Search results for: medical device security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7836

Search results for: medical device security

6606 Integration of EEG and Motion Tracking Sensors for Objective Measure of Attention-Deficit Hyperactivity Disorder in Pre-Schoolers

Authors: Neha Bhattacharyya, Soumendra Singh, Amrita Banerjee, Ria Ghosh, Oindrila Sinha, Nairit Das, Rajkumar Gayen, Somya Subhra Pal, Sahely Ganguly, Tanmoy Dasgupta, Tanusree Dasgupta, Pulak Mondal, Aniruddha Adhikari, Sharmila Sarkar, Debasish Bhattacharyya, Asim Kumar Mallick, Om Prakash Singh, Samir Kumar Pal

Abstract:

Background: We aim to develop an integrated device comprised of single-probe EEG and CCD-based motion sensors for a more objective measure of Attention-deficit Hyperactivity Disorder (ADHD). While the integrated device (MAHD) relies on the EEG signal (spectral density of beta wave) for the assessment of attention during a given structured task (painting three segments of a circle using three different colors, namely red, green and blue), the CCD sensor depicts movement pattern of the subjects engaged in a continuous performance task (CPT). A statistical analysis of the attention and movement patterns was performed, and the accuracy of the completed tasks was analysed using indigenously developed software. The device with the embedded software, called MAHD, is intended to improve certainty with criterion E (i.e. whether symptoms are better explained by another condition). Methods: We have used the EEG signal from a single-channel dry sensor placed on the frontal lobe of the head of the subjects (3-5 years old pre-schoolers). During the painting of three segments of a circle using three distinct colors (red, green, and blue), absolute power for delta and beta EEG waves from the subjects are found to be correlated with relaxation and attention/cognitive load conditions. While the relaxation condition of the subject hints at hyperactivity, a more direct CCD-based motion sensor is used to track the physical movement of the subject engaged in a continuous performance task (CPT) i.e., separation of the various colored balls from one table to another. We have used our indigenously developed software for the statistical analysis to derive a scale for the objective assessment of ADHD. We have also compared our scale with clinical ADHD evaluation. Results: In a limited clinical trial with preliminary statistical analysis, we have found a significant correlation between the objective assessment of the ADHD subjects with that of the clinician’s conventional evaluation. Conclusion: MAHD, the integrated device, is supposed to be an auxiliary tool to improve the accuracy of ADHD diagnosis by supporting greater criterion E certainty.

Keywords: ADHD, CPT, EEG signal, motion sensor, psychometric test

Procedia PDF Downloads 99
6605 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion

Authors: Yuval Reinfeld

Abstract:

This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.

Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power

Procedia PDF Downloads 24
6604 AI Software Algorithms for Drivers Monitoring within Vehicles Traffic - SiaMOTO

Authors: Ioan Corneliu Salisteanu, Valentin Dogaru Ulieru, Mihaita Nicolae Ardeleanu, Alin Pohoata, Bogdan Salisteanu, Stefan Broscareanu

Abstract:

Creating a personalized statistic for an individual within the population using IT systems, based on the searches and intercepted spheres of interest they manifest, is just one 'atom' of the artificial intelligence analysis network. However, having the ability to generate statistics based on individual data intercepted from large demographic areas leads to reasoning like that issued by a human mind with global strategic ambitions. The DiaMOTO device is a technical sensory system that allows the interception of car events caused by a driver, positioning them in time and space. The device's connection to the vehicle allows the creation of a source of data whose analysis can create psychological, behavioural profiles of the drivers involved. The SiaMOTO system collects data from many vehicles equipped with DiaMOTO, driven by many different drivers with a unique fingerprint in their approach to driving. In this paper, we aimed to explain the software infrastructure of the SiaMOTO system, a system designed to monitor and improve driver driving behaviour, as well as the criteria and algorithms underlying the intelligent analysis process.

Keywords: artificial intelligence, data processing, driver behaviour, driver monitoring, SiaMOTO

Procedia PDF Downloads 91
6603 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 364
6602 Evaluation of Hybrid Viscoelastic Damper for Passive Energy Dissipation

Authors: S. S. Ghodsi, M. H. Mehrabi, Zainah Ibrahim, Meldi Suhatril

Abstract:

This research examines the performance of a hybrid passive control device for enhancing the seismic response of steel frame structures. The device design comprises a damper which employs a viscoelastic material to control both shear and axial strain. In the design, energy is dissipated through the shear strain of a two-layer system of viscoelastic pads which are located between steel plates. In addition, viscoelastic blocks have been included on either side of the main shear damper which obtains compressive strains in the viscoelastic blocks. These dampers not only dissipate energy but also increase the stiffness of the steel frame structure, and the degree to which they increase the stiffness may be controlled by the size and shape. In this research, the cyclical behavior of the damper was examined both experimentally and numerically with finite element modeling. Cyclic loading results of the finite element modeling reveal fundamental characteristics of this hybrid viscoelastic damper. The results indicate that incorporating a damper of the design can significantly improve the seismic performance of steel frame structures.

Keywords: cyclic loading, energy dissipation, hybrid damper, passive control system, viscoelastic damper

Procedia PDF Downloads 208
6601 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 476
6600 Management of Pressure Ulcer with a Locally Constructed Negative Pressure Device (NPD) in Traumatic Paraplegia Patients: A Randomized Controlled Clinical Trial

Authors: Mukesh K. Dwivedi, Rajeshwar N. Srivastava, Amit K. Bhagat, Saloni Raj

Abstract:

Introduction: Management of Pressure Ulcer (PU) is an ongoing clinical challenge particularly in traumatic paraplegia patients in developing countries where socio economic conditions often dictate treatment modalities. When negative pressure wound therapy (NPWT) was introduced, there were a series of devices (V.A.C., KCI, San Antonio, TX) manufactured. These devices for NPWT are costly and hard to afford by patients in developing countries like India. Considering this limitation, this study was planned to design an RCT to compare NPWT by an indigenized locally constructed NPD and conventional gauze dressing for the treatment of PU. Material and Methods: This RCT (CTRI/2014/09/0050) was conducted in the Department of Orthopaedic Surgery at King George’s Medical University (KGMU), India. Thirty-four (34) subjects of traumatic paraplegia having PU of stage 3 or 4, were enrolled and randomized in two treatment groups (NPWT Group & Conventional dressing group). The outcome measures of this study were surface area and depth of PU, exudates, microorganisms and matrix metalloproteinase-8 (MMP-8) during 0 to 9 weeks follow-ups. Levels of MMP-8 were analyzed in the tissues of PU at week 0, 3, 6 and week 9 by Enzyme Linked Immuno Sorbent Assay (ELISA). Results: Significantly reduced length of PU in NPWT group was observed at week 6 (p=0.04) which further reduced at week 9 (p=0.001) as compared to conventionally treated group. Similarly significant reduction of width and depth of PU was observed in NPWT at week 9 (p<0.05). The exudate became significantly (p=0.001) lower in NPWT group as compared with conventionally treated group from 6th to 9th week. Clearance and conversion of slough into red granulation tissue was significantly higher in NPWT group (p=0.001). At week 9, the wound culture was negative in all the subjects of NPWT group, while it was positive in 10 (41⋅6%) subjects of conventional group. Significantly lower level of MMP-8 was observed in subjects of NPWT group at week 6 (0.006**), and continually more reduction was observed at week 9 (<0.0001**) as compared to the conventional group. Conclusion: NPWT by locally constructed NPD is better wound care procedure for management of PU. Our device gave similar results as commercially available devices. Reduction of level of MMP-8 and increased rate of healing was achieved by negative pressure wound therapy (NPWT) as compared to conventional dressing.

Keywords: NPWT, NPD, MMP8, ELISA

Procedia PDF Downloads 253
6599 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 156
6598 Numerical and Experimental Comparison of Surface Pressures around a Scaled Ship Wind-Assisted Propulsion System

Authors: James Cairns, Marco Vezza, Richard Green, Donald MacVicar

Abstract:

Significant legislative changes are set to revolutionise the commercial shipping industry. Upcoming emissions restrictions will force operators to look at technologies that can improve the efficiency of their vessels -reducing fuel consumption and emissions. A device which may help in this challenge is the Ship Wind-Assisted Propulsion system (SWAP), an actively controlled aerofoil mounted vertically on the deck of a ship. The device functions in a similar manner to a sail on a yacht, whereby the aerodynamic forces generated by the sail reach an equilibrium with the hydrodynamic forces on the hull and a forward velocity results. Numerical and experimental testing of the SWAP device is presented in this study. Circulation control takes the form of a co-flow jet aerofoil, utilising both blowing from the leading edge and suction from the trailing edge. A jet at the leading edge uses the Coanda effect to energise the boundary layer in order to delay flow separation and create high lift with low drag. The SWAP concept has been originated by the research and development team at SMAR Azure Ltd. The device will be retrofitted to existing ships so that a component of the aerodynamic forces acts forward and partially reduces the reliance on existing propulsion systems. Wind tunnel tests have been carried out at the de Havilland wind tunnel at the University of Glasgow on a 1:20 scale model of this system. The tests aim to understand the airflow characteristics around the aerofoil and investigate the approximate lift and drag coefficients that an early iteration of the SWAP device may produce. The data exhibits clear trends of increasing lift as injection momentum increases, with critical flow attachment points being identified at specific combinations of jet momentum coefficient, Cµ, and angle of attack, AOA. Various combinations of flow conditions were tested, with the jet momentum coefficient ranging from 0 to 0.7 and the AOA ranging from 0° to 35°. The Reynolds number across the tested conditions ranged from 80,000 to 240,000. Comparisons between 2D computational fluid dynamics (CFD) simulations and the experimental data are presented for multiple Reynolds-Averaged Navier-Stokes (RANS) turbulence models in the form of normalised surface pressure comparisons. These show good agreement for most of the tested cases. However, certain simulation conditions exhibited a well-documented shortcoming of RANS-based turbulence models for circulation control flows and over-predicted surface pressures and lift coefficient for fully attached flow cases. Work must be continued in finding an all-encompassing modelling approach which predicts surface pressures well for all combinations of jet injection momentum and AOA.

Keywords: CFD, circulation control, Coanda, turbo wing sail, wind tunnel

Procedia PDF Downloads 135
6597 Mechanical Prosthesis Controlled by Brain-Computer Interface

Authors: Tianyu Cao, KIRA (Ruizhi Zhao)

Abstract:

The purpose of our research is to study the possibility of people with physical disabilities manipulating mechanical prostheses through brain-computer interface (BCI) technology. The brain-machine interface (BCI) of the neural prosthesis records signals from neurons and uses mathematical modeling to decode them, converting desired movements into body movements. In order to improve the patient's neural control, the prosthesis is given a natural feeling. It records data from sensitive areas from the body to the prosthetic limb and encodes signals in the form of electrical stimulation to the brain. In our research, the brain-computer interface (BCI) is a bridge connecting patients’ cognition and the real world, allowing information to interact with each other. The efficient work between the two is achieved through external devices. The flow of information is controlled by BCI’s ability to record neuronal signals and decode signals, which are converted into device control. In this way, we could encode information and then send it to the brain through electrical stimulation, which has significant medical application.

Keywords: biomedical engineering, brain-computer interface, prosthesis, neural control

Procedia PDF Downloads 181
6596 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 86
6595 The Physiological Effect of Cold Atmospheric Pressure Plasma on Cancer Cells, Cancer Stem Cells, and Adult Stem Cells

Authors: Jeongyeon Park, Yeo Jun Yoon, Jiyoung Seo, In Seok Moon, Hae Jun Lee, Kiwon Song

Abstract:

Cold Atmospheric Pressure Plasma (CAPP) is defined as a partially ionized gas with electrically charged particles at room temperature and atmospheric pressure. CAPP generates reactive oxygen species (ROS) and reactive nitrogen species (RNS), and has potential as a new apoptosis-promoting cancer therapy. With an annular type dielectric barrier discharge (DBD) CAPP-generating device combined with a helium (He) gas feeding system, we showed that CAPP selectively induced apoptosis in various cancer cells while it promoted proliferation of the adipose tissue-derived stem cell (ASC). The apoptotic effect of CAPP was highly selective toward p53-mutated cancer cells. The intracellular ROS was mainly responsible for apoptotic cell death in CAPP-treated cancer cells. CAPP induced apoptosis even in doxorubicin-resistant cancer cell lines, demonstrating the feasibility of CAPP as a potent cancer therapy. With the same device and exposure conditions to cancer cells, CAPP stimulated proliferation of the ASC, a kind of mesenchymal stem cell that is capable of self-renewing and differentiating into adipocytes, chondrocytes, osteoblasts and neurons. CAPP-treated ASCs expressed the stem cell markers and differentiated into adipocytes as untreated ASCs. The increase of proliferation by CAPP in ASCs was offset by a NO scavenger but was not affected by ROS scavengers, suggesting that NO generated by CAPP is responsible for the activated proliferation in ASCs. Usually, cancer stem cells are reported to be resistant to known cancer therapies. When we applied CAPP of the same device and exposure conditions to cancer cells to liver cancer stem cells (CSCs) that express CD133 and epithelial cell adhesion molecule (EpCAM) cancer stem cell markers, apoptotic cell death was not examined. Apoptotic cell death of liver CSCs was induced by the CAPP generated from a device with an air-based flatten type DBD. An exposure of liver CSCs to CAPP decreased the viability of liver CSCs to a great extent, suggesting plasma be used as a promising anti-cancer treatment. To validate whether CAPP can be a promising anti-cancer treatment or an adjuvant modality to eliminate remnant tumor in cancer surgery of vestibular schwannoma, we applied CAPP to mouse schwannoma cell line SC4 Nf2 ‑/‑ and human schwannoma cell line HEI-193. A CAPP treatment leads to anti-proliferative effect in both cell lines. We are currently studying the molecular mechanisms of differential physiological effect of CAPP; the proliferation of ASCs and apoptosis of various cancer cells and CSCs.

Keywords: cold atmospheric pressure plasma, apoptosis, proliferation, cancer cells, adult stem cells

Procedia PDF Downloads 282
6594 Development of Multi-Leaf Collimator-Based Isocenter Verification Tool Using Electrical Portal Imaging Device for Stereotactic Radiosurgery

Authors: Panatda Intanin, Sangutid Thongsawad, Chirapha Tannanonta, Todsaporn Fuangrod

Abstract:

Stereotactic radiosurgery (SRS) is a highly precision delivery technique that requires comprehensive quality assurance (QA) tests prior to treatment delivery. An isocenter of delivery beam plays a critical role that affect the treatment accuracy. The uncertainty of isocenter is traditionally accessed using circular cone equipment, Winston-Lutz (WL) phantom and film. This technique is considered time consuming and highly dependent on the observer. In this work, the development of multileaf collimator (MLC)-based isocenter verification tool using electronic portal imaging device (EPID) was proposed and evaluated. A mechanical isocenter alignment with ball bearing diameter 5 mm and circular cone diameter 10 mm fixed to gantry head defines the radiation field was set as the conventional WL test method. The conventional setup was to compare to the proposed setup; using MLC (10 x 10 mm) to define the radiation filed instead of cone. This represents more realistic delivery field than using circular cone equipment. The acquisition from electronic portal imaging device (EPID) and radiographic film were performed in both experiments. The gantry angles were set as following: 0°, 90°, 180° and 270°. A software tool was in-house developed using MATLAB/SIMULINK programming to determine the centroid of radiation field and shadow of WL phantom automatically. This presents higher accuracy than manual measurement. The deviation between centroid of both cone-based and MLC-based WL tests were quantified. To compare between film and EPID image, the deviation for all gantry angle was 0.26±0.19mm and 0.43±0.30 for cone-based and MLC-based WL tests. For the absolute deviation calculation on EPID images between cone and MLC-based WL test was 0.59±0.28 mm and the absolute deviation on film images was 0.14±0.13 mm. Therefore, the MLC-based isocenter verification using EPID present high sensitivity tool for SRS QA.

Keywords: isocenter verification, quality assurance, EPID, SRS

Procedia PDF Downloads 152
6593 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 619
6592 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant

Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park

Abstract:

CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).

Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method

Procedia PDF Downloads 217
6591 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
6590 Synthesis, Characterization and Applications of Some Selected Dye-Functionalized P and N-Type Nanoparticles in Dye Sensitized Solar Cells

Authors: Arifa Batool, Ghulam Hussain Bhatti, Syed Mujtaba Shah

Abstract:

Inorganic n-type (TiO2, CdO) and p-type (NiO, CuO) metal oxide nanoparticles were synthesized by a facile wet chemical method at room temperature. The morphological, compositional, structural and optical properties were investigated by scanning electron microscopy, energy dispersive X-ray spectroscopy, FT-IR, XRD analysis, UV/Visible and fluorescence spectroscopy. All semiconducting nanoparticles were photosensitized with Ru (II) based Z907 dye in ethanol solvent by grafting. Grafting of dye on the surface of nanoparticles was confirmed by UV/Visible and FT-IR spectroscopy. The synthesized photo-active nanohybrid was thoroughly blended with P3HT, a solid electrolyte and I-V measurements under solar stimulated radiations 1000 W/m2 (AM 1.5) were recorded. Maximum incident photon to current conversion efficiency (IPCE) of 0.9% was achieved with dye functionalized Z907-TiO2 hybrid, IPCE of 0.72% was achieved with bulk-heterojunction of TiO2-Z907-CuO and IPCE of 0.68% was attained with nanocomposite of TiO2-CdO. TiO2 based Solar cells have maximum Jscvalue i.e.4.63 mA/cm2. Dye-functionalized TiO2-based photovoltaic devices were found more efficient than the reference device but the morphology of the device was a major check in progress.

Keywords: solar cell, bulk heterojunction, nanocomposites, photosensitization, dye sensitized solar cell

Procedia PDF Downloads 284
6589 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 112
6588 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 500
6587 Development of Requirements Analysis Tool for Medical Autonomy in Long-Duration Space Exploration Missions

Authors: Lara Dutil-Fafard, Caroline Rhéaume, Patrick Archambault, Daniel Lafond, Neal W. Pollock

Abstract:

Improving resources for medical autonomy of astronauts in prolonged space missions, such as a Mars mission, requires not only technology development, but also decision-making support systems. The Advanced Crew Medical System - Medical Condition Requirements study, funded by the Canadian Space Agency, aimed to create knowledge content and a scenario-based query capability to support medical autonomy of astronauts. The key objective of this study was to create a prototype tool for identifying medical infrastructure requirements in terms of medical knowledge, skills and materials. A multicriteria decision-making method was used to prioritize the highest risk medical events anticipated in a long-term space mission. Starting with those medical conditions, event sequence diagrams (ESDs) were created in the form of decision trees where the entry point is the diagnosis and the end points are the predicted outcomes (full recovery, partial recovery, or death/severe incapacitation). The ESD formalism was adapted to characterize and compare possible outcomes of medical conditions as a function of available medical knowledge, skills, and supplies in a given mission scenario. An extensive literature review was performed and summarized in a medical condition database. A PostgreSQL relational database was created to allow query-based evaluation of health outcome metrics with different medical infrastructure scenarios. Critical decision points, skill and medical supply requirements, and probable health outcomes were compared across chosen scenarios. The three medical conditions with the highest risk rank were acute coronary syndrome, sepsis, and stroke. Our efforts demonstrate the utility of this approach and provide insight into the effort required to develop appropriate content for the range of medical conditions that may arise.

Keywords: decision support system, event-sequence diagram, exploration mission, medical autonomy, scenario-based queries, space medicine

Procedia PDF Downloads 127
6586 Micropillar-Assisted Electric Field Enhancement for High-Efficiency Inactivation of Bacteria

Authors: Sanam Pudasaini, A. T. K. Perera, Ahmed Syed Shaheer Uddin, Sum Huan Ng, Chun Yang

Abstract:

Development of high-efficiency and environment friendly bacterial inactivation methods is of great importance for preventing waterborne diseases which are one of the leading causes of death in the world. Traditional bacterial inactivation methods (e.g., ultraviolet radiation and chlorination) have several limitations such as longer treatment time, formation of toxic byproducts, bacterial regrowth, etc. Recently, an electroporation-based inactivation method was introduced as a substitute. Here, an electroporation-based continuous flow microfluidic device equipped with an array of micropillars is developed, and the device achieved high bacterial inactivation performance ( > 99.9%) within a short exposure time ( < 1 s). More than 99.9% reduction of Escherichia coli bacteria was obtained for the flow rate of 1 mL/hr, and no regrowth of bacteria was observed. Images from scanning electron microscope confirmed the formation of electroporation-induced nano-pore within the cell membrane. Through numerical simulation, it has been shown that sufficiently large electric field strength (3 kV/cm), required for bacterial electroporation, were generated using PDMS micropillars for an applied voltage of 300 V. Further, in this method of inactivation, there is no involvement of chemicals and the formation of harmful by-products is also minimum.

Keywords: electroporation, high-efficiency, inactivation, microfluidics, micropillar

Procedia PDF Downloads 180
6585 Use of Mobile Phone Applications in Teaching Precalculus

Authors: Jay-R. Hosana Leonidas, Jayson A. Lucilo

Abstract:

The K-12 Curriculum in the Philippines shed light to mathematics education as it recognizes the use of smartphones/mobile phones as appropriate tools necessary in teaching mathematics. However, there were limited pieces of evidence on the use of these devices in teaching and learning process. This descriptive study developed lessons integrating the use of mobile phone applications with basis on low-level competencies of students in Precalculus and determined its effects on students’ conceptual understanding, procedural skills, and attitudes towards Precalculus. Employing Bring Your Own Device (BYOD) scheme in the study, lessons developed were conducted among Grade 11 Science, Technology, Engineering, and Mathematics (STEM) students at Central Bicol State University of Agriculture for the academic year 2018-2019. This study found that there is a significant difference between the competency levels of students along conceptual understanding and procedural skills prior to and after the conduct of lessons developed. Also, it disclosed that the use of mobile phone applications had positive effects on students’ attitudes towards Precalculus. Thus, the use of mobile phone applications in teaching Precalculus can enrich students’ understanding of concepts and procedural skills (solving and graphing skills) and can increase students’ motivation, self-confidence, and enjoyment in dealing with Precalculus.

Keywords: bring your own device, mathematics education, mobile phone applications, senior high school

Procedia PDF Downloads 163
6584 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 238
6583 The Sociolinguistics of Visual Culture: An Analogous Appraisal of the Language of Trado-Medical and Church Adverts in Nigeria

Authors: Grace Temiloluwa Agbede, Rodwell Makombe, Gift Mheta

Abstract:

The study adopts a sociolinguistic framework to analyse trado-medical and church advertisements in Nigeria. The study employs a qualitative case-study approach to examine the language of trado-medical and church adverts in Nigeria. Obviously, language serves as an instrument of thought. Thus, it is safe to say that language is at the centre of every human activity and experience because it differentiates human beings from all other animals. The study analyses the appropriateness of language and visual elements in trado-medical and church advertisements in relation to their meaning. It focuses on billboard advertisements as well as selected Newspapers in Nigeria. It then became clearer that society influences language and vice versa. Thus, the justification for this study is predicated on the fact that more work still needs to be done to unpack the intertwined relationship among sociolinguistics, visual culture and advertisement. Given that this research focuses on visual advertisements by traditional medical practitioners and churches in Nigeria, it is therefore necessary to investigate the interplay between language and visuality in advertisements by traditional medical practitioners and churches.

Keywords: commercials, culture, language, visuality

Procedia PDF Downloads 186
6582 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 290
6581 Study of Exciton Binding Energy in Photovoltaic Polymers and Non-Fullerene Acceptors

Authors: Ho-Wa Li, Sai-Wing Tsang

Abstract:

The excitonic effect in organic semiconductors plays a key role in determining the electronic devices performance. Strong exciton binding energy has been regarded as the detrimental factor limiting the further improvement in organic photovoltaic cells. To the best of our knowledge, only limited reported can be found in measuring the exciton binding energy in organic photovoltaic materials. Conventional sophisticated approach using photoemission spectroscopy (UPS and IPES) would limit the wide access of the investigation. Here, we demonstrate a facile approach to study the electrical and optical quantum efficiencies of a series of conjugated photovoltaic polymer, fullerene and non-fullerene materials. Quantitative values of the exciton binding energy in those prototypical materials were obtained with concise photovoltaic device structure. And the extracted binding energies have excellent agreement with those determined by the conventional photoemission technique. More importantly, our findings can provide valuable information on the excitonic dissociation in the first excited state. Particularly, we find that the high binding energy of some non-fullerene acceptors limits the combination of polymer acceptors for efficiency exciton dissociation. The results bring insight into the engineering of excitonic effect for the development of efficient organic photovoltaic cells.

Keywords: organic photovoltaics, quantum efficiency, exciton binding energy, device physics

Procedia PDF Downloads 151
6580 Medical Knowledge Management since the Integration of Heterogeneous Data until the Knowledge Exploitation in a Decision-Making System

Authors: Nadjat Zerf Boudjettou, Fahima Nader, Rachid Chalal

Abstract:

Knowledge management is to acquire and represent knowledge relevant to a domain, a task or a specific organization in order to facilitate access, reuse and evolution. This usually means building, maintaining and evolving an explicit representation of knowledge. The next step is to provide access to that knowledge, that is to say, the spread in order to enable effective use. Knowledge management in the medical field aims to improve the performance of the medical organization by allowing individuals in the care facility (doctors, nurses, paramedics, etc.) to capture, share and apply collective knowledge in order to make optimal decisions in real time. In this paper, we propose a knowledge management approach based on integration technique of heterogeneous data in the medical field by creating a data warehouse, a technique of extracting knowledge from medical data by choosing a technique of data mining, and finally an exploitation technique of that knowledge in a case-based reasoning system.

Keywords: data warehouse, data mining, knowledge discovery in database, KDD, medical knowledge management, Bayesian networks

Procedia PDF Downloads 395
6579 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 332
6578 Walking Progression in Ambulatory Individuals with Spinal Cord Injury Who Daily Walked with a Walking Device

Authors: Makamas Kumprou, Pipatana Amatachaya, Sugalya Amatachaya, Thiwabhorn Thaweewannakij, Preeda Arayawichanon

Abstract:

Many individuals with spinal cord injury (SCI) need an ambulatory assistive device (AAD) to promote their independence and experience of task-specific walking practice. Without a periodic follow-up for their walking progression, however, many individuals may use the same AAD even though up to 66% of them had the potential to progress walking ability. This may distort their optimal ability and increase the possibility of having negative impacts due to the long-lasting used of an AAD. However, these findings were cross-sectionally collected without data confirmation for the benefit or negative impacts of those who changed the types of AAD used. Therefore, this study prospectively assessed the proportion of ambulatory individuals with SCI who were able to progress their walking ability as determined using a type of AAD, and the changes of their functional ability as well as the incidence of falls over 6 months. Twenty-four subjects with SCI who daily walked with an AAD were involved in the study for 2 visits over 6 months. At the first visit (baseline assessments), the subjects were assessed for their spatiotemporal variables (i.e., cadence, step length, stride length, and step symmetry) and walking ability using the 10-meter walk test (10MWT). Then, they were assessed for the possibility of their walking progression as determined using the ability of walking with the least support AAD with no more than contact guarding assist. Those who were capable of changing an AAD were trained for the ability to walk with a new AAD. Thereafter, all subjects were monthly monitored for incidence of fall over 6 months. At the second visit (after 6 months followed-up), subjects were reassessed for their spatiotemporal variables and 10MWT. The findings indicated that, of all 24 subjects, 8 subjects (33.3%) were able to walk with less support AAD than their usual one. The walking cadence, step length symmetry, and walking ability of these subjects improved significantly greater than those who walked with the same AAD (p < 0.05). Among these subjects, one subject (12.5%) reported fell (3 times) during the follow-up period, whereas 5 subjects (31.3%) who walked with the same AAD experienced at least one fall (range 1 – 16 times). The findings indicated that a large proportion of ambulatory individuals with SCI who daily walked with an AAD could progress their walking ability, whereby their walking ability and safety also significantly improved after they walked with an optimal AAD. The findings suggest the need for a periodic follow-up for an appropriate AAD used for these individuals.

Keywords: walking device, walker, crutches, cane, rehabilitation

Procedia PDF Downloads 126
6577 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 314