Search results for: key agreement protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2656

Search results for: key agreement protocol

2536 Family Satisfaction with Neuro-Linguistic Care for Patients with Alzheimer’s Disease

Authors: Sara Sahraoui

Abstract:

This research studied the effect of Alzheimer's disease (AD) on language information processing in subjects with Alzheimer’s disease (AD) who were bilingual (French and dialectical Arabic). The results show a disorder of certain semantic aspects of their mother tongue (L1). On the other hand, grammatical levels appeared to be relatively unaffected in oral speech in L1 but were disturbed in the second language (L2). In consequence, we constructed a cognitive-language stimulation protocol for bilingual patients (PSCLAB) to respond to this disorder. The efficacy of this protocol in terms of rehabilitation was assessed in 30 such patients through discourse analysis carried out before and after initiating the protocol. The results show that cognitive/language training using the PSCLAB appears to improve the language behaviour of bilingual patients with AD. However, this survey study aims to verify the satisfaction of patients’ relatives with the results of cognitive language training by PSCLAB. We developed a brief instrument to measure the satisfaction of family members. The results report that the patient's relatives are satisfied with the results of cognitive training by PSCLAB.

Keywords: satisfaction, Alzheimer's disease, rehabilitation, levels language

Procedia PDF Downloads 81
2535 Unconventional Dating of Old Peepal Tree of Chandigarh (India) Using Optically Stimulated Luminescence

Authors: Rita Rani, Ramesh Kumar

Abstract:

The intend of the current study is to date an old grand Peepal tree that is still alive. The tree is situated in Kalibard village, Sector 9, Chandigarh (India). Due to its huge structure, it has got the status of ‘Heritage tree.’ Optically Stimulated Luminescence of sediments beneath the roots is used to determine the age of the tree. Optical dating is preferred over conventional dating methods due to more precession. The methodology includes OSL of quartz grain using SAR protocol for accumulated dose measurement. The age determination of an alive tree using sedimentary quartz is in close agreement with the approximated age provided by the related agency. This is the first attempt at using optically stimulated luminescence in the age determination of alive trees in this region. The study concludes that the Luminescence dating of alive trees is the nondestructive and more precise method.

Keywords: luminescence, dose rate, optical dating, sediments

Procedia PDF Downloads 176
2534 Functional Variants Detection by RNAseq

Authors: Raffaele A. Calogero

Abstract:

RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts.

Keywords: fusion transcripts, INDEL, RNA-seq, WES, SNV

Procedia PDF Downloads 288
2533 Assessing Two Protocols for Positive Reinforcement Training in Captive Olive Baboons (Papio anubis)

Authors: H. Cano, P. Ferrer, N. Garcia, M. Popovic, J. Zapata

Abstract:

Positive Reinforcement Training is a well-known methodology which has been reported frequently to be used in captive non-human primates. As a matter of fact, it is an invaluable tool for different purposes related with animal welfare, such as primate husbandry and environmental enrichment. It is also essential to perform some cognitive experiments. The main propose of this pilot study was to establish an efficient protocol to train captive olive baboons (Papio anubis). This protocol seems to be vital in the context of a larger research program in which it will be necessary to train a complete population of around 40 baboons. Baboons were studied at the Veterinary Research Farm of the University of Murcia. Temporally isolated animals were trained to perform three basic tasks. Firstly, they were required to take food prices directly from the researchers’ hands. Then a clicker sound or bridge stimulus was added each time the animal acceded to the reinforcement. Finally, they were trained to touch a target, consisted of a whip with a red ball in its end, with their hands or their nose. When the subject completed correctly this task, it was also exposed to the bridge stimulus and awarded with a food price, such as a portion of banana, orange, apple, peach or a raisin. Two protocols were tested during this experiment. In both of them, there were 6 series of 2min training periods each day. However, in the first protocol, the series consisted in 3 trials, whereas in the second one, in each series there were 5 trials. A reliable performance was obtained with only 6 days of training in the case of the 5-trials protocol. However, with the 3-trials one, 26 days of training were needed. As a result, the 5-trials protocol seems to be more effective than the 3-trials one, in order to teach these three basic tasks to olive baboons. In consequence, it will be used to train the rest of the colony.

Keywords: captive primates, olive baboon, positive reinforcement training, Papio anubis, training

Procedia PDF Downloads 126
2532 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm

Authors: Frodouard Minani

Abstract:

Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.

Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks

Procedia PDF Downloads 146
2531 Effect of Perioperative Protocol of Care on Clinical Outcomes among Patients Undergoing Coronary Artery Bypass Graft

Authors: Manal Ahmed, Amal Shehata, Shereen Deeb

Abstract:

The study's purpose was to determine the effect of the perioperative protocol of care on clinical outcomes among patients undergoing coronary artery bypass graft. Subjects: A sample of 100 adult patients who were planned for coronary artery bypass graft, were selected and divided alternatively and randomly into two equal groups (50 study -50 control).The study was carried out at National heart Institute in Cairo and open heart surgical intensive care unit in Shebin El-Kom Teaching Hospital. Instruments: Four instruments were used for data collection: Interviewing questionnaire, dyspnea analogue scale, Biophysiological measurement instrument, and Compliance assessment sheet. Results: There were statistically significant differences between both groups regarding most respiratory system assessment findings at discharge. More than two-thirds of the study group of the current study had a continuous and regular commitment to diet regimen, which ranked first followed by the compliance of daily living activities then quitting smoking. Conclusions: The perioperative protocol of care has a significant improving effect on respiratory findings, dyspnea degree, duration of mechanical ventilation, length of hospital stay, compliance to diet, therapeutic regimen, daily living activities, and quit smoking among study group undergoing CABG. Recommendations: Perioperative protocol of care should be carried out for CABG patients at open-heart surgical units as well as an illustrative colored booklet about CAD, CABG and perioperative care should be available and distributed to all CABG patients.

Keywords: perioperative, effect, clinical outcomes, coronary artery, bypass graft, protocol of care

Procedia PDF Downloads 139
2530 Factors Influencing Resolution of Anaphora with Collective Nominals in Russian

Authors: Anna Moskaleva

Abstract:

A prolific body of research in theoretical and experimental linguistics claims that a preference for conceptual or grammatical information in the process of agreement greatly depends on the type of agreement dependency. According to the agreement hierarchy, an anaphoric agreement is more sensitive to semantic or conceptual rather than grammatical information of an antecedent. Furthermore, a higher linear distance between a pronoun and its antecedent is assumed to trigger semantic agreement, yet the hierarchical distance is hardly examined in the research field, and the contribution of each distance factor is unclear. Apart from that, working memory volume is deemed to play a role in maintaining grammatical information during language comprehension. The aim of this study is to observe distance and working memory effects in resolution of anaphora with collective nominals (e.g., team) and to have a closer look at the interaction of the factors. Collective nominals in many languages can have a holistic or distributive meaning and can be addressed by a singular or a plural pronoun, respectively. We investigated linguistic factors of linear and rhetorical (hierarchical) distance and a more general factor of working memory volume in their ability to facilitate the interpretation of the number feature of a collective noun in Russian. An eye-tracking reading experiment on comprehension has been conducted where university students were presented with composed texts, including collective nouns and personal pronouns alluding to them. Different eye-tracking measures were calculated using statistical methods. The results have shown that a significant increase in reading time in the case of a singular pronoun was demonstrated when both distances were high, and no such effect was observed when just one of the distances was high. A decrease in reading time has been obtained with distance in the case of a plural pronoun. The working memory effect was not revealed in the experiment. The resonance of distance factors indicates that not only the linear distance but also the hierarchical distance is of great importance in interpreting pronouns. The experimental findings also suggest that, apart from the agreement hierarchy, the preference for conceptual or grammatical information correlates with the distance between a pronoun and its antecedent.

Keywords: collective nouns, agreement hierarchy, anaphora resolution, eye-tracking, language comprehension

Procedia PDF Downloads 40
2529 Survey: Topology Hiding in Multipath Routing Protocol in MANET

Authors: Akshay Suhas Phalke, Manohar S. Chaudhari

Abstract:

In this paper, we have discussed the multipath routing with its variants. Our purpose is to discuss the different types of the multipath routing mechanism. Here we also put the taxonomy of the multipath routing. Multipath routing is used for the alternate path routing, reliable transmission of data and for better utilization of network resources. We also discussed the multipath routing for topology hiding such as TOHIP. In multipath routing, different parameters such as energy efficiency, packet delivery ratio, shortest path routing, fault tolerance play an important role. We have discussed a number of multipath routing protocol based on different parameters lastly.

Keywords: multi-path routing, WSN, topology, fault detection, trust

Procedia PDF Downloads 356
2528 Investigation of Cold Atmospheric Plasma Exposure Protocol on Wound Healing in Diabetic Foot Ulcer

Authors: P. Akbartehrani, M. Khaledi Pour, M. Amini, M. Khani, M. Mohajeri Tehrani, E. Ghasemi, P. Charipoor, B. Shokri

Abstract:

A common problem between diabetic patients is foot ulcers which are chronic and require specialized treatment. Previous studies illustrate that Cold atmospheric plasma (CAP) has beneficial effects on wound healing and infection. Nevertheless, the comparison of different cap exposure protocols in diabetic ulcer wound healing remained to be studied. This study aims to determine the effect of two different exposure protocols on wound healing in diabetic ulcers. A prospective, randomized clinical trial was conducted at two clinics. Diabetic patients with G1 and G2 wanger classification diabetic foot ulcers were divided into two groups of study. One group was treated by the first protocol, which was treating wounds by argon-generated cold atmospheric plasma jet once a week for five weeks in a row. The other group was treated by the second protocol, which was treating wounds every three days for five weeks in a row. The wounds were treated for 40 seconds/cubic centimeter, while the nozzle tip was moved nonlocalized 1 cm above the wounds. A patient with one or more wounds could participate in different groups as wounds were separately randomized, which allow a participant to be treated several times during the study. The study's significant findings were two different reductions rate in wound size, microbial load, and two different healing speeds. This study concludes that CAP therapy by the second protocol yields more effective healing speeds, reduction in wound sizes, and microbial loads of foot ulcers in diabetic patients.

Keywords: wound healing, diabetic ulcers, cold atmospheric plasma, cold argon jet

Procedia PDF Downloads 219
2527 Comparison of Power Consumption of WiFi Inbuilt Internet of Things Device with Bluetooth Low Energy

Authors: Darshana Thomas, Edward Wilkie, James Irvine

Abstract:

The Internet of things (IoT) is currently a highly researched topic, especially within the context of the smart home. These are small sensors that are capable of gathering data and transmitting it to a server. The majority of smart home products use protocols such as ZigBee or Bluetooth Low Energy (BLE). As these small sensors are increasing in number, the need to implement these with much more capable and ubiquitous transmission technology is necessary. The high power consumption is the reason that holds these small sensors back from using other protocols such as the most ubiquitous form of communication, WiFi. Comparing the power consumption of existing transmission technologies to one with WiFi inbuilt, would provide a better understanding for choosing between these technologies. We have developed a small IoT device with WiFi capability and proven that it is much more efficient than the first protocol, 433 MHz. We extend our work in this paper and compare WiFi power consumption with the other most widely used protocol BLE. The experimental results in this paper would conclude whether the developed prototype is capable in terms of power consumption to replace the existing protocol BLE with WiFi.

Keywords: bluetooth, internet of things (IoT), power consumption, WiFi

Procedia PDF Downloads 267
2526 Performance Parameters of an Abbreviated Breast MRI Protocol

Authors: Andy Ho

Abstract:

Breast cancer is a common cancer in Australia. Early diagnosis is crucial for improving patient outcomes, as later-stage detection correlates with poorer prognoses. While multiparametric MRI offers superior sensitivity in detecting invasive and high-grade breast cancers compared to conventional mammography, its extended scan duration and high costs limit widespread application. As a result, full protocol MRI screening is typically reserved for patients at elevated risk. Recent advancements in imaging technology have facilitated the development of Abbreviated MRI protocols, which dramatically reduce scan times (<10 minutes compared to >30 minutes for full protocol). The potential for Abbreviated MRI to offer a more time- and cost-efficient alternative has implications for improving patient accessibility, reducing appointment durations, and enhancing compliance—especially relevant for individuals requiring regular annual screening over several decades. The purpose of this study is to assess the diagnostic efficacy of Abbreviated MRI for breast cancer screening among high-risk patients at the Royal Prince Alfred Hospital (RPA). This study aims to determine the sensitivity, specificity, and inter-reader variability of Abbreviated MRI protocols when interpreted by subspecialty-trained Breast Radiologists. A systematic review of the RPA’s electronic Picture Archive and Communication System identified high-risk patients, defined by Australian ‘Medicare Benefits Schedule’ criteria, who underwent Breast MRI from 2021 to 2022. Eligible participants included asymptomatic patients under 50 years old referred by the High-Risk Clinic due to a high-risk genetic profile or relevant familial history. The MRIs were anonymized, randomized, and interpreted by four Breast Radiologists, each independently completing standardized proforma evaluations. Radiological findings were compared against histopathology as the gold standard or follow-up imaging if biopsies were unavailable. Statistical metrics, including sensitivity, specificity, and inter-reader variability, were assessed. The Fleiss-Kappa analysis demonstrated a fair inter-reader agreement (kappa = 0.25; 95% CI: 0.19–0.32; p < 0.0001). The sensitivity for detecting malignancies was 0.75, with a specificity of 0.84. These findings underline the potential of Abbreviated MRI as a reliable screening tool for malignancies with significant specificity, though reduced sensitivity highlights the importance of robust radiologist training and consistent evaluation standards. Abbreviated MRI protocols exhibit promise as a viable screening option for high-risk patients, combining reduced scan times and acceptable diagnostic accuracy. Further work to refine interpretation practices and optimize training is essential to maximize the protocol’s utility in routine clinical screening and facilitate broader accessibility.

Keywords: abbreviated, breast, cancer, MRI

Procedia PDF Downloads 17
2525 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Keywords: challenges, IPTV service, requirements, software defined networking (SDN)

Procedia PDF Downloads 272
2524 Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool

Authors: Ossama Al-Maliki

Abstract:

The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications.

Keywords: EMV, card authentication, contactless card, SDA, DDA, CDA AVISPA

Procedia PDF Downloads 178
2523 Non-State Actors and Their Liabilities in International Armed Conflicts

Authors: Shivam Dwivedi, Saumya Kapoor

Abstract:

The Israeli Supreme Court in Public Committee against Torture in Israel v. Government of Israel observed the presence of non-state actors in cross-border terrorist activities thereby making the role of non-state actors in terrorism the center of discussion under the scope of International Humanitarian Law. Non-state actors and their role in a conflict have also been traversed upon by the Tadic case decided by the International Criminal Tribunal for the former Yugoslavia. However, there still are lacunae in International Humanitarian Law when it comes to determining the nature of a conflict, especially when non-state groups act within the ambit of various states, for example, Taliban in Afghanistan or the groups operating in Ukraine and Georgia. Thus, the objective of writing this paper would be to observe the ways by which non-state actors particularly terrorist organizations could be brought under the ambit of Additional Protocol I. Additional Protocol I is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of international conflicts which basically outlaws indiscriminate attacks on civilian populations, forbids conscription of children and preserves various other human rights during the war. In general, the Additional Protocol I reaffirms the provisions of the original four Geneva Conventions. Since provisions of Additional Protocol I apply only to cases pertaining to International Armed Conflicts, the answer to the problem should lie in including the scope for ‘transnational armed conflict’ in the already existing definition of ‘International Armed Conflict’ within Common Article 2 of the Geneva Conventions. This would broaden the applicability of the provisions in cases of non-state groups and render an international character to the conflict. Also, the non-state groups operating or appearing to operate should be determined by the test laid down in the Nicaragua case by the International Court of Justice and not under the Tadic case decided by the International Criminal Tribunal for Former Yugoslavia in order to provide a comprehensive system to deal with such groups. The result of the above proposal, therefore, would enhance the scope of the application of International Humanitarian Law to non-state groups and individuals.

Keywords: Geneva Conventions, International Armed Conflict, International Humanitarian Law, non-state actors

Procedia PDF Downloads 379
2522 Increasing the System Availability of Data Centers by Using Virtualization Technologies

Authors: Chris Ewe, Naoum Jamous, Holger Schrödl

Abstract:

Like most entrepreneurs, data center operators pursue goals such as profit-maximization, improvement of the company’s reputation or basically to exist on the market. Part of those aims is to guarantee a given quality of service. Quality characteristics are specified in a contract called the service level agreement. Central part of this agreement is non-functional properties of an IT service. The system availability is one of the most important properties as it will be shown in this paper. To comply with availability requirements, data center operators can use virtualization technologies. A clear model to assess the effect of virtualization functions on the parts of a data center in relation to the system availability is still missing. This paper aims to introduce a basic model that shows these connections, and consider if the identified effects are positive or negative. Thus, this work also points out possible disadvantages of the technology. In consequence, the paper shows opportunities as well as risks of data center virtualization in relation to system availability.

Keywords: availability, cloud computing IT service, quality of service, service level agreement, virtualization

Procedia PDF Downloads 539
2521 Industrial Relations as Communication: The Strange Case of the FCA-UAW Agreement

Authors: Francesco Nespoli

Abstract:

After having posed a theoretical framework combining framing theory and new rhetoric, the paper analyze the shift in communication both adopted by UAW and FCA during the negotiations in fall 2015. The paper argues that mistakes and adjustments played a determinant role respectively in the rejection of the first tentative agreement and in the ratification of the contract. The purpose of the paper is to set a new theoretical framework for the analysis of communication in industrial relations, by describing a narrative construction of reality from the perspective of the new rhetoric. The paper thus analyze all public text, speeches, tweets and Facebook posts by the union reading them as part of the narrative set by the organization condensed by the slogan 'it’s our time'. That narrative tried to gain consensus from the members matching the expectations due to the industry recovery after more than five years of workers' sacrifices. In doing so, the analysis points out a shift in the communication strategy of the union after the first rejection of a tentative agreement in 15 years. The findings suggest that, from the communication point of view, consultation in industrial relations can be conceived as a particular kind of political communication where identification with the audience through deliberate narrative may not be effective if it is not preceded by a listening campaign.

Keywords: communication, consultation, automotive, FCA

Procedia PDF Downloads 191
2520 The Analysis of Personalized Low-Dose Computed Tomography Protocol Based on Cumulative Effective Radiation Dose and Cumulative Organ Dose for Patients with Breast Cancer with Regular Chest Computed Tomography Follow up

Authors: Okhee Woo

Abstract:

Purpose: The aim of this study is to evaluate 2-year cumulative effective radiation dose and cumulative organ dose on regular follow-up computed tomography (CT) scans in patients with breast cancer and to establish personalized low-dose CT protocol. Methods and Materials: A retrospective study was performed on the patients with breast cancer who were diagnosed and managed consistently on the basis of routine breast cancer follow-up protocol between 2012-01 and 2016-06. Based on ICRP (International Commission on Radiological Protection) 103, the cumulative effective radiation doses of each patient for 2-year follow-up were analyzed using the commercial radiation management software (Radimetrics, Bayer healthcare). The personalized effective doses on each organ were analyzed in detail by the software-providing Monte Carlo simulation. Results: A total of 3822 CT scans on 490 patients was evaluated (age: 52.32±10.69). The mean scan number for each patient was 7.8±4.54. Each patient was exposed 95.54±63.24 mSv of radiation for 2 years. The cumulative CT radiation dose was significantly higher in patients with lymph node metastasis (p = 0.00). The HER-2 positive patients were more exposed to radiation compared to estrogen or progesterone receptor positive patient (p = 0.00). There was no difference in the cumulative effective radiation dose with different age groups. Conclusion: To acknowledge how much radiation exposed to a patient is a starting point of management of radiation exposure for patients with long-term CT follow-up. The precise and personalized protocol, as well as iterative reconstruction, may reduce hazard from unnecessary radiation exposure.

Keywords: computed tomography, breast cancer, effective radiation dose, cumulative organ dose

Procedia PDF Downloads 199
2519 An Exemption for Vertical Restraint Regarding Intellectual Property Licensing: Case Study of Thailand

Authors: Sanpetchuda Krutkrua, Suphawatchara Malanond

Abstract:

Throughout the history of Antitrust regimes in Thailand, Thailand has been trying to prevent collusive practices in the market through the amendments of the Trade Competition Act, and Thailand just passed the current Trade Competition Act of B.E. 2560 in 2017 of which several aspects of the law were amended in order to enhance the prevention of collusive outcome through both vertical trade restraints and horizontal trade restraints. An agreement is vertical when it involves arrangements that are in a complementary relationship. In Section 55 of the Act, any agreements to reduce the price, quantity, or quality of the goods, agreements to assign a sole retailer for the goods, and the agreement to impose conditions on the retailers are not allowed. However, Section 56 provides exemptions for the vertical relationship between the business operators, the franchise agreement, and the licensing agreement as long as such agreements do not surpass the necessity to do so, create monopolization, or affect the consumers in terms of price, quality, quantity, or options. The paper aims to explore the extent of the exemption under Section 56 and sequential regulations in terms of the vertical trade restraints regarding intellectual property licensing, and, at the same time, compare with the exemptions under the European Union competition law, and Singapore competition law. Comparative legal analysis with leading jurisdiction will illustrate the application of the newly enacted Thai Competition Act in terms of its enforcement in the global impact of IP rights, which, by nature are de jure or de facto international protection.

Keywords: antitrust, competition law, vertical restraint, intellectual property, IP licensing

Procedia PDF Downloads 158
2518 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 452
2517 The Role of Poling Protocol on Augmentation of Magnetoelectricity in BCZT/NZFO Layered Composites

Authors: Pankhuri Bansal, Sanjeev Kumar

Abstract:

We examined the exotic role of electrical poling of layered BCZT-NZFO bulk composite for sustainable advancement of magnetoelectric (ME) technology. Practically, it seems quite difficult to access the full potential of ME composites due to their weak ME coupling performances. Using a standard poling protocol, we successfully deployed the coupling performance of laminated ME composite, comprised of a ferroelectric (FE) layer of BCZT and a ferrite layer of NZFO. However, the ME coupling constant of laminated composite is optimized by lowering the volume fraction of the FE component to strengthen the mechanical strain in the piezoelectric layer while fixing the thickness of the magnetostrictive ferrite layer. Here, we employed systematic zero field cooled (ZFC) and field cooled (FC) electrical poling protocol on morphotropic phase boundary (MPB) based BCZT composition, well-appreciated for it’s remarkable electromechanical activity. We report a record augmentation in magnetoelectric coupling as a consequence of a prudent field-cooled poling mechanism. On the basis of our findings, we emphasize that the degree of magnetoelectricity may be significantly improved for the miniaturization of efficient devices via proper execution of the poling technique.

Keywords: magnetoelectric, lead-free, ferroelctric, ferromagnetic, energy harvesting

Procedia PDF Downloads 45
2516 Experimental Investigation to Find Transition Temperature of VG 30 Binder

Authors: D. Latha, V. Sunitha, Samson Mathew

Abstract:

In India, most of the pavement is laid by bituminous road and the consumption of binder is high for pavement construction and also modified binders are used to satisfy any specific pavement requirement. Since the binders are visco-elastic material which is having the mechanical properties of binder transition from visco-elastic solid to visco-elastic fluid. In this paper, two different protocols were used to measure the viscosity property of binder using a Brookfield Viscometer and there is a need to find the appropriate mixing and compaction temperatures of various types of binders which can result in complete aggregate coating and adequate field density of HMA mixtures. The aim of this work is to find the transition temperature from Non-Newtonian behavior to Newtonian behavior of the binder by adopting a steady shear protocol and the shear rate ramp protocol. The transition from non-Newtonian to Newtonian can occur through an increase of temperature and shear of the material. The test has been conducted for unmodified binder VG 30. The transition temperature was found in the unmodified binder VG is 120oC. So the application of both modified binder and unmodified binder in the pavement construction needs to be studied properly by considering temperature and traffic loading factors of the respective project site.

Keywords: unmodified and modified binders, Brookfield viscometer, transition temperature, steady shear and shear rate protocol

Procedia PDF Downloads 215
2515 Wireless Sensor Network Energy Efficient and QoS-Aware MAC Protocols: A Survey

Authors: Bashir Abdu Muzakkari, Mohamad Afendee Mohamad, Mohd Fadzil Abdul Kadir

Abstract:

Wireless Sensor Networks (WSNs) is an aggregation of several tiny, low-cost sensor nodes, spatially distributed to monitor physical or environmental status. WSN is constantly changing because of the rapid technological advancements in sensor elements such as radio, battery and operating systems. The Medium Access Control (MAC) protocols remain very vital in the WSN because of its role in coordinating communication amongst the sensors. Other than battery consumption, packet collision, network lifetime and latency are factors that largely depend on WSN MAC protocol and these factors have been widely treated in recent days. In this paper, we survey some latest proposed WSN Contention-based, Scheduling-based and Hybrid MAC protocols while presenting an examination, correlation of advantages and limitations of each protocol. Concentration is directed towards investigating the treatment of Quality of Service (QoS) performance metrics within these particular protocols. The result shows that majority of the protocols leaned towards energy conservation. We, therefore, believe that other performance metrics of guaranteed QoS such as latency, throughput, packet loss, network and bandwidth availability may play a critical role in the design of future MAC protocols for WSNs.

Keywords: WSN, QoS, energy consumption, MAC protocol

Procedia PDF Downloads 401
2514 A Survey on Various Technique of Modified TORA over MANET

Authors: Shreyansh Adesara, Sneha Pandiya

Abstract:

The mobile ad-hoc network (MANET) is an important and open area research for the examination and determination of the performance evolution. Temporary ordered routing algorithm (TORA) is adaptable and distributed MANET routing algorithm which is totally dependent on internet MANET Encapsulation protocol (IMEP) for the detection of the link and sensing of the link. If IMEP detect the wrong link failure then the network suffer from congestion and unnecessary route maintenance. Thus, the improvement in link detection method of TORA is introduced by various methods on IMEP by different perspective from different person. There are also different reactive routing protocols like AODV, TORA and DSR has been compared for the knowledge of the routing scenario for different parameter and using different model.

Keywords: IMEP, mobile ad-hoc network, protocol, TORA

Procedia PDF Downloads 442
2513 Functional and Stimuli Implementation and Verification of Programmable Peripheral Interface (PPI) Protocol

Authors: N. N. Joshi, G. K. Singh

Abstract:

We present the stimuli implementation and verification of a Programmable Peripheral Interface (PPI) 8255. It involves a designing and verification of configurable intellectual property (IP) module of PPI protocol using Verilog HDL for implementation part and System Verilog for verification. The overview of the PPI-8255 presented then the design specification implemented for the work following the functional description and pin configuration of PPI-8255. The coverage report of design shows that our design and verification environment covered 100% functionality in accordance with the design specification generated by the Questa Sim 10.0b.

Keywords: Programmable Peripheral Interface (PPI), verilog HDL, system verilog, questa sim

Procedia PDF Downloads 523
2512 A Named Data Networking Stack for Contiki-NG-OS

Authors: Sedat Bilgili, Alper K. Demir

Abstract:

The current Internet has become the dominant use with continuing growth in the home, medical, health, smart cities and industrial automation applications. Internet of Things (IoT) is an emerging technology to enable such applications in our lives. Moreover, Named Data Networking (NDN) is also emerging as a Future Internet architecture where it fits the communication needs of IoT networks. The aim of this study is to provide an NDN protocol stack implementation running on the Contiki operating system (OS). Contiki OS is an OS that is developed for constrained IoT devices. In this study, an NDN protocol stack that can work on top of IEEE 802.15.4 link and physical layers have been developed and presented.

Keywords: internet of things (IoT), named-data, named data networking (NDN), operating system

Procedia PDF Downloads 172
2511 Test-Retest Agreement, Random Measurement Error and Practice Effect of the Continuous Performance Test-Identical Pairs for Patients with Schizophrenia

Authors: Kuan-Wei Chen, Chien-Wei Chen, Tai-Ling Chang, Nan-Cheng Chen, Ching-Lin Hsieh, Gong-Hong Lin

Abstract:

Background and Purposes: Deficits in sustained attention are common in patients with schizophrenia. Such impairment can limit patients to effectively execute daily activities and affect the efficacy of rehabilitation. The aims of this study were to examine the test-retest agreement, random measurement error, and practice effect of the Continuous Performance Test-Identical Pairs (CPT-IP) (a commonly used sustained attention test) in patients with schizophrenia. The results can provide empirical evidence for clinicians and researchers to apply a sustained attention test with sound psychometric properties in schizophrenia patients. Methods: We recruited patients with chronic schizophrenia to be assessed twice with 1 week interval using CPT-IP. The intra-class correlation coefficient (ICC) was used to examine the test-retest agreement. The percentage of minimal detectable change (MDC%) was used to examine the random measurement error. Moreover, the standardized response mean (SRM) was used to examine the practice effect. Results: A total of 56 patients participated in this study. Our results showed that the ICC was 0.82, MDC% was 47.4%, and SRMs were 0.36 for the CPT-IP. Conclusion: Our results indicate that CPT-IP has acceptable test-retests agreement, substantial random measurement error, and small practice effect in patients with schizophrenia. Therefore, to avoid overestimating patients’ changes in sustained attention, we suggest that clinicians interpret the change scores of CPT-IP conservatively in their routine repeated assessments.

Keywords: schizophrenia, sustained attention, CPT-IP, reliability

Procedia PDF Downloads 305
2510 Power-Aware Adaptive Coverage Control with Consensus Protocol

Authors: Mert Turanli, Hakan Temeltas

Abstract:

In this paper, we propose a new approach to coverage control problem by using adaptive coordination and power aware control laws. Nonholonomic mobile nodes position themselves suboptimally according to a time-varying density function using Centroidal Voronoi Tesellations. The Lyapunov stability analysis of the adaptive and decentralized approach is given. A linear consensus protocol is used to establish synchronization among the mobile nodes. Also, repulsive forces prevent nodes from collision. Simulation results show that by using power aware control laws, energy consumption of the nodes can be reduced.

Keywords: power aware, coverage control, adaptive, consensus, nonholonomic, coordination

Procedia PDF Downloads 354
2509 The Impact of Bilateral Investment Treaties on Health-Related Intellectual Property Rights in the Agreement on Trade-Related Aspects of Intellectual Property Rights in the Kingdom of Saudi Arabia and Australia

Authors: Abdulrahman Fahim M. Alsulami

Abstract:

This paper is dedicated to a detailed investigation of the interaction between the agreement on trade-related aspects of intellectual property rights (TRIPS) and bilateral investment treaties (BITs) in the regulation of health-related intellectual property rights in Australia and the Kingdom of Saudi Arabia. The chosen research object is complex and requires a thorough examination of a set of factors influencing the problem under investigation. At the moment, to the author’s best knowledge’ there is no academic research that would conceptualize and critically compare the regulation of health-related intellectual property rights in these two countries. While there is a substantial amount of information in the literature on certain aspects of the problem, the existing knowledge about certain aspects of the health-related regulatory frameworks in Australia and Saudi Arabia barely explains in detail the specifics of the ways in which the TRIPS agreement interacts with (BITs) in the regulation of health-related intellectual property rights. Therefore, this paper will address an evident research gap by studying an intriguing yet under-researched problem. The paper comprises five subsections. The first subsection provides an overview of the investment climate in Saudi Arabia and Australia with an emphasis on the health care industry. It will cover political, economic, and social factors influencing the investment climate in these countries, the systems of intellectual property rights protection, recent patterns relevant to the investment climate’s development, and key characteristics of the investment climate in the health care industry. The second subsection analyses BITs in Saudi Arabia and Australia in light of the countries’ responsibilities under the TRIPS Agreement. The third subsection provides a critical examination of the interaction between the TRIPS Agreement and BITs in Saudi Arabia on the basis of data collected and analyzed in previous subsections. It will investigate key discrepancies concerning the regulation of health-related intellectual property rights in Saudi Arabia and Australia from the position of BITs’ interaction with the TRIPS Agreement and explore the existing procedures for clarifying priorities between them in regulating health-related intellectual property rights. The fourth subsection of the paper provides recommendations concerning the transformation of BITS into a TRIPS+ dimension in regulating health-related intellectual property rights in Saudi Arabia and Australia. The final subsection provides a summary of differences between the Australian and Saudi BITs from the perspective of the regulation of health-related intellectual property rights under the TRIPS agreement and bilateral investment treaties.

Keywords: Australia, bilateral investment treaties, IP law, public health sector, Saudi Arabia

Procedia PDF Downloads 145
2508 Factorial Design Analysis for Quality of Video on MANET

Authors: Hyoup-Sang Yoon

Abstract:

The quality of video transmitted by mobile ad hoc networks (MANETs) can be influenced by several factors, including protocol layers; parameter settings of each protocol. In this paper, we are concerned with understanding the functional relationship between these influential factors and objective video quality in MANETs. We illustrate a systematic statistical design of experiments (DOE) strategy can be used to analyse MANET parameters and performance. Using a 2k factorial design, we quantify the main and interactive effects of 7 factors on a response metric (i.e., mean opinion score (MOS) calculated by PSNR with Evalvid package) we then develop a first-order linear regression model between the influential factors and the performance metric.

Keywords: evalvid, full factorial design, mobile ad hoc networks, ns-2

Procedia PDF Downloads 415
2507 A Cognitive Schema of Architectural Designing Activity

Authors: Abdelmalek Arrouf

Abstract:

This article sets up a cognitive schema of the architectural designing activity. It begins by outlining, theoretically, an a priori model of its general cognitive mechanisms. The obtained theoretical framework represents the designing activity as a complex system composed of three interrelated subsystems of cognitive actions: a subsystem of meaning production, one of morphology production and finally a subsystem of navigation between the two formers. A protocol analysis that uses statistical and informational tools is then used to measure the validity of the built schema. The model thus achieved shows that the designer begins by conceiving abstract meanings, which he then translates into shapes. That’s why we call it a semio-morphic model of the designing activity.

Keywords: designing actions, model of the design process, morphosis, protocol analysis, semiosis

Procedia PDF Downloads 172