neural network consisting of a three-layer one-dimensional convolutional neural network (1D-CNN) and two-layer attention- based bidirectional long short-term memory (Bi-LSTM) network to learn representations from temporally sampled signals. The second stream extracts latent representations from the PPG time-frequency spectrogram using a five-layer CNN. The outputs from both streams are fed into a fusion layer for the outcome. Visualization of the attention weights learned demonstrates the effectiveness of the attention mechanism against noise. The experimental results show that the TSHNN outperforms all the competitive baseline approaches and with 98.09% accuracy, achieves state-of-the-art performance.

Keywords: PPG wearables, atrial fibrillation, feature fusion, attention mechanism, hyber network

Procedia PDF Downloads 104
13021 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 281
13020 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 59
13019 In vivo Mechanical Characterization of Facial Skin Combining Digital Image Correlation and Finite Element

Authors: Huixin Wei, Shibin Wang, Linan Li, Lei Zhou, Xinhao Tu

Abstract:

Facial skin is a biomedical material with complex mechanical properties of anisotropy, viscoelasticity, and hyperelasticity. The mechanical properties of facial skin are crucial for a number of applications including facial plastic surgery, animation, dermatology, cosmetic industry, and impact biomechanics. Skin is a complex multi-layered material which can be broadly divided into three main layers, the epidermis, the dermis, and the hypodermis. Collagen fibers account for 75% of the dry weight of dermal tissue, and it is these fibers which are responsible for the mechanical properties of skin. Many research on the anisotropic mechanical properties are mainly concentrated on in vitro, but there is a great difference between in vivo and in vitro for mechanical properties of the skin. In this study, we presented a method to measure the mechanical properties of facial skin in vivo. Digital image correlation (DIC) and indentation tests were used to obtain the experiment data, including the deformation of facial surface and indentation force-displacement curve. Then, the experiment was simulated using a finite element (FE) model. Application of Computed Tomography (CT) and reconstruction techniques obtained the real tissue geometry. A three-dimensional FE model of facial skin, including a bi-layer system, was obtained. As the epidermis is relatively thin, the epidermis and dermis were regarded as one layer and below it was hypodermis in this study. The upper layer was modeled as a Gasser-Ogden-Holzapfel (GOH) model to describe hyperelastic and anisotropic behaviors of the dermis. The under layer was modeled as a linear elastic model. In conclusion, the material properties of two-layer were determined by minimizing the error between the FE data and experimental data.

Keywords: facial skin, indentation test, finite element, digital image correlation, computed tomography

Procedia PDF Downloads 102
13018 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 404
13017 Building Successful Organizational Business Communication and Its Impact on Business Performance: An Intra- and Inter-Organizational Perspective

Authors: Aynura Valiyeva, Basil John Thomas

Abstract:

Intra-firm communication is critical for building synergy amongst internal business units of a firm, where employees from various functional departments and ranks incorporate their decision-making, understanding of organizational objectives, as well as common norms and culture for better organizational effectiveness. This study builds on and assesses a framework of the causes and consequences of effective communication in business interactions between customer and supplier firms, and the path for efficient communication within a firm. The proposed study’s structural equation modeling (SEM) analysis based on 352 sample responses collected from firm representatives at different job positions ranging from marketing to logistics operations, reveals that, in the frame of reference of intra-organizational communication, organization characteristics and shared values, top management support and style of leadership, as well as information technology, are all significantly related to communication effectiveness. Furthermore, the frequency and variety of interactions enhance the outcome of communication, that improves a company’s performance. The results reveal that cultural factors are significantly related to communication effectiveness, as well as the shared beliefs and goals. In terms of organizational factors, leadership style, top management support and information technology are significant determinants of effective communication. Among the contextual factors, interaction frequency and diversity are found to be priority factors. This study also tests the relationship between supplier and supplier firm performance in the context of communication effectiveness, and finds that they are closely related, when trust and commitment is built between business partners. When firms do business in other multicultural contexts, language and shared values with destination country must be considered significant elements of communication process.

Keywords: business performance, intra-firm communication, inter-firm communication, structural equation modeling

Procedia PDF Downloads 87
13016 Firm-Created Social Media Communication and Consumer Brand Perceptions

Authors: Rabail Khalid

Abstract:

Social media has changed the business communication strategies in the corporate world. Firms are using social media to reach their maximum stakeholders in minimum time at different social media forums. The current study examines the role of firm-created social media communication on consumer brand perceptions and their loyalty to brand. An online survey is conducted through social media forums including Facebook and Twitter to collect data regarding social media communication of a well-reputed clothing company’s brand in Pakistan. A link is sent to 900 customers of that company. Out of 900 questionnaires, 534 were received. So, the response rate is 59.33%. During data screening and entry, 13 questionnaires are rejected due to incomplete answer. Therefore, 521 questionnaires are completed in all respect and seem to be helpful for the study. So, the positive response rate is 57.89%. The empirical results report positive and significant influence of company-generated social media communication on brand trust, brand equity, and brand loyalty. The findings of this study provide important information to the marketing professionals and brand managers to understand consumer behavior through social media communication.

Keywords: firm-created social media communication, brand trust, brand equity, consumer behavior, brand loyalty

Procedia PDF Downloads 376
13015 Effects of SRT and HRT on Treatment Performance of MBR and Membrane Fouling

Authors: M. I. Aida Isma, Azni Idris, Rozita Omar, A. R. Putri Razreena

Abstract:

40L of hollow fiber membrane bioreactor with solids retention times (SRT) of 30, 15 and 4 days were setup for treating synthetic wastewater at hydraulic retention times (HRT) of 12, 8 and 4 hours. The objectives of the study were to investigate the effects of SRT and HRT on membrane fouling. A comparative analysis was carried out for physiochemical quality parameters (turbidity, suspended solids, COD, NH3-N and PO43-). Scanning electron microscopy (SEM), energy diffusive X-ray (EDX) analyzer and particle size distribution (PSD) were used to characterize the membrane fouling properties. The influence of SRT on the quality of effluent, activated sludge quality, and membrane fouling were also correlated. Lower membrane fouling and slower rise in trans-membrane pressure (TMP) were noticed at the longest SRT and HRT of 30d and 12h, respectively. Increasing SRT results in noticeable reduction of dissolved organic matters. The best removal efficiencies of COD, TSS, NH3-N and PO43- were 93%, 98%, 80% and 30% respectively. The high HRT with shorter SRT induced faster fouling rate. The main fouling resistance was cake layer. The most severe membrane fouling was observed at SRT and HRT of 4 and 12, respectively with thickness cake layer of 17 μm as reflected by higher TMP, lower effluent removal and thick sludge cake layer.

Keywords: membrane bioreactor, SRT, HRT, fouling

Procedia PDF Downloads 510
13014 Efficient Relay Selection Scheme Utilizing OVSF Code in Cooperative Communication System

Authors: Yeong-Seop Ahn, Myoung-Jin Kim, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes a relay selection scheme utilizing an orthogonal variable spreading factor (OVSF) code in a cooperative communication. The relay selection scheme influences on the communication performance in the cooperative communication. Conventional relay selection schemes such as the best harmonic mean relay selection scheme or the threshold-based relay selection scheme should know information such as channel state information (CSI) in advance. The proposed relay selection scheme does not require information in advance by using a reference signal utilizing the OVSF code. The simulation result shows that bit error rate (BER) performance of proposed relay selection scheme is similar to the best harmonic mean relay selection scheme that is known as one of the optimal relay selection schemes.

Keywords: cooperative communication, relay selection, OFDM, OVSF code

Procedia PDF Downloads 624
13013 Geometry of the Bandaging Procedure and Its Application while Wrapping Bandages for Treatment of Leg Ulcers

Authors: Monica Puri Sikka, Subrato Ghosh Arunangshu Mukhopadhyay

Abstract:

Appropriate compression bandaging is important for compression therapeutic medical diseases. The high compression approach employed for treating venous leg ulcers should be used correctly so that sufficient (but not excessive) pressure is applied. Bandages used to treat venous disease by compression should achieve and sustain effective levels and gradients of pressure and minimise the risk of pressure trauma. To maintain graduated compression on the limb the bandage needs to be applied at same tension for each layer from ankle to the knee. In this paper the geometry for various bandaging procedures is used to wrap each layer of bandage by marking the relaxed length of the bandage. The relaxed length is calculated depending on the stretch, average circumference of the limb on which it is to be applied and the bandaging technique to be used. This paper aims at developing a scientific approach while applying the bandage to reduce the inter operator variability in applying same tension on each successive layer of bandage.

Keywords: bandaging, compression, inter operator variability, graduated, relaxed length, stretch

Procedia PDF Downloads 486
13012 Morphological Interaction of Porcine Oocyte and Cumulus Cells Study on in vitro Oocyte Maturation Using Electron Microscopy

Authors: M. Areekijseree, W. Pongsawat, M. Pumipaiboon, C. Thepsithar, S. Sengsai, T. Chuen-Im

Abstract:

Morphological interaction of porcine cumulus-oocyte complexes (pCOCs) was investigated on in vitro condition using electron microscope (SEM and TEM). The totals of 1,923 oocytes were round in shape, surrounded by zona pellucida with layer of cumulus cells ranging between 59.29-202.14 µm in size. They were classified into intact-, multi-, partial cumulus cell layer oocyte, and completely denuded oocyte, at the percentage composition of 22.80% 32.70%, 18.60%, and 25.90 % respectively. The pCOCs classified as intact- and multi cumulus cell layer oocytes were further culturing at 37°C with 5% CO2, 95% air atmosphere and high humidity for 44 h in M199 with Earle’s salts supplemented with 10% HTFCS, 2.2 mg/mL NaHCO3, 1 M Hepes, 0.25 mM pyruvate, 15 µg/mL porcine follicle-stimulating hormone, 1 µg/mL LH, 1µg/mL estradiol with ethanol, and 50 µg/mL gentamycin sulfate. On electron microscope study, cumulus cells were found to stick their processes to secrete substance from the sac-shape end into zona pellucida of the oocyte and also communicated with the neighboring cells through their microvilli on the beginning of incubation period. It is believed that the cumulus cells communicate with the oocyte by inserting the microvilli through this gap and embedded in the oocyte cytoplasm before secreting substance, through the sac-shape end of the microvilli, to inhibit primary oocyte development at the prophase I. Morphological changes of the complexes were observed after culturing for 24-44 h. One hundred percentages of the cumulus layers were expanded and cumulus cells were peeling off from the oocyte surface. In addition, the round-shape cumulus cells transformed themselves into either an elongate shape or a columnar shape, and no communication between cumulus neighboring cells. After 44 h of incubation time, diameter of oocytes surrounded by cumulus cells was larger than 0 h incubation. The effect of hormones in culture medium is exerted by their receptors present in porcine oocyte. It is likely that all morphological changes of the complexes after hormone treatment were to allow maturation of the oocyte. This study demonstrated that the association of hormones in M199 could promote porcine follicle activation in 44 h in vitro condition. This culture system should be useful for studying the regulation of early follicular growth and development, especially because these follicles represent a large source of oocytes that could be used in vitro for cell technology.

Keywords: cumulus cells, electron microscopy, in vitro, porcine oocyte

Procedia PDF Downloads 371
13011 Correlation between Defect Suppression and Biosensing Capability of Hydrothermally Grown ZnO Nanorods

Authors: Mayoorika Shukla, Pramila Jakhar, Tejendra Dixit, I. A. Palani, Vipul Singh

Abstract:

Biosensors are analytical devices with wide range of applications in biological, chemical, environmental and clinical analysis. It comprises of bio-recognition layer which has biomolecules (enzymes, antibodies, DNA, etc.) immobilized over it for detection of analyte and transducer which converts the biological signal into the electrical signal. The performance of biosensor primarily the depends on the bio-recognition layer and therefore it has to be chosen wisely. In this regard, nanostructures of metal oxides such as ZnO, SnO2, V2O5, and TiO2, etc. have been explored extensively as bio-recognition layer. Recently, ZnO has the attracted attention of researchers due to its unique properties like high iso-electric point, biocompatibility, stability, high electron mobility and high electron binding energy, etc. Although there have been many reports on usage of ZnO as bio-recognition layer but to the authors’ knowledge, none has ever observed correlation between optical properties like defect suppression and biosensing capability of the sensor. Here, ZnO nanorods (ZNR) have been synthesized by a low cost, simple and low-temperature hydrothermal growth process, over Platinum (Pt) coated glass substrate. The ZNR have been synthesized in two steps viz. initially a seed layer was coated over substrate (Pt coated glass) followed by immersion of it into nutrient solution of Zinc nitrate and Hexamethylenetetramine (HMTA) with in situ addition of KMnO4. The addition of KMnO4 was observed to have a profound effect over the growth rate anisotropy of ZnO nanostructures. Clustered and powdery growth of ZnO was observed without addition of KMnO4, although by addition of it during the growth, uniform and crystalline ZNR were found to be grown over the substrate. Moreover, the same has resulted in suppression of defects as observed by Normalized Photoluminescence (PL) spectra since KMnO4 is a strong oxidizing agent which provides an oxygen rich growth environment. Further, to explore the correlation between defect suppression and biosensing capability of the ZNR Glucose oxidase (Gox) was immobilized over it, using physical adsorption technique followed by drop casting of nafion. Here the main objective of the work was to analyze effect of defect suppression over biosensing capability, and therefore Gox has been chosen as model enzyme, and electrochemical amperometric glucose detection was performed. The incorporation of KMnO4 during growth has resulted in variation of optical and charge transfer properties of ZNR which in turn were observed to have deep impact on biosensor figure of merits. The sensitivity of biosensor was found to increase by 12-18 times, due to variations introduced by addition of KMnO4 during growth. The amperometric detection of glucose in continuously stirred buffer solution was performed. Interestingly, defect suppression has been observed to contribute towards the improvement of biosensor performance. The detailed mechanism of growth of ZNR along with the overall influence of defect suppression on the sensing capabilities of the resulting enzymatic electrochemical biosensor and different figure of merits of the biosensor (Glass/Pt/ZNR/Gox/Nafion) will be discussed during the conference.

Keywords: biosensors, defects, KMnO4, ZnO nanorods

Procedia PDF Downloads 273
13010 The Ratio of Second-to-Fourth Digit Length (2D:4D) and the Physical Ability in Men and Women

Authors: Marek Kociuba, Jarosław Kurek

Abstract:

Introduction: The digit length ratio (2D:4D) is generally higher in women compared to men. Lower 2D:4D is linked with greater physical ability, strength, and better sporting performance. Second-to-fourth digit lengths ratio (2D:4D) is an indicator of PT exposure. Lower 2D:4D indicates higher PT exposure and vice versa. Methods: The objectives of this paper were to investigate the relationship of 2D:4D with physical fitness in men and women. The study compared 137 female and 174 male students from Wrocław. Besides calculating 2D:4D for each hand, height and weight were also recorded. Assessment of physical fitness and endurance were performed through Eurofit tests. Handgrip strength was measured by a standardized isometric dynamometer. Results: Male participants had significantly lower 2D:4D than females on each hand. A weak relationship between 2D:4D and the results of strength tests was found.

Keywords: 2D:4D, physical fitness, prenatal testosterone, sexual dimorphism

Procedia PDF Downloads 113
13009 Static Study of Piezoelectric Bimorph Beams with Delamination Zone

Authors: Zemirline Adel, Ouali Mohammed, Mahieddine Ali

Abstract:

The FOSDT (First Order Shear Deformation Theory) is taking into consideration to study the static behavior of a bimorph beam, with a delamination zone between the upper and the lower layer. The effect of limit conditions and lengths of the delamination zone are presented in this paper, with a PVDF piezoelectric material application. A FEM “Finite Element Method” is used to discretize the beam. In the axial displacement, a displacement field appears in the debonded zone with inverse effect between the upper and the lower layer was observed.

Keywords: static, piezoelectricity, beam, delamination

Procedia PDF Downloads 407
13008 Experimental Investigation of the Failure Behavior of a Retaining Wall Constructed with Soil Bags

Authors: Kewei Fan, Sihong Liu, Yi Pik Cheng

Abstract:

This paper aims to analyse the failure behaviour of the retaining wall constructed with soil bags that are formed by filling river sand into woven bags (geosynthetics). Model tests were conducted to obtain the failure mode of the wall, and shear tests on two-layers and five-layers of soil bags were designed to investigate the mechanical characteristics of the interface of soil bags. The test results show that the slip surface in the soil bags-constructed retaining wall is ladder-like due to the inter-layer insertion of soil bags, and the wall above the ladder-like surface undergoes a rigid body translation. The insertion strengthens the shear strength of two-layer staggered-stacked soil bags. Meanwhile, it affects the shape of the slip surface of the five-layer staggered-stacked soil bags. Finally, the interlayer resisting friction of soil bags is found to be related to the shape of the slip surface.

Keywords: geosynthetics, retaining wall, soil bag, failure mode, interface, shear strength

Procedia PDF Downloads 120
13007 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 322
13006 The Flow Separation Delay on the Aircraft Wing

Authors: Ishtiaq A. Chaudhry, Z. R. Tahir, F. A. Siddiqui, Z. Anwar, F. Valenzuelacalva

Abstract:

A series of experiments involving the particle image velocimetry technique are carried out to analyse the quantitative effectiveness of the synthesized vortical structures towards actual flow separation control. The streamwise vortices are synthesized from the synthetic jet actuator and introduced into the attached and separating boundary layer developed on the flat plate surface. Two types of actuators with different geometrical set up are used to analyse the evolution of vortical structures in the near wall region and their impact towards achieving separation delay on the actual aircraft wing. Firstly a single circular jet is synthesized at varying actuator operating parameters and issued into the boundary layer to evaluate the dynamics of the interaction between the vortical structures and the near wall low momentum fluid in the separated region. Secondly, an array of jets has been issued into the artificially separated region to assess the effectiveness of various vortical structures towards achieving the reattachment of the separated flow in the streamwise direction.

Keywords: boundary layer, flow separation, streamwise vortices, synthetic jet actuator

Procedia PDF Downloads 454
13005 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 520
13004 Optimization Based Extreme Learning Machine for Watermarking of an Image in DWT Domain

Authors: RAM PAL SINGH, VIKASH CHAUDHARY, MONIKA VERMA

Abstract:

In this paper, we proposed the implementation of optimization based Extreme Learning Machine (ELM) for watermarking of B-channel of color image in discrete wavelet transform (DWT) domain. ELM, a regularization algorithm, works based on generalized single-hidden-layer feed-forward neural networks (SLFNs). However, hidden layer parameters, generally called feature mapping in context of ELM need not to be tuned every time. This paper shows the embedding and extraction processes of watermark with the help of ELM and results are compared with already used machine learning models for watermarking.Here, a cover image is divide into suitable numbers of non-overlapping blocks of required size and DWT is applied to each block to be transformed in low frequency sub-band domain. Basically, ELM gives a unified leaning platform with a feature mapping, that is, mapping between hidden layer and output layer of SLFNs, is tried for watermark embedding and extraction purpose in a cover image. Although ELM has widespread application right from binary classification, multiclass classification to regression and function estimation etc. Unlike SVM based algorithm which achieve suboptimal solution with high computational complexity, ELM can provide better generalization performance results with very small complexity. Efficacy of optimization method based ELM algorithm is measured by using quantitative and qualitative parameters on a watermarked image even though image is subjected to different types of geometrical and conventional attacks.

Keywords: BER, DWT, extreme leaning machine (ELM), PSNR

Procedia PDF Downloads 300
13003 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 153
13002 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River

Authors: Kebron Asnake

Abstract:

Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.

Keywords: water, health, agriculture, medicine

Procedia PDF Downloads 65
13001 X-Ray Photoelectron Spectroscopy Analyses of Candidate Materials for Advanced Nuclear Reactors

Authors: Marie Kudrnová, Jana Rejková

Abstract:

The samples of supplied INCONEL 601, 617, 625, and HASTELLOY C-22 alloys and experimental nickel alloy MoNiCr were examined by XPS (X-ray photoelectron spectroscopy) before and after exposure. The experiment was performed in a mixture of LiCl-KCl salt (58.2-41.8 wt. %). The exposure conditions were 440°C, pressure 0.2 MPa, 500 hours in an inert argon atmosphere. The XPS analysis shows that a thin oxide layer composed of metal oxides such as NiO, Cr₂O₃, and Nb₂O₅ was formed. After sputtering the exposed surface with Ar ions, metals were also detected in the elemental state, indicating a very thin protective oxide layer with a thickness in units of up to tens of nanometers.

Keywords: XPS, MSR, nickel alloy, metal oxides

Procedia PDF Downloads 63
13000 Effects of COVID-19 Confinement on Physical Activity and Screen Time in Spanish Children

Authors: Maria Medrano, Cristina Cadenas-Sanchez, Maddi Oses, Lide Arenaza, Maria Amasene, Idoia Labayen

Abstract:

The COVID-19 outbreak began in December 2019 in China and was rapidly expanded globally. Emergency measures, such as social distance or home confinement, were adopted by many country governments to prevent its transmission. In Spain, one of the most affected countries, the schools were closed, and one of the most severe mandatory home confinement was established for children from 14th March to 26th April 2020. The hypothesis of this study was that the measures adopted during the COVID-19 pandemic may have negatively affected physical activity and screen time of children. However, few studies have examined the effects of COVID-19 pandemic on lifestyle behaviours. Thus, the aim of the current work was to analyse the effects of the COVID-19 confinement on physical activity and screen time in Spanish children. For the current purpose, a total of 113 children and adolescents (12.0 ± 2.6 yr., 51.3% boys, 24.0% with overweight/obesity according to the World Obesity Federation) of the MUGI project were included in the analyses. Physical activity and screen time were longitudinally assessed by 'The Youth Activity Profile' questionnaire (YAP). Differences in physical activity and screen time before and during the confinement were assessed by dependent t-test. Before the confinement, 60% did not meet physical activity recommendations ( ≥ 60/min/day of moderate to vigorous physical activity), and 61% used screens ≥ 2 h/day. During the COVID-19 confinement, children decreased their physical activity levels (-91 ± 55 min/day, p < 0.001) and increased screen time ( ± 2.6 h/day, p < 0.001). The prevalence of children that worsened physical activity and screen time during the COVID-19 confinement were 95.2% and 69.8%, respectively. The current study evidence the negative effects of the COVID-19 confinement on physical activity and screen time in Spanish children. These findings should be taken into account to develop and implement future public health strategies for preserving children's lifestyle behaviours and health during and after the COVID-19 pandemic.

Keywords: COVID-19, lifestyle changes, paediatric, physical activity, screen time

Procedia PDF Downloads 116
12999 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 153
12998 The Design of Multiple Detection Parallel Combined Spread Spectrum Communication System

Authors: Lixin Tian, Wei Xue

Abstract:

Many jobs in society go underground, such as mine mining, tunnel construction and subways, which are vital to the development of society. Once accidents occur in these places, the interruption of traditional wired communication is not conducive to the development of rescue work. In order to realize the positioning, early warning and command functions of underground personnel and improve rescue efficiency, it is necessary to develop and design an emergency ground communication system. It is easy to be subjected to narrowband interference when performing conventional underground communication. Spreading communication can be used for this problem. However, general spread spectrum methods such as direct spread communication are inefficient, so it is proposed to use parallel combined spread spectrum (PCSS) communication to improve efficiency. The PCSS communication not only has the anti-interference ability and the good concealment of the traditional spread spectrum system, but also has a relatively high frequency band utilization rate and a strong information transmission capability. So, this technology has been widely used in practice. This paper presents a PCSS communication model-multiple detection parallel combined spread spectrum (MDPCSS) communication system. In this paper, the principle of MDPCSS communication system is described, that is, the sequence at the transmitting end is processed in blocks and cyclically shifted to facilitate multiple detection at the receiving end. The block diagrams of the transmitter and receiver of the MDPCSS communication system are introduced. At the same time, the calculation formula of the system bit error rate (BER) is introduced, and the simulation and analysis of the BER of the system are completed. By comparing with the common parallel PCSS communication, we can draw a conclusion that it is indeed possible to reduce the BER and improve the system performance. Furthermore, the influence of different pseudo-code lengths selected on the system BER is simulated and analyzed, and the conclusion is that the larger the pseudo-code length is, the smaller the system error rate is.

Keywords: cyclic shift, multiple detection, parallel combined spread spectrum, PN code

Procedia PDF Downloads 128