Search results for: memory protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3511

Search results for: memory protection

2401 Weak Solutions Of Stochastic Fractional Differential Equations

Authors: Lev Idels, Arcady Ponosov

Abstract:

Stochastic fractional differential equations have recently attracted considerable attention, as they have been used to model real-world processes, which are subject to natural memory effects and measurement uncertainties. Compared to conventional hereditary differential equations, one of the advantages of fractional differential equations is related to more realistic geometric properties of their trajectories that do not intersect in the phase space. In this report, a Peano-like existence theorem for nonlinear stochastic fractional differential equations is proven under very general hypotheses. Several specific classes of equations are checked to satisfy these hypotheses, including delay equations driven by the fractional Brownian motion, stochastic fractional neutral equations and many others.

Keywords: delay equations, operator methods, stochastic noise, weak solutions

Procedia PDF Downloads 211
2400 The Portuguese Framework of the Professional Internship without Public Funds

Authors: Ana Lambelho

Abstract:

In an economic crisis such as the one that shook (and still shake) Europe, one does not question the importance of the measures that encourage the hiring and integration of young people into the labour market. In the mentioned context, enterprises tend to reduce the cost of labour and to seek flexible contracting instruments. The professional internships allow innovation and creativity at low cost, because, as they are not labour contracts, the enterprises do not have to respect the minimum standards related to wages, working time duration and so on. In Portugal, we observe a widespread existence of training contracts in which the trainee worked several hours without salary or was paid below the legally prescribed for the function and the work period. For this reason, under the tripartite agreement for a new system of regulation of labour relations, employment policies and social protection, between the Government and the social partners, in June 2008, foresaw a prohibition of professional internships unpaid and the legal regulation of the mandatory internships for access to an activity. The first Act about private internship contracts, i.e., internships without public funding was embodied in the Decree-Law N. 66/2011, of 1st June. This work is dedicated to the study of the legal regime of the internship contract in Portugal, by analysing the problems brought by the new set of rules and especially those which remains unresolved. In fact, we can conclude that the number of situations covered by the Act is much lower than what was expected, because of the exclusion of the mandatory internship for access to a profession when the activity is developed autonomously. Since the majority of the activities can be developed both autonomously or subordinated, it is quite easy to out of the Act requirements and, so, out of the protection that it confers to the intern. In order to complete this study, we considered not only the mentioned legal Act, but also the few doctrine and jurisprudence about the theme.

Keywords: intern, internship contact, labour law, Portugal

Procedia PDF Downloads 311
2399 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 147
2398 Innovative Design Considerations for Adaptive Spacecraft

Authors: K. Parandhama Gowd

Abstract:

Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.

Keywords: satellites, low earth orbit (LEO), medium earth orbit (MEO), geostationary earth orbit (GEO), self-organizing control system, anti-satellite weapons (ASAT), orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems (AOCS), command and data handling (CDH)

Procedia PDF Downloads 296
2397 A Cognitive Training Program in Learning Disability: A Program Evaluation and Follow-Up Study

Authors: Krisztina Bohacs, Klaudia Markus

Abstract:

To author’s best knowledge we are in absence of studies on cognitive program evaluation and we are certainly short of programs that prove to have high effect sizes with strong retention results. The purpose of our study was to investigate the effectiveness of a comprehensive cognitive training program, namely BrainRx. This cognitive rehabilitation program target and remediate seven core cognitive skills and related systems of sub-skills through repeated engagement in game-like mental procedures delivered one-on-one by a clinician, supplemented by digital training. A larger sample of children with learning disability were given pretest and post-test cognitive assessments. The experimental group completed a twenty-week cognitive training program in a BrainRx center. A matched control group received another twenty-week intervention with Feuerstein’s Instrumental Enrichment programs. A second matched control group did not receive training. As for pre- and post-test, we used a general intelligence test to assess IQ and a computer-based test battery for assessing cognition across the lifespan. Multiple regression analyses indicated that the experimental BrainRx treatment group had statistically significant higher outcomes in attention, working memory, processing speed, logic and reasoning, auditory processing, visual processing and long-term memory compared to the non-treatment control group with very large effect sizes. With the exception of logic and reasoning, the BrainRx treatment group realized significantly greater gains in six of the above given seven cognitive measures compared to the Feuerstein control group. Our one-year retention measures showed that all the cognitive training gains were above ninety percent with the greatest retention skills in visual processing, auditory processing, logic, and reasoning. The BrainRx program may be an effective tool to establish long-term cognitive changes in case of students with learning disabilities. Recommendations are made for treatment centers and special education institutions on the cognitive training of students with special needs. The importance of our study is that targeted, systematic, progressively loaded and intensive brain training approach may significantly change learning disabilities.

Keywords: cognitive rehabilitation training, cognitive skills, learning disability, permanent structural cognitive changes

Procedia PDF Downloads 202
2396 A Phenomenological Study on the Role of Civil Society Organizations in Supporting Urban Refugees in Thailand

Authors: Rowena Clemino Alcoba

Abstract:

Thailand is host to the largest number of refugees in the region. The country has been one of the most accessible points of entry to refugees around the world because it has relatively lenient visa requirements, enabling asylum seekers to enter the country and subsequently search for legal assistance. However, because Thailand is not a signatory to the 1951 Geneva Convention on Refugees which governs the refugee status determination and safeguards several rights of the refugees, there are no national laws or administrative framework on the protection of refugees. Refugees are considered as illegal migrants, and certain groups are permitted to stay temporarily only upon executive discretion. Aside from the documented group of refugees from the Myanmar border, there are many others who came from different parts of the world. They are known as urban refugees believed to be in the thousands and are scattered in the impoverished areas of Bangkok and the suburbs. This study aims to advance understanding of the role of civil society organizations in supporting refugees, with particular focus on urban refugees. Using the method of triangulation in qualitative research, the study investigates the life journey of a refugee family from Pakistan, their difficulties and struggles to survive in perilous situations. The study presents the dynamics of how civil society works and collaborates to fill the gap for much-needed social services. It also discusses the depth and scope of the role of faith actors in the protection and support of this vulnerable sector. The engagement of civil society reveals framework and structure that aims to create long-term impact. The help provided is not merely monetary or material dole-outs but a platform for refugees to integrate with community, develop skills and make productive use of their time.

Keywords: asylum seeker, civil society, faith actors, refugees

Procedia PDF Downloads 148
2395 Durability of Cement Bonded Particleboards Produced from Terminalia superba and Gmelina arborea against Subterranean Termite Attack

Authors: Amos Olajide Oluyege, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape

Abstract:

This study was conducted to determine the durability of wood-cement particleboards when exposed to attack by subterranean termites, Macrotermes subhylinus. The boards were made from Terminalia superba and Gmelina arborea wood sawdust at nominal board densities (BD) of 1000, 900, and 800 kg/m³ using wood-cement mixing ratios (MR) of 3:1, 2.5:1, 2:1, and 1:1. Above ground durability tests against termite attack were carried out according to ASTM D 2017 for 14 weeks. Results of visual assessment of the wood cement particleboards show that all the board samples had a visual rating that was not less than 7 (i.e., moderate attack) for both species irrespective of the MR and BD. T. superba boards were found to have higher resistance to termite attack compared to their G. arborea counterparts. The mean values for weight loss following exposure ranged from 1.93 to 6.13% and 3.24 to 12.44%. Analysis of variance (ANOVA) results of the weight loss assessment revealed a significant (p < 0.05) effect of species and mixing ratio on the weight loss of the boards due to termite attack with F(₁,₇₂) = 92.890 and P = 0.000 and F(₃,₇₂) = 8.318 and p = 0.000, while board density did not have any significant effect (p > 0.05) with F (₂,₇₂) = 1.307 and p = 0.277. Thus, boards made from a higher mixing ratio had better resistance against termite attacks. Thus, it can be concluded that the durability of cement-bonded particleboards when exposed to subterranean termite attack is not only dependent on the quality of the wood raw material (species) but also on the enhanced protection imparted by the cement matrix; the protection increased with increase in cement/wood mixing ratio.

Keywords: cement-bonded particleboard, mixing ratio, board density, Gmelina arborea, Terminalia superba

Procedia PDF Downloads 218
2394 Urban Form, Heritage, and Disaster Prevention: What Do They Have in Common?

Authors: Milton Montejano Castillo, Tarsicio Pastrana Salcedo

Abstract:

Based on the hypothesis that disaster risk is constructed socially and historically, this article shows the importance of keeping alive the historical memory of disaster by means of architectural and urban heritage conservation. This is illustrated with three examples of Latin American World Heritage cities where disasters like floods and earthquakes have shaped urban form. Therefore, the study of urban form or ‘Urban Morphology’ is proposed as a tool to understand and analyze urban transformations with the documentation of the occurrence of disasters. Lessons learned from such cities may be useful to reduce disasters risk in contemporary built environments.

Keywords: conservation, disaster risk reduction, urban morphology, World Heritage

Procedia PDF Downloads 543
2393 K-Means Clustering-Based Infinite Feature Selection Method

Authors: Seyyedeh Faezeh Hassani Ziabari, Sadegh Eskandari, Maziar Salahi

Abstract:

Infinite Feature Selection (IFS) algorithm is an efficient feature selection algorithm that selects a subset of features of all sizes (including infinity). In this paper, we present an improved version of it, called clustering IFS (CIFS), by clustering the dataset in advance. To do so, first, we apply the K-means algorithm to cluster the dataset, then we apply IFS. In the CIFS method, the spatial and temporal complexities are reduced compared to the IFS method. Experimental results on 6 datasets show the superiority of CIFS compared to IFS in terms of accuracy, running time, and memory consumption.

Keywords: feature selection, infinite feature selection, clustering, graph

Procedia PDF Downloads 129
2392 Circadian Clock and Subjective Time Perception: A Simple Open Source Application for the Analysis of Induced Time Perception in Humans

Authors: Agata M. Kołodziejczyk, Mateusz Harasymczuk, Pierre-Yves Girardin, Lucie Davidová

Abstract:

Subjective time perception implies connection to cognitive functions, attention, memory and awareness, but a little is known about connections with homeostatic states of the body coordinated by circadian clock. In this paper, we present results from experimental study of subjective time perception in volunteers performing physical activity on treadmill in various phases of their circadian rhythms. Subjects were exposed to several time illusions simulated by programmed timing systems. This study brings better understanding for further improvement of of work quality in isolated areas. 

Keywords: biological clock, light, time illusions, treadmill

Procedia PDF Downloads 338
2391 Study of the Protective Effects of Summer Savory against Multiple Organ Damage Induced by Lead Acetate in Rats

Authors: Bassant M. M. Ibrahim, Doha H. Abou Baker, Ahmed Abd Elghafour

Abstract:

Excessive exposure to heavy metals contributes to the occurrence of deleterious health problems that affect vital organs like the brain, liver, kidneys, and heart. The use of natural products that have antioxidant capabilities may contribute to the protection of these organs. In the present study, the essential oil of summer savory (Satureja hortensis) was used to evaluate its protective effects against lead acetate induced damaging effect on rats’ vital organs, due to its high contents of carvacrol, y-terpinene, and p-cymene. Forty female Wister Albino rats were classified into five equal groups, the 1st served as normal group, the 2nd served as positive control group was given lead acetate (60 mg/kg) intra-peritoneal (IP), the third to fifth groups were treated with calcium disodium (EDTA) as chelating agent and summer savory essential oil in doses of (50 and 100mg/kg) respectively. All treatments were given IP concomitant with lead acetate for ten successive days. At the end of the experiment duration electrocardiogram (ECG), an open field test for the evaluation of psychological state, rotarod test as for the evaluation of locomotor coordination ability as well as anti-inflammatory and oxidative stress biomarkers in serum and histopathology of vital organs were performed. The investigations in this study show that the protective effect of high dose of summer savory essential oil is more than the low dose and that the essential oil of summer savory is a promising agent that can contribute to the protection of vital organs against the hazardous damaging effects of lead acetate.

Keywords: brain, heart, kidneys, lead acetate, liver, protective, summer savory

Procedia PDF Downloads 125
2390 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 117
2389 Antifeedant Activity of Plant Extracts on the Spongy Moth (Lymantria dispar) Larvae

Authors: Jovana M. Ćirković, Aleksandar M. Radojković, Sanja Z. Perać, Jelena N. Jovanović, Zorica M. Branković, Slobodan D. Milanović, Ivan Lj. Milenković, Jovan N. Dobrosavljević, Nemanja V. Simović, Vanja M. Tadić, Ana R. Žugić, Goran O. Branković

Abstract:

The protection of forests is a national interest and of strategic importance in every country. The spongy moth (Lymantria dispar) is a damaging invasive pest that can weaken and destroy trees by defoliating them. Chemical pesticides commonly used to protect forests against spongy moths not only have a negative impact on terrestrial and aquatic organisms/ecosystems but also often fail to provide significant protection. Therefore, many eco-friendly alternatives have been considered. Within this research, a new biopesticide was developed based on the method of nanoencapsulation of plant extracts in a biopolymer matrix, which provides a slow release of the active components during a substantial time period. The antifeedant activity of plant extracts of common (Fraxinus excelsior L.), manna (F. ornus L.) ash tree, and the tree of heaven Ailanthus altissima (Mill.) was tested on the spongy moth (Lymantria dispar L, 1758) larvae. To test the antifeedant activity of these compounds, the choice and non-choice tests in laboratory conditions for different plant extract concentrations (0.01, 0.1, 0.5, and 1 % v/v) were carried out. In both cases, the best results showed formulations based on the tree of heaven and common ash for the concentration of 1%, with deterioration indices of 163 and 132, respectively. The main benefit of these formulations is their versatility, effectiveness, prolonged effect, and because they are completely environmentally acceptable. Therefore, they can be considered for suppression of the spongy moth in forest ecosystems.

Keywords: Ailanthus altissima (Mill.), Fraxinus excelsior L., encapsulation, Lymantria dispar

Procedia PDF Downloads 78
2388 Evaluation of Agricultural Drought Impact in the Crop Productivity of East Gojjam Zone

Authors: Walelgn Dilnesa Cherie, Fasikaw Atanaw Zimale, Bekalu W. Asres

Abstract:

The most catastrophic condition for agricultural production is a drought event, which is also one of the most hydro-metrological-related hazards. According to the combined susceptibility of plants to meteorological and hydrological conditions, agricultural drought is defined as the magnitude, severity, and duration of a drought that affects crop production. The accurate and timely assessment of agricultural drought can lead to the development of risk management strategies, appropriate proactive mechanisms for the protection of farmers, and the improvement of food security. The evaluation of agricultural drought in the East Gojjam zone was the primary subject of this study. To identify the agricultural drought, soil moisture anomalies, soil moisture deficit indices, and Normalized Difference Vegetation Indices (NDVI) are used. The measured welting point, field capacity, and soil moisture were utilized to validate the soil water deficit indices computed from the satellite data. The soil moisture and soil water deficit indices in 2013 in all woredas were minimum; this makes vegetation stress also in all woredas. The soil moisture content decreased in 2013/2014/2019, and 2021 in Dejen, 2014, and 2019 in Awobel Woreda. The max/ min values of NDVI in 2013 are minimum; it dominantly shows vegetation stress and an observed agricultural drought that happened in all woredas. The validation process of satellite and in-situ soil moisture and soil water deficit indices shows a good agreement with a value of R²=0.87 and 0.56, respectively. The study area becomes drought detected region, so government officials, policymakers, and environmentalists pay attention to the protection of drought effects.

Keywords: NDVI, agricultural drought, SWDI, soil moisture

Procedia PDF Downloads 87
2387 Construction and Optimization of Green Infrastructure Network in Mountainous Counties Based on Morphological Spatial Pattern Analysis and Minimum Cumulative Resistance Models: A Case Study of Shapingba District, Chongqing

Authors: Yuning Guan

Abstract:

Under the background of rapid urbanization, mountainous counties need to break through mountain barriers for urban expansion due to undulating topography, resulting in ecological problems such as landscape fragmentation and reduced biodiversity. Green infrastructure networks are constructed to alleviate the contradiction between urban expansion and ecological protection, promoting the healthy and sustainable development of urban ecosystems. This study applies the MSPA model, the MCR model and Linkage Mapper Tools to identify eco-sources and eco-corridors in the Shapingba District of Chongqing and combined with landscape connectivity assessment and circuit theory to delineate the importance levels to extract ecological pinch point areas on the corridors. The results show that: (1) 20 ecological sources are identified, with a total area of 126.47 km², accounting for 31.88% of the study area, and showing a pattern of ‘one core, three corridors, multi-point distribution’. (2) 37 ecological corridors are formed in the area, with a total length of 62.52km, with a ‘more in the west, less in the east’ pattern. (3) 42 ecological pinch points are extracted, accounting for 25.85% of the length of the corridors, which are mainly distributed in the eastern new area. Accordingly, this study proposes optimization strategies for sub-area protection of ecological sources, grade-level construction of ecological corridors, and precise restoration of ecological pinch points.

Keywords: green infrastructure network, morphological spatial pattern, minimal cumulative resistance, mountainous counties, circuit theory, shapingba district

Procedia PDF Downloads 46
2386 Development of an Aerosol Protection Capsule for Patients with COVID-19

Authors: Isomar Lima da Silva, Aristeu Jonatas Leite de Oliveira, Roberto Maia Augusto

Abstract:

Biological isolation capsules are equipment commonly used in the control and prevention of infectious diseases in the hospital environment. This type of equipment, combined with pre-established medical protocols, contributes significantly to the containment of highly transmissible pathogens such as COVID-19. Due to its hermetic isolation, it allows more excellent patient safety, protecting companions and the health team. In this context, this work presents the development, testing, and validation of a medical capsule to treat patients affected by COVID-19. To this end, requirements such as low cost and easy handling were considered to meet the demand of people infected with the virus in remote locations in the Amazon region and/or where there are no ICU beds and mechanical ventilators for orotracheal intubation. Conceived and developed in a partnership between SAMEL Planos de Saúde and Instituto Conecthus, the device entitled "Vanessa Capsule" was designed to be used together with the NIV protocol (non-invasive ventilation), has an automatic exhaust system and filters performing the CO2 exchange, in addition to having BiPaps ventilatory support equipment (mechanical fans) in the Cabin Kit. The results show that the degree of effectiveness in protecting against infection by aerosols, with the protection cabin, is satisfactory, implying the consideration of the Vanessa capsule as an auxiliary method to be evaluated by the health team. It should also be noted that the medical observation of the evaluated patients found that the treatment against the COVID-19 virus started earlier with non-invasive mechanical ventilation reduces the patient's suffering and contributes positively to their recovery, in association with isolation through the Vanessa capsule.

Keywords: COVID-19, mechanical ventilators, medical capsule, non-invasive ventilation

Procedia PDF Downloads 85
2385 Investor Beware - Significance of Investor Conduct under the Fair and Equitable Treatment Standard

Authors: Damayanti Sen

Abstract:

The Fair and Equitable Treatment standard has emerged as a core tenet of a formulated legal structure aimed at encouraging investment through the granting of a secure and stable environment for the investor in the Host State. As an absolute, non-contingent standard, it constitutes an independent and reliable system for the protection of the investor and is frequently invoked and applied in investor-state dispute settlement under bilateral and multilateral investment treaties. Thus far, the standard has been examined principally as a measure for determining the responsibility of host countries towards investors and investments. The conduct of investor in applying the Fair and Equitable Treatment Standard is relatively unexplored. Such an assessment may be necessary in light of the development of new defenses to demands of host governments to confine the application of the standard in order to ensure a proper balance between the protection of investors and the inherent right of a State to regulate economic conduct within its borders. This paper explores the implications of including considerations of investor conduct in the determination of whether an act of the host country’s administrative and/or judicial authorities has breached the fair and equitable treatment principle. The need for such defenses are of special concern for governments of developing countries, whose limited resources can affect their ability to provide an effective evaluation of the nature of the proposed investment, and, subsequently, to ensure that the expected benefits are realized. On the basis of conceptual analysis, and emerging international judicial and arbitral case law, this paper suggests that investor duties such as, the avoidance of unconscionable conduct, the reasonable assessment of investment risk in the host country, and a duty to operate an investment reasonably are leading to a new limit upon the fair and equitable treatment standard- one that can be succinctly captured in the phrase “Caveat Investor”.

Keywords: BITs, FET Standard, investor behavior, arbitral case law

Procedia PDF Downloads 313
2384 Discovery the Relics of Buddhist Stupa at Thanesar, Kurukshetra

Authors: Chander Shekhar, Manoj Kumar

Abstract:

Present paper deal with the discovery of the stupa’s relics which belongs to the Kushana period. These remains were found during the scientific clearance work at a mound near Brahma-SarovarThanesar, Kurukshetra. This archaeological work was done by Department of Archaeology & Museums Haryana Government. The relics of stupa show that it would have been similar to Assandh and Damekhstupa. As per-Buddhist literature, GoutamBudhha reached Thanesar. In memory of Buddh’s Journey, King Ashoka built a big Stupa at Thanesar on the bank of Sarasvati River. Chinese pilgrim Yuan Chuang also referred a Monastery and stupa near Aujas-ghatof Brahma-sarovar. It may be part of that settlement which was mentioned by Yuan Chuang.

Keywords: archaeology, stupa, buddhism, excavtoin

Procedia PDF Downloads 194
2383 Resistive Switching Characteristics of Resistive Random Access Memory Devices after Furnace Annealing Processes

Authors: Chi-Yan Chu, Kai-Chi Chuang, Huang-Chung Cheng

Abstract:

In this study, the RRAM devices with the TiN/Ti/HfOx/TiN structure were fabricated, then the electrical characteristics of the devices without annealing and after 400 °C and 500 °C of the furnace annealing (FA) temperature processes were compared. The RRAM devices after the FA’s 400 °C showed the lower forming, set and reset voltages than the other devices without annealing. However, the RRAM devices after the FA’s 500 °C did not show any electrical characteristics because the TiN/Ti/HfOx/TiN device was oxidized, as shown in the XPS analysis. From these results, the RRAM devices after the FA’s 400 °C showed the best electrical characteristics.

Keywords: RRAM, furnace annealing (FA), forming, set and reset voltages, XPS

Procedia PDF Downloads 372
2382 Comparison of Clinical Profiles of Patients Seen in a Women and Children Protection Unit in a Local Government Hospital in Makati, Philippines Before and During the COVID-19 Pandemic Between January 2018 to February 2020 and March 2020 to December 2021

Authors: Margaret Denise P. Del Rosario, Geraldine Alcantara

Abstract:

Background: The declaration of the COVID-19 pandemic has impacted hospital visits of child abuse cases with less consults but more severe injuries. Objective: The study aims to identify the clinical profiles of patients seen in the hospital ng Makati Women and Children Protection Unit before and during the pandemic. Design: A cross-sectional analytic study design through review of records that underwent quantitative analysis. Results: 264 cases pre-pandemic and 208 cases during the pandemic were reviewed. Most reported cases were neglect comprising of 47% of the pre-pandemic cases and 68% of cases during the pandemic. Supervisory neglect was most commonly reported. An equal distribution between males and females were seen among victims and alleged perpetrators. The age group of both victims and alleged perpetrators during the pandemic was significantly younger compared to the pre-pandemic period. Children belonging to larger family groups were commonly encountered with most of them being the eldest amongst siblings. Alleged perpetrators were mostly secondary graduates for both time periods. A significant increase of cases during the pandemic occurred at home. More patients required hospitalization during the pandemic period with 37% compared to the 23% of admissions prior to the pandemic. Furthermore, a three-fold increase of injuries sustained during the pandemic required intensive care. Conclusion: The study reflects increased severity of injuries related to abuse during the pandemic compared to pre-pandemic times. A significant increase in injuries requiring intensive care were also seen despite less reported cases.

Keywords: child abuse, COVID-19, violence against children, WCPU, neglect

Procedia PDF Downloads 56
2381 Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings

Authors: Gaelle Candel, David Naccache

Abstract:

t-SNE is an embedding method that the data science community has widely used. It helps two main tasks: to display results by coloring items according to the item class or feature value; and for forensic, giving a first overview of the dataset distribution. Two interesting characteristics of t-SNE are the structure preservation property and the answer to the crowding problem, where all neighbors in high dimensional space cannot be represented correctly in low dimensional space. t-SNE preserves the local neighborhood, and similar items are nicely spaced by adjusting to the local density. These two characteristics produce a meaningful representation, where the cluster area is proportional to its size in number, and relationships between clusters are materialized by closeness on the embedding. This algorithm is non-parametric. The transformation from a high to low dimensional space is described but not learned. Two initializations of the algorithm would lead to two different embeddings. In a forensic approach, analysts would like to compare two or more datasets using their embedding. A naive approach would be to embed all datasets together. However, this process is costly as the complexity of t-SNE is quadratic and would be infeasible for too many datasets. Another approach would be to learn a parametric model over an embedding built with a subset of data. While this approach is highly scalable, points could be mapped at the same exact position, making them indistinguishable. This type of model would be unable to adapt to new outliers nor concept drift. This paper presents a methodology to reuse an embedding to create a new one, where cluster positions are preserved. The optimization process minimizes two costs, one relative to the embedding shape and the second relative to the support embedding’ match. The embedding with the support process can be repeated more than once, with the newly obtained embedding. The successive embedding can be used to study the impact of one variable over the dataset distribution or monitor changes over time. This method has the same complexity as t-SNE per embedding, and memory requirements are only doubled. For a dataset of n elements sorted and split into k subsets, the total embedding complexity would be reduced from O(n²) to O(n²=k), and the memory requirement from n² to 2(n=k)², which enables computation on recent laptops. The method showed promising results on a real-world dataset, allowing to observe the birth, evolution, and death of clusters. The proposed approach facilitates identifying significant trends and changes, which empowers the monitoring high dimensional datasets’ dynamics.

Keywords: concept drift, data visualization, dimension reduction, embedding, monitoring, reusability, t-SNE, unsupervised learning

Procedia PDF Downloads 144
2380 Optimal ECG Sampling Frequency for Multiscale Entropy-Based HRV

Authors: Manjit Singh

Abstract:

Multiscale entropy (MSE) is an extensively used index to provide a general understanding of multiple complexity of physiologic mechanism of heart rate variability (HRV) that operates on a wide range of time scales. Accurate selection of electrocardiogram (ECG) sampling frequency is an essential concern for clinically significant HRV quantification; high ECG sampling rate increase memory requirements and processing time, whereas low sampling rate degrade signal quality and results in clinically misinterpreted HRV. In this work, the impact of ECG sampling frequency on MSE based HRV have been quantified. MSE measures are found to be sensitive to ECG sampling frequency and effect of sampling frequency will be a function of time scale.

Keywords: ECG (electrocardiogram), heart rate variability (HRV), multiscale entropy, sampling frequency

Procedia PDF Downloads 271
2379 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 147
2378 Delay-Independent Closed-Loop Stabilization of Neutral System with Infinite Delays

Authors: Iyai Davies, Olivier L. C. Haas

Abstract:

In this paper, the problem of stability and stabilization for neutral delay-differential systems with infinite delay is investigated. Using Lyapunov method, new delay-independent sufficient condition for the stability of neutral systems with infinite delay is obtained in terms of linear matrix inequality (LMI). Memory-less state feedback controllers are then designed for the stabilization of the system using the feasible solution of the resulting LMI, which are easily solved using any optimization algorithms. Numerical examples are given to illustrate the results of the proposed methods.

Keywords: infinite delays, Lyapunov method, linear matrix inequality, neutral systems, stability

Procedia PDF Downloads 432
2377 Laboratory Simulation of Subway Dynamic Stray Current Interference with Cathodically Protected Structures

Authors: Mohammad Derakhshani, Saeed Reza Allahkaram, Michael Isakani-Zakaria, Masoud Samadian, Hojat Sharifi Rasaey

Abstract:

Dynamic stray currents tend to change their magnitude and polarity with time at their source which will create anodic and cathodic spots on a nearby interfered structure. To date, one of the biggest known dynamic stray current sources are DC traction systems. Laboratory simulation is a suitable method to apply theoretical principles in order to identify effective parameters in dynamic stray current influenced corrosion. Simulation techniques can be utilized for various mitigation methods applied in a small scales for selection of the most efficient method with regards to field applications. In this research, laboratory simulation of potential fluctuations caused by dynamic stray current on a cathodically protected structure was investigated. A lab model capable of generating DC static and dynamic stray currents and simulating its effects on cathodically protected samples were developed based on stray current induced (contact-less) polarization technique. Stray current pick-up and discharge spots on an influenced structure were simulated by inducing fluctuations in the sample’s stationary potential. Two mitigation methods for dynamic stray current interference on buried structures namely application of sacrificial anodes as preferred discharge point for the stray current and potentially controlled cathodic protection was investigated. Results showed that the application of sacrificial anodes can be effective in reducing interference only in discharge spot. But cathodic protection through potential controlling is more suitable for mitigating dynamic stray current effects.

Keywords: simulation, dynamic stray current, fluctuating potentials, sacrificial anode

Procedia PDF Downloads 301
2376 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 92
2375 Regulation Aspects for a Radioisotope Production Installation in Brazil

Authors: Rian O. Miranda, Lidia V. de Sa, Julio C. Suita

Abstract:

The Brazilian Nuclear Energy Commission (CNEN) is the main manufacturer of radiopharmaceuticals in Brazil. The Nuclear Engineering Institute (IEN), located at Rio de Janeiro, is one of its main centers of research and production, attending public and private hospitals in the state. This radiopharmaceutical production is used in diagnostic and therapy procedures and allows one and a half million nuclear medicine procedures annually. Despite this, the country is not self-sufficient to meet national demand, creating the need for importation and consequent dependence on other countries. However, IEN facilities were designed in the 60's, and today its structure is inadequate in relation to the good manufacturing practices established by sanitary regulator (ANVISA) and radiological protection leading to the need for a new project. In order to adapt and increase production in the country, a new plant will be built and integrated to the existing facilities with a new 30 MeV Cyclotron that is actually in project detailing process. Thus, it is proposed to survey current CNEN and ANVISA standards for radiopharmaceutical production facilities, as well as the radiological protection analysis of each area of the plant, following good manufacturing practices recommendations adopted nationally besides licensing exigencies for radioactive facilities. In this way, the main requirements for proper operation, equipment location, building materials, area classification, and maintenance program have been implemented. The access controls, interlocks, segregation zones and pass-through boxes integrated into the project were also analyzed. As a result, IEN will in future have the flexibility to produce all necessary radioisotopes for nuclear medicine application, more efficiently by simultaneously bombarding two targets, allowing the simultaneous production of two different radioisotopes, minimizing radiation exposure and saving operating costs.

Keywords: cyclotron, legislation, norms, production, radiopharmaceuticals

Procedia PDF Downloads 136
2374 A Reduced Distributed Sate Space for Modular Petri Nets

Authors: Sawsen Khlifa, Chiheb AMeur Abid, Belhassan Zouari

Abstract:

Modular verification approaches have been widely attempted to cope with the well known state explosion problem. This paper deals with the modular verification of modular Petri nets. We propose a reduced version for the modular state space of a given modular Petri net. The new structure allows the creation of smaller modular graphs. Each one draws the behavior of the corresponding module and outlines some global information. Hence, this version helps to overcome the explosion problem and to use less memory space. In this condensed structure, the verification of some generic properties concerning one module is limited to the exploration of its associated graph.

Keywords: distributed systems, modular verification, petri nets, state space explosition

Procedia PDF Downloads 117
2373 Radon-222 Concentration and Potential Risk to Workers of Al-Jalamid Phosphate Mines, North Province, Saudi Arabia

Authors: El-Said. I. Shabana, Mohammad S. Tayeb, Maher M. T. Qutub, Abdulraheem A. Kinsara

Abstract:

Usually, phosphate deposits contain 238U and 232Th in addition to their decay products. Due to their different pathways in the environment, the 238U/232Th activity concentration ratio usually found to be greater than unity in phosphate sediments. The presence of these radionuclides creates a potential need to control exposure of workers in the mining and processing activities of the phosphate minerals in accordance with IAEA safety standards. The greatest dose to workers comes from exposure to radon, especially 222Rn from the uranium series, and has to be controlled. In this regard, radon (222Rn) was measured in the atmosphere (indoor and outdoor) of Al-Jalamid phosphate-mines working area using a portable radon-measurement instrument RAD7, in a purpose of radiation protection. Radon was measured in 61 sites inside the open phosphate mines, the phosphate upgrading facility (offices and rooms of the workers, and in some open-air sites) and in the dwellings of the workers residence-village that lies at about 3 km from the mines working area. The obtained results indicated that the average indoor radon concentration was about 48.4 Bq/m3. Inside the upgrading facility, the average outdoor concentrations were 10.8 and 9.7 Bq/m3 in the concentrate piles and crushing areas, respectively. It was 12.3 Bq/m3 in the atmosphere of the open mines. These values are comparable with the global average values. Based on the average values, the annual effective dose due to radon inhalation was calculated and risk estimates have been done. The average annual effective dose to workers due to the radon inhalation was estimated by 1.32 mSv. The potential excess risk of lung cancer mortality that could be attributed to radon, when considering the lifetime exposure, was estimated by 53.0x10-4. The results have been discussed in detail.

Keywords: dosimetry, environmental monitoring, phosphate deposits, radiation protection, radon

Procedia PDF Downloads 275
2372 A Video Surveillance System Using an Ensemble of Simple Neural Network Classifiers

Authors: Rodrigo S. Moreira, Nelson F. F. Ebecken

Abstract:

This paper proposes a maritime vessel tracker composed of an ensemble of WiSARD weightless neural network classifiers. A failure detector analyzes vessel movement with a Kalman filter and corrects the tracking, if necessary, using FFT matching. The use of the WiSARD neural network to track objects is uncommon. The additional contributions of the present study include a performance comparison with four state-of-art trackers, an experimental study of the features that improve maritime vessel tracking, the first use of an ensemble of classifiers to track maritime vessels and a new quantization algorithm that compares the values of pixel pairs.

Keywords: ram memory, WiSARD weightless neural network, object tracking, quantization

Procedia PDF Downloads 312