Search results for: quantum secure direct communcation practicality
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4627

Search results for: quantum secure direct communcation practicality

3457 First Principle-Based Dft and Microkinetic Simulation of Co-Conversion of Carbon Dioxide and Methane on Single Iridium Atom Doped Hematite with Surface Oxygen Defect

Authors: Kefale W. Yizengaw, Delele Worku Ayele, Jyh-Chiang Jiang

Abstract:

The catalytic co-conversion of CO₂ and CH₄ to value-added compounds has become one of the promising approaches to addressing global climate change by having valuable fossil fuels. Thedirect co-conversion of CO₂ and CH₄ to value-added compounds is attractive but tremendously challenging because of both molecules' thermodynamic stability and kinetic inertness. In the present study, a single iridium atom doped and a single oxygen atom defect hematite (110)surface model catalyst, which can comprehend direct C–O coupling based on simultaneous activation of CO2 and CH4 was studied using density functional theory plus U (DFT + U)calculations. The presence of dual active sites on the Ir/Fe₂O₃(110)-OV surface catalyst enablesCO₂ activation on the Ir site and CH₄ activation at the defect site. The electron analysis for the theco-adsorption of CO₂ and CH₄ deals with the electron redistribution on the surface and clearly shows the synergistic effect for simultaneous CO₂ and CH₄ activation on Ir/α- Fe₂O₃(110)-OVsurface. The microkinetic analysis shows that the dissociation of CH4 to CH3 * and H* plays an excellent role in the C–O coupling. The coverage analysis for the intermediate products of the microkinetic simulation results indicates that C–O coupling is the reaction limiting step. Finally, after the CH₃O* intermediate product species is produced, the radical hydrogen species spontaneously diffuse to the CH3O* intermediate product to form methanol at around 490 [K]. The present work provides mechanistic and kinetic insights into the direct C–O coupling of CO₂and CH₄, which could help design more-efficient catalysts.

Keywords: co-conversion, C–O coupling, doping, oxygen vacancy, microkinetic

Procedia PDF Downloads 115
3456 Molecular Dynamics Study of Ferrocene in Low and Room Temperatures

Authors: Feng Wang, Vladislav Vasilyev

Abstract:

Ferrocene (Fe(C5H5)2, i.e., di-cyclopentadienyle iron (FeCp2) or Fc) is a unique example of ‘wrong but seminal’ in chemistry history. It has significant applications in a number of areas such as homogeneous catalysis, polymer chemistry, molecular sensing, and nonlinear optical materials. However, the ‘molecular carousel’ has been a ‘notoriously difficult example’ and subject to long debate for its conformation and properties. Ferrocene is a dynamic molecule. As a result, understanding of the dynamical properties of ferrocene is very important to understand the conformational properties of Fc. In the present study, molecular dynamic (MD) simulations are performed. In the simulation, we use 5 geometrical parameters to define the overall conformation of Fc and all the rest is a thermal noise. The five parameters are defined as: three parameters d---the distance between two Cp planes, α and δ to define the relative positions of the Cp planes, in which α is the angle of the Cp tilt and δ the angle the two Cp plane rotation like a carousel. Two parameters to position the Fe atom between two Cps, i.e., d1 for Fe-Cp1 and d2 for Fe-Cp2 distances. Our preliminary MD simulation discovered the five parameters behave differently. Distances of Fe to the Cp planes show that they are independent, practically identical without correlation. The relative position of two Cp rings, α, indicates that the two Cp planes are most likely not in a parallel position, rather, they tilt in a small angle α≠ 0°. The mean plane dihedral angle δ ≠ 0°. Moreover, δ is neither 0° nor 36°, indicating under those conditions, Fc is neither in a perfect eclipsed structure nor a perfect staggered structure. The simulations show that when the temperature is above 80K, the conformers are virtually in free rotations, A very interesting result from the MD simulation is the five C-Fe bond distances from the same Cp ring. They are surprisingly not identical but in three groups of 2, 2 and 1. We describe the pentagon formed by five carbon atoms as ‘turtle swimming’ for the motion of the Cp rings of Fc as shown in their dynamical animation video. The Fe- C(1) and Fe-C(2) which are identical as ‘the turtle back legs’, Fe-C(3) and Fe-C(4) which are also identical as turtle front paws’, and Fe-C(5) ---’the turtle head’. Such as ‘turtle swimming’ analog may be able to explain the single substituted derivatives of Fc. Again, the mean Fe-C distance obtained from MD simulation is larger than the quantum mechanically calculated Fe-C distances for eclipsed and staggered Fc, with larger deviation with respect to the eclipsed Fc than the staggered Fc. The same trend is obtained for the five Fe-C-H angles from same Cp ring of Fc. The simulated mean IR spectrum at 7K shows split spectral peaks at approximately 470 cm-1 and 488 cm-1, in excellent agreement with quantum mechanically calculated gas phase IR spectrum for eclipsed Fc. As the temperature increases over 80K, the clearly splitting IR spectrum become a very board single peak. Preliminary MD results will be presented.

Keywords: ferrocene conformation, molecular dynamics simulation, conformer orientation, eclipsed and staggered ferrocene

Procedia PDF Downloads 218
3455 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 480
3454 Exploring the Applications of Modular Forms in Cryptography

Authors: Berhane Tewelday Weldhiwot

Abstract:

This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.

Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory

Procedia PDF Downloads 16
3453 Assessment of Physical Activity and Sun Exposure of Saudi Patients with Type 2 Diabetes Mellitus in Ramadan and Non-Ramadan Periods

Authors: Abdullah S. Alghamdi, Khaled Alghamdi, Richard O. Jenkins, Parvez I. Haris

Abstract:

Background: Physical activity is an important factor in the treatment and prevention of type 2 diabetes mellitus (T2DM). Reduction in HbA1c level, an important diabetes biomarker, was reported in patients who increased their daily physical activity. Although the ambient temperature was reported to be positively correlated to a negative impact on health and increase the incidences of diabetes, the exposure to bright sunlight was recently found to be associated with enhanced insulin sensitivity and improved beta-cell function. How Ramadan alters physical activity, and especially sunlight exposure, has not been adequately investigated. Aim: This study aimed to assess the physical activity and sun exposure of Saudis with T2DM over different periods (before, during, and after Ramadan) and related this to HbA1c levels. Methods: This study recruited 82 Saudis with T2DM, who chose to fast during Ramadan, from the Endocrine and Diabetic Centre of Al Iman General Hospital, Riyadh, Saudi Arabia. Ethical approvals for this study were obtained from De Montfort University and Saudi Ministry of Health. Physical activity and sun exposure were assessed by a self-administered questionnaire. Physical activity was estimated using the International Physical Activity Questionnaire (IPAQ), while the sun exposure was assessed by asking the patients about their hours per week of direct exposure to the sun, and daily hours spent outdoors. Blood samples were collected in each period for measuring HbA1c. Results: Low physical activity was observed in more than 60% of the patients, with no significant changes between periods. There were no significant variances between periods in the daily hours spent outdoors and the total number of weekly hours of direct exposure to the sun. The majority of patients reported only few hours of exposure to the sun (1h or less per week) and time spent outdoors (1h or less per day). The mean HbA1c significantly changed between periods (P = 0.001), with lowest level during Ramadan. There were significant differences in the mean HbA1c between the groups for the level of physical activity (P < 0.001), with significant lower mean HbA1c in the higher-level group. There were no significant variances in the mean of HbA1c between the groups for the daily hours spent outdoors. The mean HbA1c of the patients, who reported never in their total weekly hours of exposure to the sun, was significantly lower than the mean HbA1c of those who reported 1 hour or less (P = 0.001). Conclusion: Physical inactivity was prevalent among the study population with very little exposure to the sun or time spent outdoors. Higher level of physical activity was associated with lower mean HbA1c levels. Encouraging T2DM patients to achieve the recommended levels of physical activity may help them to obtain greater benefits of Ramadan fasting, such as reducing their HbA1c levels. The impact of low direct exposure to the sun and the time spent outdoors needs to be further investigated in both healthy and diabetic patients.

Keywords: diabetes, fasting, physical activity, sunlight, Ramadan

Procedia PDF Downloads 160
3452 EU Integratıon Impact over the Real Convergence

Authors: Badoiu Mihaela Catalina

Abstract:

Main focus of COHESION policy was reducing social and economic disparities between member states and regions, sustainable development and equal opportunities. In this perspective, the present study intend to analyze the evolution of the European architecture and its direct impact over the real convergence in the member states.

Keywords: cooperation, European union, member states, cohesion policy

Procedia PDF Downloads 459
3451 National Projects' Impact on the Regional Division

Authors: Mosaad Hamouda, Kamal Khalaf, Zaker Mousa

Abstract:

National projects are considered Egypt's future vision in investing its various resources and the best way to bring about a developmental renaissance that constitutes a quantum leap because of its developmental impact on the planning regions, which it achieves in attracting and localizing investments to achieve urban development, and what this has a noticeable impact on dividing those regions in order to achieve a developmental balance or at least reduce the severity of the disparities between them, by measuring the impact of these projects, which appear in the per capita share of the various developmental variables, and also analyzing global and local experiences so that a balanced division of the country’s regions can be reached, and the research finds a set of planning foundations that are compatible with the settlement of these national projects in the future.

Keywords: national projects, regional development, division of regions, development disparities

Procedia PDF Downloads 126
3450 Factors Affecting Bus Use as a Sustainable Mode of Transportation: Insights from Kerman, Iran

Authors: Fatemeh Rahmani, Navid Nadimi, Vahid Khalifeh

Abstract:

In the near future, cities with medium populations will face traffic congestion, air pollution, high fuel consumption, and noise pollution. It is possible to improve the sustainability of cities by utilizing public transportation. A study of the factors that influence citizens' bus usage in medium-sized cities is presented in this paper. For this purpose, Kerman's citizens were surveyed online. The model was based on a binary logistic regression. A descriptive analysis revealed that simple measures like renewing the fleet, upgrading the stations, establishing a schedule program, and cleaning the buses could improve passenger satisfaction. In addition, the modeling results showed that future traffic congestion can be prevented by implementing road and parking lot pricing plans. Further, as the number and length of trips increases, the probability of citizens taking the bus increases. In conclusion, Kerman's bus system is both secure and fast, but these two characteristics can be improved to increase bus ridership.

Keywords: sustainability, transportation, bus, congestion, satisfaction

Procedia PDF Downloads 10
3449 Diverse Sensitivity to Ultraviolet Radiation of DNA and RNA Viruses

Authors: Nickolay Nosik, Dmitry Nosik, Marina Bochkova, Nina Kondrashina, Olga Lobach

Abstract:

The bactericidal effect of UV radiation is known for long time and widely used for inactivation of pathogens but for viruses it is not so uniform. Due to a wide variety of viruses their sensitivity to UV radiation is quite different and not quite predictable. The goal of the study was to determine the inactivation kinetics of UV radiation ( 254 nm) of the viruses of social importance (HIV), as well as test-viruses (poliovirus, adenovirus) used for the evaluation of the viral inactivation efficacy of germicides. Methods: DNA viruses- adenovirus, type 5; Herpes simplex virus (HSV), type 1, and RNA viruses–human immunodeficiency virus (HIV), type 1 and poliovirus, type 1 (Sabin strain) were obtained from State collection of viruses ( The D.I. Ivanovsky Institute of Virology). The source of UV radiation was a 15-watt low-pressure mercury vapor lamp (over 60% 254nm). The samples of 5cm2 were placed direct under the UV lamp flow (h-0.3m). Log reduction value was used as a marker for the rate of virus inactivation. Results: The data obtained indicate that poliovirus (one of the viruses most resistant to chemical germicides) and HSV are rather sensitive to UV radiation ( D90 =250-311 J/m2). Adenovirus is much more resistant to UV radiation (750 J/m2 ). The kinetics of adenovirus inactivation : 0 min- 5.0 lg TCID50, 10 min - 5,0, 15 min -4,0, 30 min – 3.5, 60 min – 1,0, 75 min -0,5 lg TCID50, 90 min –virus not detectable. HIV is most resistant to UV radiation among the studied viruses. It takes more than 4 hrs to inactivate the virus on the surface. D90 = 2000 J/m2 Conclusion: The results of the study show that there is no direct dependence between sensitivity to UV light and the size of the virion or presence\absence of the envelope of the virus. Poliovirus and adenovirus are small viruses (20-30nm poliovirus and 70-90nm adenovirus) and both are non-enveloped viruses but adenovirus 3-fold more resistant to UV radiation than poliovirus. It can be expected that viruses with more complicate structure, like Herpes virus (200nm) or HIV (80-100 nm), would be more sensitive to UV light. However, the very high resistance of HIV to UV radiation needs further investigation. The diverse resistance of the different viruses to UV radiation should be taken into the account when UV light is used to inactivate infectious viruses in hospitals and other public environments.

Keywords: HIV, HSV, inhibition of viruses, UV radiation

Procedia PDF Downloads 455
3448 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 382
3447 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 89
3446 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication

Authors: Aishwarya Shekhar, Himanshu Sharma

Abstract:

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.

Keywords: confidentiality, deduplication, data compression, hybridity of cloud

Procedia PDF Downloads 381
3445 Artificial Intelligence as a User of Copyrighted Work: Descriptive Study

Authors: Dominika Collett

Abstract:

AI applications, such as machine learning, require access to a vast amount of data in the training phase, which can often be the subject of copyright protection. During later usage, the various content with which the application works can be recorded or made available on the basis of which it produces the resulting output. The EU has recently adopted new legislation to secure machine access to protected works under the DSM Directive; but, the issue of machine use of copyright works is not clearly addressed. However, such clarity is needed regarding the increasing importance of AI and its development. Therefore, this paper provides a basic background of the technology used in the development of applications in the field of computer creativity. The second part of the paper then will focus on a legal analysis of machine use of the authors' works from the perspective of existing European and Czech legislation. The main results of the paper discuss the potential collision of existing legislation in regards to machine use of works with special focus on exceptions and limitations. The legal regulation of machine use of copyright work will impact the development of AI technology.

Keywords: copyright, artificial intelligence, legal use, infringement, Czech law, EU law, text and data mining

Procedia PDF Downloads 123
3444 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 440
3443 Advancements in AI Training and Education for a Future-Ready Healthcare System

Authors: Shamie Kumar

Abstract:

Background: Radiologists and radiographers (RR) need to educate themselves and their colleagues to ensure that AI is integrated safely, useful, and in a meaningful way with the direction it always benefits the patients. AI education and training are fundamental to the way RR work and interact with it, such that they feel confident using it as part of their clinical practice in a way they understand it. Methodology: This exploratory research will outline the current educational and training gaps for radiographers and radiologists in AI radiology diagnostics. It will review the status, skills, challenges of educating and teaching. Understanding the use of artificial intelligence within daily clinical practice, why it is fundamental, and justification on why learning about AI is essential for wider adoption. Results: The current knowledge among RR is very sparse, country dependent, and with radiologists being the majority of the end-users for AI, their targeted training and learning AI opportunities surpass the ones available to radiographers. There are many papers that suggest there is a lack of knowledge, understanding, and training of AI in radiology amongst RR, and because of this, they are unable to comprehend exactly how AI works, integrates, benefits of using it, and its limitations. There is an indication they wish to receive specific training; however, both professions need to actively engage in learning about it and develop the skills that enable them to effectively use it. There is expected variability amongst the profession on their degree of commitment to AI as most don’t understand its value; this only adds to the need to train and educate RR. Currently, there is little AI teaching in either undergraduate or postgraduate study programs, and it is not readily available. In addition to this, there are other training programs, courses, workshops, and seminars available; most of these are short and one session rather than a continuation of learning which cover a basic understanding of AI and peripheral topics such as ethics, legal, and potential of AI. There appears to be an obvious gap between the content of what the training program offers and what the RR needs and wants to learn. Due to this, there is a risk of ineffective learning outcomes and attendees feeling a lack of clarity and depth of understanding of the practicality of using AI in a clinical environment. Conclusion: Education, training, and courses need to have defined learning outcomes with relevant concepts, ensuring theory and practice are taught as a continuation of the learning process based on use cases specific to a clinical working environment. Undergraduate and postgraduate courses should be developed robustly, ensuring the delivery of it is with expertise within that field; in addition, training and other programs should be delivered as a way of continued professional development and aligned with accredited institutions for a degree of quality assurance.

Keywords: artificial intelligence, training, radiology, education, learning

Procedia PDF Downloads 85
3442 Attribute Selection for Preference Functions in Engineering Design

Authors: Ali E. Abbas

Abstract:

Industrial Engineering is a broad multidisciplinary field with intersections and applications in numerous areas. When designing a product, it is important to determine the appropriate attributes of value and the preference function for which the product is optimized. This paper provides some guidelines on appropriate selection of attributes for preference and value functions for engineering design.

Keywords: decision analysis, industrial engineering, direct vs. indirect values, engineering management

Procedia PDF Downloads 306
3441 Schrödinger Equation with Position-Dependent Mass: Staggered Mass Distributions

Authors: J. J. Peña, J. Morales, J. García-Ravelo, L. Arcos-Díaz

Abstract:

The Point canonical transformation method is applied for solving the Schrödinger equation with position-dependent mass. This class of problem has been solved for continuous mass distributions. In this work, a staggered mass distribution for the case of a free particle in an infinite square well potential has been proposed. The continuity conditions as well as normalization for the wave function are also considered. The proposal can be used for dealing with other kind of staggered mass distributions in the Schrödinger equation with different quantum potentials.

Keywords: free particle, point canonical transformation method, position-dependent mass, staggered mass distribution

Procedia PDF Downloads 403
3440 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 158
3439 Australian Teachers and School Leaders’ Use of Differentiated Learning Experiences as Responsive Teaching for Students with ADHD

Authors: Kathy Gibbs

Abstract:

There is a paucity of research in Australia about educators’ use of differentiated instruction (DI) to support the learning of students with ADHD. This study reports on small-scale, qualitative research using interviews with teachers and school leaders to identify how they use DI as an effective teaching instruction for students with ADHD. Findings showed that teachers and school leaders have a good understanding of ADHD; teachers use DI as an effective teaching practice to enhance learning for this student group and ensure the classroom environment is safe and secure. However, they do not adjust assessments for students with ADHD. School leaders are not clear on how teachers differentiate assessments or adapt to the classroom environment. These results highlight the need for further research at the teacher and teacher-educator level teachers to ensure teaching practices are effective in reducing unwanted behaviours that prevent students with ADHD from achieving their full academic potential.

Keywords: teachers, differentiated instruction, ADHD, student learning, educators knowledge

Procedia PDF Downloads 53
3438 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review

Authors: Zeeshan Hamid, Asher Ramish

Abstract:

The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.

Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care

Procedia PDF Downloads 313
3437 Physical, Microstructural and Functional Quality Improvements of Cassava-Sorghum Composite Snacks

Authors: Adil Basuki Ahza, Michael Liong, Subarna Suryatman

Abstract:

Healthy chips now dominating the snack market shelves. More than 80% processed snack foods in the market are chips. This research takes the advantages of twin extrusion technology to produce two types of product, i.e. directly expanded and intermediate ready-to-fry or microwavable chips. To improve the functional quality, the cereal-tuber based mix was enriched with antioxidant rich mix of temurui, celery, carrot and isolated soy protein (ISP) powder. Objectives of this research were to find best composite cassava-sorghum ratio, i.e. 60:40, 70:30 and 80:20, to optimize processing conditions of extrusion and study the microstructural, physical and sensorial characteristics of the final products. Optimization was firstly done by applying metering section of extruder barrel temperatures of 120, 130 and 140 °C with screw speeds of 150, 160 and 170 rpm to produce direct expanded product. The intermediate product was extruded in 100 °C and 100 rpm screw speed with feed moisture content of 35, 40 and 45%. The directly expanded products were analyzed for color, hardness, density, microstructure, and organoleptic properties. The results showed that interaction of ratio of cassava-sorghum and cooking methods affected the product's color, hardness, and bulk density (p<0.05). Extrusion processing conditions also significantly affected product's microstructure (p<0.05). The direct expanded snacks of 80:20 cassava-sorghum ratio and fried expanded one 70:30 and 80:20 ratio shown the best organoleptic score (slightly liked) while baking the intermediate product with microwave were resulted sensorial not acceptable quality chips.

Keywords: cassava-sorghum composite, extrusion, microstructure, physical characteristics

Procedia PDF Downloads 282
3436 Comparison of the Emotion Seeking and Attachment Styles of the Runaway and Normal Girls in Iran

Authors: Hassan Gharibi

Abstract:

This research aims to comparing the emotion seeking and attachment styles between runaway and normal girls. The statistical population consisted of 80 (13-25 year-old) girls were selected among runaway girls and normal girls(40 runaway girls +40 normal girls). Normal girls were matched with the runaway girls in demographic features and selected by simple random method. Measuring tools in this research include the 1993 Shaver and Hazan attachment style scale and the Arent emotion seeking scale. Data analyzed by independent t test. Findings showed that there is no significant difference between two groups of girls in ambivalent and avoidant attachment styles. Secure attachment style rate in normal girls is more than runaway girls. Findings showed significant difference of insecure attachment style (avoidant and ambivalent styles together) between the two groups bout in variable of emotion seeking there is no significant difference.

Keywords: attachment styles, emotion seeking, runaway, girls

Procedia PDF Downloads 156
3435 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value

Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.

Abstract:

Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.

Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework

Procedia PDF Downloads 50
3434 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 113
3433 Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control

Authors: Bogusław Schreyer

Abstract:

The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking.

Keywords: select-high, select-low, torque distribution, wheeled robots

Procedia PDF Downloads 119
3432 Kocuria Keratitis: A Rare and Diagnostically Challenging Infection of the Cornea

Authors: Sarah Jacqueline Saram, Diya Baker, Jaishree Gandhewar

Abstract:

Named after the Slovakian microbiologist, Miroslav Kocur, the Kocuria spp. are an emerging cause of significant human infections. Their predilection for immunocompromised states, such as malignancy and metabolic disorders, is highlighted in the literature. The coagulase-negative, gram-positive cocci are commensals found in the skin and oropharynx of humans, and their growing presence as responsible organisms in ocular infections cannot be ignored. The severe, rapid, and unrelenting disease course associated with Kocuria keratitis is underlined in the literature. However, the clinical features are variable, which may impede making a diagnosis. Here, we describe a first account of an initial misdiagnosis due to reliance on subjective analysis features on a confocal microscope, which ultimately led to a delay in commencing the correct treatment. In documenting this, we hope to underline to clinicians the difficulties in recognising a Kocuria Rhizophilia keratitis due to its similar clinical presentation to an Acanthamoeba Keratitis, thus emphasizing the need for early investigations such as corneal scrapes to secure the correct diagnosis and prevent further harm and vision loss for the patient.

Keywords: keratitis, cornea, infection, rare, Kocuria

Procedia PDF Downloads 54
3431 Influencing Factors and Mechanism of Patient Engagement in Healthcare: A Survey in China

Authors: Qing Wu, Xuchun Ye, Kirsten Corazzini

Abstract:

Objective: It is increasingly recognized that patients’ rational and meaningful engagement in healthcare could make important contributions to their health care and safety management. However, recent evidence indicated that patients' actual roles in healthcare didn’t match their desired roles, and many patients reported a less active role than desired, which suggested that patient engagement in healthcare may be influenced by various factors. This study aimed to analyze influencing factors on patient engagement and explore the influence mechanism, which will be expected to contribute to the strategy development of patient engagement in healthcare. Methods: On the basis of analyzing the literature and theory study, the research framework was developed. According to the research framework, a cross-sectional survey was employed using the behavior and willingness of patient engagement in healthcare questionnaire, Chinese version All Aspects of Health Literacy Scale, Facilitation of Patient Involvement Scale and Wake Forest Physician Trust Scale, and other influencing factor related scales. A convenience sample of 580 patients was recruited from 8 general hospitals in Shanghai, Jiangsu Province, and Zhejiang Province. Results: The results of the cross-sectional survey indicated that the mean score for the patient engagement behavior was (4.146 ± 0.496), and the mean score for the willingness was (4.387 ± 0.459). The level of patient engagement behavior was inferior to their willingness to be involved in healthcare (t = 14.928, P < 0.01). The influencing mechanism model of patient engagement in healthcare was constructed by the path analysis. The path analysis revealed that patient attitude toward engagement, patients’ perception of facilitation of patient engagement and health literacy played direct prediction on the patients’ willingness of engagement, and standard estimated values of path coefficient were 0.341, 0.199, 0.291, respectively. Patients’ trust in physician and the willingness of engagement played direct prediction on the patient engagement, and standard estimated values of path coefficient were 0.211, 0.641, respectively. Patient attitude toward engagement, patients’ perception of facilitation and health literacy played indirect prediction on patient engagement, and standard estimated values of path coefficient were 0.219, 0.128, 0.187, respectively. Conclusions: Patients engagement behavior did not match their willingness to be involved in healthcare. The influencing mechanism model of patient engagement in healthcare was constructed. Patient attitude toward engagement, patients’ perception of facilitation of engagement and health literacy posed indirect positive influence on patient engagement through the patients’ willingness of engagement. Patients’ trust in physician and the willingness of engagement had direct positive influence on the patient engagement. Patient attitude toward engagement, patients’ perception of physician facilitation of engagement and health literacy were the factors influencing the patients’ willingness of engagement. The results of this study provided valuable evidence on guiding the development of strategies for promoting patient rational and meaningful engagement in healthcare.

Keywords: healthcare, patient engagement, influencing factor, the mechanism

Procedia PDF Downloads 156
3430 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 298
3429 Environmental Pollution and Health Risks of Residents Living near Ewekoro Cement Factory, Ewekoro, Nigeria

Authors: Michael Ajide Oyinloye

Abstract:

The natural environment is made up of air, water and soil. The release of emission of industrial waste into anyone of the components of the environment causes pollution. Industrial pollution significantly threatens the inherent right of people, to the enjoyment of a safe and secure environment. The aim of this paper is to assess the effect of environmental pollution and health risks of residents living near Ewekoro Cement factory. The research made use of IKONOS imagery for Geographical Information System (GIS) to buffer and extract buildings that are less than 1 km to the plant, within 1 km to 5 km and above 5 km to the factory. Also, a questionnaire was used to elicit information on the socio-economic factors, the effect of environmental pollution on residents and measures adopted to control industrial pollution on the residents. Findings show that most buildings that between less than 1 km and 1 km to 5 km to the factory have high health risk in the study area. The study recommended total relocation for the residents of the study area to reduce risk health problems.

Keywords: environmental pollution, health risk, GIS, satellite imagery, ewekoro

Procedia PDF Downloads 542
3428 Simulation of Carbon Nanotubes/GaAs Hybrid PV Using AMPS-1D

Authors: Nima E. Gorji

Abstract:

The performance and characteristics of a hybrid heterojunction single-walled carbon nanotube and GaAs solar cell is modelled and numerically simulated using AMPS-1D device simulation tool. The device physics and performance parameters with different junction parameters are analysed. The results suggest that the open-circuit voltage changes very slightly by changing the work function, acceptor and donor density while the other electrical parameters reach to an optimum value. Increasing the concentration of a discrete defect density in the absorber layer decreases the electrical parameters. The current-voltage characteristics, quantum efficiency, band gap and thickness variation of the photovoltaic response will be quantitatively considered.

Keywords: carbon nanotube, GaAs, hybrid solar cell, AMPS-1D modelling

Procedia PDF Downloads 330