Search results for: access block
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4303

Search results for: access block

4183 Different Motor Inhibition Processes in Action Selection Stage: A Study with Spatial Stroop Paradigm

Authors: German Galvez-Garcia, Javier Albayay, Javiera Peña, Marta Lavin, George A. Michael

Abstract:

The aim of this research was to investigate whether the selection of the actions needs different inhibition processes during the response selection stage. In Experiment 1, we compared the magnitude of the Spatial Stroop effect, which occurs in response selection stage, in two motor actions (lifting vs reaching) when the participants performed both actions in the same block or in different blocks (mixed block vs. pure blocks).Within pure blocks, we obtained faster latencies when lifting actions were performed, but no differences in the magnitude of the Spatial Stroop effect were observed. Within mixed block, we obtained faster latencies as well as bigger-magnitude for Spatial Stroop effect when reaching actions were performed. We concluded that when no action selection is required (the pure blocks condition), inhibition works as a unitary system, whereas in the mixed block condition, where action selection is required, different inhibitory processes take place within a common processing stage. In Experiment 2, we investigated this common processing stage in depth by limiting participants’ available resources, requiring them to engage in a concurrent auditory task within a mixed block condition. The Spatial Stroop effect interacted with Movement as it did in Experiment 1, but it did not significantly interact with available resources (Auditory task x Spatial Stroop effect x Movement interaction). Thus, we concluded that available resources are distributed equally to both inhibition processes; this reinforces the likelihood of there being a common processing stage in which the different inhibitory processes take place.

Keywords: inhibition process, motor processes, selective inhibition, dual task

Procedia PDF Downloads 387
4182 First Order Filter Based Current-Mode Sinusoidal Oscillators Using Current Differencing Transconductance Amplifiers (CDTAs)

Authors: S. Summart, C. Saetiaw, T. Thosdeekoraphat, C. Thongsopa

Abstract:

This article presents new current-mode oscillator circuits using CDTAs which is designed from block diagram. The proposed circuits consist of two CDTAs and two grounded capacitors. The condition of oscillation and the frequency of oscillation can be adjusted by electronic method. The circuits have high output impedance and use only grounded capacitors without any external resistor which is very appropriate to future development into an integrated circuit. The results of PSPICE simulation program are corresponding to the theoretical analysis.

Keywords: current-mode, quadrature oscillator, block diagram, CDTA

Procedia PDF Downloads 451
4181 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 357
4180 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields

Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen

Abstract:

A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.

Keywords: white-box, block cipher, composite field, threshold implementation

Procedia PDF Downloads 163
4179 A Retrospective Study of Pain Management Strategies for Pediatric Hypospadias Surgery in a Tertiary Care Hospital in Western Rajasthan

Authors: Darshana Rathod, Kirtikumar Rathod, Kamlesh Kumari, Abhilasha Motghare

Abstract:

Background and Aims: Hypospadias is one of the common congenital anomalies in males. Various modalities are used for pain management, including caudal, penile, pudendal, ring blocks, and systemic analgesics. There has yet to be a consensus regarding the most effective and safe analgesic method for controlling pain in these children. We planned this study to determine our institute's pain management practices for hypospadias surgeries. Material and Methods: This retrospective cohort study reviewed 150 children with hypospadias undergoing surgery from January 2020 to December 2023. Data regarding the mode of pain management, postoperative opioid requirement, PACU discharge, and complications was collected from the records. Results: For postoperative pain, 33 (22%) children received caudal block, 60 (40%) penile block, and 57 (38%) were managed by intravenous analgesics. A significant difference was found in the three groups, with the IV analgesic group requiring significantly higher opioid boluses in PACU [43 (75.4%) required two boluses (p < 0.05)]. The difference in PACU discharge time among the three groups was statistically significant (p< 0.05), with IV analgesics groups having the highest (55 mins [47, 60]), the Caudal group at 35mins (30, 40), and the dorsal penile block group at 35mins (25, 40). There was no significant difference in complications like edema, meatal stenosis, urethra-cutaneous fistula, or wound dehiscence among all three groups. Conclusion: Intravenous analgesics and regional blocks like caudal and penile blocks are the common pain management modalities in our institute. The regional blocks are effective in managing pain in the postoperative period and are not significantly associated with complications.

Keywords: caudal block, hypospadias, pain management, penile block

Procedia PDF Downloads 41
4178 Lidocaine-Bupivacaine Block Improve Analgesia in Cats Undergoing Orchiectomy

Authors: T. C. Ng, R. Radzi, T. K. Ng, H. C. Chen

Abstract:

The analgesic effects of lidocaine-bupivacaine block in cats undergoing routine orchiectomy were determined in this controlled, randomized, and blinded study. Twelve cats were randomly assigned to two groups. Cats in local block group received subcutaneous infiltration of 1 mg/kg of 2% lidocaine and 1 mg/kg of 0.5% bupivacaine into the scrotal sac. Cats in control group received equivolume of saline. Both groups were induced with mixture of ketamine (15 mg/kg) and acepromazine (0.1 mg/kg) intramuscularly and maintained on sevoflurane via facemask. Non-invasive blood pressures (BP), heart (HR), and respiratory rate (RR) were measured intra-operatively at specific events. Post-operatively, all cats received meloxicam, 0.2 mg/kg subcutaneously. Pain scores were determined at 4, 8, and 24 hours postoperatively. Mechanical pressure thresholds (MPT) at the perineum and metatarsus were determined at 2, 4, 8, and 24 hours postoperatively. Intra-operatively, the BP and HR tended to be higher in the control group. The increment in HR peaked during traction and autoligation of the spermatic cord in the control group. There was no treatment difference in RR. Post-operatively, pain scores in the group given local blocks were lower than the control group at 4 hour post-operation. There was no treatment difference in the post-operative HR, RR, BP and MPT values. In conclusion, subcutaneous infiltration of lidocaine-bupivacaine into the scrotal sac before orchiectomy improved intra-operative hemodynamic stability and provided better analgesia up to 4 hours post-surgery.

Keywords: analgesia, bupivacaine, cat, lidocaine, local block, orchiectomy

Procedia PDF Downloads 133
4177 Effects of Titanium Dioxide Coatings on Building Composites for Sustainable Construction Applications

Authors: Ifeyinwa Ijeoma Obianyo, Luqman Adedeji Taiwo, Olugbenga O. Amu, Azikiwe Peter Onwualu

Abstract:

Improving the durability of building materials saves maintenance costs, construction time, and energy. In this study, titanium dioxide coated conventional and non-conventional composites were produced, and the effects of titanium dioxide coatings were investigated. Conventional composites were produced using river sand and Portland cement, whereas non-conventional composites were produced by partially replacing river sand and Portland cement with quarry dust and rice husk ash. Water absorption and thickness swelling tests were conducted on the produced coated and non-coated block samples. A reduction in water absorption was observed in the coated composite samples when compared to the non-coated composite samples, and this is an indication of the improved durability of the samples coated with titanium dioxide. However, there was an increase in the thickness swelling of coatings on the coated block samples, but this increase has a slight influence on the compressive strength of the coated samples. The outcome of this study indicates that coating composite building blocks with titanium dioxide will improve theirdurability. Also, the site exposure experiments revealed the self-cleansing properties of TiO2-coated composite block samples, while the Rhodamine B discolouration test confirmed the photocatalytic features of TiO2-coated composite block samples.

Keywords: titanium dioxide, water absorption, durability, mechanical properties, building composite

Procedia PDF Downloads 107
4176 Efficacy of Erector Spinae Plane Block for Postoperative Pain Management in Coronary Artery Bypass Graft Patients

Authors: Santosh Sharma Parajuli, Diwas Manandhar

Abstract:

Background: Perioperative pain management plays an integral part in patients undergoing cardiac surgery. We studied the effect of Erector Spinae Plane block on acute postoperative pain reduction and 24 hours opioid consumption in adult cardiac surgical patients. Methods: Twenty-five adult cardiac surgical patients who underwent cardiac surgery with sternotomy in whom ESP catheters were placed preoperatively were kept in group E, and the other 25 patients who had undergone cardiac surgery without ESP catheter and pain management done with conventional opioid injection were placed in group C. Fentanyl was used for pain management. The primary study endpoint was to compare the consumption of fentanyl and to assess the numeric rating scale in the postoperative period in the first 24 hours in both groups. Results: The 24 hours fentanyl consumption was 43.00±51.29 micrograms in the Erector Spinae Plane catheter group and 147.00±60.94 micrograms in the control group postoperatively which was statistically significant (p <0.001). The numeric rating scale was also significantly reduced in the Erector Spinae Plane group compared to the control group in the first 24 hours postoperatively. Conclusion: Erector Spinae Plane block is superior to the conventional opioid injection method for postoperative pain management in CABG patients. Erector Spinae Plane block not only decreases the overall opioid consumption but also the NRS score in these patients.

Keywords: erector, spinae, plane, numerical rating scale

Procedia PDF Downloads 62
4175 Low Students' Access to University Education in Nigeria: Causes and Remedy

Authors: Robert Ogbanje Okwori

Abstract:

The paper explained the causes low students’ access to university education in Nigeria and how it can be remedied. It is discovered that low students’ access to university education in Nigeria is evident despite these number of universities in the country. In 2006/2007 academic session, 806,089 sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 123,626 (15.3%) were admitted while 2011/2012 academic session, a total of 1,493,604 candidates sat for Joint Unified Matriculation Board Examination (JAMB) into Nigerian universities and only 65,073 (43.57%) were admitted. This necessitates for the research. Therefore, the study posed the following research questions. What are causes of low students’ access to university education in Nigeria? What are the challenges of students’ access to university education in Nigeria? How can students’ access to university education in Nigeria be improved? Sample survey research design was adopted for the study. A structured questionnaire was used to gather data for the study. Six hundred and eighty (680) respondents which comprised of 100 level university students; JAMB Officers and University administrators (Vice Chancellors, Registrars and Admission Officers) were used for the study. Stratified random sampling was applied for adequate representation of respondents from universities in the six geopolitical zones of Nigeria. Mean was used to answer research questions while Kuder-Richardson formula 20 was used to check the internal consistency of the instrument. The correlation coefficient of the instrument was 0.87. The major findings include the carrying capacity of each university contributes to low students’ access to university education and academic staff were inadequate. From the analysis of the study, it is concluded that the rate of access to university education is low, therefore, every university should establish distance learning programme to reduce university admission crisis. The training infrastructure in the universities should be improved upon by the owners to increase the carrying capacity of each university.

Keywords: access, causes, low, university

Procedia PDF Downloads 464
4174 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell

Authors: Nawang Chhunid, Gagnesh Kumar

Abstract:

On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.

Keywords: DRAM Cell, Read Access Time, Retention Time, Average Power dissipation

Procedia PDF Downloads 308
4173 Nanoparticles Modification by Grafting Strategies for the Development of Hybrid Nanocomposites

Authors: Irati Barandiaran, Xabier Velasco-Iza, Galder Kortaberria

Abstract:

Hybrid inorganic/organic nanostructured materials based on block copolymers are of considerable interest in the field of Nanotechnology, taking into account that these nanocomposites combine the properties of polymer matrix and the unique properties of the added nanoparticles. The use of block copolymers as templates offers the opportunity to control the size and the distribution of inorganic nanoparticles. This research is focused on the surface modification of inorganic nanoparticles to reach a good interface between nanoparticles and polymer matrices which hinders the nanoparticle aggregation. The aim of this work is to obtain a good and selective dispersion of Fe3O4 magnetic nanoparticles into different types of block copolymers such us, poly(styrene-b-methyl methacrylate) (PS-b-PMMA), poly(styrene-b-ε-caprolactone) (PS-b-PCL) poly(isoprene-b-methyl methacrylate) (PI-b-PMMA) or poly(styrene-b-butadiene-b-methyl methacrylate) (SBM) by using different grafting strategies. Fe3O4 magnetic nanoparticles have been surface-modified with polymer or block copolymer brushes following different grafting methods (grafting to, grafting from and grafting through) to achieve a selective location of nanoparticles into desired domains of the block copolymers. Morphology of fabricated hybrid nanocomposites was studied by means of atomic force microscopy (AFM) and with the aim to reach well-ordered nanostructured composites different annealing methods were used. Additionally, nanoparticle amount has been also varied in order to investigate the effect of the nanoparticle content in the morphology of the block copolymer. Nowadays different characterization methods were using in order to investigate magnetic properties of nanometer-scale electronic devices. Particularly, two different techniques have been used with the aim of characterizing synthesized nanocomposites. First, magnetic force microscopy (MFM) was used to investigate qualitatively the magnetic properties taking into account that this technique allows distinguishing magnetic domains on the sample surface. On the other hand, magnetic characterization by vibrating sample magnetometer and superconducting quantum interference device. This technique demonstrated that magnetic properties of nanoparticles have been transferred to the nanocomposites, exhibiting superparamagnetic behavior similar to that of the maghemite nanoparticles at room temperature. Obtained advanced nanostructured materials could found possible applications in the field of dye-sensitized solar cells and electronic nanodevices.

Keywords: atomic force microscopy, block copolymers, grafting techniques, iron oxide nanoparticles

Procedia PDF Downloads 259
4172 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 537
4171 Channels Splitting Strategy for Optical Local Area Networks of Passive Star Topology

Authors: Peristera Baziana

Abstract:

In this paper, we present a network configuration for a WDM LANs of passive star topology that assume that the set of data WDM channels is split into two separate sets of channels, with different access rights over them. Especially, a synchronous transmission WDMA access algorithm is adopted in order to increase the probability of successful transmission over the data channels and consequently to reduce the probability of data packets transmission cancellation in order to avoid the data channels collisions. Thus, a control pre-transmission access scheme is followed over a separate control channel. An analytical Markovian model is studied and the average throughput is mathematically derived. The performance is studied for several numbers of data channels and various values of control phase duration.

Keywords: access algorithm, channels division, collisions avoidance, wavelength division multiplexing

Procedia PDF Downloads 294
4170 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 356
4169 Ranking of Optimal Materials for Building Walls from the Perspective of Cost and Waste of Electricity and Gas Energy Using AHP-TOPSIS 1 Technique: Study Example: Sari City

Authors: Seyedomid Fatemi

Abstract:

The walls of the building, as the main intermediary between the outside and the inside of the building, play an important role in controlling the environmental conditions and ensuring the comfort of the residents, thus reducing the heating and cooling loads. Therefore, the use of suitable materials is considered one of the simplest and most effective ways to reduce the heating and cooling loads of the building, which will also save energy. Therefore, in order to achieve the goal of the research "Ranking of optimal materials for building walls," optimal materials for building walls in a temperate and humid climate (case example: Sari city) from the perspective of embodied energy, waste of electricity and gas energy, cost and reuse been investigated to achieve sustainable architecture. In this regard, using information obtained from Sari Municipality, design components have been presented by experts using the Delphi method. Considering the criteria of experts' opinions (cost and reuse), the amount of embodied energy of the materials, as well as the amount of waste of electricity and gas of different materials of the walls, with the help of the AHP weighting technique and finally with the TOPSIS technique, the best type of materials in the order of 1- 3-D Panel 2-ICF-, 3-Cement block with pumice, 4-Wallcrete block, 5-Clay block, 6-Autoclaved Aerated Concrete (AAC), 7-Foam cement block, 8-Aquapanel and 9-Reinforced concrete wall for use in The walls of the buildings were proposed in Sari city.

Keywords: optimum materials, building walls, moderate and humid climate, sustainable architecture, AHP-TOPSIS technique

Procedia PDF Downloads 72
4168 Impact of the Government Ghana Block Farm Program on Rural Households in Northern Ghana

Authors: Antwi Kwaku Dei, Lyford Conrad Power

Abstract:

This paper investigates the outcome of participating in the government of Ghana block farm program on rural households’ farm productivity, income, food security and nutritional status in Northern Ghana using cross-sectional data. Data analysis was done using the Instrumental Variable and the Heckman Selection Bias procedures. Our analysis indicates that participation in the block farm program significantly increased directly the productivity of maize, rice, and soybean by 21.3 percent, 15.8 percent, and 12.3 percent respectively. Also, the program participation was found to increase households’ farm income by 20 percent in northern Ghana. Furthermore, program participation was found to improve household food security and nutrition by 19 percent and 14 percent respectively through income effect. Based on the benefit-cost ratio of 1.59 the results from the study recommends that the program is expanded to other communities in the northern region. Further analysis indicates that rural households’ decision to participate in food security intervention programs is significantly influenced by factors including the gender of the household head, the age of the household head, and household size. Results of the study further show that gender of household head, household size, household monthly income, household assets, women educational status, the age of women, marital status of women, are significant determinants of food security and nutrition status in Northern Ghana.

Keywords: block farm program, farm productivity, , household food security, Northern Ghana

Procedia PDF Downloads 275
4167 Energy Saving as a Mean to Increase Energy Access in Sub-Saharan Africa

Authors: Joseph Levodo, Ndimbarafine Young Tobin, E. Messina, P. Edouma

Abstract:

Energy efficiency can contribute significantly towards increasing clean energy access to modern energy services. Many developing countries have largely focused on expanding energy access by increasing supply. This is due to the fact the links between energy efficiency and clean energy access are often unnoticed. Energy efficiency measures offer the promise of reducing energy use and saving money on electricity bills, as well as reducing negative environmental externalities associated with the production of electricity. This paper seeks to address the economic and effectiveness of reducing energy consumption by integrating energy efficiency as a priority to meet energy access examines the barriers to energy efficient in sub-Saharan African countries. The findings from this study reveal that an appropriate policy can promote the development of more energy-efficient buildings, products and strengthen incentives for consumers, businesses, and industrial customers to pursue cost-effective energy-efficiency measures and to make investments that will provide future energy-efficiency improvements.

Keywords: barriers, Sub-Saharan Africa, cost effective, energy savings, clean energy

Procedia PDF Downloads 43
4166 Digital Demands: Addressing the Digital Divide in Basic Education and Its Relation to Academic Performance and Aspirations

Authors: Jose Rodrigo Zubiri, Sofia Carmen Tomacruz

Abstract:

Amidst an increasingly digitalized society, information and communication technologies have been seamlessly integrated into the economic, social, and political life of individuals. Information has been regarded as a primary good, essential to the wellbeing and self-respect of individuals in society. The digital engagements of an individual play a key role in a variety of life outcomes ranging from academic performance to entrepreneurial success to health service uptake. As a result of varying degrees of access to the Internet and ICTs across populations and individuals, a digital divide emerges. Education, a sector pivotal to directing individual life trajectories, has been radically transformed with regards to the learning process and access to information and thus faces the implications of the digital divide, as new waves of inequalities are introduced in the classroom. As the period of basic education is critical to transitioning into civic life or higher education, digital inequalities are capable of aggravating pre-existing social inequalities. Through survey-questionnaires, conducted on 152 high school students from a Philippine public school, the study reveals the correlation of academic performance and aspirations (for their highest academic qualification) to access to digital technologies and the Internet, according to Van Dijk’s four measurements of digital poverty, namely: motivational access, material access, skills access, and usage access. The findings reveal a positive correlation for academic performance whereas no correlation was found between aspirations and digital access. In the study, significant correlational differences were also found between genders, specifically, in terms of skills access and academic performance.

Keywords: digital divide, ICTs, inequality, education, life trajectories

Procedia PDF Downloads 266
4165 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 418
4164 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 358
4163 Urban Block Design's Impact on the Indoor Daylight Quality, Heating and Cooling Loads of Buildings in the Semi-Arid Regions: Duhok City in Kurdistan Region-Iraq as a Case Study

Authors: Kawar Salih

Abstract:

It has been proven that designing sustainable buildings starts from early stages of urban design. The design of urban blocks specifically, is considered as one of the pragmatic strategies of sustainable urbanism. There have been previous studies that focused on the impact of urban block design and regulation on the outdoor thermal comfort in the semi-arid regions. However, no studies have been found that concentrated on that impact on the internal behavior of buildings of those regions specifically the daylight quality and energy performance. Further, most studies on semi-arid regions are focusing only on the cooling load reduction, neglecting the heating load. The study has focused on two parameters of urban block distribution which are the block orientation and the surface-to-volume ratio with the consideration of both heating and cooling loads of buildings. In Duhok (a semi-arid city in Kurdistan region of Iraq), energy consumption and daylight quality of different types of residential blocks have been examined using dynamic simulation. The findings suggest that there is a considerable higher energy load for heating than cooling, contradicting many previous studies about these regions. The results also highlight that the orientation of urban blocks can vary the energy consumption to 8%. Regarding the surface-to-volume ratio (S/V), it was observed that after the twice enlargement of the S/V, the energy consumption increased 15%. Though, the study demonstrates as well that there are opportunities for reducing energy consumption with the increase of the S/V which contradicts many previous research on S/V impacts on energy consumption. These results can help to design urban blocks with the bigger S/V than existing blocks in the city which it can provide better indoor daylight and relatively similar energy consumption.

Keywords: blocke orienation, building energy consumption, urban block design, semi-arid regions, surfacet-to-volume ratio

Procedia PDF Downloads 355
4162 Spatial Disparity in Education and Medical Facilities: A Case Study of Barddhaman District, West Bengal, India

Authors: Amit Bhattacharyya

Abstract:

The economic scenario of any region does not show the real picture for the measurement of overall development. Therefore, economic development must be accompanied by social development to be able to make an assessment to measure the level of development. The spatial variation with respect to social development has been discussed taking into account the quality of functioning of a social system in a specific area. In this paper, an attempt has been made to study the spatial distribution of social infrastructural facilities and analyze the magnitude of regional disparities at inter- block level in Barddhman district. It starts with the detailed account of the selection process of social infrastructure indicators and describes the methodology employed in the empirical analysis. Analyzing the block level data, this paper tries to identify the disparity among the blocks in the levels of social development. The results have been subsequently explained using both statistical analysis and geo spatial technique. The paper reveals that the social development is not going on at the same rate in every part of the district. Health facilities and educational facilities are concentrated at some selected point. So overall development activities come to be concentrated in a few centres and the disparity is seen over the blocks.

Keywords: disparity, inter-block, social development, spatial variation

Procedia PDF Downloads 165
4161 Assessing Socio-economic Impacts of Arsenic and Iron Contamination in Groundwater: Feasibility of Rainwater Harvesting in Amdanga Block, North 24 Parganas, West Bengal, India

Authors: Rajkumar Ghosh

Abstract:

The present study focuses on conducting a socio-economic assessment of groundwater contamination by arsenic and iron and explores the feasibility of rainwater harvesting (RWH) as an alternative water source in the Amdanga Block of North 24 Parganas, West Bengal, India. The region is plagued by severe groundwater contamination, primarily due to excessive concentrations of arsenic and iron, which pose significant health risks to the local population. The study utilizes a mixed-methods approach, combining quantitative analysis of water samples collected from different locations within the Amdanga Block and socio-economic surveys conducted among the affected communities. The results reveal alarmingly high levels of arsenic and iron contamination in the groundwater, surpassing the World Health Organization (WHO) and Indian government's permissible limits. This contamination significantly impacts the health and well-being of the local population, leading to a range of health issues such as skin The water samples are analyzed for arsenic and iron levels, while the surveys gather data on water usage patterns, health conditions, and socio-economic factors. lesions, respiratory disorders, and gastrointestinal problems. Furthermore, the socio-economic assessment highlights the vulnerability of the affected communities due to limited access to safe drinking water. The findings reveal the adverse socio-economic implications, including increased medical expenditures, reduced productivity, and compromised educational opportunities. To address these challenges, the study explores the feasibility of rainwater harvesting as an alternative source of clean water. RWH systems have the potential to mitigate groundwater contamination by providing a sustainable and independent water supply. The assessment includes evaluating the rainwater availability, analyzing the infrastructure requirements, and estimating the potential benefits and challenges associated with RWH implementation in the study area. The findings of this study contribute to a comprehensive understanding of the socio-economic impact of groundwater contamination by arsenic and iron, emphasizing the urgency to address this critical issue in the Amdanga Block. The feasibility assessment of rainwater harvesting serves as a practical solution to ensure a safe and sustainable water supply, reducing the dependency on contaminated groundwater sources. The study's results can inform policymakers, researchers, and local stakeholders in implementing effective mitigation measures and promoting the adoption of rainwater harvesting as a viable alternative in similar arsenic and iron-contaminated regions.

Keywords: contamination, rainwater harvesting, groundwater, sustainable water supply

Procedia PDF Downloads 93
4160 Determination of Fatigue Limit in Post Impacted Carbon Fiber Reinforced Epoxy Polymer (CFRP) Specimens Using Self Heating Methodology

Authors: Deepika Sudevan, Patrick Rozycki, Laurent Gornet

Abstract:

This paper presents the experimental identification of the fatigue limit for pristine and impacted Carbon Fiber Reinforced Epoxy polymer (CFRP) woven composites based on the relatively new self-heating methodology for composites. CFRP composites of [0/90]8 and quasi isotropic configurations prepared using hand-layup technique are subjected to low energy impacts (20 J energy) simulating a barely visible impact damage (BVID). Runway debris strike, tool drop or hailstone impact can cause a BVID on an aircraft fuselage made of carbon composites and hence understanding the post-impact fatigue response of CFRP laminates is of immense importance to the aerospace community. The BVID zone on the specimens is characterized using X-ray Tomography technique. Both pristine and impacted specimens are subjected to several blocks of constant amplitude (CA) fatigue loading keeping R-ratio a constant but with increments in the mean loading stress after each block. The number of loading cycles in each block is a subjective parameter and it varies for pristine and impacted CFRP specimens. To monitor the temperature evolution during fatigue loading, thermocouples are pasted on the CFRP specimens at specific locations. The fatigue limit is determined by two strategies, first is by considering the stabilized temperature in every block and second is by considering the change in the temperature slope per block. The results show that both strategies can be adopted to determine the fatigue limit in both pristine and impacted CFRP composites.

Keywords: CFRP, fatigue limit, low energy impact, self-heating, WRM

Procedia PDF Downloads 229
4159 Walls, Barriers, and Fences to Informal Political Economy of Land Resource Accesses: A Case of Banyabunagana Along with Uganda–Congo Border, South Western Uganda, Kisoro District

Authors: Niringiye Fred

Abstract:

Banyabunagana has always had access to land resources for grazing animals, sand mining, and farmland across the border in the Democratic Republic of Congo during the pre-colonial and colonial times, usually on an informal arrangement facilitated by kinship ties and rent transactions for these resources. However, in recent periods, the government of the Democratic Republic of the Congo (DRC) has been pursuing a policy of constructing barriers such as walls and fences so that Banyabunagana communities do not access the land on the DRC side of the border. This is happening in the background of increased and intensified demand for land use on the side of the Ugandan community. This paper will attempt to discuss the reasons behind the construction of walls, fences, and other barriers which deny access to land for Banyabunagana communities in Bunagana Parish, Muramba Sub-county- Kisoro district, Uganda. The research will attempt to answer the following main questions, among others, whether there are the factors that explain the construction of walls and fences which could limit or deny access to the informal use of land and other resources and whether policy options to ensure continued access to land and other resources for local communities.

Keywords: border, walls, fences, land resource access

Procedia PDF Downloads 116
4158 Analyzing the Oil and Gas Exploration Opportunities in Poland: Five Prospective Areas Selected and Dedicated to the Tender

Authors: Krystian Wójcik, Sara Wróblewska, Marcin Łojek, Katarzyna Sobień

Abstract:

Polish Geological Survey selected five of the most prospective areas for oil and gas exploration in Poland. They are dedicated to the 6th international tender round for hydrocarbon concessions, planned in 2022. The main exploration target of these areas is related to conventional and unconventional accumulations of gas and oil in the Carpathian basement, Carpathian Foredeep and Outer Carpathians (Block 413 – 414), as well as in the Carboniferous, Rotliegend, Main Dolomite (Block 208, Cybinka – Torzym, Zielona Góra West), and in the Mesozoic of the Polish Lowlands (Koło).

Keywords: concession policy, international tender, oil and gas exploration horizons, prospective areas

Procedia PDF Downloads 209
4157 Regional Anesthesia: A Vantage Point for Management of Normal Pressure Hydrocephalus

Authors: Kunal K. S., Shwetashri K. R., Keerthan G., Ajinkya R.

Abstract:

Background: Normal pressure hydrocephalus is a condition caused by abnormal accumulation of cerebrospinal fluid (CSF) within the brain resulting in enlarged cerebral ventricles due to a disruption of CSF formation, absorption, or flow. Over the course of time, ventriculoperitoneal shunt under general anesthesia has become a standard of care. Yet only a finite number of centers have started the inclusion of regional anesthesia techniques for the such patient cohort. Stem Case: We report a case of a 75-year-old male with underlying aortic sclerosis and cardiomyopathy who presented with complaints of confusion, forgetfulness, and difficulty in walking. Neuro-imaging studies revealed disproportionally enlarged subarachnoid space hydrocephalus (DESH). The baseline blood pressure was 116/67 mmHg with a heart rate of 106 beats/min and SpO2 of 96% on room air. The patient underwent smooth induction followed by sonographically guided superficial cervical plexus block and transverse abdominis plane block. Intraoperative pain indices were monitored with Analgesia nociceptive index monitor (ANI, MdolorisTM) and surgical plethysmographic index (SPI, GE Healthcare, Helsinki, FinlandTM). These remained stable during the application of the block and the entire surgical duration. No significant hemodynamic response was observed during the tunneling of the skin by the surgeon. The patient underwent a smooth recovery and emergence. Conclusion: Our decision to incorporate peripheral nerve blockade in conjunction with general anesthesia resulted in opioid-sparing anesthesia and decreased post-operative analgesic requirement by the patient. This blockade was successful in suppressing intraoperative stress responses. Our patient recovered adequately and underwent an uncomplicated post-operative stay.

Keywords: desh, NPH, VP shunt, cervical plexus block, transversus abdominis plane block

Procedia PDF Downloads 76
4156 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 261
4155 The Probability of Smallholder Broiler Chicken Farmers' Participation in the Mainstream Market within Maseru District in Lesotho

Authors: L. E. Mphahama, A. Mushunje, A. Taruvinga

Abstract:

Although broiler production does not generate any large incomes among the smallholder community, it represents the main source of livelihood and part of nutritional requirement. As a result, market for broiler meat is growing faster than that of any other meat products and is projected to continue growing in the coming decades. However, the implication is that a multitude of factors manipulates transformation of smallholder broiler farmers participating in the mainstream markets. From 217 smallholder broiler farmers, socio-economic and institutional factors in broiler farming were incorporated into Binary model to estimate the probability of broiler farmers’ participation in the mainstream markets within the Maseru district in Lesotho. Of the thirteen (13) predictor variables fitted into the model, six (6) variables (household size, number of years in broiler business, stock size, access to transport, access to extension services and access to market information) had significant coefficients while seven (7) variables (level of education, marital status, price of broilers, poultry association, access to contract, access to credit and access to storage) did not have a significant impact. It is recommended that smallholder broiler farmers organize themselves into cooperatives which will act as a vehicle through which they can access contracts and formal markets. These cooperatives will also enable easy training and workshops for broiler rearing and marketing/markets through extension visits.

Keywords: broiler chicken, mainstream market, Maseru district, participation, smallholder farmers

Procedia PDF Downloads 144
4154 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 122