Search results for: ultra-lightweight protocols
456 Hybrid Hierarchical Routing Protocol for WSN Lifetime Maximization
Authors: H. Aoudia, Y. Touati, E. H. Teguig, A. Ali Cherif
Abstract:
Conceiving and developing routing protocols for wireless sensor networks requires considerations on constraints such as network lifetime and energy consumption. In this paper, we propose a hybrid hierarchical routing protocol named HHRP combining both clustering mechanism and multipath optimization taking into account residual energy and RSSI measures. HHRP consists of classifying dynamically nodes into clusters where coordinators nodes with extra privileges are able to manipulate messages, aggregate data and ensure transmission between nodes according to TDMA and CDMA schedules. The reconfiguration of the network is carried out dynamically based on a threshold value which is associated with the number of nodes belonging to the smallest cluster. To show the effectiveness of the proposed approach HHRP, a comparative study with LEACH protocol is illustrated in simulations.Keywords: routing protocol, optimization, clustering, WSN
Procedia PDF Downloads 469455 Hybrid Multipath Congestion Control
Authors: Akshit Singhal, Xuan Wang, Zhijun Wang, Hao Che, Hong Jiang
Abstract:
Multiple Path Transmission Control Protocols (MPTCPs) allow flows to explore path diversity to improve the throughput, reliability and network resource utilization. However, the existing solutions may discourage users to adopt the solutions in the face of multipath scenario where different paths are charged based on different pricing structures, e.g., WiFi vs cellular connections, widely available for mobile phones. In this paper, we propose a Hybrid MPTCP (H-MPTCP) with a built-in mechanism to incentivize users to use multiple paths with different pricing structures. In the meantime, H-MPTCP preserves the nice properties enjoyed by the state-of-the-art MPTCP solutions. Extensive real Linux implementation results verify that H-MPTCP can indeed achieve the design objectives.Keywords: network, TCP, WiFi, cellular, congestion control
Procedia PDF Downloads 717454 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.Keywords: proxy signature, fault tolerance, rsa, key agreement protocol
Procedia PDF Downloads 286453 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 450452 Molecular Analysis of Somaclonal Variation in Tissue Culture Derived Bananas Using MSAP and SSR Marker
Authors: Emma K. Sales, Nilda G. Butardo
Abstract:
The project was undertaken to determine the effects of modified tissue culture protocols e.g. age of culture and hormone levels (2,4-D) in generating somaclonal variation. Moreover, the utility of molecular markers (SSR and MSAP) in sorting off types/somaclones were investigated. Results show that somaclonal variation is in effect due to prolonged subculture and high 2,4-D concentration. The resultant variation was observed to be due to high level of methylation events specifically cytosine methylation either at the internal or external cytosine and was identified by methylation sensitive amplification polymorphism (MSAP). Simple sequence repeats (SSR) on the other hand, was able to associate a marker to a trait of interest. These therefore, show that molecular markers can be an important tool in sorting out variation/mutants at an early stage.Keywords: methylation, MSAP, somaclones, SSR, subculture, 2, 4-D
Procedia PDF Downloads 301451 Secure Proxy Signature Based on Factoring and Discrete Logarithm
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.Keywords: discrete logarithm, factoring, proxy signature, key agreement
Procedia PDF Downloads 308450 Mathematical Model of Cancer Growth under the Influence of Radiation Therapy
Authors: Beata Jackowska-Zduniak
Abstract:
We formulate and analyze a mathematical model describing dynamics of cancer growth under the influence of radiation therapy. The effect of this type of therapy is considered as an additional equation of discussed model. Numerical simulations show that delay, which is added to ordinary differential equations and represent time needed for transformation from one type of cells to the other one, affects the behavior of the system. The validation and verification of proposed model is based on medical data. Analytical results are illustrated by numerical examples of the model dynamics. The model is able to reconstruct dynamics of treatment of cancer and may be used to determine the most effective treatment regimen based on the study of the behavior of individual treatment protocols.Keywords: mathematical modeling, numerical simulation, ordinary differential equations, radiation therapy
Procedia PDF Downloads 408449 Assessment of Breast, Lung and Liver Effective Doses in Heart Imaging by CT-Scan 128 Dual Sources with Use of TLD-100 in RANDO Phantom
Authors: Seyedeh Sepideh Amini, Navideh Aghaei Amirkhizi, Seyedeh Paniz Amini, Seyed Soheil Sayyahi, Mohammad Reza Davar Panah
Abstract:
CT-Scan is one of the lateral and sectional imaging methods that produce 3D-images with use of rotational x-ray tube around central axis. This study is about evaluation and calculation of effective doses around heart organs such as breast, lung and liver with CT-Scan 128 dual sources with TLD_100 and RANDO Phantom by spiral, flash and conventional protocols. In results, it is showed that in spiral protocol organs have maximum effective dose and minimum in flash protocol. Thus flash protocol advised for children and risk persons.Keywords: X-ray computed tomography, dosimetry, TLD-100, RANDO, phantom
Procedia PDF Downloads 474448 OILU Tag: A Projective Invariant Fiducial System
Authors: Youssef Chahir, Messaoud Mostefai, Salah Khodja
Abstract:
This paper presents the development of a 2D visual marker, derived from a recent patented work in the field of numbering systems. The proposed fiducial uses a group of projective invariant straight-line patterns, easily detectable and remotely recognizable. Based on an efficient data coding scheme, the developed marker enables producing a large panel of unique real time identifiers with highly distinguishable patterns. The proposed marker Incorporates simultaneously decimal and binary information, making it readable by both humans and machines. This important feature opens up new opportunities for the development of efficient visual human-machine communication and monitoring protocols. Extensive experiment tests validate the robustness of the marker against acquisition and geometric distortions.Keywords: visual markers, projective invariants, distance map, level sets
Procedia PDF Downloads 163447 Effect of Perioperative Multimodal Analgesia on Postoperative Opioid Consumption and Complications in Elderly Traumatic Hip Fracture Patients: A Systematic Review of Randomised Controlled Trials
Authors: Raheel Shakoor Siddiqui, Shahbaz Malik, Manikandar Srinivas Cheruvu, Sanjay Narayana Murthy, Livio DiMascio
Abstract:
Background: elderly traumatic hip fracture patients frequently present to trauma services globally. Rising low energy falls amongst an osteoporotic aging population is the commonest cause for injury. Hip fractures in this population are a major cause for severe pain, morbidity and mortality. The term hip fracture is interchangeable with neck of femur fracture, fractured neck of femur or proximal femur fracture. Hip fracture pain management protocols and guidelines suggest conventional analgesia, nerve block and opioid based treatment as rescue analgesia. There is a current global opioid crisis with overuse, abuse and dependence. Adverse opioid related complications in vulnerable elderly patients further adds to morbidity and mortality. Systematic reviews in literature have evidenced superiority of multimodal analgesia in osteoarthritic primary joint replacements compared to opioids however, this has not yet been conducted for elderly traumatic hip fracture patients. Aims: The primary aim of this systematic review is to provide standardised evidence following Cochrane and PRISMA guidance in determining advantages of perioperative multimodal analgesia over conventional opioid based treatments in elderly traumatic hip fractures. Methods: 5 databases were searched from January 2000-2023 which identified 8 randomised controlled trials and 446 total participants. These trials met defined PICOS eligibility criteria of patient mean age ≥ 65 years presenting with a unilateral traumatic fractured neck of femur for operative intervention. Analgesic intervention with perioperative multimodal analgesia has been compared to conventional opioid based analgesia. Outcomes of interest include, primarily, the change in postoperative opioid consumption within a 0-30 postoperative period and secondarily, the change in postoperative adverse events and complications. A qualitative synthesis has been performed due to clinical heterogenicity and variance amongst trials. Results: GRADE evidence of moderate quality supports perioperative multimodal analgesia leads to a reduction in postoperative opioid consumption however, low quality evidence supports a reduction of adverse effects and complications. Conclusion: Perioperative multimodal analgesia whether used preoperative, intraoperative and/or postoperative leads to a reduction in postoperative opioid consumption for elderly traumatic hip fracture patients. This review recommends the use of perioperative multimodal analgesia as part of hip fracture pain protocols however, caution and clinical judgement should be used as the risk of adverse effects may not be lower.Keywords: trauma, orthopaedics, hip, fracture, neck of femur fracture, analgesia, multimodal analgesia, opioid
Procedia PDF Downloads 97446 Elaboration and Characterization of CdxZn1-XS Thin Films Deposed by Chemical Bath Deposition
Authors: Zellagui Rahima, Chaumont Denis, Boughelout Abderrahman, Adnane Mohamed
Abstract:
Thin films of CdxZn1-xS were deposed by chemical bath deposition on glass substrates for photovoltaic applications. The thin films CdZnS were synthesized by chemical bath (CBD) with different deposition protocols for optimized the parameter of deposition as the temperature, time of deposition, concentrations of ion and pH. Surface morphology, optical and chemical composition properties of thin film CdZnS were investigated by SEM, EDAX, spectrophotometer. The transmittance is 80% in visible region 300 nm – 1000 nm; it has been observed in that films the grain size is between 50nm and 100nm measured by SEM image and we also note that the shape of particle is changing with the change in concentration. This result favors of application these films in solar cells; the chemical analysis with EDAX gives information about the presence of Cd, Zn and S elements and investigates the stoichiometry.Keywords: thin film, solar cells, transmition, cdzns
Procedia PDF Downloads 261445 Secure Optical Communication System Using Quantum Cryptography
Authors: Ehab AbdulRazzaq Hussein
Abstract:
Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).
Procedia PDF Downloads 404444 Single Centre Retrospective Analysis of MR Imaging in Placenta Accreta Spectrum Disorder with Histopathological Correlation
Authors: Frank Dorrian, Aniket Adhikari
Abstract:
The placenta accreta spectrum (PAS), which includes placenta accreta, increta, and percreta, is characterized by the abnormal implantation of placental chorionic villi beyond the decidua basalis. Key risk factors include placenta previa, prior cesarean sections, advanced maternal age, uterine surgeries, multiparity, pelvic radiation, and in vitro fertilization (IVF). The incidence of PAS has increased tenfold over the past 50 years, largely due to rising cesarean rates. PAS is associated with significant peripartum and postpartum hemorrhage. Magnetic resonance imaging (MRI) and ultrasound assist in the evaluation of PAS, enabling a multidisciplinary approach to mitigate morbidity and mortality. This study retrospectively analyzed PAS cases at Royal Prince Alfred Hospital, Sydney, Australia. Using the SAR-ESUR joint consensus statement, seven imaging signs were reassessed for their sensitivity and specificity in predicting PAS, with histopathological correlation. The standardized MRI protocols for PAS at the institution were also reviewed. Data were collected from the picture archiving and communication system (PACS) records from 2010 to July 2024, focusing on cases where MR imaging and confirmed histopathology or operative notes were available. This single-center, observational study provides insights into the reliability of MRI for PAS detection and the optimization of imaging protocols for accurate diagnosis. The findings demonstrate that intraplacental dark bands serve as highly sensitive markers for diagnosing PAS, achieving sensitivities of 88.9%, 85.7%, and 100% for placenta accreta, increta, and percreta, respectively, with a combined specificity of 42.9%. Sensitivity for abnormal vascularization was lower (33.3%, 28.6%, and 50%), with a specificity of 57.1%. The placenta bulge exhibited sensitivities of 55.5%, 57.1%, and 100%, with a specificity of 57.1%. Loss of the T2 hypointense interface had sensitivities of 66.6%, 85.7%, and 100%, with 42.9% specificity. Myometrial thinning showed high sensitivity across PAS conditions (88.9%, 71.4%, and 100%) and a specificity of 57.1%. Bladder wall thinning was sensitive only for placenta percreta (50%) but had a specificity of 100%. Focal exophytic mass displayed variable sensitivity (22.9%, 42.9%, and 100%) with a specificity of 85.7%. These results highlight the diagnostic variability among markers, with intraplacental dark bands and myometrial thinning being useful in detecting abnormal placentation, though they lack high specificity. The literature and the results of our study highlight that while no single feature can definitively diagnose PAS, the presence of multiple features -especially when combined with elevated clinical risk- significantly increases the likelihood of an underlying PAS. A thorough understanding of the range of MRI findings associated with PAS, along with awareness of the clinical significance of each sign, helps the radiologist more accurately diagnose the condition and assist in surgical planning, ultimately improving patient care.Keywords: placenta, accreta, spectrum, MRI
Procedia PDF Downloads 7443 Health and Safety Practices of Midsayapenos in Relation to The Governance of the Local Government Unit of Midsayap in Responding to the COVID-19 Pandemic
Authors: Jolai R. Garca, Sergio Mahinay Jr., Fathma Dubpaleg, Rhea Jaberina, Jovanne Mabit II
Abstract:
The COVID-19 pandemic has still been going on for almost two years now, but because of the health and safety practices of the citizens, together with the action of the Local Government Unit, it has slowly dissipated. This study investigated the relationship between the health and safety protocols as well as the status of governance of the Local Government Unit of Midsayap using the evidence-based key indicators of Good Governance aggregated from the Organisation for Economic Co-operation and Development (OECD). A quantitative research design was employed to determine the relationship of the variables under study. Findings showed that the residents of Midsayap often practice the necessary health and safety measures against COVID-19 and that the Local Government Unit of Midsayap is effective in responding to the pandemic.Keywords: governance, health and safety practices, covid-19, local government unit
Procedia PDF Downloads 176442 Capacity Estimation of Hybrid Automated Repeat Request Protocol for Low Earth Orbit Mega-Constellations
Authors: Arif Armagan Gozutok, Alper Kule, Burak Tos, Selman Demirel
Abstract:
Wireless communication chain requires effective ways to keep throughput efficiency high while it suffers location-dependent, time-varying burst errors. Several techniques are developed in order to assure that the receiver recovers the transmitted information without errors. The most fundamental approaches are error checking and correction besides re-transmission of the non-acknowledged packets. In this paper, stop & wait (SAW) and chase combined (CC) hybrid automated repeat request (HARQ) protocols are compared and analyzed in terms of throughput and average delay for the usage of low earth orbit (LEO) mega-constellations case. Several assumptions and technological implementations are considered as well as usage of low-density parity check (LDPC) codes together with several constellation orbit configurations.Keywords: HARQ, LEO, satellite constellation, throughput
Procedia PDF Downloads 145441 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol
Authors: S. Vasundra, D. Venkatesh
Abstract:
Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.Keywords: wireless networks, ant colony optimization, load balancing, architecture
Procedia PDF Downloads 421440 Analysis of Network Performance Using Aspect of Quantum Cryptography
Authors: Nisarg A. Patel, Hiren B. Patel
Abstract:
Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).Keywords: cryptography, networking, quantum, encryption and decryption
Procedia PDF Downloads 184439 Project Management Agile Model Based on Project Management Body of Knowledge Guideline
Authors: Mehrzad Abdi Khalife, Iraj Mahdavi
Abstract:
This paper presents the agile model for project management process. For project management process, the Project Management Body of Knowledge (PMBOK) guideline has been selected as platform. Combination of computational science and artificial intelligent methodology has been added to the guideline to transfer the standard to agile project management process. The model is the combination of practical standard, computational science and artificial intelligent. In this model, we present communication model and protocols to keep process agile. Here, we illustrate the collaboration man and machine in project management area with artificial intelligent approach.Keywords: artificial intelligent, conceptual model, man-machine collaboration, project management, standard
Procedia PDF Downloads 341438 Clinical Case Report of Fulminating Leptospirosis in a 4-Months Old Caucasian Dog: Public Health Significance and Ramifications
Authors: N. N. Pilau, M. S. Abubakar, A. Danmaigoro, P. C. Mshelia, Y. Sani
Abstract:
A severely debilitated 4months old Caucasian male dog presented dehydration, emaciation, vomiting, icteric ocular and oral mucous membranes, generalized lymphadenopathy, hematuria, anorexia and prolonged recumbency. Clinical workup was done in established protocols for diagnosis based on history, clinical signs and selected laboratory tests. Treatment course were administered over 48hours during which the patient died of overwhelming hepatopathy, nephropathy and pneumonia. Postmortem findings supported by ante mortem laboratory test results tentatively diagnosed leptospirosis, a disease endemic and presenting potentially fatal epidemics and zoonoses in some countries amongst the developing regions of the world. This disease is reviewed and a call for attention on the public health significance of the disease is hereby presented through this case report.Keywords: canine, endemic, leptospirosis, prevalence
Procedia PDF Downloads 515437 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 215436 Emotion Regulation and Executive Functioning Scale for Children and Adolescents (REMEX): Scale Development
Authors: Cristina Costescu, Carmen David, Adrian Roșan
Abstract:
Executive functions (EF) and emotion regulation strategies are processes that allow individuals to function in an adaptative way and to be goal-oriented, which is essential for success in daily living activities, at school, or in social contexts. The Emotion Regulation and Executive Functioning Scale for Children and Adolescents (REMEX) represents an empirically based tool (based on the model of EF developed by Diamond) for evaluating significant dimensions of child and adolescent EFs and emotion regulation strategies, mainly in school contexts. The instrument measures the following dimensions: working memory, inhibition, cognitive flexibility, executive attention, planning, emotional control, and emotion regulation strategies. Building the instrument involved not only a top-down process, as we selected the content in accordance with prominent models of FE, but also a bottom-up one, as we were able to identify valid contexts in which FE and ER are put to use. For the construction of the instrument, we implemented three focus groups with teachers and other professionals since the aim was to develop an accurate, objective, and ecological instrument. We used the focus group method in order to address each dimension and to yield a bank of items to be further tested. Each dimension is addressed through a task that the examiner will apply and through several items derived from the main task. For the validation of the instrument, we plan to use item response theory (IRT), also known as the latent response theory, that attempts to explain the relationship between latent traits (unobservable cognitive processes) and their manifestations (i.e., observed outcomes, responses, or performance). REMEX represents an ecological scale that integrates a current scientific understanding of emotion regulation and EF and is directly applicable to school contexts, and it can be very useful for developing intervention protocols. We plan to test his convergent validity with the Childhood Executive Functioning Inventory (CHEXI) and Emotion Dysregulation Inventory (EDI) and divergent validity between a group of typically developing children and children with neurodevelopmental disorders, aged between 6 and 9 years old. In a previous pilot study, we enrolled a sample of 40 children with autism spectrum disorders and attention-deficit/hyperactivity disorder aged 6 to 12 years old, and we applied the above-mentioned scales (CHEXI and EDI). Our results showed that deficits in planning, bebavior regulation, inhibition, and working memory predict high levels of emotional reactivity, leading to emotional and behavioural problems. Considering previous results, we expect our findings to provide support for the validity and reliability of the REMEX version as an ecological instrument for assessing emotion regulation and EF in children and for key features of its uses in intervention protocols.Keywords: executive functions, emotion regulation, children, item response theory, focus group
Procedia PDF Downloads 100435 Autism Screening Questionnaire for Daycare Attendees
Authors: David Alejandro Torres-Lopez , Lilia Albores-Gallo, Ronald Soto-Calderon, Roberto Lagunes-Cordoba
Abstract:
Autism Screening Questionnaire for Daycare Attendees (ASQ-DAT) is a screening instrument that assesses the risk of autism in children between 12 and 47 months, being the first free observational instrument created according to the criteria of the DSM-5 that can be applied by teachers in nurseries. The people in charge of answering the questionnaires are the daycare assistants. Its application presents a series of previous activities with which daycare assistants are familiar (dance, games, oral narration and breakfast), which are executed with the children and then answer a questionnaire with dichotomous questions "Yes/No" in approximately 3 minutes per child. The instrument was developed with the participation of nurseries according to the protocols of the creation of psychometric instruments of the Classical Test Theory having as a gold standard ADOS-2 Modules T and 1. The results of the investigation show that the use of ASQ-DAT combined with the application of M-CHAT / RF provides more information about the risk of ASD in young children, which allows improvements in the screening.Keywords: diagnosis, screening, autism, daycare
Procedia PDF Downloads 219434 HIS Integration Systems Using Modality Worklist and DICOM
Authors: Kulvinder Singh Mann
Abstract:
The usability and simulation of information systems, known as Hospital Information System (HIS), Radiology Information System (RIS), and Picture Archiving, Communication System, for electronic medical records has shown a good impact for actors in the hospital. The objective is to help and make their work easier; such as for a nurse or administration staff to record the medical records of the patient, and for a patient to check their bill transparently. However, several limitations still exists on such area regarding the type of data being stored in the system, ability for data transfer, storage and protocols to support communication between medical devices and digital images. This paper reports the simulation result of integrating several systems to cope with those limitations by using the Modality Worklist and DICOM standard. It succeeds in documenting the reason of that failure so future research will gain better understanding and be able to integrate those systems.Keywords: HIS, RIS, PACS, modality worklist, DICOM, digital images
Procedia PDF Downloads 317433 A New Method for Fault Detection
Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed
Abstract:
Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths
Procedia PDF Downloads 448432 Behaviour of Non-local Correlations and Quantum Information Theoretic Measures in Frustrated Molecular Wheels
Authors: Amit Tribedi
Abstract:
Genuine Quantumness present in Quantum Systems is the resource for implementing Quantum Information and Computation Protocols which can outperform the classical counterparts. These Quantumness measures encompass non-local ones known as quantum entanglement (QE) and quantum information theoretic (QIT) ones, e.g. Quantum Discord (QD). In this paper, some well-known measures of QE and QD in some wheel-like frustrated molecular magnetic systems have been studied. One of the systems has already been synthesized using coordination chemistry, and the other is hypothetical, where the dominant interaction is the spin-spin exchange interaction. Exact analytical methods and exact numerical diagonalization methods have been used. Some counter-intuitive non-trivial features, like non-monotonicity of quantum correlations with temperature, persistence of multipartite entanglement over bipartite ones etc. indicated by the behaviour of the correlations and the QIT measures have been found. The measures, being operational ones, can be used to realize the resource of Quantumness in experiments.Keywords: 0D Magnets, discord, entanglement, frustration
Procedia PDF Downloads 228431 Overview of Wireless Body Area Networks
Authors: Rashi Jain
Abstract:
The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.Keywords: vehicular networks, sensors, MicroController 8085, LTE
Procedia PDF Downloads 259430 A Multilevel Authentication Protocol: MAP in VANET for Human Safety
Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed
Abstract:
Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay
Procedia PDF Downloads 296429 Human Rights as Part of the Core Values System of International Organisations: A Comparative Study
Authors: Ayyoub Jamali, Jennie Edlund, Alena Kozlová
Abstract:
This paper evaluates the monitoring, prevention, and enforcing mechanisms of the core values of international organisations (IOs) in a comparative human rights perspective. The IOs in focus are the European Union, the Council of Europe, the African Union, and the Organization of American States. The paper will take the founding treaties of these IOs and their relevant protocols as a starting point to identify the values and the mechanisms used for their implementation. It will explore the scope of violations, the procedures in place and evaluate what type of response to those breaches seems to work best in terms of achieving its declared objectives. The study will identify and compare the weaknesses and strengths of each mechanism used by the IOs and recognize common challenges and means, thereby drawing inter-organizational comparisons. Consequently, the findings of this paper can be used among the IOs to improve their system and thus enhance their effectiveness.Keywords: international organizations, core values, human rights, enforcement mechanism, compliance
Procedia PDF Downloads 180428 The Burmese Exodus of 1942: Towards Evolving Policy Protocols for a Refugee Archive
Authors: Vinod Balakrishnan, Chrisalice Ela Joseph
Abstract:
The Burmese Exodus of 1942, which left more than 4 lakh as refugees and thousands dead, is one of the worst forced migrations in recorded history. Adding to the woes of the refugees is the lack of credible documentation of their lived experiences, trauma, and stories and their erasure from recorded history. Media reports, national records, and mainstream narratives that have registered the exodus provide sanitized versions which have reduced the refugees to a nameless, faceless mass of travelers and obliterated their lived experiences, trauma, and sufferings. This attitudinal problem compels the need to stem the insensitivity that accompanies institutional memory by making a case for a more humanistically evolved policy that puts in place protocols for the way the humanities would voice the concern for the refugee. A definite step in this direction and a far more relevant project in our times is the need to build a comprehensive refugee archive that can be a repository of the refugee experiences and perspectives. The paper draws on Hannah Arendt’s position on the Jewish refugee crisis, Agamben’s work on statelessness and citizenship, Foucault’s notion of governmentality and biopolitics, Edward Said’s concepts on Exile, Fanon’s work on the dispossessed, Derrida’s work on ‘the foreigner and hospitality’ in order to conceptualize the refugee condition which will form the theoretical framework for the paper. It also refers to the existing scholarship in the field of refugee studies such as Roger Zetter’s work on the ‘refugee label’, Philip Marfleet’s work on ‘refugees and history’, Lisa Malkki’s research on the anthropological discourse of the refugee and refugee studies. The paper is also informed by the work that has been done by the international organizations to address the refugee crisis. The emphasis is on building a strong argument for the establishment of the refugee archive that finds but a passing and a none too convincing reference in refugee studies in order to enable a multi-dimensional understanding of the refugee crisis. Some of the old questions cannot be dismissed as outdated as the continuing travails of the refugees in different parts of the world only remind us that they are still, largely, unanswered. The questions are -What is the nature of a Refugee Archive? How is it different from the existing historical and political archives? What are the implications of the refugee archive? What is its contribution to refugee studies? The paper draws on Diana Taylor’s concept of the archive and the repertoire to theorize the refugee archive as a repository that has the documentary function of the ‘archive’ and the ‘agency’ function of the repertoire. It then reads Ayya’s Accounts- a memoir by Anand Pandian -in the light of Hannah Arendt’s concepts of the ‘refugee as vanguard’ and ‘story telling as political action’- to illustrate how the memoir contributes to the refugee archive that provides the refugee a place and agency in history. The paper argues for a refugee archive that has implications for the formulation of inclusive refugee policies.Keywords: Ayya’s Accounts, Burmese Exodus, policy protocol, refugee archive
Procedia PDF Downloads 140427 A Secure Routing Algorithm for Underwater Wireless Sensor Networks
Authors: Seyed Mahdi Jameii
Abstract:
Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay.Keywords: attacks, routing, security, underwater wireless sensor networks
Procedia PDF Downloads 418