Search results for: anonymous routing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 397

Search results for: anonymous routing

157 Numerical Analysis and Design of Dielectric to Plasmonic Waveguides Couplers

Authors: Emanuela Paranhos Lima, Vitaly Félix Rodríguez Esquerre

Abstract:

In this work, efficient directional coupler composed of dielectric waveguides and metallic film has been analyzed in details by simulations using finite element method (FEM). The structure consists of a step-index fiber with dielectric core, silica cladding, and a metal nanowire parallel to the core. The results show that an efficient conversion of optical dielectric modes to long range plasmonic is possible. Low insertion losses in conjunction with short coupling length and a broadband operation can be achieved under certain conditions. This kind of couplers has potential applications for the design of photonic integrated circuits for signal routing between dielectric/plasmonic waveguides, sensing, lithography, and optical storage systems. A high efficient focusing of light in a very small region can be obtained.

Keywords: directional coupler, finite element method, metallic nanowire, plasmonic, surface plasmon polariton, superfocusing

Procedia PDF Downloads 250
156 Cosmetic Surgery on the Rise: The Impact of Remote Communication

Authors: Bruno Di Pace, Roxanne H. Padley

Abstract:

Aims: The recent increase in remote video interaction has increased the number of requests for teleconsultations with plastic surgeons in private practice (70% in the UK and 64% in the USA). This study investigated the motivations for such an increase and the underlying psychological impact on patients. Method: An anonymous web-based poll of 8 questions was designed and distributed to patients seeking cosmetic surgery through social networks in both Italy and the UK. The questions gathered responses regarding 1. Reasons for pursuing cosmetic surgery; 2. The effects of delays caused by the SARS-COV-2 pandemic; 3. The effects on mood; 4. The influence of video conferencing on body-image perception. Results: 85 respondents completed the online poll. Overall, 68% of respondents stated that seeing themselves more frequently online had influenced their decision to seek cosmetic surgery. The types of surgeries indicated were predominantly to the upper body and face (82%). Delays and access to surgeons during the pandemic were perceived as negatively impacting patients' moods (95%). Body-image perception and self-esteem were lower than in the pre-pandemic, particularly during lockdown (72%). Patients were more inclined to undergo cosmetic surgery during the pandemic, both due to the wish to improve their “lockdown face” for video conferencing (77%) and also due to the benefits of home recovery while in smart working (58%). Conclusions: Overall, findings suggest that video conferencing has led to a significant increase in requests for cosmetic surgery and the so-called “Zoom Boom” effect.

Keywords: cosmetic surgery, remote communication, telehealth, zoom boom

Procedia PDF Downloads 155
155 An Assessment of Sexual Informational Needs of Breast Cancer Patients in Radiation Oncology

Authors: Li Hoon Lim, Nur Farhanah Said, Katie Simmons, Eric Pei Ping Pang, Sharon Mei Mei Wong

Abstract:

Background and Purpose: Research regarding the sexual impact of breast cancer treatment on Asian women is both sensitive and scarce. This study aims to assess and evaluate the sexual health needs and concerns of breast cancer radiotherapy patients. It is hoped that awareness will be increased and an appropriate intervention can be developed to address the needs of future breast cancer patients. Methods: 110 consecutive unselected breast cancer patients were recruited prospectively. Questionnaires were administered once for patient undergoing radiotherapy to the breast. This study employed an anonymous questionnaire; any breast radiotherapy patient who can read English can voluntarily receive and complete the survey. The questionnaire consisted of items addressing demographics, potential informational needs, and educational preferences. Results: Patients’ interest to address sexual concerns decreases with age (p=0.024). Coherently, sexual concerns of patients are reported to decrease with age (p=0.015) where 70% of all respondents below age 50 [age 20-29 (60%); 30-39 (56.3%); 40-49(55.1%)] have started to have sexual concerns regarding their treatment effects on their sexual health. Patients who underwent breast conservation surgery (42.2%) and reconstruction surgery (83.3%) were more likely to have concerns about sexual health versus patients who underwent mastectomy (36.7%) (p=0.032). 74.2% of patients with sexual concern regardless of age would initiate conversation with their healthcare providers (p < 0.001). Conclusions: The results showed a staggering interest of female patients wanting information on this area which would not only boost their confidence and body image but also address concerns of the effect of breast radiotherapy on sexual health during their treatment.

Keywords: breast cancer, breast radiotherapy, sexual health, sexual impact

Procedia PDF Downloads 184
154 Software Vulnerability Markets: Discoverers and Buyers

Authors: Abdullah M. Algarni, Yashwant K. Malaiya

Abstract:

Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. Although there has been an attempt to model the level of their efforts, information regarding their identities, modes of operation, and what they are doing with the discovered vulnerabilities has not been explored. Reports of buying and selling of the vulnerabilities are now appearing in the press; however, the existence of such markets requires validation, and the natures of the markets need to be analysed. To address this need, we have attempted to collect detailed information. We have identified the most prolific vulnerability discoverers throughout the past decade and examined their motivation and methods. A large percentage of these discoverers are located in Eastern and Western Europe and in the Far East. We have contacted several of them in order to collect first-hand information regarding their techniques, motivations, and involvement in the vulnerability markets. We examine why many of the discoverers appear to retire after a highly successful vulnerability-finding career. The paper identifies the actual vulnerability markets, rather than the hypothetical ideal markets that are often examined. The emergence of worldwide government agencies as vulnerability buyers has significant implications. We discuss potential factors that can impact the risk to society and the need for detailed exploration.

Keywords: risk management, software security, vulnerability discoverers, vulnerability markets

Procedia PDF Downloads 228
153 Psychological Aspects of Depression among the Romanian Adults

Authors: Zoltan Abram

Abstract:

Background: In the last time it was hardly increased the prevalence of psychical diseases and disorders which reduce work capacity, life quality and life expectancy. Objectives: The aim of our research is to study the psychical health state of the Romanian adults living in the middle part of the country and the role of some economical, psychological and social factors, especially in relationship with depression. Methods: The study is based on a complex anonymous questionnaire, including Beck depressive scale, which was completed by a representative sample among adult population. The applied method was a combination between stratification and more-steps sampling. Results: After our results depression is the most common psychical illness with 9,1% diagnosis, but the tendency to depression, the existence of depressive symptoms is much higher than the treated illness. The percentage of suicide attempt among the studied population was 2,9%. It is analysed how gender, age, professional and social status, living and working conditions and different social factors are influencing the health state. According to Beck score, it was established a significant difference in the favour of female, elderly people, lower educational level, urban population. Conclusions: In our study it is underlined the importance of health promotion and education. It is concluded that improving living standards, modifying in a proper way the lifestyle of the population, we can positively influence the physical and mental health state of the Romanian adult population.

Keywords: Beck scale, depression, psychological aspects, suicide attempt

Procedia PDF Downloads 392
152 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 197
151 Comparative Analysis of Characterologic Features of Cadets with High Psychomotor Skills Who Study in Polish Air Force Academy

Authors: Justyna Skrzyńska, Zdzisław Kobos, Zbigniew Wochyński

Abstract:

The assessment of characterologic type is an essential element which decides about the proper task performance in the Air Forces. The aim of the research was to specify the percentage distribution of characterologic features by cadets studying particular courses in Polish Air Force Academy with the use of questionnaire. 34 first-year cadets chosen by lot and disunited into aircrafts pilots (N-10), helicopter pilots (N-13) and navigators(N-11) participated in the research. All of the questioned have had their psychomotor education examined in Military Aviation Medicine Institute in Warsaw, Poland. Moreover all of them are characterised by very good fitness. In the research, an anonymous poll(based on Myers-Briggs Type Indicator) appraising cadets’ characterologic type has been used. Cadets were provided with the same accommodation and nutrition. The findings have shown that percentage distribution was diversified, however it could be distinctly observed that most of future helicopter pilots (69%) are introverts whereas the majority of aircrafts pilots (70%) and navigators (100%) are extraverts. Moreover, it was also observed that 70% of cadets studying aircrafts pilotage run regular lifestyle and have judging skill according to Myers-Briggs Type Indicator. In future navigators group, 73% of students do not have this characteristic. The research has shown that cadets studying pilotage are more likely to demonstrate the characteristics which are essential for a performance of the important tasks in pilots environment than the cadets studying navigation.

Keywords: pilot, Myers-Briggs Type indicator, questionnaire research, cadets, psychomotor education

Procedia PDF Downloads 453
150 Communication of Sensors in Clustering for Wireless Sensor Networks

Authors: Kashish Sareen, Jatinder Singh Bal

Abstract:

The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.

Keywords: clustering, DLCC, MLCC, wireless sensor networks

Procedia PDF Downloads 452
149 Anonymous Gel-Fluid Transition of Solid Supported Lipids

Authors: Asma Poursoroush

Abstract:

Solid-supported lipid bilayers are often used as a simple model for studies of biological membranes. The presence of a solid substrate that interacts attractively with lipid head-groups is expected to affect the phase behavior of the supported bilayer. Molecular dynamics simulations of a coarse-grained model are thus performed to investigate the phase behavior of supported one-component lipid bilayer membranes. Our results show that the attraction of the lipid head groups to the substrate leads to a phase behavior that is different from that of a free standing lipid bilayer. In particular, we found that the phase behaviors of the two leaflets are decoupled in the presence of a substrate. The proximal leaflet undergoes a clear gel-to-fluid phase transition at a temperature lower than that of a free standing bilayer, and that decreases with increasing strength of the substrate-lipid attraction. The distal leaflet, however, undergoes a change from a homogeneous liquid phase at high temperatures to a heterogeneous state consisting of small liquid and gel domains, with the average size of the gel domains that increases with decreasing temperature. While the chain order parameter of the proximal leaflet clearly shows a gel-fluid phase transition, the chain order parameter of the distal leaflet does not exhibit a clear phase transition. The decoupling in the phase behavior of the two leaflets is due to a non-symmteric lipid distribution in the two leaflets resulting from the presence of the substrate.

Keywords: membrane, substrate, molecular dynamics, simulation

Procedia PDF Downloads 170
148 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 253
147 Order Picking Problem: An Exact and Heuristic Algorithms for the Generalized Travelling Salesman Problem With Geographical Overlap Between Clusters

Authors: Farzaneh Rajabighamchi, Stan van Hoesel, Christof Defryn

Abstract:

The generalized traveling salesman problem (GTSP) is an extension of the traveling salesman problem (TSP) where the set of nodes is partitioned into clusters, and the salesman must visit exactly one node per cluster. In this research, we apply the definition of the GTSP to an order picker routing problem with multiple locations per product. As such, each product represents a cluster and its corresponding nodes are the locations at which the product can be retrieved. To pick a certain product item from the warehouse, the picker needs to visit one of these locations during its pick tour. As all products are scattered throughout the warehouse, the product clusters not separated geographically. We propose an exact LP model as well as heuristic and meta-heuristic solution algorithms for the order picking problem with multiple product locations.

Keywords: warehouse optimization, order picking problem, generalised travelling salesman problem, heuristic algorithm

Procedia PDF Downloads 84
146 Dambreak Flood Analysis Using HEC-RAS and GIS Technologies

Authors: Oussama Derdous, Lakhdar Djemili, Hamza Bouchehed

Abstract:

The potential risks associated with dam break flooding could be considerable and result in major damage, including loss of life and property destruction. In the past, Algeria experienced such flood disasters; let’s recall the failure of Fergoug dam in 1881, this accident cost 200 lives, many houses and bridges were destroyed by the flooding. Recently the Algerian government have obligated to dam owners the development of detailed dam break Emergency Action Plans for its 64 major dams. The research presented here was conducted within this framework, Zardezas dam which is located in the city of Skikda in the North East of Algeria was the case of study. The model HEC-RAS was used for the hydrodynamic routing of the dam break flood wave. In addition, Geographic Information System (GIS) was used to create inundation maps and produce a visualization of the flood propagation in the Saf-Saf River.The simulation results that demonstrate the significance of Zardezas dam break flooding; constitute a real tool for developing emergency response plans and assisting territorial communities in land use planning.

Keywords: dam break, HEC-RAS, GIS, inundation maps, Emergency Action Plan

Procedia PDF Downloads 365
145 Blockchain: Institutional and Technological Disruptions in the Public Sector

Authors: Maria Florencia Ferrer, Saulo Fabiano Amancio-Vieira

Abstract:

The use of the blockchain in the public sector is present today and no longer the future of disruptive institutional and technological models. There are still some cultural barriers and resistance to the proper use of its potential. This research aims to present the strengths and weaknesses of using a public-permitted and distributed network in the context of the public sector. Therefore, bibliographical/documentary research was conducted to raise the main aspects of the studied platform, focused on the use of the main demands of the public sector. The platform analyzed was LACChain, which is a global alliance composed of different actors in the blockchain environment, led by the Innovation Laboratory of the Inter-American Development Bank Group (IDB Lab) for the development of the blockchain ecosystem in Latin America and the Caribbean. LACChain provides blockchain infrastructure, which is a distributed ratio technology (DLT). The platform focuses on two main pillars: community and infrastructure. It is organized as a consortium for the management and administration of an infrastructure classified as public, following the ISO typologies (ISO / TC 307). It is, therefore, a network open to any participant who agrees with the established rules, which are limited to being identified and complying with the regulations. As benefits can be listed: public network (open to all), decentralized, low transaction cost, greater publicity of transactions, reduction of corruption in contracts / public acts, in addition to improving transparency for the population in general. It is also noteworthy that the platform is not based on cryptocurrency and is not anonymous; that is, it is possible to be regulated. It is concluded that the use of record platforms, such as LACChain, can contribute to greater security on the part of the public agent in the migration process of their informational applications.

Keywords: blockchain, LACChain, public sector, technological disruptions

Procedia PDF Downloads 148
144 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 382
143 Improving Communication System through Router Configuration: The Nigerian Navy Experience

Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale

Abstract:

The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.

Keywords: C-band, communication, router, VSAT

Procedia PDF Downloads 344
142 Health Professions Students' Knowledge of and Attitude toward Complementary and Alternative Medicine

Authors: Peter R. Reuter

Abstract:

Health professionals play important roles in helping patients use Complementary and Alternative Medicine (CAM) practices safely and accurately. Consequently, it is important for future health professionals to learn about CAM practices during their time in undergraduate and graduate programs. To satisfy this need for education, teaching CAM in nursing and medical schools and other health professions programs is becoming more prevalent. Our study was the first to look specifically at the knowledge of, and attitude toward CAM of undergraduate health professions students at a university in the U.S. Students were invited to participate in one of two anonymous online surveys depending on whether they were pre-health professions students or graduating health professions seniors. Of the 763 responses analyzed, 71.7% were from pre-health professions students, and 28.3% came from graduating seniors. The overall attitude of participants toward and interest in learning about CAM practices was generally fairly positive with graduating seniors being more positive than pre-health professions students. Yoga, meditation, massage therapy, aromatherapy, and chiropractic care were the practices most respondents had personal experience with. Massage therapy, yoga, chiropractic care, meditation, music therapy, and diet-based therapy received the highest ratings from respondents. Three-quarters of respondents planned on including aspects of holistic medicine in their future career as a health professional. The top five practices named were yoga, meditation, massage therapy, diet-based therapy, and music therapy. The study confirms the need to educate health professions students about CAM practices to give them the background information they need to select or recommend the best practices for their patients' needs.

Keywords: CAM education, health professions, health professions students, pre-health professions students

Procedia PDF Downloads 117
141 Pregnant Women’s Views on a Trial of Posture for Fetal Malposition

Authors: Jennifer A. Barrowclough, Caroline A. Crowther, Bridget Kool

Abstract:

Fetal malposition in labour is associated with adverse maternal and infant health outcomes. Evidence for effective interventions for fetal malposition is inconclusive. The feasibility and design of a randomized controlled trial (RCT) of maternal posture to improve maternal and infant outcomes of malposition should be considered, based on the hypothesis that gravity corrects malposition. The aim was to assess pregnant women’s views on the acceptability of a future trial of maternal posture for fetal malposition in labour, and the enablers and barriers of participation. Method: An online anonymous survey of pregnant women was conducted in Auckland during 2020. Descriptive summaries of quantitative data used chi-square to assess differences in proportions. The influence of maternal characteristics on women’s responses was assessed using cross-tabulation. Free text responses were analysed thematically. Results: Respondents (n=206) were mostly aged26-35 years (75%), of 29-38 weeks gestation (71%), of European (40%) or Asian (36%) ethnicity, were evenly nulliparous or multiparous. Most women (76%) had heard of fetal malposition in labour however only 28% were aware of the use of maternal posture to correct this. Most women (86%) were interested in labour research. Although 37% indicated they would participate in a future RCT of posture for fetal malposition, nearly half (47%) were unsure and a further quarter (15%) indicated they would not participate. Comfort was the predominant concern (22%). Almost half of the respondents (49%) indicated they would consult their partner before deciding on participation in an RCT. Conclusions: Participation in a trial of maternal posture in labour can be enabled through measures to enhance maternal comfort, increased awareness of malposition and the role of posture, and the involvement of partners during trial counselling and recruitment.

Keywords: pregnant women, labour, presentation, posture, randomized controlled trial, survey

Procedia PDF Downloads 137
140 Tsada-MobiMinder: A Location Based Alarm Mobile Reminder

Authors: Marylene S. Eder

Abstract:

Existing location based alarm applications has inability to give information to user’s particular direction to a specified place of destination and does not display a particular scenic spot from its current location going to the destination. With this problem, a location based alarm mobile reminder was developed. The application is implemented on Android based smart phones to provide services like providing routing information, helping to find nearby hotels, restaurants and scenic spots and offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. It reminds the user about the location when the user enters some predefined location. All the user needs to have is the mobile phone with android platform with version 4.0 and above, and then the user can select the destination and find the destination on the application. The main objective of the project is to develop a location based application that provides tourists with real time information for scenic spots and provides alarm to a specified place of destination. This mobile application service will act as assistance for the frequent travelers to visit new places around the City.

Keywords: location based alarm, mobile application, mobile reminder, tourist’s spots

Procedia PDF Downloads 357
139 Body Image Impact on Quality of Life and Adolescents’ Binge Eating: The Indirect Role of Body Image Coping Strategies

Authors: Dora Bianchi, Anthony Schinelli, Laura Maria Fatta, Antonia Lonigro, Fabio Lucidi, Fiorenzo Laghi

Abstract:

Purpose: The role of body image in adolescent binge eating is widely confirmed, albeit the various facets of this relationship are still mostly unexplored. Within the multidimensional body image framework, this study hypothesized the indirect effects of three body image coping strategies (positive rational acceptance, appearance fixing, avoidance) in the expected relationship between the perceived impact of body image on individuals’ quality of life and binge eating symptoms. Methods: Participants were 715 adolescents aged 15-21 years (49.1% girls) recruited in Italian schools. An anonymous self-report online survey was administered. A multiple mediation model was tested. Results: A more positive perceived impact of body image on quality of life was a negative predictor of adolescents’ binge eating, controlling for individual levels of body satisfaction. Three indirect effects were found in this relationship: on one hand, the positive body image impact reduced binge eating via increasing positive rational acceptance (M1), and via reducing avoidance (M2); on the contrary, the positive body image impact also enhanced binge eating via increasing appearance fixing (M3). Conclusions: The body image impact on quality of life can be alternatively protective—when adaptive coping is solicited, and maladaptive strategies are reduced—or a risk factor, which may increase binge eating by soliciting appearance fixing.

Keywords: binge eating, body image satisfaction, quality of life, coping strategies, adolescents

Procedia PDF Downloads 55
138 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 134
137 Verification and Application of Finite Element Model Developed for Flood Routing in Rivers

Authors: A. L. Qureshi, A. A. Mahessar, A. Baloch

Abstract:

Flood wave propagation in river channel flow can be enunciated by nonlinear equations of motion for unsteady flow. However, it is difficult to find analytical solution of these complex non-linear equations. Hence, verification of the numerical model should be carried out against field data and numerical predictions. This paper presents the verification of developed finite element model applying for unsteady flow in the open channels. The results of a proposed model indicate a good matching with both Preissmann scheme and HEC-RAS model for a river reach of 29 km at both sites (15 km from upstream and at downstream end) for discharge hydrographs. It also has an agreeable comparison with the Preissemann scheme for the flow depth (stage) hydrographs. The proposed model has also been applying to forecast daily discharges at 400 km downstream from Sukkur barrage, which demonstrates accurate model predictions with observed daily discharges. Hence, this model may be utilized for predicting and issuing flood warnings about flood hazardous in advance.

Keywords: finite element method, Preissmann scheme, HEC-RAS, flood forecasting, Indus river

Procedia PDF Downloads 480
136 Success Factors for Innovations in SME Networks

Authors: J. Gochermann

Abstract:

Due to complex markets and products, and increasing need to innovate, cooperation between small and medium size enterprises arose during the last decades, which are not prior driven by process optimization or sales enhancement. Especially small and medium sized enterprises (SME) collaborate increasingly in innovation and knowledge networks to enhance their knowledge and innovation potential, and to find strategic partners for product and market development. These networks are characterized by dual objectives, the superordinate goal of the total network, and the specific objectives of the network members, which can cause target conflicts. Moreover, most SMEs do not have structured innovation processes and they are not accustomed to collaborate in complex innovation projects in an open network structure. On the other hand, SMEs have suitable characteristics for promising networking. They are flexible and spontaneous, they have flat hierarchies, and the acting people are not anonymous. These characteristics indeed distinguish them from bigger concerns. Investigation of German SME networks have been done to identify success factors for SME innovation networks. The fundamental network principles, donation-return and confidence, could be confirmed and identified as basic success factors. Further factors are voluntariness, adequate number of network members, quality of communication, neutrality and competence of the network management, as well as reliability and obligingness of the network services. Innovation and knowledge networks with an appreciable number of members from science and technology institutions need also active sense-making to bring different disciplines into successful collaboration. It has also been investigated, whether and how the involvement in an innovation network impacts the innovation structure and culture inside the member companies. The degree of reaction grows with time and intensity of commitment.

Keywords: innovation and knowledge networks, SME, success factors, innovation structure and culture

Procedia PDF Downloads 261
135 Supply Chain Decarbonisation – A Cost-Based Decision Support Model in Slow Steaming Maritime Operations

Authors: Eugene Y. C. Wong, Henry Y. K. Lau, Mardjuki Raman

Abstract:

CO2 emissions from maritime transport operations represent a substantial part of the total greenhouse gas emission. Vessels are designed with better energy efficiency. Minimizing CO2 emission in maritime operations plays an important role in supply chain decarbonisation. This paper reviews the initiatives on slow steaming operations towards the reduction of carbon emission. It investigates the relationship and impact among slow steaming cost reduction, carbon emission reduction, and shipment delay. A scenario-based cost-driven decision support model is developed to facilitate the selection of the optimal slow steaming options, considering the cost on bunker fuel consumption, available speed, carbon emission, and shipment delay. The incorporation of the social cost of cargo is reviewed and suggested. Additional measures on the effect of vessels sizes, routing, and type of fuels towards decarbonisation are discussed.

Keywords: slow steaming, carbon emission, maritime logistics, sustainability, green supply chain

Procedia PDF Downloads 434
134 Improvement of GVPI Insulation System Characteristics by Curing Process Modification

Authors: M. Shadmand

Abstract:

The curing process of insulation system for electrical machines plays a determinative role for its durability and reliability. Polar structure of insulating resin molecules and used filler of insulation system can be taken as an occasion to leverage it to enhance overall characteristics of insulation system, mechanically and electrically. The curing process regime for insulating system plays an important role for its mechanical and electrical characteristics by arranging the polymerization of chain structure for resin. In this research, the effect of electrical field application on in-curing insulating system for Global Vacuum Pressurized Impregnation (GVPI) system for traction motor was considered by performing the dissipation factor, polarization and de-polarization current (PDC) and voltage endurance (aging) measurements on sample test objects. Outcome results depicted obvious improvement in mechanical strength of the insulation system as well as higher electrical characteristics with routing and long-time (aging) electrical tests. Coming together, polarization of insulation system during curing process would enhance the machine life time. 

Keywords: insulation system, GVPI, PDC, aging

Procedia PDF Downloads 242
133 Blockchain Technology Applications in Patient Tracking Systems Regarding Privacy-Preserving Concerns and COVID-19 Pandemic

Authors: Farbod Behnaminia, Saeed Samet

Abstract:

The COVID-19 pandemic has paralyzed many lives until a vaccine was available, which caused the so-called “new normal.” According to the World Health Organization (WHO), COVID-19 is an infectious disease. It can cause significant illness or death in anyone. Governments and health officials tried to impose rules and regulations to avoid and slow down transmission. Therefore, software engineers worldwide developed applications to trace and track patients’ movements and notify others, mainly using Bluetooth. In this way, everyone could be informed whether they come in close contact with someone who has COVID-19 and takes proper safety precautions. Because most of the applications use technologies that can potentially reveal the user’s identity and location, researchers have debated privacy preservation and how to improve user privacy during such pandemics. Thanks to Distributed Ledger Technology (DLT), there have been some proposed methods to develop privacy-preserving Patient Tracking Systems in the last two years. As an instance of the DLT, Blockchain is like a decentralized peer-to-peer database that maintains a record of transactions. Transactions are immutable, transparent, and anonymous in this system. We conducted a comprehensive evaluation of the literature by looking for papers in the relevant field and dividing them into pre- and post-pandemic systems. Additionally, we discussed the many uses of blockchain technology in pandemic control. We found that two major obstacles facing blockchain implementation across many healthcare systems are scalability and privacy. The Polkadot platform is presented, along with a review of its efficacy in tackling current concerns. A more scalable healthcare system is achievable in the near future using Polkadot as well as a much more privacy-preserving environment.

Keywords: blockchain, electronic record management, EHR, privacy-preserving, patient tracking, COVID-19, trust and confidence, Polkadot

Procedia PDF Downloads 76
132 Risk Assessment for Aerial Package Delivery

Authors: Haluk Eren, Ümit Çelik

Abstract:

Recent developments in unmanned aerial vehicles (UAVs) have begun to attract intense interest. UAVs started to use for many different applications from military to civilian use. Some online retailer and logistics companies are testing the UAV delivery. UAVs have great potentials to reduce cost and time of deliveries and responding to emergencies in a short time. Despite these great positive sides, just a few works have been done for routing of UAVs for package deliveries. As known, transportation of goods from one place to another may have many hazards on delivery route due to falling hazards that can be exemplified as ground objects or air obstacles. This situation refers to wide-range insurance concept. For this reason, deliveries that are made with drones get into the scope of shipping insurance. On the other hand, air traffic was taken into account in the absence of unmanned aerial vehicle. But now, it has been a reality for aerial fields. In this study, the main goal is to conduct risk analysis of package delivery services using drone, based on delivery routes.

Keywords: aerial package delivery, insurance estimation, territory risk map, unmanned aerial vehicle, route risk estimation, drone risk assessment, drone package delivery

Procedia PDF Downloads 307
131 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs

Authors: Navneet Kaur, Amarpreet Singh

Abstract:

In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.

Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network

Procedia PDF Downloads 324
130 The Effect of a Three-Month Training Program on the Back Kyphosis of Former Male Addicts

Authors: M. J. Pourvaghar, Sh. Khoshemehry

Abstract:

Adopting inappropriate body posture during addiction can cause muscular and skeletal deformities. This study is aimed at investigating the effects of a program of the selected corrective exercises on the kyphosis of addicted male patients. Materials and methods: This was a quasi-experimental study. This study has been carried out using the semi-experimental method. The subjects of the present study included 104 addicted men between 25 to 45 years of age. In 2014, these men were referred to one of the NA (Narcotic Anonymous) centres in Kashan in 2015. A total of 24 people suffering from drug withdrawal, who had abnormal kyphosis, were purposefully selected as a sample. The sample was randomly divided into two groups, experimental and control; each group consisted of 12 people. The experimental group participated in a training program for 12 weeks consisting of three 60 minute sessions per week. That includes strengthening, stretching and PNF exercises (deep stretching of the muscle). The control group did no exercise or corrective activity. The Kolmogorov-Smirnov test was used to assess normal distribution of data; and a paired t-test and covariance analysis test were used to assess the effectiveness of the exercises, with a significance level of P≤0.05 by using SPSS18. The results showed that three months of the selected corrective exercises had a significant effect (P≤ 0.005) on the correction of the kyphosis of the addicted male patients after three months of rehabilitation (drug withdrawal) in the experimental group, while there was no significant difference recorded in the control group (P≥0.05). The results show that exercise and corrective activities can be used as non-invasive and non-pharmacological methods to rehabilitate kyphosis abnormalities after drug withdrawal and treatment for addiction.

Keywords: kyphosis, exercise-rehabilitation, addict, addiction

Procedia PDF Downloads 258
129 Optimisation of Intermodal Transport Chain of Supermarkets on Isle of Wight, UK

Authors: Jingya Liu, Yue Wu, Jiabin Luo

Abstract:

This work investigates an intermodal transportation system for delivering goods from a Regional Distribution Centre to supermarkets on the Isle of Wight (IOW) via the port of Southampton or Portsmouth in the UK. We consider this integrated logistics chain as a 3-echelon transportation system. In such a system, there are two types of transport methods used to deliver goods across the Solent Channel: one is accompanied transport, which is used by most supermarkets on the IOW, such as Spar, Lidl and Co-operative food; the other is unaccompanied transport, which is used by Aldi. Five transport scenarios are studied based on different transport modes and ferry routes. The aim is to determine an optimal delivery plan for supermarkets of different business scales on IOW, in order to minimise the total running cost, fuel consumptions and carbon emissions. The problem is modelled as a vehicle routing problem with time windows and solved by genetic algorithm. The computing results suggested that accompanied transport is more cost efficient for small and medium business-scale supermarket chains on IOW, while unaccompanied transport has the potential to improve the efficiency and effectiveness of large business scale supermarket chains.

Keywords: genetic algorithm, intermodal transport system, Isle of Wight, optimization, supermarket

Procedia PDF Downloads 345
128 The Use of Stochastic Gradient Boosting Method for Multi-Model Combination of Rainfall-Runoff Models

Authors: Phanida Phukoetphim, Asaad Y. Shamseldin

Abstract:

In this study, the novel Stochastic Gradient Boosting (SGB) combination method is addressed for producing daily river flows from four different rain-runoff models of Ohinemuri catchment, New Zealand. The selected rainfall-runoff models are two empirical black-box models: linear perturbation model and linear varying gain factor model, two conceptual models: soil moisture accounting and routing model and Nedbør-Afrstrømnings model. In this study, the simple average combination method and the weighted average combination method were used as a benchmark for comparing the results of the novel SGB combination method. The models and combination results are evaluated using statistical and graphical criteria. Overall results of this study show that the use of combination technique can certainly improve the simulated river flows of four selected models for Ohinemuri catchment, New Zealand. The results also indicate that the novel SGB combination method is capable of accurate prediction when used in a combination method of the simulated river flows in New Zealand.

Keywords: multi-model combination, rainfall-runoff modeling, stochastic gradient boosting, bioinformatics

Procedia PDF Downloads 312