Search results for: wireless transaction protocol
851 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 497850 Improving the Logistic System to Secure Effective Food Fish Supply Chain in Indonesia
Authors: Atikah Nurhayati, Asep A. Handaka
Abstract:
Indonesia is a world’s major fish producer which can feed not only its citizens but also the people of the world. Currently, the total annual production is 11 tons and expected to double by the year of 2050. Given the potential, fishery has been an important part of the national food security system in Indonesia. Despite such a potential, a big challenge is facing the Indonesians in making fish the reliable source for their food, more specifically source of protein intake. The long geographic distance between the fish production centers and the consumer concentrations has prevented effective supply chain from producers to consumers and therefore demands a good logistic system. This paper is based on our research, which aimed at analyzing the fish supply chain and is to suggest relevant improvement to the chain. The research was conducted in the Year of 2016 in selected locations of Java Island, where intensive transaction on fishery commodities occur. Data used in this research comprises secondary data of time series reports on production and distribution and primary data regarding distribution aspects which were collected through interviews with purposively selected 100 respondents representing fishers, traders and processors. The data were analyzed following the supply chain management framework and processed following logistic regression and validity tests. The main findings of the research are as follows. Firstly, it was found that improperly managed connectivity and logistic chain is the main cause for insecurity of availability and affordability for the consumers. Secondly, lack of quality of most local processed products is a major obstacle for improving affordability and connectivity. The paper concluded with a number of recommended strategies to tackle the problem. These include rationalization of the length of the existing supply chain, intensification of processing activities, and improvement of distribution infrastructure and facilities.Keywords: fishery, food security, logistic, supply chain
Procedia PDF Downloads 241849 Simulation of a Cost Model Response Requests for Replication in Data Grid Environment
Authors: Kaddi Mohammed, A. Benatiallah, D. Benatiallah
Abstract:
Data grid is a technology that has full emergence of new challenges, such as the heterogeneity and availability of various resources and geographically distributed, fast data access, minimizing latency and fault tolerance. Researchers interested in this technology address the problems of the various systems related to the industry such as task scheduling, load balancing and replication. The latter is an effective solution to achieve good performance in terms of data access and grid resources and better availability of data cost. In a system with duplication, a coherence protocol is used to impose some degree of synchronization between the various copies and impose some order on updates. In this project, we present an approach for placing replicas to minimize the cost of response of requests to read or write, and we implement our model in a simulation environment. The placement techniques are based on a cost model which depends on several factors, such as bandwidth, data size and storage nodes.Keywords: response time, query, consistency, bandwidth, storage capacity, CERN
Procedia PDF Downloads 271848 A New Reliability based Channel Allocation Model in Mobile Networks
Authors: Anujendra, Parag Kumar Guha Thakurta
Abstract:
The data transmission between mobile hosts and base stations (BSs) in Mobile networks are often vulnerable to failure. Thus, efficient link connectivity, in terms of the services of both base stations and communication channels of the network, is required in wireless mobile networks to achieve highly reliable data transmission. In addition, it is observed that the number of blocked hosts is increased due to insufficient number of channels during heavy load in the network. Under such scenario, the channels are allocated accordingly to offer a reliable communication at any given time. Therefore, a reliability-based channel allocation model with acceptable system performance is proposed as a MOO problem in this paper. Two conflicting parameters known as Resource Reuse factor (RRF) and the number of blocked calls are optimized under reliability constraint in this problem. The solution to such MOO problem is obtained through NSGA-II (Non-dominated Sorting Genetic Algorithm). The effectiveness of the proposed model in this work is shown with a set of experimental results.Keywords: base station, channel, GA, pareto-optimal, reliability
Procedia PDF Downloads 408847 Nano Fat Injection for Scar Treatment and Skin Rejuvenation
Authors: Sokol Isaraj, Lorela Bendo
Abstract:
Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars, and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at three months post-treatment, which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment in scar treatment and skin rejuvenation.Keywords: fat grafting, fat transfer, micro fat, nano fat
Procedia PDF Downloads 84846 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 440845 Impact of Hard Limited Clipping Crest Factor Reduction Technique on Bit Error Rate in OFDM Based Systems
Authors: Theodore Grosch, Felipe Koji Godinho Hoshino
Abstract:
In wireless communications, 3GPP LTE is one of the solutions to meet the greater transmission data rate demand. One issue inherent to this technology is the PAPR (Peak-to-Average Power Ratio) of OFDM (Orthogonal Frequency Division Multiplexing) modulation. This high PAPR affects the efficiency of power amplifiers. One approach to mitigate this effect is the Crest Factor Reduction (CFR) technique. In this work, we simulate the impact of Hard Limited Clipping Crest Factor Reduction technique on BER (Bit Error Rate) in OFDM based Systems. In general, the results showed that CFR has more effects on higher digital modulation schemes, as expected. More importantly, we show the worst-case degradation due to CFR on QPSK, 16QAM, and 64QAM signals in a linear system. For example, hard clipping of 9 dB results in a 2 dB increase in signal to noise energy at a 1% BER for 64-QAM modulation.Keywords: bit error rate, crest factor reduction, OFDM, physical layer simulation
Procedia PDF Downloads 366844 Nano Fat Injection for Scar Treatment and Skin Rejuvenation
Authors: Sokol Isaraj, Lorela Bendo
Abstract:
Scars resulting from surgery, injury, or burns have a physical and psychological impact on the affected patient. Although a number of treatments are available, nano fat grafting is an effective treatment for scars. Nano fat is a liquid suspension rich in stem cells obtained by mechanical emulsification. Nano fat grafting was performed in 10 cases to correct rhytides, surgical scars and post-burn scars between January 2022 and April 2022. Fat was aspirated from the lower abdomen or trochanteric region. After emulsification and filtration protocol, the resulting nano fat liquid was injected intradermally and subdermally. All patients filled out a questionnaire at 3 months post-treatment which consisted of questions regarding the grade of improvement of skin and recommendation of the procedure. The clinical results were apparent between 2 and 3 weeks after the treatment. All patients confirmed an improvement in skin texture and quality. The most significant improvement was seen in pigmentation and pliability. No complications were reported. Nano fat seems to be a safe and effective treatment for scar treatment and skin rejuvenation.Keywords: fat grafting, fat transfer, microfat, nanofat
Procedia PDF Downloads 83843 Biomimicked Nano-Structured Coating Elaboration by Soft Chemistry Route for Self-Cleaning and Antibacterial Uses
Authors: Elodie Niemiec, Philippe Champagne, Jean-Francois Blach, Philippe Moreau, Anthony Thuault, Arnaud Tricoteaux
Abstract:
Hygiene of equipment in contact with users is an important issue in the railroad industry. The numerous cleanings to eliminate bacteria and dirt cost a lot. Besides, mechanical solicitations on contact parts are observed daily. It should be interesting to elaborate on a self-cleaning and antibacterial coating with sufficient adhesion and good resistance against mechanical and chemical solicitations. Thus, a Hauts-de-France and Maubeuge Val-de-Sambre conurbation authority co-financed Ph.D. thesis has been set up since October 2017 based on anterior studies carried by the Laboratory of Ceramic Materials and Processing. To accomplish this task, a soft chemical route has been implemented to bring a lotus effect on metallic substrates. It involves nanometric liquid zinc oxide synthesis under 100°C. The originality here consists in a variation of surface texturing by modification of the synthesis time of the species in solution. This helps to adjust wettability. Nanostructured zinc oxide has been chosen because of the inherent photocatalytic effect, which can activate organic substance degradation. Two methods of heating have been compared: conventional and microwave assistance. Tested subtracts are made of stainless steel to conform to transport uses. Substrate preparation was the first step of this protocol: a meticulous cleaning of the samples is applied. The main goal of the elaboration protocol is to fix enough zinc-based seeds to make them grow during the next step as desired (nanorod shaped). To improve this adhesion, a silica gel has been formulated and optimized to ensure chemical bonding between substrate and zinc seeds. The last step consists of deposing a wide carbonated organosilane to improve the superhydrophobic property of the coating. The quasi-proportionality between the reaction time and the nanorod length will be demonstrated. Water Contact (superior to 150°) and Roll-off Angle at different steps of the process will be presented. The antibacterial effect has been proved with Escherichia Coli, Staphylococcus Aureus, and Bacillus Subtilis. The mortality rate is found to be four times superior to a non-treated substrate. Photocatalytic experiences were carried out from different dyed solutions in contact with treated samples under UV irradiation. Spectroscopic measurements allow to determinate times of degradation according to the zinc quantity available on the surface. The final coating obtained is, therefore, not a monolayer but rather a set of amorphous/crystalline/amorphous layers that have been characterized by spectroscopic ellipsometry. We will show that the thickness of the nanostructured oxide layer depends essentially on the synthesis time set in the hydrothermal growth step. A green, easy-to-process and control coating with self-cleaning and antibacterial properties has been synthesized with a satisfying surface structuration.Keywords: antibacterial, biomimetism, soft-chemistry, zinc oxide
Procedia PDF Downloads 142842 Phenotypical and Molecular Characterization of Burkholderia mallei from Horses with Glanders: Preliminary Data
Authors: A. F. C. Nassar, D. K. Tessler, L. Okuda, C. Del Fava, D. P. Chiebao, A. H. C. N. Romaldini, A. P. Alvim, M. J. Sanchez-Vazquez, M. S. Rosa, J. C. Pompei, R. Harakava, M. C. S. Araujo, G. H. F. Marques, E. M. Pituco
Abstract:
Glanders is a zoonotic disease of Equidae caused by the bacterium Burkholderia mallei presented in acute or chronic clinical forms with inflammatory nodules in the respiratory tract, lymphangitis and caseous lymph nodes. There is not a treatment with veterinary drugs to this life-threatening disease; thus, its occurrence must be notified to official animal health services and any infected animal must be eliminated. This study aims to detect B. mallei from horses euthanized in outbreaks of glanders in Brazil, providing a better understanding of the bacterial characteristics and determine a proper protocol for isolation. The work was carried out with the collaboration of the Ministry of Agriculture and the Sao Paulo State Animal Health Department, while its procedures were approved by the Committee of Ethics in Animal Experimentation from the Instituto Biologico (CETEA n°156/2017). To the present time, 16 horses from farms with outbreaks of glanders detected by complement fixation test (CFT) serology method were analyzed. During the necropsy, samples of possibly affected organs (lymph nodes, lungs, heart, liver, spleen, kidneys and trachea) were collected for bacterial isolation, molecular tests and pathology. Isolation was performed using two enriched mediums, a potato infusion agar with 5% sheep blood, 4% glycerol and antibiotics (penicilin100U/ mL), and another with the same ingredients except the antibiotic. A PCR protocol was modified for this study using primers design to identify a region of the Flip gen of B. mallei. Thru isolation, 12.5% (2/16) animals were confirmed positive using only the enriched medium with antibiotic and confirmed by PCR: from mediastinal and submandibular lymph nodes and lungs in one animal and from mediastinal lymph node in the other. The detection of the bacterium using PCR showed positivity of 100% (16/16) horses from 144 samples of organs. Pathology macroscopic lesions observed were catarrhal nasal discharge, fetlock ulcers, emaciation, lymphangitis in limbs, suppurative lymphangitis, lymph node enlargement, star shaped liver, and spleen scars, adherence of the renal capsule, pulmonary hemorrhage, and miliary nodules. Microscopic lesions were suppurative bronchopneumonia with microabscesses and Langhans giant cells in lungs; lymph nodes with abscesses and intense lymphoid reaction; hemosiderosis and abscesses in spleen. Positive samples on PCR will be sequenced later and analyzed comparing with previous records in the literature. A throughout description of the recent acute cases of glanders occurring in Brazil and characterization of the bacterium related will contribute to advances in the knowledge of the pathogenicity, clinical symptoms, and epidemiology of this zoonotic disease. Acknowledgment: This project is sponsored by FAPESP.Keywords: equines, bacterial isolation, zoonosis, PCR, pathology
Procedia PDF Downloads 138841 Modified Step Size Patch Array Antenna for UWB Wireless Applications
Authors: Hamid Aslani, Ahmed Radwan
Abstract:
In this paper, a single element microstrip antenna is presented for UWB applications by using techniques as partial ground plane and modified the shape of the patch. The antenna is properly designed to have a compact size and constant gain against frequency. The simulated results have done using two EM software and show good agreement with the measured results for the fabricated antenna. Then a designing of two elements patch antenna array for UWB in the frequency band of 3.1-10 GHz is presented in this paper. The array is constructed by means of feeding two omni-directional modified circular patch elements with a modified power divider. Experimental results show that the array has a stable radiation pattern and low return loss over a broad bandwidth of 64% (3.1–10 GHz). Due to its planar profile, physically compact size, wide impedance bandwidth, directive performance over a wide bandwidth proposed antenna is a good candidate for portable UWB applications and other UWB integrated circuits.Keywords: ultra wide band, radiation performance, microstrip antenna, size miniaturized antenna
Procedia PDF Downloads 258840 The Narrative Coherence of Autistic Children’s Accounts of an Experienced Event over Time
Authors: Fuming Yang, Telma Sousa Almeida, Xinyu Li, Yunxi Deng, Heying Zhang, Michael E. Lamb
Abstract:
Twenty-seven children aged 6-15 years with autism spectrum disorder (ASD) and 32 typically developing children were questioned about their participation in a set of activities after a two-week delay and again after a two-month delay, using a best-practice interview protocol. This paper assessed the narrative coherence of children’s reports based on key story grammar elements and temporal features included in their accounts of the event. Results indicated that, over time, both children with ASD and typically developing (TD) children decreased their narrative coherence. Children with ASD were no different from TD peers with regards to story length and syntactic complexity. However, they showed significantly less coherence than TD children. They were less likely to use the gist of the story to organize their narrative coherence. Interviewer prompts influenced children’s narrative coherence. The findings indicated that children with ASD could provide meaningful and reliable testimony about an event they personally experienced, but the narrative coherence of their reports deteriorates over time and is affected by interviewer prompts.Keywords: autism spectrum disorders, delay, eyewitness testimony, narrative coherence
Procedia PDF Downloads 289839 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors
Authors: Lok Yi Joyce Poon
Abstract:
China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay
Procedia PDF Downloads 393838 'Pacta Sunt Servanda': Which Form of Contract to Use in the Construction Industry
Authors: Ahmed Stifi, Sascha Gentes
Abstract:
The contract in its simplest definition is an agreement involving parties with a number of documents which may be as little as a marriage contract involving two parties or as big as a contract of construction and operation of a nuclear power plant involving companies and stakeholders with hundreds or even thousands of documents. All parties in the construction industry, not only the contract experts, agree that the success of a project is linked primarily to the form of contract regulating the relationship between stakeholders of the project. Therefore it is essential for the construction industry to study, analyze and improve its contracts forms continuously. However, it should be mentioned that different contract forms are developed to suit the construction evolution in term of its machinery, materials and construction process. There exist some similarities in some clauses and variations in many of these forms depending upon the type of project, the kind of clients and more importantly the laws and regulations governing the transaction in the country where the project is carried out. This paper will discuss the most important forms of construction contracts starting from national level, intended to the contract form in Germany and moving on to the international level introducing FIDIC contracts and its different forms, some newly developed contracts forms namely the integrated form of agreement, the new engineering contract and the project alliance agreement. The result of the study shows that many of the contract’s paragraphs are similar and the main difference comes in the approach of the relationship between the parties. Is it based on co-operation and mutual trust, or in some cases a load of responsibility for a particular party which increases the problems and disputes that affects the success of the project negatively. Thus we can say that the form of the contract, that plays an essential role in the approach of the project management, which is ultimately the key factor for the success of the project. So we advise to use a form of contract, which enhance the mutual trust between the project parties, contribute to support the cooperation between them, distribute responsibility and risks on an equitable basis and build on the principle “win-win". In additional to the conventional role of the contract it should integrate all parties into one team to achieve the target value of the project.Keywords: contract, FIDIC, integrated form of agreement, new engineering contract, project alliance agreemen
Procedia PDF Downloads 373837 Formation Control for Linear Multi-Robot System with Switched Directed Topology and Time-Varying Delays
Authors: Yaxiao Zhang, Yangzhou Chen
Abstract:
This study investigate the formation problem for high-order continuous-time multi-robot with bounded symmetric time-varying delay protocol under switched directed communication topology. By using a linear transformation, the formation problem is transformed to stability analysis of a switched delay system. Under the assumption that each communication topology has a directed spanning tree, sufficient conditions are presented in terms of linear matrix inequalities (LMIs) that the multi-robot system can achieve a desired formation by the trade-off among the pre-exist topologies with the help of the scheme of average dwell time. A numeral example is presented to illustrate the effectiveness of the obtained results.Keywords: multi-robot systems, formation, switched directed topology, symmetric time-varying delay, average dwell time, linear matrix inequalities (lmis)
Procedia PDF Downloads 534836 Satellite Connectivity for Sustainable Mobility
Authors: Roberta Mugellesi Dow
Abstract:
As the climate crisis becomes unignorable, it is imperative that new services are developed addressing not only the needs of customers but also taking into account its impact on the environment. The Telecommunication and Integrated Application (TIA) Directorate of ESA is supporting the green transition with particular attention to the sustainable mobility.“Accelerating the shift to sustainable and smart mobility” is at the core of the European Green Deal strategy, which seeks a 90% reduction in related emissions by 2050 . Transforming the way that people and goods move is essential to increasing mobility while decreasing environmental impact, and transport must be considered holistically to produce a shared vision of green intermodal mobility. The use of space technologies, integrated with terrestrial technologies, is an enabler of smarter traffic management and increased transport efficiency for automated and connected multimodal mobility. Satellite connectivity, including future 5G networks, and digital technologies such as Digital Twin, AI, Machine Learning, and cloud-based applications are key enablers of sustainable mobility.SatCom is essential to ensure that connectivity is ubiquitously available, even in remote and rural areas, or in case of a failure, by the convergence of terrestrial and SatCom connectivity networks, This is especially crucial when there are risks of network failures or cyber-attacks targeting terrestrial communication. SatCom ensures communication network robustness and resilience. The combination of terrestrial and satellite communication networks is making possible intelligent and ubiquitous V2X systems and PNT services with significantly enhanced reliability and security, hyper-fast wireless access, as well as much seamless communication coverage. SatNav is essential in providing accurate tracking and tracing capabilities for automated vehicles and in guiding them to target locations. SatNav can also enable location-based services like car sharing applications, parking assistance, and fare payment. In addition to GNSS receivers, wireless connections, radar, lidar, and other installed sensors can enable automated vehicles to monitor surroundings, to ‘talk to each other’ and with infrastructure in real-time, and to respond to changes instantaneously. SatEO can be used to provide the maps required by the traffic management, as well as evaluate the conditions on the ground, assess changes and provide key data for monitoring and forecasting air pollution and other important parameters. Earth Observation derived data are used to provide meteorological information such as wind speed and direction, humidity, and others that must be considered into models contributing to traffic management services. The paper will provide examples of services and applications that have been developed aiming to identify innovative solutions and new business models that are allowed by new digital technologies engaging space and non space ecosystem together to deliver value and providing innovative, greener solutions in the mobility sector. Examples include Connected Autonomous Vehicles, electric vehicles, green logistics, and others. For the technologies relevant are the hybrid satcom and 5G providing ubiquitous coverage, IoT integration with non space technologies, as well as navigation, PNT technology, and other space data.Keywords: sustainability, connectivity, mobility, satellites
Procedia PDF Downloads 133835 Physical Activity and Nutrition Intervention for Singaporean Women Aged 50 Years and Above: A Study Protocol for a Community Based Randomised Controlled Trial
Authors: Elaine Yee Sing Wong, Jonine Jancey, Andy H. Lee, Anthony P. James
Abstract:
Singapore has a rapidly aging population, where the majority of older women aged 50 years and above, are physically inactive and have unhealthy dietary habits, placing them at ‘high risk’ of non-communicable diseases. Given the multiplicity of less than optimal dietary habits and high levels of physical inactivity among Singaporean women, it is imperative to develop appropriate lifestyle interventions at recreational centres to enhance both their physical and nutritional knowledge, as well as provide them with the opportunity to develop skills to support behaviour change. To the best of our knowledge, this proposed study is the first physical activity and nutrition cluster randomised controlled trial conducted in Singapore for older women. Findings from this study may provide insights and recommendations for policy makers and key stakeholders to create new healthy living, recreational centres with supportive environments. This 6-month community-based cluster randomised controlled trial will involve the implementation and evaluation of physical activity and nutrition program for community dwelling Singaporean women, who currently attend recreational centres to promote social leisure activities in their local neighbourhood. The intervention will include dietary education and counselling sessions, physical activity classes, and telephone contact by certified fitness instructors and qualified nutritionists. Social Cognitive Theory with Motivational Interviewing will inform the development of strategies to support health behaviour change. Sixty recreational centres located in Singapore will be randomly selected from five major geographical districts and randomly allocated to the intervention (n=30) or control (n=30) cluster. A sample of 600 (intervention n=300; control n=300) women aged 50 years and above will then be recruited from these recreational centres. The control clusters will only undergo pre and post data collection and will not receive the intervention. It is hypothesised that by the end of the intervention, the intervention group participants (n = 300) compared to the control group (n = 300), will show significant improvements in the following variables: lipid profile, body mass index, physical activity and dietary behaviour, anthropometry, mental and physical health. Data collection will be examined and compared via the Statistical Package for the Social Science version 23. Descriptive and summary statistics will be used to quantify participants’ characteristics and outcome variables. Multi-variable mixed regression analyses will be used to confirm the effects of the proposed health intervention, taking into account the repeated measures and the clustering of the observations. The research protocol was approved by the Curtin University Human Research Ethics Committee (approval number: HRE2016-0366). The study has been registered with the Australian and New Zealand Clinical Trial Registry (12617001022358).Keywords: community based, healthy aging, intervention, nutrition, older women, physical activity
Procedia PDF Downloads 177834 Functional Analysis of Thyroid Peroxidase (TPO) Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis
Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das
Abstract:
Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection
Procedia PDF Downloads 345833 Functional Analysis of Thyroid Peroxidase Gene Mutations Detected in Patients with Thyroid Dyshormonogenesis
Authors: Biswabandhu Bankura, Srikanta Guria, Madhusudan Das
Abstract:
Purpose: Thyroid peroxidase (TPO) is the key enzyme in the biosynthesis of thyroid hormones. We aimed to identify the spectrum of mutations in the TPO gene leading to hypothyroidism in the population of West Bengal to establish the genetic etiology of the disease. Methods: 200 hypothyroid patients (case) and their corresponding sex and age matched 200 normal individuals (control) were screened depending on their clinical manifestations. Genomic DNA was isolated from peripheral blood samples and TPO gene (Exon 7 to Exon 14) was amplified by PCR. The PCR products were subjected to sequencing to identify mutations. Results: Single nucleotide changes such as Glu 641 Lys, Asp 668 Asn, Thr 725 Pro, Asp 620 Asn, Ser 398 Thr, and Ala 373 Ser were found. Changes in the TPO were assayed in vitro to compare mutant and wild-type activities. Five mutants were enzymatically inactive in the guaiacol and iodide assays. This is a strong indication that the mutations are present at crucial positions of the TPO gene, resulting in inactivated TPO. Key Findings: The results of this study may help to develop a genetic screening protocol for goiter and hypothyroidism in the population of West Bengal.Keywords: thyroid peroxidase, hypothyroidism, mutation, in vitro assay, transfection
Procedia PDF Downloads 335832 Problems and Challenges of Implementing Distance Learning against the Background of the COVID-19 Pandemic
Authors: Tinatin Sabauri, Eduard Gelagutashvili, Salome Pataridze
Abstract:
The COVID-19 pandemic presents a serious challenge to all sectors of the country. Particularly difficult and important was the rapid mobilization of educational institutions to ensure the continuous flow of the educational process and effective fulfillment of the transaction. Developed countries managed to overcome this challenge quickly because, before the pandemic, part of universities had implemented blended learning (a mixture of online and face-to-face learning). The article aims to evaluate the use of electronic platforms by non-Georgian-speaking students and their involvement in the e-learning process at Ilia State University. Based on the phenomenological research design, a comparative analysis has been conducted - what was the use of electronic systems by non-Georgian-speaking students before 2019, and what was it like during the COVID-19 pandemic? Concretely, the phenomenological design was used in the research to evaluate the efficiency of distance learning with non-Georgian speaking students at Ilia State University. Focus groups were created within the phenomenological design. In the focus groups, students answered a pre-designed semi-structured questionnaire. Based on the analysis of the questionnaires, it was revealed that online learning and access to electronic portals were not a particular difficulty for ethnic minorities. The following positive and negative aspects of e-learning were identified in the research. Students named as positive aspects: Enables joining online classes directly from home before the start of the lecture, It saves time and money on travel and accommodation (for some students). It was named as negative aspects: Learning a language online is more difficult than in face-to-face classrooms, lack of teamwork activity, lack of strong and stable internet connections, and audio problems. Based on the results of the research, it was shown that in the post-pandemic period, the involvement of non-Georgian speaking students has significantly increased; therefore, the use of electronic systems by non-Georgian speaking students.Keywords: electronic system, distance learning, COVID-19, students
Procedia PDF Downloads 81831 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 254830 Wideband Planar Antenna Based on Composite Right/Left-Handed Transmission-Line (CRLH-TL) for Operation across UHF/L/S-Bands
Authors: Mohammad Alibakhshikenari, Ernesto Limiti, Bal S. Virdee
Abstract:
The paper presents a miniature wideband antenna using composite right/left-handed transmission-line (CRLH-TL) metamaterial. The proposed planar antenna has a fractional bandwidth of 100% and is designed to operate in several frequency bands from 800MHz to 2.40GHz. The antenna is constructed using just two CRLH-TL unit cells comprising of two T-shaped slots that are inverted. The slots contribute towards generating the series left-handed (LH) capacitance CL. The rectangular patch on which the slots are created is grounded with spiral shaped high impedance stubs that contribute towards LH inductance LL. The antenna has a size of 14×6×1.6mm3 (0.037λ0×0.016λ0× 0.004λ0, where λ0 is free space wavelength at 800MHz). The peak gain and efficiency of the antenna are 1.5 dBi and ~75%, respectively, at 1.6GHz. Proposed antenna is suitable for use in wireless systems working at UHF/L/S-bands, in particular, AMPS, GSM, WCDMA, UMTS, PCS, cellular, DCS, IMT-2000, JCDMA, KPCS, GPS, lower band of WiMAX.Keywords: miniature antenna, composite right/left-handed transmission line (CRLH-TL), wideband antenna, communication transceiver, metamaterials
Procedia PDF Downloads 218829 Overview of the Various Factors Affecting the Properties of Microwave and Millimeterwave Dielectric Ceramics
Authors: Abdul Manan
Abstract:
Dielectric Resonators (DRs) have revolutionized the microwave wireless communication industry globally. There are three directions for research in ceramics for application in telecommunication industry Three key properties of ceramic dielectrics that determine their functionality at microwave and millimetrewave frequencies include relative permittivity (εr), unloaded quality factor Qu- the inverse of the dielectric loss (tanδ) and temperature coefficient of resonant frequency (τf). Each direction requires specific properties. These dielectric properties are affected by a number of factors. These includes tolerance factor, onset of structural phase transitions, dark core formation, processing conditions, raw materials and impurities, order/disorder behavior, compositional ordering, porosity, humidity, grain size, orientation of the crystallites, and grain boundaries. The data related to these factors is scattered. The main purpose of this review is to bring these together and present the effects of these factors on the microwave dielectric properties. Control of these factors is important for improvement in the microwave properties. This review would be very helpful to the novice researchers and technologists in the field.Keywords: order disorder, sintering, defect, porosity, grain boundaries
Procedia PDF Downloads 395828 A Step-by-Step Analytical Protocol For Detecting and Identifying Minor Differences In Like Materials and Polymers Using Pyrolysis -Gas Chromatography/Mass Spectrometry Technique
Authors: Athena Nguyen, Rojin Belganeh
Abstract:
Detecting and identifying differences in like polymer materials are key factors in failure and deformulation analysis, and reverse engineering. Pyrolysis-GC/MS is an easy solid sample introduction technique which expands the application areas of gas chromatography and mass spectrometry. The Micro furnace pyrolyzer is directly interfaced with the GC injector preventing any potential of cold spot, carryover, and cross contamination. In this presentation, the analysis of the differences in three polystyrene samples is demonstrated. Although the three samples look very similar by Evolve gas analysis (EGA) and Flash pyrolysis, there are indications of small levels of other materials. By performing Thermal desorption-GC/MS, the additive compounds between samples show the differences. EGA, flash pyrolysis, and thermal desorption analysis are the different modes of operations of the micro-furnace pyrolyzer enabling users to perform multiple analytical techniques.Keywords: Gas chromatography/Mass spectrometry, pyrolysis, pyrolyzer, thermal desorption-GC/MS
Procedia PDF Downloads 187827 Effect of Wind and Humidity on Microwave Links in North West Libya
Authors: M. S. Agha, A. M. Eshahiry, S. A. Aldabbar, Z. M. Alshahri
Abstract:
The propagation of microwave is affected by rain and dust particles causing signal attenuation and de-polarization. Computations of these effects require knowledge of the propagation characteristics of microwave and millimeter wave energy in the climate conditions of the studied region. This paper presents effect of wind and humidity on wireless communication such as microwave links in the North West region of Libya (Al-Khoms). The experimental procedure is done on three selected antennae towers (Nagaza station, Al-Khoms center station, Al-Khoms gateway station) for determining the attenuation loss per unit length and cross-polarization discrimination (XPD) change. Dust particles are collected along the region of the study, to measure the particle size distribution (PSD), calculate the concentration, and chemically analyze the contents, then the dielectric constant can be calculated. The results show that humidity and dust, antenna height and the visibility affect both attenuation and phase shift; in which, a few considerations must be taken into account in the communication power budget.Keywords: : Attenuation, scattering, transmission loss.
Procedia PDF Downloads 215826 Realization of Wearable Inertial Measurement Units-Sensor-Fusion Harness to Control Therapeutic Smartphone Applications
Authors: Svilen Dimitrov, Manthan Pancholi, Norbert Schmitz, Didier Stricker
Abstract:
This paper presents the end-to-end development of a wearable motion sensing harness consisting of computational unit and four inertial measurement units to control three smartphone therapeutic games for children. The inertial data is processed in real time to obtain lower body motion information like knee raises, feet taps and squads. By providing a Wi-Fi connection interface the sensor harness acts wireless remote control for smartphone applications. By performing various lower body movements the users provoke corresponding game state changes. In contrary to the current similar offers, like Nintendo Wii Remote, Xbox Kinect and Playstation Move, this product, consisting of the sensor harness and the applications on top of it, are fully wearable, which means they do not rely on the user to be bound to concrete soft- or hardwareequipped space.Keywords: wearable harness, inertial measurement units, smartphone therapeutic games, motion tracking, lower-body activity monitoring
Procedia PDF Downloads 403825 The Achievements and Challenges of Physics Teachers When Implementing Problem-Based Learning: An Exploratory Study Applied to Rural High Schools
Authors: Osman Ali, Jeanne Kriek
Abstract:
Introduction: The current instructional approach entrenched in memorizing does not assist conceptual understanding in science. Instructional approaches that encourage research, investigation, and experimentation, which depict how scientists work, should be encouraged. One such teaching strategy is problem-based learning (PBL). PBL has many advantages; enhanced self-directed learning and improved problem-solving and critical thinking skills. However, despite many advantages, PBL has challenges. Research confirmed is time-consuming and difficult to formulate ill-structured questions. Professional development interventions are needed for in-service educators to adopt the PBL strategy. The purposively selected educators had to implement PBL in their classrooms after the intervention to develop their practice and then reflect on the implementation. They had to indicate their achievements and challenges. This study differs from previous studies as the rural educators were subjected to implementing PBL in their classrooms and reflected on their experiences, beliefs, and attitudes regarding PBL. Theoretical Framework: The study reinforced Vygotskian sociocultural theory. According to Vygotsky, the development of a child's cognitive is sustained by the interaction between the child and more able peers in his immediate environment. The theory suggests that social interactions in small groups create an opportunity for learners to form concepts and skills on their own better than working individually. PBL emphasized learning in small groups. Research Methodology: An exploratory case study was employed. The reason is that the study was not necessarily for specific conclusive evidence. Non-probability purposive sampling was adopted to choose eight schools from 89 rural public schools. In each school, two educators were approached, teaching physical sciences in grades 10 and 11 (N = 16). The research instruments were questionnaires, interviews, and lesson observation protocol. Two open-ended questionnaires were developed before and after intervention and analyzed thematically. Three themes were identified. The semi-structured interviews and responses were coded and transcribed into three themes. Subsequently, the Reform Teaching Observation Protocol (RTOP) was adopted for lesson observation and was analyzed using five constructs. Results: Evidence from analyzing the questionnaires before and after the intervention shows that participants knew better what was required to develop an ill-structured problem during the implementation. Furthermore, indications from the interviews are that participants had positive views about the PBL strategy. They stated that they only act as facilitators, and learners’ problem-solving and critical thinking skills are enhanced. They suggested a change in curriculum to adopt the PBL strategy. However, most participants may not continue to apply the PBL strategy stating that it is time-consuming and difficult to complete the Annual Teaching Plan (ATP). They complained about materials and equipment and learners' readiness to work. Evidence from RTOP shows that after the intervention, participants learn to encourage exploration and use learners' questions and comments to determine the direction and focus of classroom discussions.Keywords: problem-solving, self-directed, critical thinking, intervention
Procedia PDF Downloads 119824 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 312823 Impedance Matching of Axial Mode Helical Antennas
Authors: Hossein Mardani, Neil Buchanan, Robert Cahill, Vincent Fusco
Abstract:
In this paper, we study the input impedance characteristics of axial mode helical antennas to find an effective way for matching it to 50 Ω. The study is done on the important matching parameters such as like wire diameter and helix to the ground plane gap. It is intended that these parameters control the matching without detrimentally affecting the radiation pattern. Using transmission line theory, a simple broadband technique is proposed, which is applicable for perfect matching of antennas with similar design parameters. We provide design curves to help to choose the proper dimensions of the matching section based on the antenna’s unmatched input impedance. Finally, using the proposed technique, a 4-turn axial mode helix is designed at 2.5 GHz center frequency and the measurement results of the manufactured antenna will be included. This parametric study gives a good insight into the input impedance characteristics of axial mode helical antennas and the proposed impedance matching approach provides a simple, useful method for matching these types of antennas.Keywords: antenna, helix, helical, axial mode, wireless power transfer, impedance matching
Procedia PDF Downloads 312822 Social Construction of Gender: Comparison of Gender Stereotypes among Bureaucrats and Non- Bureaucrats
Authors: Arshad Ali
Abstract:
This study aims to highlight the comparative patterns of social construction of gender among bureaucrats and non-bureaucrats. For the purpose of this study purposive sample of 8 respondents, including both male and female bureaucrats and non-bureaucrats, was collected from Gujranwala and Lahore. The measures for collecting data included an indigenous demographic information sheet and interview protocol related to gender roles, social construction of gender and managerial performance. The collected data was analyzed through the Nvivo version 11 and analysis reveals that there are diverse perceptions regarding male and female stereotyping among bureaucrats and non-bureaucrats, as different kinds of social environments lead to the modification of stereotypes. The research contributes to gender studies, specifically in the context of Pakistani society. There are very few studies available, and empirical data about Gender construction is scanty, so the study provides an impetus for future research. It is suggested that future research explore the phenomenon at a larger scale, including more respondents and another dimension, by keeping in view the socio-economic factors and policies of the government regarding the elimination of gender discrimination in Pakistan.Keywords: social construction, gender, bureaucrats, gender perception
Procedia PDF Downloads 75