Search results for: secure mean and variance
1662 The Impact of Information and Communication Technologies on Teaching Performance at an Iranian University
Authors: Yusef Hedjazi, Saeedeh Nazari Nooghabi
Abstract:
New information and communication technologies (ICT) as one of the main needs of Faculty members in the process of teaching and learning has used in Irans higher education system since 2000.The main purpose of this study is to investigate the role of information and communication technologies (ICT) in teaching performance of Agricultural and Natural Resources Faculties at University of Tehran. The statistical population of the study consisted of all 250 faculties in Agriculture and Natural Resources Colleges and a questionnaire was used to collect data. The reliability of the questionnaire was confirmed by computing of Cronbachs Alpha coefficient at greater than .72. The study showed a significant relationship between agricultural Faculty members teaching performance and competency in using ICT. The results of the regression analysis also explained 51.7% of the variance, teaching performance. The six independent variables that accounted for the explained variance were experience in using educational websites or software, use of educational multimedia (e.g. film and CD, etc), making a presentation using PowerPoint, familiarity with online education websites, using News group to discuss on educational subjects with colleagues and students, and using Electronic communication (messengers) to solve studentsproblems.Keywords: information and communication technologies, agricultural and natural resources, faculties, teaching performance
Procedia PDF Downloads 3331661 Factors Predicting Symptom Cluster Functional Status and Quality of Life of Chronic Obstructive Pulmonary Disease Patients
Authors: D. Supaporn, B. Julaluk
Abstract:
The purposes of this study were to study symptom cluster, functional status and quality of life of patients with chronic obstructive pulmonary disease (COPD), and to examine factors related to and predicting symptom cluster, functional status and quality of life of COPD patients. The sample was 180 COPD patients multi-stage random sampling from 4 hospitals in the eastern region, Thailand. The research instruments were 8 questionnaires and recorded forms measuring personal and illness data, co-morbidity, physical and psychological symptom, health status perception, social support, and regimen adherence, functional status and quality of life. Spearman rank and Pearson correlation coefficient, exploratory factors analysis and standard multiple regression were used to analyzed data. The findings revealed that two symptom clusters were generated: physical symptom cluster including dyspnea, fatigue and insomnia; and, psychological symptom cluster including anxiety and depression. Scores of physical symptom cluster was at moderate level while that of psychological symptom cluster was at low level. Scores on functional status, social support and overall regimen adherence were at good level whereas scores on quality of life and health status perception were at moderate level. Disease severity was positively related to physical symptom cluster, psychological symptom cluster and quality of life, and was negatively related to functional status at a moderate level (rs = .512, .509, .588 and -.611, respectively). Co-morbidity was positively related to physical symptom cluster and psychological symptom cluster at a low level (r = .179 and .176, respectively). Regimen adherence was negatively related to quality of life and psychological symptom cluster at a low level (r=-.277 and -.309, respectively), and was positively related to functional status at a moderate level (r=.331). Health status perception was negatively related to physical symptom cluster, psychological symptom cluster and quality of life at a moderate to high level (r = -.567, -.640 and -.721, respectively) and was positively related to functional status at a high level (r = .732). Social support was positively related to functional status (r=.235) and was negatively related to quality of life at a low level (r=-.178). Physical symptom cluster was negatively related to functional status (r= -.490) and was positively related to quality of life at a moderate level (r=.566). Psychological symptom cluster was negatively related to functional status and was positively related to quality of life at a moderate level (r= -.566 and .559, respectively). Disease severity, co-morbidity and health status perception could predict 40.2% of the variance of physical symptom cluster. Disease severity, co-morbidity, regimen adherence and health status perception could predict 49.8% of the variance of psychological symptom cluster. Co-morbidity, regimen adherence and health status perception could predict 65.0% of the variance of functional status. Disease severity, health status perception and physical symptom cluster could predict 60.0% of the variance of quality of life in COPD patients. The results of this study can be used for enhancing quality of life of COPD patients.Keywords: chronic obstructive pulmonary disease, functional status, quality of life, symptom cluster
Procedia PDF Downloads 5581660 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization
Authors: Hebberly Ahatlan
Abstract:
The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain
Procedia PDF Downloads 1831659 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)
Authors: Serkan Tezgel
Abstract:
The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.Keywords: security, cooperation, asymmetrical, area denial
Procedia PDF Downloads 8031658 Explaining Listening Comprehension among L2 Learners of English: The Contribution of Vocabulary Knowledge and Working Memory Capacity
Authors: Ahmed Masrai
Abstract:
Listening comprehension constitutes a considerable challenge for the second language (L2) learners, but a little is known about the explanatory power of different variables in explaining variance in listening comprehension. Since research in this area, to the researcher's knowledge, is relatively small in comparison to that focusing on the relationship between reading comprehension and factors such as vocabulary and working memory, there is a need for studies that are seeking to fill the gap in our knowledge about the specific contribution of working memory capacity (WMC), aural vocabulary knowledge and written vocabulary knowledge to explaining listening comprehension. Among 130 English as foreign language learners, the present study examines what proportion of the variance in listening comprehension is explained by aural vocabulary knowledge, written vocabulary knowledge, and WMC. Four measures were used to collect the required data for the study: (1) A-Lex, a measure of aural vocabulary knowledge; (2) XK-Lex, a measure of written vocabulary knowledge; (3) Listening Span Task, a measure of WMC and; (4) IELTS Listening Test, a measure of listening comprehension. The results show that aural vocabulary knowledge is the strongest predictor of listening comprehension, followed by WMC, while written vocabulary knowledge is the weakest predictor. The study discusses implications for the explanatory power of aural vocabulary knowledge and WMC to listening comprehension and pedagogical practice in L2 classrooms.Keywords: listening comprehension, second language, vocabulary knowledge, working memory
Procedia PDF Downloads 3831657 The Effect of MOOC-Based Distance Education in Academic Engagement and Its Components on Kerman University Students
Authors: Fariba Dortaj, Reza Asadinejad, Akram Dortaj, Atena Baziyar
Abstract:
The aim of this study was to determine the effect of distance education (based on MOOC) on the components of academic engagement of Kerman PNU. The research was quasi-experimental method that cluster sampling with an appropriate volume was used in this study (one class in experimental group and one class in controlling group). Sampling method is single-stage cluster sampling. The statistical society is students of Kerman Payam Noor University, which) were selected 40 of them as sample (20 students in the control group and 20 students in experimental group). To test the hypothesis, it was used the analysis of univariate and Co-covariance to offset the initial difference (difference of control) in the experimental group and the control group. The instrument used in this study is academic engagement questionnaire of Zerang (2012) that contains component of cognitive, behavioral and motivational engagement. The results showed that there is no significant difference between mean scores of academic components of academic engagement in experimental group and the control group on the post-test, after elimination of the pre-test. The adjusted mean scores of components of academic engagement in the experimental group were higher than the adjusted average of scores after the test in the control group. The use of technology-based education in distance education has been effective in increasing cognitive engagement, motivational engagement and behavioral engagement among students. Experimental variable with the effect size 0.26, predicted 26% of cognitive engagement component variance. Experimental variable with the effect size 0.47, predicted 47% of the motivational engagement component variance. Experimental variable with the effect size 0.40, predicted 40% of behavioral engagement component variance. So teaching with technology (MOOC) has a positive impact on increasing academic engagement and academic performance of students in educational technology. The results suggest that technology (MOOC) is used to enrich the teaching of other lessons of PNU.Keywords: educational technology, distance education, components of academic engagement, mooc technology
Procedia PDF Downloads 1491656 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.
Procedia PDF Downloads 361655 Cross-Validation of the Data Obtained for ω-6 Linoleic and ω-3 α-Linolenic Acids Concentration of Hemp Oil Using Jackknife and Bootstrap Resampling
Authors: Vibha Devi, Shabina Khanam
Abstract:
Hemp (Cannabis sativa) possesses a rich content of ω-6 linoleic and ω-3 linolenic essential fatty acid in the ratio of 3:1, which is a rare and most desired ratio that enhances the quality of hemp oil. These components are beneficial for the development of cell and body growth, strengthen the immune system, possess anti-inflammatory action, lowering the risk of heart problem owing to its anti-clotting property and a remedy for arthritis and various disorders. The present study employs supercritical fluid extraction (SFE) approach on hemp seed at various conditions of parameters; temperature (40 - 80) °C, pressure (200 - 350) bar, flow rate (5 - 15) g/min, particle size (0.430 - 1.015) mm and amount of co-solvent (0 - 10) % of solvent flow rate through central composite design (CCD). CCD suggested 32 sets of experiments, which was carried out. As SFE process includes large number of variables, the present study recommends the application of resampling techniques for cross-validation of the obtained data. Cross-validation refits the model on each data to achieve the information regarding the error, variability, deviation etc. Bootstrap and jackknife are the most popular resampling techniques, which create a large number of data through resampling from the original dataset and analyze these data to check the validity of the obtained data. Jackknife resampling is based on the eliminating one observation from the original sample of size N without replacement. For jackknife resampling, the sample size is 31 (eliminating one observation), which is repeated by 32 times. Bootstrap is the frequently used statistical approach for estimating the sampling distribution of an estimator by resampling with replacement from the original sample. For bootstrap resampling, the sample size is 32, which was repeated by 100 times. Estimands for these resampling techniques are considered as mean, standard deviation, variation coefficient and standard error of the mean. For ω-6 linoleic acid concentration, mean value was approx. 58.5 for both resampling methods, which is the average (central value) of the sample mean of all data points. Similarly, for ω-3 linoleic acid concentration, mean was observed as 22.5 through both resampling. Variance exhibits the spread out of the data from its mean. Greater value of variance exhibits the large range of output data, which is 18 for ω-6 linoleic acid (ranging from 48.85 to 63.66 %) and 6 for ω-3 linoleic acid (ranging from 16.71 to 26.2 %). Further, low value of standard deviation (approx. 1 %), low standard error of the mean (< 0.8) and low variance coefficient (< 0.2) reflect the accuracy of the sample for prediction. All the estimator value of variance coefficients, standard deviation and standard error of the mean are found within the 95 % of confidence interval.Keywords: resampling, supercritical fluid extraction, hemp oil, cross-validation
Procedia PDF Downloads 1411654 A Tool to Provide Advanced Secure Exchange of Electronic Documents through Europe
Authors: Jesus Carretero, Mario Vasile, Javier Garcia-Blas, Felix Garcia-Carballeira
Abstract:
Supporting cross-border secure and reliable exchange of data and documents and to promote data interoperability is critical for Europe to enhance sector (like eFinance, eJustice and eHealth). This work presents the status and results of the European Project MADE, a Research Project funded by Connecting Europe facility Programme, to provide secure e-invoicing and e-document exchange systems among Europe countries in compliance with the eIDAS Regulation (Regulation EU 910/2014 on electronic identification and trust services). The main goal of MADE is to develop six new AS4 Access Points and SMP in Europe to provide secure document exchanges using the eDelivery DSI (Digital Service Infrastructure) amongst both private and public entities. Moreover, the project demonstrates the feasibility and interest of the solution provided by providing several months of interoperability among the providers of the six partners in different EU countries. To achieve those goals, we have followed a methodology setting first a common background for requirements in the partner countries and the European regulations. Then, the partners have implemented access points in each country, including their service metadata publisher (SMP), to allow the access to their clients to the pan-European network. Finally, we have setup interoperability tests with the other access points of the consortium. The tests will include the use of each entity production-ready Information Systems that process the data to confirm all steps of the data exchange. For the access points, we have chosen AS4 instead of other existing alternatives because it supports multiple payloads, native web services, pulling facilities, lightweight client implementations, modern crypto algorithms, and more authentication types, like username-password and X.509 authentication and SAML authentication. The main contribution of MADE project is to open the path for European companies to use eDelivery services with cross-border exchange of electronic documents following PEPPOL (Pan-European Public Procurement Online) based on the e-SENS AS4 Profile. It also includes the development/integration of new components, integration of new and existing logging and traceability solutions and maintenance tool support for PKI. Moreover, we have found that most companies are still not ready to support those profiles. Thus further efforts will be needed to promote this technology into the companies. The consortium includes the following 9 partners. From them, 2 are research institutions: University Carlos III of Madrid (Coordinator), and Universidad Politecnica de Valencia. The other 7 (EDICOM, BIZbrains, Officient, Aksesspunkt Norge, eConnect, LMT group, Unimaze) are private entities specialized in secure delivery of electronic documents and information integration brokerage in their respective countries. To achieve cross-border operativity, they will include AS4 and SMP services in their platforms according to the EU Core Service Platform. Made project is instrumental to test the feasibility of cross-border documents eDelivery in Europe. If successful, not only einvoices, but many other types of documents will be securely exchanged through Europe. It will be the base to extend the network to the whole Europe. This project has been funded under the Connecting Europe Facility Agreement number: INEA/CEF/ICT/A2016/1278042. Action No: 2016-EU-IA-0063.Keywords: security, e-delivery, e-invoicing, e-delivery, e-document exchange, trust
Procedia PDF Downloads 2651653 Digital Media Market, Multimedia, and Computer Graphic Analysis Amidst Fluctuating Global and Local Scale Economy
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study centred on investigating the influence of multimedia systems and computer graphic design on global and local scale economies. Firstly, the study pinpointed the significant participants and top five global digital media distribution in the digital media market. Then, the study investigated whether a tie or variance existed between the digital media vendor and market shares. Also, the paper probed whether the global and local desktop, mobile, and tablet markets differ while assessing the association between the top five digital media and global market shares. Finally, the study explored the extent of growth, economic gains, major setbacks, and opportunities within the industry amidst global and local scale economic flux. A multiple regression analysis method was employed to analyse the significant influence of the top five global digital media on the total market share, and the Analysis of Variance (ANOVA) was used to analyse the global digital media vendor market share data. The findings were intriguing and significant.Keywords: computer graphics, digital media market, global market share, market size, media vendor, multimedia, social media, systems design
Procedia PDF Downloads 321652 Investigation of Surface Electromyograph Signal Acquired from the around Shoulder Muscles of Upper Limb Amputees
Authors: Amanpreet Kaur, Ravinder Agarwal, Amod Kumar
Abstract:
Surface electromyography is a strategy to measure the muscle activity of the skin. Sensors placed on the skin recognize the electrical current or signal generated by active muscles. A lot of the research has focussed on the detection of signal from upper limb amputee with activity of triceps and biceps muscles. The purpose of this study was to correlate phantom movement and sEMG activity in residual stump muscles of transhumeral amputee from the shoulder muscles. Eight non- amputee and seven right hand amputees were recruited for this study. sEMG data were collected for the trapezius, pectoralis and teres muscles for elevation, protraction and retraction of shoulder. Contrast between the amputees and non-amputees muscles action have been investigated. Subsequently, to investigate the impact of class separability for different motions of shoulder, analysis of variance for experimental recorded data was carried out. Results were analyzed to recognize different shoulder movements and represent a step towards the surface electromyography controlled system for amputees. Difference in F ratio (p < 0.05) values indicates the distinction in mean therefore these analysis helps to determine the independent motion. The identified signal would be used to design more accurate and efficient controllers for the upper-limb amputee for researchers.Keywords: around shoulder amputation, surface electromyography, analysis of variance, features
Procedia PDF Downloads 4341651 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud
Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya
Abstract:
Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture
Procedia PDF Downloads 1591650 An Optimization of Machine Parameters for Modified Horizontal Boring Tool Using Taguchi Method
Authors: Thirasak Panyaphirawat, Pairoj Sapsmarnwong, Teeratas Pornyungyuen
Abstract:
This paper presents the findings of an experimental investigation of important machining parameters for the horizontal boring tool modified to mouth with a horizontal lathe machine to bore an overlength workpiece. In order to verify a usability of a modified tool, design of experiment based on Taguchi method is performed. The parameters investigated are spindle speed, feed rate, depth of cut and length of workpiece. Taguchi L9 orthogonal array is selected for four factors three level parameters in order to minimize surface roughness (Ra and Rz) of S45C steel tubes. Signal to noise ratio analysis and analysis of variance (ANOVA) is performed to study an effect of said parameters and to optimize the machine setting for best surface finish. The controlled factors with most effect are depth of cut, spindle speed, length of workpiece, and feed rate in order. The confirmation test is performed to test the optimal setting obtained from Taguchi method and the result is satisfactory.Keywords: design of experiment, Taguchi design, optimization, analysis of variance, machining parameters, horizontal boring tool
Procedia PDF Downloads 4401649 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 3911648 Impact of Macroeconomic Variables on Indian Mutual Funds: A Time Series Analysis
Authors: Sonali Agarwal
Abstract:
The investor perception about investment avenues is affected to a great degree by the current happenings, within the country, and on the global stage. The influencing events can range from government policies, bilateral trade agreements, election agendas, to changing exchange rates, appreciation and depreciation of currency, recessions, meltdowns, bankruptcies etc. The current research attempts to discover and unravel the effect of various macroeconomic variables (crude oil price, gold price, silver price and USD exchange rate) on the Indian mutual fund industry in general and the chosen funds (Axis Gold Fund, BSL Gold Fund, Kotak Gold Fund & SBI gold fund) in particular. Cointegration tests and Vector error correction equations prove that the chosen variables have strong effect on the NAVs (net asset values) of the mutual funds. However, the greatest influence is felt from the fund’s own past and current information and it is found that when an innovation of fund’s own lagged NAVs is given, variance caused is high that changes the current NAVs markedly. The study helps to highlight the interplay of macroeconomic variables and their repercussion on mutual fund industry.Keywords: cointegration, Granger causality, impulse response, macroeconomic variables, mutual funds, stationarity, unit root test, variance decomposition, VECM
Procedia PDF Downloads 2441647 Psycho-Social Predictors of Health-Related Quality of Life among Persons Living with Benign Prostatic Hyperplasia in Ibadan, Nigeria
Authors: A. C. Obosi, H. O. Osinowo, L. I. Okeke
Abstract:
Benign prostatic hyperplasia (BPH) is one among other prostate diseases with an increasing public health concern. The prevalence and increased psychological distress of BPH among men negatively impact on their health-related quality of life (HRQoL). Although several biomedical factors have been implicated in poor HRQoL among people with BPH, there is a dearth of research on the psychosocial factors predicting HRQoL among them especially in developing climes. This study, therefore, examined the psychosocial (knowledge, perceived stigma, depression, anxiety, perceived social support and illness acceptance) predictors of health-related quality of life among persons living with BPH in Ibadan, Nigeria. Biopsychosocial model and Health-related Quality of life guided this study which utilized ex-post facto design. Eighty-seven males living with BPH were purposively selected and actively participated in the study. Participants’ mean age was 61.77 ± 15.80 years. A standardized questionnaire comprising Socio-demographics and measures of health-related quality of life (α = 0.47); knowledge (α = 0.72); psychological distress (α = 0.95); perceived social support (α = 0.96) and Illness acceptance (α = 0.89) scales was utilized in the study. Data were content analysed, while bivariate correlation, hierarchical multiple regression and t-test for independent samples were computed at p < 0.05. Results revealed that 42.5% of the respondents reported poor HRQoL. Furthermore, age, length of illness, perceived stigma, depression, anxiety, knowledge, perceived social support and illness acceptance jointly predicted HRQoL significantly (R2=0.33, F(9,75)=4.05) and accounted for 33% variance in the total observed variance on HRQoL, while Illness acceptance (β=0.43), anxiety (β=-0.54), and perceived social support (β=0.16) had significant independent contributions to the observed variance on HRQoL. Illness acceptance, knowledge, perceived social support and psychological distress such as anxiety, depression and perceived stigma are important predictors of HRQoL. Therefore, it was recommended that urgent psychological intervention targeted at improving the quality of life of these persons be undertaken.Keywords: benign prostatic hyperplasia, Health-related quality of life, prostate disorders, psychosocial factors
Procedia PDF Downloads 2191646 Effects of Excess-Iron Stress on Symbiotic Nitrogen Fixation Efficiency of Yardlong-Bean Plants
Authors: Hong Li, Tingxian Li, Xudong Wang, Qinghuo Lin
Abstract:
Excess-iron (Fe) stresses involved in legume symbiotic nitrogen fixation are not understood. Our objectives were to investigate the tolerance of yardlong-bean plants to soil excess-Fe stress and antagonistic effects of organic amendments and rhizobial inoculants on plant root nodulation and stem ureide formation. The study was conducted in the tropical Hainan Island during 2012-2013. The soil was strongly acidic (pH 5.3±0.4) and highly variable in Fe concentrations(596±79 mg/kg). The treatments were arranged in a split-plot design with three blocks. The treatment effects were significant on root nodulation, stem ureide, amino acids, plant N/Fe accumulation and bean yields (P<0.05). The yardlong-bean stem allantoin, amino acids and nitrate concentrations and relative ureide % declined with high soil Fe concentrations (>300 mg/kg). It was concluded that the co-variance of excess Fe stress could inhibit legume symbiotic N fixation efficiency. Organic amendments and rhizobial inoculants could help improve crop tolerance to excess Fe stress.Keywords: atmospheric N fixation, root nodulation, soil Fe co-variance, stem ureide, yardlong-bean plants
Procedia PDF Downloads 2881645 Private Coded Computation of Matrix Multiplication
Authors: Malihe Aliasgari, Yousef Nejatbakhsh
Abstract:
The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers
Procedia PDF Downloads 1221644 A Framework for Secure Information Flow Analysis in Web Applications
Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa
Abstract:
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.Keywords: web applications security, secure information flow, program dependence graph, database annotation
Procedia PDF Downloads 4711643 Friendship Love Orientation as Predictor of Attachment Style: A Gender Perspective
Authors: Maria Sana Amin, Anum Atiq, Haya Fatimah
Abstract:
Secure attachment in childhood creates a healthy love attitude in the adulthood. Child secure attachment develops a positive relation attitude in their adulthood, similarly, anxiety-avoidant attachment develops negative attitude toward relations. The aim of this paper is twofold: 1) We investigate the relationship between Friendship Attitude and Attachment Styles; and 2) explore the impact of gender on Love Attitudes and Attachment styles. Data was collected by convincing sampling among the students of University of Management and Technology age group 18- 25. The sample consists 60 young adults (Male=36, Female =54). The Love Attitudes Scales subscale Storage was used to measure attitudes towards friendship love and The Experiences in Close Relationships-Revised questionnaire was used to measure Adult Attachment Style. The result of Independent T-Test analysis shows that there was no significant difference in anxiety for female and male conditions; t (58) =-.768, p=.446 and avoidance for female and male conditions; t (58) =1.63, p=.108. Moreover, also there was no significant difference in friendship love for female (M=27.37, SD=6.371) and male (M=26.08, SD=5.709) conditions; t (58) =-.820, p=.416. Pearson correlation analysis shows significantly negative correlation between love attitude-friendship and attachment style- avoidance, (r=-.433, p=.008) among male and love attitude-friendship and attachment style- avoidance (r=-.438, p=.032) among female. There are no gender differences in attachment styles i.e. anxiety, avoidance and their relationship with friendship love attitude. People have avoidant attachment find it hard to fall in love and develop intimacy, and they tend to search for independence.Keywords: avoidance attachment style, anxiety attachment style, friendship love attitude, gender difference/similarity
Procedia PDF Downloads 3091642 Differentiation between Different Rangeland Sites Using Principal Component Analysis in Semi-Arid Areas of Sudan
Authors: Nancy Ibrahim Abdalla, Abdelaziz Karamalla Gaiballa
Abstract:
Rangelands in semi-arid areas provide a good source for feeding huge numbers of animals and serving environmental, economic and social importance; therefore, these areas are considered economically very important for the pastoral sector in Sudan. This paper investigates the means of differentiating between different rangelands sites according to soil types using principal component analysis to assist in monitoring and assessment purposes. Three rangeland sites were identified in the study area as flat sandy sites, sand dune site, and hard clay site. Principal component analysis (PCA) was used to reduce the number of factors needed to distinguish between rangeland sites and produce a new set of data including the most useful spectral information to run satellite image processing. It was performed using selected types of data (two vegetation indices, topographic data and vegetation surface reflectance within the three bands of MODIS data). Analysis with PCA indicated that there is a relatively high correspondence between vegetation and soil of the total variance in the data set. The results showed that the use of the principal component analysis (PCA) with the selected variables showed a high difference, reflected in the variance and eigenvalues and it can be used for differentiation between different range sites.Keywords: principal component analysis, PCA, rangeland sites, semi-arid areas, soil types
Procedia PDF Downloads 1861641 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management
Authors: Kenneth Harper
Abstract:
The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups
Procedia PDF Downloads 271640 Optimization of Cutting Parameters on Delamination Using Taguchi Method during Drilling of GFRP Composites
Authors: Vimanyu Chadha, Ranganath M. Singari
Abstract:
Drilling composite materials is a frequently practiced machining process during assembling in various industries such as automotive and aerospace. However, drilling of glass fiber reinforced plastic (GFRP) composites is significantly affected by damage tendency of these materials under cutting forces such as thrust force and torque. The aim of this paper is to investigate the influence of the various cutting parameters such as cutting speed and feed rate; subsequently also to study the influence of number of layers on delamination produced while drilling a GFRP composite. A plan of experiments, based on Taguchi techniques, was instituted considering drilling with prefixed cutting parameters in a hand lay-up GFRP material. The damage induced associated with drilling GFRP composites were measured. Moreover, Analysis of Variance (ANOVA) was performed to obtain minimization of delamination influenced by drilling parameters and number layers. The optimum drilling factor combination was obtained by using the analysis of signal-to-noise ratio. The conclusion revealed that feed rate was the most influential factor on the delamination. The best results of the delamination were obtained with composites with a greater number of layers at lower cutting speeds and feed rates.Keywords: analysis of variance, delamination, design optimization, drilling, glass fiber reinforced plastic composites, Taguchi method
Procedia PDF Downloads 2581639 Need for E-Learning: An Effective Method in Educating the Persons with Hearing Impairment Using Sign Language
Authors: S. Vijayakumar, S. B. Rathna Kumar, Navnath D Jagadale
Abstract:
Learning and teaching are the challenges ahead in the education of the students with hearing impairment using sign language (SHISL). Either the students or teachers face difficulties in the process of learning/teaching. Communication is one of the main barriers while teaching SHISL. Further, the courses of study or the subjects are limited to SHISL at least in countries like India. Students with hearing impairment mainly opt for sign language as a communication mode. Subjects like physics, chemistry, advanced mathematics etc. are not available in the curriculum for the SHISL since their content and ideas are complex. In India, exemption for language papers is being given for the students with hearing impairment. It may give opportunity to them to secure secondary/ higher secondary qualifications. It is a known fact that students with hearing impairment are facing difficulty in their future carrier. They secure neither a higher study nor a good employment opportunity. Vocational training in various trades will land them in few jobs with few bucks in pocket. However, not all of them are blessed with higher positions in government or private sectors in competitive fields or where the technical knowledge is required. E learning with sign language instructions can be used for teaching languages and science subjects. Computer Based Instruction (CBI), Computer Based Training (CBT), and Computer Assisted Instruction (CAI) are now part-and-parcel of Modern Education. It will also include signed video clip corresponding to the topic. Learning language subjects will improve the understanding of concepts in different subjects. Learning other science subjects like their hearing counterparts will enable the SHISL to go higher in studies and increase their height to pluck a fruit of the tree of employment.Keywords: students with hearing impairment using sign language, hearing impairment, language subjects, science subjects, e-learning
Procedia PDF Downloads 4051638 The Impact of Transaction Costs on Rebalancing an Investment Portfolio in Portfolio Optimization
Authors: B. Marasović, S. Pivac, S. V. Vukasović
Abstract:
Constructing a portfolio of investments is one of the most significant financial decisions facing individuals and institutions. In accordance with the modern portfolio theory maximization of return at minimal risk should be the investment goal of any successful investor. In addition, the costs incurred when setting up a new portfolio or rebalancing an existing portfolio must be included in any realistic analysis. In this paper rebalancing an investment portfolio in the presence of transaction costs on the Croatian capital market is analyzed. The model applied in the paper is an extension of the standard portfolio mean-variance optimization model in which transaction costs are incurred to rebalance an investment portfolio. This model allows different costs for different securities, and different costs for buying and selling. In order to find efficient portfolio, using this model, first, the solution of quadratic programming problem of similar size to the Markowitz model, and then the solution of a linear programming problem have to be found. Furthermore, in the paper the impact of transaction costs on the efficient frontier is investigated. Moreover, it is shown that global minimum variance portfolio on the efficient frontier always has the same level of the risk regardless of the amount of transaction costs. Although efficient frontier position depends of both transaction costs amount and initial portfolio it can be concluded that extreme right portfolio on the efficient frontier always contains only one stock with the highest expected return and the highest risk.Keywords: Croatian capital market, Markowitz model, fractional quadratic programming, portfolio optimization, transaction costs
Procedia PDF Downloads 3851637 Impact of a Virtual Reality-Training on Real-World Hockey Skill: An Intervention Trial
Authors: Matthew Buns
Abstract:
Training specificity is imperative for successful performance of the elite athlete. Virtual reality (VR) has been successfully applied to a broad range of training domains. However, to date there is little research investigating the use of VR for sport training. The purpose of this study was to address the question of whether virtual reality (VR) training can improve real world hockey shooting performance. Twenty four volunteers were recruited and randomly selected to complete the virtual training intervention or enter a control group with no training. Four primary types of data were collected: 1) participant’s experience with video games and hockey, 2) participant’s motivation toward video game use, 3) participants technical performance on real-world hockey, and 4) participant’s technical performance in virtual hockey. One-way multivariate analysis of variance (ANOVA) indicated that that the intervention group demonstrated significantly more real-world hockey accuracy [F(1,24) =15.43, p <.01, E.S. = 0.56] while shooting on goal than their control group counterparts [intervention M accuracy = 54.17%, SD=12.38, control M accuracy = 46.76%, SD=13.45]. One-way multivariate analysis of variance (MANOVA) repeated measures indicated significantly higher outcome scores on real-world accuracy (35.42% versus 54.17%; ES = 1.52) and velocity (51.10 mph versus 65.50 mph; ES=0.86) of hockey shooting on goal. This research supports the idea that virtual training is an effective tool for increasing real-world hockey skill.Keywords: virtual training, hockey skills, video game, esports
Procedia PDF Downloads 1471636 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core
Authors: Yashas Bedre Raghavendra, Pim Vullers
Abstract:
This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction
Procedia PDF Downloads 701635 A Comparative Analysis of Carbon Footprints of Households in Different Housing Types and Seasons
Authors: Taehyun Kim
Abstract:
As a result of rapid urbanization, energy demands for lighting, heating and cooling of households have been concentrated in metropolitan areas. The energy resources for housing in urban areas are dominantly fossil fuel whose uses contribute to increase cost of living and carbon dioxide (CO2) emission. To achieve environmentally and economically sustainable residential development, it is important to know how energy use and cost of living can be reduced by planning and design. The purpose of this study is to examine which type of building requires less energy for housing. To do so, carbon footprint (CF) quiz survey was employed which estimates the amount of carbon dioxide required to support households’ consumption of energy uses for housing. The housing carbon footprints (HCF) of 500 households of Seoul, Korea in summer and winter were estimated and compared in three major types of housing: single-family (detached), row-house and apartment. In addition, its differences of HCF were estimated between tower and flat type of apartment. The results of T-test and analysis of variance (ANOVA) provide statistical evidence that housing type is related to housing energy use. Average HCF of detached house was higher than other housing types. Between two types of apartment, tower type shows higher HCF than flat type in winter. These findings may provide new perspectives on CF application in sustainable architecture and urban design.Keywords: analysis of variance, carbon footprint, energy use, housing type
Procedia PDF Downloads 5051634 Performance Comparison of Wideband Covariance Matrix Sparse Representation (W-CMSR) with Other Wideband DOA Estimation Methods
Authors: Sandeep Santosh, O. P. Sahu
Abstract:
In this paper, performance comparison of wideband covariance matrix sparse representation (W-CMSR) method with other existing wideband Direction of Arrival (DOA) estimation methods has been made.W-CMSR relies less on a priori information of the incident signal number than the ordinary subspace based methods.Consider the perturbation free covariance matrix of the wideband array output. The diagonal covariance elements are contaminated by unknown noise variance. The covariance matrix of array output is conjugate symmetric i.e its upper right triangular elements can be represented by lower left triangular ones.As the main diagonal elements are contaminated by unknown noise variance,slide over them and align the lower left triangular elements column by column to obtain a measurement vector.Simulation results for W-CMSR are compared with simulation results of other wideband DOA estimation methods like Coherent signal subspace method (CSSM), Capon, l1-SVD, and JLZA-DOA. W-CMSR separate two signals very clearly and CSSM, Capon, L1-SVD and JLZA-DOA fail to separate two signals clearly and an amount of pseudo peaks exist in the spectrum of L1-SVD.Keywords: W-CMSR, wideband direction of arrival (DOA), covariance matrix, electrical and computer engineering
Procedia PDF Downloads 4711633 A Hill Cipher Based on the Kish-Sethuraman Protocol
Authors: Kondwani Magamba
Abstract:
In the idealized Kish-Sethuraman (KS) protocol,messages are sent between Alice and Bob each using a secret personal key. This protocol is said to be perfectly secure because both Bob and Alice keep their keys undisclosed so that at all times the message is encrypted by at least one key, thus no information is leaked or shared. In this paper, we propose a realization of the KS protocol through the use of the Hill Cipher.Keywords: Kish-Sethuraman Protocol, Hill Cipher, MDS Matrices, encryption
Procedia PDF Downloads 357