Search results for: key agreement protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2656

Search results for: key agreement protocol

2506 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 394
2505 Gender Agreement in Italian Compounds with Capo-

Authors: Irene Lami, Silvia Micheli, Jan Radimský, Joost van de Weijer

Abstract:

The present study examines gender agreement in Italian compounds with "capo-". Compounds containing "capo-" as the first element is highly productive in Italian and are attested from the earliest stages of the language, with "capo" indicating a prominent role in a group. This type of compound has become progressively more productive over time, establishing itself in the language to indicate human referents with a leadership role over someone or something belonging to both subordinate and coordinate compound categories. In light of the debates on the use of inclusive language, especially with regard to female professional titles in Italian, the gender agreement of the word "capo" is investigated, which in addition to social resistance, also encounters etymological resistance. Regarding the gender agreement of the word "capo-" as the first element of compounds, in addition to social and etymological resistances, morphological constraints must also be considered. In our experiment, 190 native informants were asked to match the gender of the given the word in a sentence, thinking of female referents. The results confirm a scalar hypothesis of gender agreement (i.e., titles traditionally attributed to women > titles traditionally attributed to men > the word "capo" in isolation > the word "capo-" as an element of subordinate compound > the word “capo-“ as an element of a coordinate compound). A significant interplay with number marking is also shown, as words are inflected in gender when the trait +plural is present. Moreover, the results show that, contrary to what is prescriptively established, speakers do inflect the word "capo" according to gender, in limited instances, even when this is found as a compound element, even though to a lesser extent than words that only have social hinders and not etymological or morphological ones. The results appear to show that, although a morphological obstacle is visible, sociolinguistic claims seem to be able to divert these obstacles. This study appears particularly suitable for replication tests over the next few decades, which, if society opens up further to claims of inclusiveness, could further corroborate this trend.

Keywords: compounds, gender inflection, Italian, morphology

Procedia PDF Downloads 58
2504 Decode and Forward Cooperative Protocol Enhancement Using Interference Cancellation

Authors: Siddeeq Y. Ameen, Mohammed K. Yousif

Abstract:

Cooperative communication systems are considered to be a promising technology to improve the system capacity, reliability and performances over fading wireless channels. Cooperative relaying system with a single antenna will be able to reach the advantages of multiple antenna communication systems. It is ideally suitable for the distributed communication systems; the relays can cooperate and form virtual MIMO systems. Thus the paper will aim to investigate the possible enhancement of cooperated system using decode and forward protocol. On decode and forward an attempt to cancel or at least reduce the interference instead of increasing the SNR values is achieved. The latter can be achieved via the use group of relays depending on the channel status from source to relay and relay to destination respectively. In the proposed system, the transmission time has been divided into two phases to be used by decode and forward protocol. The first phase has been allocated for the source to transmit its data whereas the relays and destination nodes are in receiving mode. On the other hand, the second phase is allocated for the first and second groups of relay nodes to relay the data to the destination node. Simulations results have shown an improvement in performance is achieved compared to the conventional decode and forward in terms of BER and transmission rate.

Keywords: cooperative systems, decode and forward, interference cancellation, virtual MIMO

Procedia PDF Downloads 324
2503 Cartagena Protocol and Beyond: Issues and Challenges in the Nigeria's Response to Biosafety

Authors: Dalhat Binta Dan - Ali

Abstract:

The reality of the new world economic order and the ever increasing importance of biotechnology in the global economy have necessitated the ratification of the Cartagena Protocol on Biosafety and the recent promulgation of Biosafety Act in Nigeria 2015. The legal regimes are anchored on the need to create an enabling environment for the flourishing of bio-trade and also to ensure the safety of the environment and human health. This paper critically examines the legal framework on biosafety by taking a cursory look at its philosophical foundation, key issues and milestones. The paper argues that the extant laws, though a giant leap in the establishment of a legal framework on biosafety, it posits that the legal framework raises debate and controversy on the difficulties of risk assessment on biodiversity and human health, other challenges includes lack of sound institutional capacity and the regimes direction of a hybrid approach between environmental conservation and trade issues. The paper recommend the need for the country to do more in the area of stimulating awareness and establishment of a sound institutional capacity to enable the law ensure adequate level of protection in the field of safe transfer, handling, and use of genetically modified organisms (GMOs) in Nigeria.

Keywords: Cartagena protocol, biosafety, issues, challenges, biotrade, genetically modified organism (GMOs), environment

Procedia PDF Downloads 327
2502 Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks

Authors: Awatef Chniguir, Tarek Farah, Zouhair Ben Jemaa, Safya Belguith

Abstract:

Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms’ performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN.

Keywords: clustering, heterogeneous, stability, scalability, IoT, WSN

Procedia PDF Downloads 133
2501 Performance Comparison of Reactive, Proactive and Hybrid Routing Protocols in Wireless Ad Hoc Networks

Authors: Kumar Manoj, Ramesh Kumar, Kumari Arti, Kumar Prashant

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper we compare AODV, DSDV, DSR and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyses these routing protocols by extensive simulations in OPNET simulator and show that how pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, data traffic sent, throughput, retransmission attempts.

Keywords: MANET, AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 680
2500 Comparison of the Classification of Cystic Renal Lesions Using the Bosniak Classification System with Contrast Enhanced Ultrasound and Magnetic Resonance Imaging to Computed Tomography: A Prospective Study

Authors: Dechen Tshering Vogel, Johannes T. Heverhagen, Bernard Kiss, Spyridon Arampatzis

Abstract:

In addition to computed tomography (CT), contrast enhanced ultrasound (CEUS), and magnetic resonance imaging (MRI) are being increasingly used for imaging of renal lesions. The aim of this prospective study was to compare the classification of complex cystic renal lesions using the Bosniak classification with CEUS and MRI to CT. Forty-eight patients with 65 cystic renal lesions were included in this study. All participants signed written informed consent. The agreement between the Bosniak classifications of complex renal lesions ( ≥ BII-F) on CEUS and MRI were compared to that of CT and were tested using Cohen’s Kappa. Sensitivity, specificity, positive and negative predictive values (PPV/NPV) and the accuracy of CEUS and MRI compared to CT in the detection of complex renal lesions were calculated. Twenty-nine (45%) out of 65 cystic renal lesions were classified as complex using CT. The agreement between CEUS and CT in the classification of complex cysts was fair (agreement 50.8%, Kappa 0.31), and was excellent between MRI and CT (agreement 93.9%, Kappa 0.88). Compared to CT, MRI had a sensitivity of 96.6%, specificity of 91.7%, a PPV of 54.7%, and an NPV of 54.7% with an accuracy of 63.1%. The corresponding values for CEUS were sensitivity 100.0%, specificity 33.3%, PPV 90.3%, and NPV 97.1% with an accuracy 93.8%. The classification of complex renal cysts based on MRI and CT scans correlated well, and MRI can be used instead of CT for this purpose. CEUS can exclude complex lesions, but due to higher sensitivity, cystic lesions tend to be upgraded. However, it is useful for initial imaging, for follow up of lesions and in those patients with contraindications to CT and MRI.

Keywords: Bosniak classification, computed tomography, contrast enhanced ultrasound, cystic renal lesions, magnetic resonance imaging

Procedia PDF Downloads 144
2499 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 482
2498 Mechanical Responses to Hip Versus Knee Induced Muscle Fatigue in Patellofemoral Pain Syndrome

Authors: Eman Ahmed Ahmed, Ghada Abdelmoneim Mohamed, Hamada Ahmed Hamada, Nagui Sobhi Nassif

Abstract:

Impaired skeletal muscle endurance may be an important causal factor in the development of patellofemoral pain syndrome (PFPS). However, there is lack of information regarding the effect of hip versus knee muscle fatigue on isokinetic parameters, and myoelectric activity of hip and knee muscles in these patients. Purpose: The study was conducted to investigate the effect of hip abductors versus knee extensors fatigue protocol on knee proprioception, hip and knee muscle strength and their myoelectric activity in patients with PFPS. Methods: Fifteen female patients with PFPS participated in the study. They were tested randomly under two fatiguing conditions; hip abductors and knee extensors fatigue protocols. Isolated muscle fatigue of two muscles was induced isokinetically on the affected side in a two separate sessions with a rest interval of at least three days. After determining peak torque, patients performed continuous maximal concentric-eccentric contraction of the selected muscle until the torque output dropped below 50% of peak torque value for 3 consecutive repetitions. Knee proprioception, eccentric hip abductors' peak torque, eccentric knee extensors' peak torque, EMG ratio of vastus medialis obliquus (VMO) / vastus lateralis (VL), and EMG activity of gluteus medius (GM) muscle, were recorded before and immediately after each fatigue protocol using the Biodex Isokinetic system and EMG Myosystem. Results: Two-way within subject MANOVA revealed that eccentric knee extensors’ peak torque decreased significantly after hip abductors fatigue protocol compared to pre fatigue condition (p<0.05). On the other hand, there was no statistically significant difference in the eccentric hip abductors’ peak torque after admitting knee extensors fatigue protocol (p > 0.05). Moreover, no significant difference was found in knee proprioception, EMG ratio of VMO/VL, and EMG activity of GM muscle, after either hip or knee fatigue protocol (p>0.05). Conclusion: A hip focused rehabilitation program may be beneficial in improving knee function through correcting faulty kinematics and hence decrease knee loading in patients with PFPS.

Keywords: electromyography, knee proprioception, mechanical responses, muscle fatigue, patellofemoral pain syndrome

Procedia PDF Downloads 312
2497 Collective Bargaining Agreement with Its Related Factors and Employees’ Perceived Productivity: The Case of an Academic Institution in Davao City, Philippines

Authors: Amylyn F. Labasano, M. S. Econ

Abstract:

The study predicts the impact of collective bargaining agreement and its related factors on employees’ perceived productivity in terms of union-management relation’s climate, income, fringe benefits, and job satisfaction of the employees. It also determines whether there are significant differences in the employees’ perceived productivity based on the demographic characteristics of the respondents. The results revealed that the relationship climate which exists between the union and the management is found to have significant adverse effect on the average unpaid hours spent by employees working within the college. On the other hand, the total monthly wage earnings of employees have negative effect on the average hours an employee spent in bringing his work home while job satisfaction positively influences the overall productivity level of employees. The result further shows significant differences in the productivity level of employees across civil status and current designation.

Keywords: perceived productivity, collective bargaining agreement, union, union-management relations climate, income, fringe benefits, job satisfaction

Procedia PDF Downloads 332
2496 Block Mining: Block Chain Enabled Process Mining Database

Authors: James Newman

Abstract:

Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.

Keywords: blockchain, process mining, memory optimization, protocol

Procedia PDF Downloads 104
2495 Care: A Cluster Based Approach for Reliable and Efficient Routing Protocol in Wireless Sensor Networks

Authors: K. Prasanth, S. Hafeezullah Khan, B. Haribalakrishnan, D. Arun, S. Jayapriya, S. Dhivya, N. Vijayarangan

Abstract:

The main goal of our approach is to find the optimum positions for the sensor nodes, reinforcing the communications in points where certain lack of connectivity is found. Routing is the major problem in sensor network’s data transfer between nodes. We are going to provide an efficient routing technique to make data signal transfer to reach the base station soon without any interruption. Clustering and routing are the two important key factors to be considered in case of WSN. To carry out the communication from the nodes to their cluster head, we propose a parameterizable protocol so that the developer can indicate if the routing has to be sensitive to either the link quality of the nodes or the their battery levels.

Keywords: clusters, routing, wireless sensor networks, three phases, sensor networks

Procedia PDF Downloads 506
2494 A Closed Loop Audit of Pre-operative Transfusion Samples in Orthopaedic Patients at a Major Trauma Centre

Authors: Tony Feng, Rea Thomson, Kathryn Greenslade, Ross Medine, Jennifer Easterbrook, Calum Arthur, Matilda Powell-bowns

Abstract:

There are clear guidelines on taking group and screen samples (G&S) for elective arthroplasty and major trauma. However, there is limited guidance on blood grouping for other trauma patients. The purpose of this study was to review the level of blood grouping at a major trauma centre and validate a protocol that limits the expensive processing of G&S samples. After reviewing the national guidance on transfusion samples in orthopaedic patients, data was prospectively collected for all orthopaedic admissions in the Royal Infirmary of Edinburgh between January to February 2023. The cause of admission, number of G&S samples processed on arrival and need for red cells was collected using the hospital blood bank. A new protocol was devised based on a multidisciplinary meeting which limited the requirement for G&S samples only to presentations in “category X”, including neck-of-femur fractures (NOFs), pelvic fractures and major trauma. A re-audit was completed between April and May after departmental education and institution of this protocol. 759 patients were admitted under orthopaedics in the major trauma centre across two separate months. 47% of patients were admitted with presentations falling in category X (354/759) and patients in this category accounted for 88% (92/104) of those requiring post-operative red cell transfusions. Of these, 51% were attributed to NOFs (47/92). In the initial audit, 50% of trauma patients outwith category X had samples sent (116/230), estimated to cost £3800. Of these 230 patients, 3% required post-operative transfusions (7/230). In the re-audit, 23% of patients outwith category X had samples sent (40/173), estimated to cost £1400, of which 3% (5/173) required transfusions. None of the transfusions in these patients in either audit were related to their operation and the protocol achieved an estimated cost saving of £2400 over one month. This study highlights the importance of sending samples for patients with certain categories of orthopaedic trauma (category X) due to the high demand for post-operative transfusions. However, the absence of transfusion requirements in other presentations suggests over-testing. While implementation of the new protocol has markedly reduced over-testing, additional interventions are required to reduce this further.

Keywords: blood transfusion, quality improvement, orthopaedics, trauma

Procedia PDF Downloads 77
2493 Effects of Using Clinical Practice Guidelines for Caring for Patients with Severe Sepsis or Septic Shock on Clinical Outcomes Based on the Sepsis Bundle Protocol at the ICU of Songkhla Hospital Thailand

Authors: Pornthip Seangsanga

Abstract:

Sepsis or septic shock needs urgent care because it is a cause of the high mortality rate if patients do not receive timely treatment. Songkhla Hospital does not have a clear system or clinical practice guidelines for treatment of patients with severe sepsis or septic shock, which contributes to the said problem.To compare clinical outcomes based on the protocol after using the clinical guidelines between the Emergency Room, Intensive Care Unit, and the Ward. This quasi-experimental study was conducted on the population and 50 subjects who were diagnosed with severe sepsis or septic shock from December 2013 to May 2014. The data were collected using a nursing care and referring record form for patients with severe sepsis or septic shock at Songkhla Hospital. The record form had been tested for its validity by three experts, and the IOC was 1.The mortality rate in patients with severe sepsis or septic shock who were moved from the ER to the ICU was significantly lower than that of those patients moved from the Ward to the ICU within 48 hours. This was because patients with severe sepsis or septic shock who were moved from the ER to the ICU received more fluid within the first six hours according to the protocol which helped patients to have adequate tissue perfusion within the first six hours, and that helped improve blood flow to the kidneys, and the patients’ urine was found to be with a higher quantity of 0.5 cc/kg/hr, than those patients who were moved from the Ward to the ICU. This study shows that patients with severe sepsis or septic shock need to be treated immediately. Using the clinical practice guidelines along with timely diagnosis and treatment based on the sepsis bundle in giving sufficient and suitable amount of fluid to help improve blood circulation and blood pressure can clearly prevent or reduce severity of complications.

Keywords: clinical practice guidelines, caring, septic shock, sepsis bundle protocol

Procedia PDF Downloads 296
2492 Performance Analysis and Energy Consumption of Routing Protocol in Manet Using Grid Topology

Authors: Vivek Kumar Singh, Tripti Singh

Abstract:

An ad hoc wireless network consists of mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol used for Mobile Ad hoc Network (MANET). Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks, so that MANET requires different protocols. This paper presents the performance analysis of the routing protocols used various parameter-patterns with Two-ray model.

Keywords: AODV, packet transmission rate, pause time, ZRP, QualNet 6.1

Procedia PDF Downloads 831
2491 Coding of RMAC and Its Theoretical and Simulation-Based Performance Comparison with SMAC

Authors: Hamida Qumber Ali, Waseem Muhammad Arain, Shama Siddiqui, Sayeed Ghani

Abstract:

We present an implementing of RMAC in TinyOS 1.x. RMAC is a cross layer and Duty-cycle MAC protocols that was proposed to provide energy efficient transmission services for wireless sensor networks. The protocol has a unique and efficient packet transmission scheduling mechanism that enables it to overcome delivery latency and overcome traffic congestion. Design details and implementation challenges are divulged. Experiments are conducted to show the correctness of our implementation with numerous assumptions. Simulations are performed to compare the performance of RMAC and SMAC. Our results show that RMAC outperforms SMAC in energy efficiency and delay.

Keywords: MAC protocol, performance, RMAC, wireless sensor networks

Procedia PDF Downloads 327
2490 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 308
2489 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 100
2488 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks

Authors: A. Khan, H. Mahmood

Abstract:

In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.

Keywords: energy holes, interference, routing, underwater

Procedia PDF Downloads 410
2487 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 437
2486 Implantology Failure: Epidemiological Survey among Tunisian Dentists

Authors: Faten Khanfir, Mohamed Tlili, Ali Medeb Hamrouni, Raki Selmi, M. S. Khalfi, Faten Ben Amor

Abstract:

Introduction: dental implant failure is a major concern for the clinician and the patient. Objectives: The aim of our study is to investigate the way in which 100 Tunisian dentists carried implant treatment for their patients from the early phase of planning and selection of patients to the placement of the implant in order to look for the implant failure factors. Results: significant correlations were found between failure rates > 5 and their corresponding factors as the number of implants placed (p = 0.001<0, 05), smoking (0.046 <0.05), unbalanced diabetes (0.03<0.05), aseptic protocol (= 0.004< 0.05) and the drilling speed (0,002<0.05) Conclusion: It seems that the number of implant placed, smoking, diabetes, aseptic protocol, and the drilling speed may contribute to dental implant failure.

Keywords: failure, implants, survey, risk, osseointegration

Procedia PDF Downloads 183
2485 Design Channel Non Persistent CSMA MAC Protocol Model for Complex Wireless Systems Based on SoC

Authors: Ibrahim A. Aref, Tarek El-Mihoub, Khadiga Ben Musa

Abstract:

This paper presents Carrier Sense Multiple Access (CSMA) communication model based on SoC design methodology. Such model can be used to support the modelling of the complex wireless communication systems, therefore use of such communication model is an important technique in the construction of high performance communication. SystemC has been chosen because it provides a homogeneous design flow for complex designs (i.e. SoC and IP based design). We use a swarm system to validate CSMA designed model and to show how advantages of incorporating communication early in the design process. The wireless communication created through the modeling of CSMA protocol that can be used to achieve communication between all the agents and to coordinate access to the shared medium (channel).

Keywords: systemC, modelling, simulation, CSMA

Procedia PDF Downloads 428
2484 Carbon Credits in Voluntary Carbon Markets: A Proposal for Iran

Authors: Saeed Mohammadirad

Abstract:

During the first commitment period of the Kyoto Protocol, many developed countries were forced to restrict carbon emissions. Although Iran was one of the countries of Kyoto protocol, due to some special conditions, it was not required to restrict its carbon emissions. Flexible mechanisms were developed to assist countries responsible for reducing their carbon emissions, and regulated carbon markets were introduced. Carbon credits which are provided by organizations in countries with no responsibility to restrict their carbon emissions are traded in voluntary markets. This study focuses on how to measure and report the carbon allowances and carbon credits from accounting view point under both regulated and voluntary markets.

Keywords: carbon credits, carbon markets, accounting, flexible mechanisms

Procedia PDF Downloads 409
2483 Energy Efficient Heterogeneous System for Wireless Sensor Networks (WSN)

Authors: José Anderson Rodrigues de Souza, Teles de Sales Bezerra, Saulo Aislan da Silva Eleuterio, Jeronimo Silva Rocha

Abstract:

Mobile devices are increasingly occupying sectors of society and one of its most important features is mobility. However, the use of mobile devices is subject to the lifetime of the batteries. Thus, the use of energy batteries has become an important issue in the study of wireless network technologies. In this context, new solutions that enable aggregate energy efficiency not only through energy saving, and principally they are evaluated from a more realistic model of energy discharge, if easy adaptation to existing protocols. This paper presents a study on the energy needed and the lifetime for Wireless Sensor Networks (WSN) using a heterogeneous network and applying the LEACH protocol.

Keywords: wireless sensor networks, energy efficiency, heterogeneous, LEACH protocol

Procedia PDF Downloads 581
2482 A Platform for Managing Residents' Carbon Trajectories Based on the City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Liu Xuebing, Lao Xuerui, Kuan Sinman, Jiang Yike, Wang Hanwei, Yang Xiaolang, Zhou Junjie, Xie Jinpeng

Abstract:

Climate change is a global problem facing humanity and this is now the consensus of the mainstream scientific community. In accordance with the carbon peak and carbon neutral targets and visions set out in the United Nations Framework Convention on Climate Change, the Kyoto Protocol and the Paris Agreement, this project uses the City Intelligent Model (CIM) and Artificial Intelligence Machine Vision (ICR) as the core technologies to accurately quantify low carbon behaviour into green corn, which is a means of guiding ecologically sustainable living patterns. Using individual communities as management units and blockchain as a guarantee of fairness in the whole cycle of green currency circulation, the project will form a modern resident carbon track management system based on the principle of enhancing the ecological resilience of communities and the cohesiveness of community residents, ultimately forming an ecologically sustainable smart village that can be self-organised and managed.

Keywords: urban planning, urban governance, CIM, artificial Intelligence, sustainable development

Procedia PDF Downloads 84
2481 Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)

Authors: Bilal Haider, Farhan Aadil

Abstract:

A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss.

Keywords: SDN, VANET, mobility management, optimization

Procedia PDF Downloads 171
2480 Micro-Electrical Discharge Machining (µEDM): Effect of the Electrochemical Etching Parameters on the Fabrication of Cylindrical Tungsten Micro-Tools

Authors: Asmae Tafraouti, Yasmina Layouni

Abstract:

The fabrication of cylindrical Tungsten micro-tools with a high aspect ratio is a real challenge because of several constraints that come into during their manufacture. In this paper, we will describe the process used to fabricate these micro-tools. It consists of using electrochemical etching. We will also present the optimal protocol that makes it possible to fabricate micro-tools with a high aspect ratio in a reproducible way. Next, we will show the limit of the experimental parameters chosen to manufacture micro-tools from a wire with an initial diameter of Φ_0=250µm. The protocol used allows obtaining an average diameter of Φ=88µm ±1 µm over a length of L=3.5mm.

Keywords: drop-off effect, electrochemical etching, micro-electrical discharge machining, tungsten micro-tools

Procedia PDF Downloads 191
2479 Time Synchronization between the eNBs in E-UTRAN under the Asymmetric IP Network

Authors: M. Kollar, A. Zieba

Abstract:

In this paper, we present a method for a time synchronization between the two eNodeBs (eNBs) in E-UTRAN (Evolved Universal Terrestrial Radio Access) network. The two eNBs are cooperating in so-called inter eNB CA (Carrier Aggregation) case and connected via asymmetrical IP network. We solve the problem by using broadcasting signals generated in E-UTRAN as synchronization signals. The results show that the time synchronization with the proposed method is possible with the error significantly less than 1 ms which is sufficient considering the time transmission interval is 1 ms in E-UTRAN. This makes this method (with low complexity) more suitable than Network Time Protocol (NTP) in the mobile applications with generated broadcasting signals where time synchronization in asymmetrical network is required.

Keywords: IP scheduled throughput, E-UTRAN, Evolved Universal Terrestrial Radio Access Network, NTP, Network Time Protocol, assymetric network, delay

Procedia PDF Downloads 361
2478 Direct Phoenix Identification and Antimicrobial Susceptibility Testing from Positive Blood Culture Broths

Authors: Waad Al Saleemi, Badriya Al Adawi, Zaaima Al Jabri, Sahim Al Ghafri, Jalila Al Hadhramia

Abstract:

Objectives: Using standard lab methods, a positive blood culture requires a minimum of two days (two occasions of overnight incubation) to obtain a final identification (ID) and antimicrobial susceptibility results (AST) report. In this study, we aimed to evaluate the accuracy and precision of identification and antimicrobial susceptibility testing of an alternative method (direct method) that will reduce the turnaround time by 24 hours. This method involves the direct inoculation of positive blood culture broths into the Phoenix system using serum separation tubes (SST). Method: This prospective study included monomicrobial-positive blood cultures obtained from January 2022 to May 2023 in SQUH. Blood cultures containing a mixture of organisms, fungi, or anaerobic organisms were excluded from this study. The result of the new “direct method” under study was compared with the current “standard method” used in the lab. The accuracy and precision were evaluated for the ID and AST using Clinical and Laboratory Standards Institute (CLSI) recommendations. The categorical agreement, essential agreement, and the rates of very major errors (VME), major errors (ME), and minor errors (MIE) for both gram-negative and gram-positive bacteria were calculated. Passing criteria were set according to CLSI. Result: The results of ID and AST were available for a total of 158 isolates. Of 77 isolates of gram-negative bacteria, 71 (92%) were correctly identified at the species level. Of 70 isolates of gram-positive bacteria, 47(67%) isolates were correctly identified. For gram-negative bacteria, the essential agreement of the direct method was ≥92% when compared to the standard method, while the categorical agreement was ≥91% for all tested antibiotics. The precision of ID and AST were noted to be 100% for all tested isolates. For gram-positive bacteria, the essential agreement was >93%, while the categorical agreement was >92% for all tested antibiotics except moxifloxacin. Many antibiotics were noted to have an unacceptable higher rate of very major errors including penicillin, cotrimoxazole, clindamycin, ciprofloxacin, and moxifloxacin. However, no error was observed in the results of vancomycin, linezolid, and daptomycin. Conclusion: The direct method of ID and AST for positive blood cultures using SST is reliable for gram negative bacteria. It will significantly decrease the turnaround time and will facilitate antimicrobial stewardship.

Keywords: bloodstream infection, oman, direct ast, blood culture, rapid identification, antimicrobial susceptibility, phoenix, direct inoculation

Procedia PDF Downloads 66
2477 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 407