Search results for: computer processing of large databases
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12744

Search results for: computer processing of large databases

9804 Discrete Element Simulations of Composite Ceramic Powders

Authors: Julia Cristina Bonaldo, Christophe L. Martin, Severine Romero Baivier, Stephane Mazerat

Abstract:

Alumina refractories are commonly used in steel and foundry industries. These refractories are prepared through a powder metallurgy route. They are a mixture of hard alumina particles and graphite platelets embedded into a soft carbonic matrix (binder). The powder can be cold pressed isostatically or uniaxially, depending on the application. The compact is then fired to obtain the final product. The quality of the product is governed by the microstructure of the composite and by the process parameters. The compaction behavior and the mechanical properties of the fired product depend greatly on the amount of each phase, on their morphology and on the initial microstructure. In order to better understand the link between these parameters and the macroscopic behavior, we use the Discrete Element Method (DEM) to simulate the compaction process and the fracture behavior of the fired composite. These simulations are coupled with well-designed experiments. Four mixes with various amounts of Al₂O₃ and binder were tested both experimentally and numerically. In DEM, each particle is modelled and the interactions between particles are taken into account through appropriate contact or bonding laws. Here, we model a bimodal mixture of large Al₂O₃ and small Al₂O₃ covered with a soft binder. This composite is itself mixed with graphite platelets. X-ray tomography images are used to analyze the morphologies of the different components. Large Al₂O₃ particles and graphite platelets are modelled in DEM as sets of particles bonded together. The binder is modelled as a soft shell that covers both large and small Al₂O₃ particles. When two particles with binder indent each other, they first interact through this soft shell. Once a critical indentation is reached (towards the end of compaction), hard Al₂O₃ - Al₂O₃ contacts appear. In accordance with experimental data, DEM simulations show that the amount of Al₂O₃ and the amount of binder play a major role for the compaction behavior. The graphite platelets bend and break during the compaction, also contributing to the macroscopic stress. Firing step is modeled in DEM by ascribing bonds to particles which contact each other after compaction. The fracture behavior of the compacted mixture is also simulated and compared with experimental data. Both diametrical tests (Brazilian tests) and triaxial tests are carried out. Again, the link between the amount of Al₂O₃ particles and the fracture behavior is investigated. The methodology described here can be generalized to other particulate materials that are used in the ceramic industry.

Keywords: cold compaction, composites, discrete element method, refractory materials, x-ray tomography

Procedia PDF Downloads 138
9803 Fighting for What’s Fair: Illegitimacy Appraisals as Drivers of Different Collective Action Responses to Economic Inequality

Authors: Finn Lannon, Jenny Roth, Roland Deutsch, Eric Igou

Abstract:

The world continues to be rife with economic inequality, which has an impact on how people think and behaves in response to large and often growing gaps in wealth. Large gaps in earnings between groups within a particular organization, area or society can create tension between groups. Collective action tendencies (to protest, sign a petition, vote on behalf of an ingroup etc.) are also a growing phenomenon globally. Research shows that economic inequality promotes social processes such as appraisals of illegitimacy, which are recognized antecedents of collective action. This paper examines different types of collective action intentions among middle-status group members in response to economic inequality in two studies. Study 1 (N = 72) demonstrates a causal link between high economic inequality and collective action intentions of middle-status group members both to reduce inequality and to improve group status. A second pre-registered study (N = 432) examines key drivers of these relationships, including illegitimacy appraisals and direction of intergroup comparison. Adding to the current understanding of the topic, distinctions between the illegitimacy of one’s group status and the illegitimacy of societal inequality are found to mediate key relationships between economic inequality and relevant collective action types. The direction of intergroup comparison (upwards vs. downwards) is also shown to have a significant impact on collective action intentions to improve group status. Findings add to the understanding of the consequences of economic inequality and drivers of collective action intentions.

Keywords: economic inequality, collective action, legitimacy, social psychology

Procedia PDF Downloads 90
9802 Education as a Global Business: An Overview of the Growth in International Students

Authors: Chinonso Jude Ugwu

Abstract:

This study examines education as a global business, primarily focusing on the boom of college students worldwide. It adopts a mixed-technique approach, using primary and secondary data sources. Primary data was obtained using questionnaires and interviews focusing on international college students, academic staff, and recruitment corporations from pre-determined universities in the United States, the United Kingdom, and Australia. The secondary information was collected from relevant literature, professional reports, and databases. The study ascertained that the boom in worldwide college students is a huge trend within the training enterprise, arising primarily from the growing call for better education worldwide. The studies additionally found that different factors are responsible for the decision of international students to consider studying abroad, such as high schooling satisfaction, cultural exposure, professional opportunities, and the popularity of universities. Furthermore, the study highlights the challenges college students face worldwide, including economic difficulties, social and cultural adjustments, and visa regulations. Based on the findings, the study concludes that Education as a Global Business is a profitable enterprise with substantial potential. However, universities and governments should handle global college students’ demanding situations by creating welcoming surroundings promoting diversity and inclusivity. The study recommends that universities put money into programs and offerings that assist worldwide college students’ welfare. Governments should ease visa regulations to inspire more extraordinary worldwide college students to observe abroad.

Keywords: education, business, profitability, global students

Procedia PDF Downloads 74
9801 A Study of Basic and Reactive Dyes Removal from Synthetic and Industrial Wastewater by Electrocoagulation Process

Authors: Almaz Negash, Dessie Tibebe, Marye Mulugeta, Yezbie Kassa

Abstract:

Large-scale textile industries use large amounts of toxic chemicals, which are very hazardous to human health and environmental sustainability. In this study, the removal of various dyes from effluents of textile industries using the electrocoagulation process was investigated. The studied dyes were Reactive Red 120 (RR-120), Basic Blue 3 (BB-3), and Basic Red 46 (BR-46), which were found in samples collected from effluents of three major textile factories in the Amhara region, Ethiopia. For maximum removal, the dye BB-3 required an acidic pH 3, RR120 basic pH 11, while BR-46 neutral pH 7 conditions. BB-3 required a longer treatment time of 80 min than BR46 and RR-120, which required 30 and 40 min, respectively. The best removal efficiency of 99.5%, 93.5%, and 96.3% was achieved for BR-46, BB-3, and RR-120, respectively, from synthetic wastewater containing 10 mg L1of each dye at an applied potential of 10 V. The method was applied to real textile wastewaters and 73.0 to 99.5% removal of the dyes was achieved, Indicating Electrocoagulation can be used as a simple, and reliable method for the treatment of real wastewater from textile industries. It is used as a potentially viable and inexpensive tool for the treatment of textile dyes. Analysis of the electrochemically generated sludge by X-ray Diffraction, Scanning Electron Microscope, and Fourier Transform Infrared Spectroscopy revealed the expected crystalline aluminum oxides (bayerite (Al(OH)3 diaspore (AlO(OH)) found in the sludge. The amorphous phase was also found in the floc. Textile industry owners should be aware of the impact of the discharge of effluents on the Ecosystem and should use the investigated electrocoagulation method for effluent treatment before discharging into the environment.

Keywords: electrocoagulation, aluminum electrodes, Basic Blue 3, Basic Red 46, Reactive Red 120, textile industry, wastewater

Procedia PDF Downloads 53
9800 Impact of Obesity on Outcomes in Breast Reconstruction: A Systematic Review and Meta-Analysis

Authors: Adriana C. Panayi, Riaz A. Agha, Brady A. Sieber, Dennis P. Orgill

Abstract:

Background: Increased rates of both breast cancer and obesity have resulted in more women seeking breast reconstruction. These women may be at increased risk for perioperative complications. A systematic review was conducted to assess the outcomes in obese women who have undergone breast reconstruction following mastectomy. Methods: Cochrane, PUBMED and EMBASE electronic databases were screened and data was extracted from included studies. The clinical outcomes assessed were surgical complications, medical complications, length of postoperative hospital stay, reoperation rate and patient satisfaction. Results: 33 studies met the inclusion criteria for the review and 29 provided enough data to be included in the meta-analysis (71368 patients, 20061 of which were obese). Obese women were 2.3 times more likely to experience surgical complications (95 percent CI 2.19 to 2.39; P < 0.00001), 2.8 times more likely to have medical complications (95 percent CI 2.41 to 3.26; P < 0.00001) and had a 1.9 times higher risk of reoperation (95 percent CI 1.75 to 2.07; P < 0.00001). The most common complication, wound dehiscence, was 2.5 times more likely in obese women (95 percent CI 1.80 to 3.52; P < 0.00001). Sensitivity analysis confirmed that obese women were more likely to experience surgical complications (RR 2.36, 95% CI 2.22–2.52; P < 0.00001). Conclusions: This study provides evidence that obesity increases the risk of complications in both implant and autologous reconstruction. Additional prospective and observational studies are needed to determine if weight reduction prior to reconstruction reduces the perioperative risks associated with obesity.

Keywords: autologous reconstruction, breast cancer, breast reconstruction, literature review, obesity, oncology, prosthetic reconstruction

Procedia PDF Downloads 308
9799 Chinese Vocabulary Acquisition and Mobile Assisted Language Learning

Authors: Yuqing Sun

Abstract:

Chinese has been regarded as one of the most difficult languages in learning due to its complex spelling structure, difficult pronunciation, as well as its varying forms. Since vocabulary acquisition is the basic process to acquire a language, to express yourself, to compose a sentence, and to conduct a communication, so learning the vocabulary is of great importance. However, the vocabulary contains pronunciation, spelling, recognition and application which may seem as a huge work. This may pose a question for the language teachers (language teachers in China who teach Chinese to the foreign students): How to teach them in an effective way? Traditionally, teachers have no choice but teach it all by themselves, then with the development of technology, they can use computer as a tool to help them (Computer Assisted Language Learning or CALL). Now, they move into the Mobile Assisted Language Learning (MALL) method to guide their teaching, upon which the appraisal is convincing. It diversifies the learning material and the way of output, which can activate learners’ curiosity and accelerate their understanding. This paper will focus on actual case studies occurring in the universities in China of teaching the foreign students to learn Chinese, and the analysis of the utilization of WeChat channel as an example of MALL model to explore the active role of MALL to enhance the effectiveness of Chinese vocabulary acquisition.

Keywords: Chinese, vocabulary acquisition, MALL, case

Procedia PDF Downloads 414
9798 NanoSat MO Framework: Simulating a Constellation of Satellites with Docker Containers

Authors: César Coelho, Nikolai Wiegand

Abstract:

The advancement of nanosatellite technology has opened new avenues for cost-effective and faster space missions. The NanoSat MO Framework (NMF) from the European Space Agency (ESA) provides a modular and simpler approach to the development of flight software and operations of small satellites. This paper presents a methodology using the NMF together with Docker for simulating constellations of satellites. By leveraging Docker containers, the software environment of individual satellites can be easily replicated within a simulated constellation. This containerized approach allows for rapid deployment, isolation, and management of satellite instances, facilitating comprehensive testing and development in a controlled setting. By integrating the NMF lightweight simulator in the container, a comprehensive simulation environment was achieved. A significant advantage of using Docker containers is their inherent scalability, enabling the simulation of hundreds or even thousands of satellites with minimal overhead. Docker's lightweight nature ensures efficient resource utilization, allowing for deployment on a single host or across a cluster of hosts. This capability is crucial for large-scale simulations, such as in the case of mega-constellations, where multiple traditional virtual machines would be impractical due to their higher resource demands. This ability for easy horizontal scaling based on the number of simulated satellites provides tremendous flexibility to different mission scenarios. Our results demonstrate that leveraging Docker containers with the NanoSat MO Framework provides a highly efficient and scalable solution for simulating satellite constellations, offering not only significant benefits in terms of resource utilization and operational flexibility but also enabling testing and validation of ground software for constellations. The findings underscore the importance of taking advantage of already existing technologies in computer science to create new solutions for future satellite constellations in space.

Keywords: containerization, docker containers, NanoSat MO framework, satellite constellation simulation, scalability, small satellites

Procedia PDF Downloads 49
9797 Application of Medical Information System for Image-Based Second Opinion Consultations–Georgian Experience

Authors: Kldiashvili Ekaterina, Burduli Archil, Ghortlishvili Gocha

Abstract:

Introduction – Medical information system (MIS) is at the heart of information technology (IT) implementation policies in healthcare systems around the world. Different architecture and application models of MIS are developed. Despite of obvious advantages and benefits, application of MIS in everyday practice is slow. Objective - On the background of analysis of the existing models of MIS in Georgia has been created a multi-user web-based approach. This presentation will present the architecture of the system and its application for image based second opinion consultations. Methods – The MIS has been created with .Net technology and SQL database architecture. It realizes local (intranet) and remote (internet) access to the system and management of databases. The MIS is fully operational approach, which is successfully used for medical data registration and management as well as for creation, editing and maintenance of the electronic medical records (EMR). Five hundred Georgian language electronic medical records from the cervical screening activity illustrated by images were selected for second opinion consultations. Results – The primary goal of the MIS is patient management. However, the system can be successfully applied for image based second opinion consultations. Discussion – The ideal of healthcare in the information age must be to create a situation where healthcare professionals spend more time creating knowledge from medical information and less time managing medical information. The application of easily available and adaptable technology and improvement of the infrastructure conditions is the basis for eHealth applications. Conclusion - The MIS is perspective and actual technology solution. It can be successfully and effectively used for image based second opinion consultations.

Keywords: digital images, medical information system, second opinion consultations, electronic medical record

Procedia PDF Downloads 450
9796 Nonlinear Vibration of FGM Plates Subjected to Acoustic Load in Thermal Environment Using Finite Element Modal Reduction Method

Authors: Hassan Parandvar, Mehrdad Farid

Abstract:

In this paper, a finite element modeling is presented for large amplitude vibration of functionally graded material (FGM) plates subjected to combined random pressure and thermal load. The material properties of the plates are assumed to vary continuously in the thickness direction by a simple power law distribution in terms of the volume fractions of the constituents. The material properties depend on the temperature whose distribution along the thickness can be expressed explicitly. The von Karman large deflection strain displacement and extended Hamilton's principle are used to obtain the governing system of equations of motion in structural node degrees of freedom (DOF) using finite element method. Three-node triangular Mindlin plate element with shear correction factor is used. The nonlinear equations of motion in structural degrees of freedom are reduced by using modal reduction method. The reduced equations of motion are solved numerically by 4th order Runge-Kutta scheme. In this study, the random pressure is generated using Monte Carlo method. The modeling is verified and the nonlinear dynamic response of FGM plates is studied for various values of volume fraction and sound pressure level under different thermal loads. Snap-through type behavior of FGM plates is studied too.

Keywords: nonlinear vibration, finite element method, functionally graded material (FGM) plates, snap-through, random vibration, thermal effect

Procedia PDF Downloads 262
9795 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 538
9794 Effects of Virtual Reality on Relieving Postoperative Pain in Surgical Patients: A Systematic Review and Meta-Analysis

Authors: Lingyu Ding, Hongxia Hua, Hanfei Zhu, Jinling Lu, Qin Xu

Abstract:

Background: Postoperative pain is a prevalent problem leading to many adverse outcomes in surgical patients. Virtual reality (VR) is an emerging non-pharmacological method of postoperative pain relief, but the effects of it are not clear. This review aimed to explore the effects of VR on relieving postoperative pain. Methods: We searched PubMed, Embase, Web of Science, and other databases from inception to November 2019 to get the eligible studies. Meta-analyses were conducted to compare VR and usual care for relieving postoperative pain. Subgroup analyses and sensitivity analyses were performed to explain the heterogeneity. Results: Overall, 8 randomized control trials (RCTs) enrolling 723 participants were included. Our results demonstrated that the patients receiving the VR intervention had lower postoperative pain scores than those receiving the usual care. One subgroup analysis revealed that VR could relieve postoperative pain both in minor surgery and major surgery. Another subgroup analysis demonstrated a significant reduction in postoperative pain among patients receiving VR during the intraoperative and the postoperative periods. However, there was no significant postoperative pain relief when receiving VR during the preoperative period. Additionally, significant improvements in postoperative satisfaction were reported in two studies. However, another two studies included found that VR could not affect physiological parameters related to pain. Conclusion: Applying VR can relieve postoperative pain effectively. The type of surgery and timing of using VR are the main sources of heterogeneity. More rigorous studies about the relationship between VR and postoperative pain relief will be needed.

Keywords: meta-analysis, postoperative pain, systematic review, virtual reality

Procedia PDF Downloads 133
9793 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm

Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 530
9792 Evaluation of the Biological Activities of Chrysin as an Important Perspective in the Treatment of Infectious and Cancer Diseases

Authors: Sajjad Jafari, Reza Akbari

Abstract:

Background and Aim: Chrysin, a flavonoid compound found in medicinal plants, honey, and propolis, has potential biological activities that make it an important perspective in the treatment of infectious and cancer diseases. The aim of this review study is to evaluate the biological activities of chrysin in the treatment of infectious and cancer diseases. Material and Methods: The present study is a review study that searched reputable scientific databases such as PubMed, Google Scholar, Scopus, and Web of Science from 2000 to 2023 using keywords such as antimicrobial, antifungal, chrysin, anticancer, antioxidants, and infectious diseases. The researchers examined 25 articles to determine the biological activities of chrysin. Results: Chrysin has high inhibitory or lethal activities on gram-positive and gram-negative bacteria, including Staphylococcus aureus, Escherichia coli, Pseudomonas aeruginosa, Bacillus subtilis, and Enterococcus faeces. It also has anti-biofilm effects and antifungal effects on strains such as Aspergillus niger and Candida albicans. Chrysin also has anticancer effects on various cancers, including colorectal cancer, pancreatic cancer, breast cancer, and MCF-7 cancer, which have been confirmed in vitro and in vivo. Conclusion: Chrysin has the potential as an important therapeutic option in the treatment of infectious and cancer diseases. Its high antimicrobial and anticancer activities, combined with its low toxicity in nanoparticle form, make it a promising candidate for further clinical trials. The production of anti-microbial and anti-cancer drugs from natural substances, such as chrysin, is a valuable contribution to the field of medicine.

Keywords: chrysin, antimicrobial, anticancer, infectious diseases

Procedia PDF Downloads 116
9791 The Impact of Large-Scale Wind Energy Development on Islands’ Interconnection to the Mainland System

Authors: Marina Kapsali, John S. Anagnostopoulos

Abstract:

Greek islands’ interconnection (IC) with larger power systems, such as the mainland grid, is a crucial issue that has attracted a lot of interest; however, the recent economic recession that the country undergoes together with the highly capital intensive nature of this kind of projects have stalled or sifted the development of many of those on a more long-term basis. On the other hand, most of Greek islands are still heavily dependent on the lengthy and costly supply chain of oil imports whilst the majority of them exhibit excellent potential for wind energy (WE) applications. In this respect, the main purpose of the present work is to investigate −through a parametric study which varies both in wind farm (WF) and submarine IC capacities− the impact of large-scale WE development on the IC of the third in size island of Greece (Lesbos) with the mainland system. The energy and economic performance of the system is simulated over a 25-year evaluation period assuming two possible scenarios, i.e. S(a): without the contribution of the local Thermal Power Plant (TPP) and S(b): the TPP is maintained to ensure electrification of the island. The economic feasibility of the two options is investigated in terms of determining their Levelized Cost of Energy (LCOE) including also a sensitivity analysis on the worst/reference/best Cases. According to the results, Lesbos island IC presents considerable economic interest for covering part of island’s future electrification needs with WE having a vital role in this challenging venture.

Keywords: electricity generation cost, levelized cost of energy, mainland grid, wind energy rejection

Procedia PDF Downloads 215
9790 Organotin (IV) Based Complexes as Promiscuous Antibacterials: Synthesis in vitro, in Silico Pharmacokinetic, and Docking Studies

Authors: Wajid Rehman, Sirajul Haq, Bakhtiar Muhammad, Syed Fahad Hassan, Amin Badshah, Muhammad Waseem, Fazal Rahim, Obaid-Ur-Rahman Abid, Farzana Latif Ansari, Umer Rashid

Abstract:

Five novel triorganotin (IV) compounds have been synthesized and characterized. The tin atom is penta-coordinated to assume trigonal-bipyramidal geometry. Using in silico derived parameters; the objective of our study is to design and synthesize promiscuous antibacterials potent enough to combat resistance. Among various synthesized organotin (IV) complexes, compound 5 was found as potent antibacterial agent against various bacterial strains. Further lead optimization of drug-like properties was evaluated through in silico predictions. Data mining and computational analysis were utilized to derive compound promiscuity phenomenon to avoid drug attrition rate in designing antibacterials. Xanthine oxidase and human glucose- 6-phosphatase were found as only true positive off-target hits by ChEMBL database and others utilizing similarity ensemble approach. Propensity towards a-3 receptor, human macrophage migration factor and thiazolidinedione were found as false positive off targets with E-value 1/4> 10^-4 for compound 1, 3, and 4. Further, displaying positive drug-drug interaction of compound 1 as uricosuric was validated by all databases and docked protein targets with sequence similarity and compositional matrix alignment via BLAST software. Promiscuity of the compound 5 was further confirmed by in silico binding to different antibacterial targets.

Keywords: antibacterial activity, drug promiscuity, ADMET prediction, metallo-pharmaceutical, antimicrobial resistance

Procedia PDF Downloads 504
9789 Extraction of Urban Building Damage Using Spectral, Height and Corner Information

Authors: X. Wang

Abstract:

Timely and accurate information on urban building damage caused by earthquake is important basis for disaster assessment and emergency relief. Very high resolution (VHR) remotely sensed imagery containing abundant fine-scale information offers a large quantity of data for detecting and assessing urban building damage in the aftermath of earthquake disasters. However, the accuracy obtained using spectral features alone is comparatively low, since building damage, intact buildings and pavements are spectrally similar. Therefore, it is of great significance to detect urban building damage effectively using multi-source data. Considering that in general height or geometric structure of buildings change dramatically in the devastated areas, a novel multi-stage urban building damage detection method, using bi-temporal spectral, height and corner information, was proposed in this study. The pre-event height information was generated using stereo VHR images acquired from two different satellites, while the post-event height information was produced from airborne LiDAR data. The corner information was extracted from pre- and post-event panchromatic images. The proposed method can be summarized as follows. To reduce the classification errors caused by spectral similarity and errors in extracting height information, ground surface, shadows, and vegetation were first extracted using the post-event VHR image and height data and were masked out. Two different types of building damage were then extracted from the remaining areas: the height difference between pre- and post-event was used for detecting building damage showing significant height change; the difference in the density of corners between pre- and post-event was used for extracting building damage showing drastic change in geometric structure. The initial building damage result was generated by combining above two building damage results. Finally, a post-processing procedure was adopted to refine the obtained initial result. The proposed method was quantitatively evaluated and compared to two existing methods in Port au Prince, Haiti, which was heavily hit by an earthquake in January 2010, using pre-event GeoEye-1 image, pre-event WorldView-2 image, post-event QuickBird image and post-event LiDAR data. The results showed that the method proposed in this study significantly outperformed the two comparative methods in terms of urban building damage extraction accuracy. The proposed method provides a fast and reliable method to detect urban building collapse, which is also applicable to relevant applications.

Keywords: building damage, corner, earthquake, height, very high resolution (VHR)

Procedia PDF Downloads 213
9788 In vitro Effects of Porcine Follicular Fluid Proteins on Cell Culture Growth in Luteal Phase Porcine Oviductal Epithelial Cells

Authors: Mayuva Youngsabanant, Chanikarn Srinark, Supanyika Sengsai, Soratorn Kerdkriangkrai, Nongnuch Gumlungpat, Mayuree Pumipaiboon

Abstract:

The follicular fluid proteins of healthy medium size follicles (4-6 mm in diameters) and large size follicles (7-8 mm in diameter) of large white pig ovaries were collected by using sterile technique. They were used for testing the effect on primary in vitro cell culture growth of porcine oviductal epithelial cells (pOEC). Porcine oviductal epithelial cells of luteal phase was culture in M199 and added with 10% fetal calf serum 2.2 mg/mL, NaHCO₃, 0.25 mM pyruvate, 15 µg/mL and 50 µg/mL, gentamycin sulfate at high humidified atmosphere with 5% CO₂ in 95% air atmosphere at 37°C for 96 h before testing. The optimized concentration of pFF of two follicle sizes (at concentration of 2, 4, 20, 40, 200, 400, 500, and 600 µg proteins) in culture medium was observed for 24 h using MTT assay. Results were analyzed with a one-way ANOVA in SPSS statistic. Moreover, pOEC was also studied in morphological characteristic on long-term culture. The results of long-term study revealed that pOEC showed 70-80 percentage of healthy morphology on epithelial-like character and contained 30 percentage of an elongated shape (fibroblast-like morphology) at 4 weeks of culture time. MTT assay reviewed an increase in the percentage of viability of pOEC in 2 treated of follicular fluid groups. Two treatment concentration groups were higher than control group (p < 0.05) but not in positive control group. Interestingly, at 200 µg protein of 2 treated follicular fluid groups were reached the highest cell viability which is higher than a positive control and it is significantly different form control group (P < 0.05). These cells are developed and had fibroblast elongate shape which is longer than the cells in control group and positive control group. This report implies that pFF of medium follicle size at 200 µg proteins and large follicle size at 200 and 500 µg proteins could be optimized concentration for using as a supplement in culture medium to promote cell growth and development instead of growth hormone from fetal calf serum. It could be applied in cell biotechnology researches. Acknowledgements: The project was funded by a grant from Silpakorn University Research and Development Institute (SURDI) and Faculty of Science, Silpakorn University, Thailand.

Keywords: in vitro, porcine follicular fluid protein (pFF), porcine oviductal epithelial cells (pOEC), MTT

Procedia PDF Downloads 145
9787 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 172
9786 Digital Interventions for Older People Experiencing Homelessness (OPEH): A Systematic Scoping Review

Authors: Emily Adams, Eddie Donaghy, David Henderson, Lauren Ng, Caroline Sanders, Rowena Stewart, Maria Wolters, Stewart Mercer

Abstract:

Ongoing review abstract: Older People Experiencing Homelessness (OPEH) can have mental and physical indicators of aging 10–20 years earlier than the general population and experience premature mortality due to age-related chronic conditions. Emerging literature suggests digital interventions could positively impact PEH’s well-being. However, the increased reliance on digital delivery may also perpetuate digital inequalities for socially excluded groups, including PEH. The potential triple disadvantage of being older, homeless, and digitally excluded creates a uniquely problematic situation that warrants further research. This scoping review aims to investigate and synthesise the range and type of digital interventions available to OPEH and the organisations that support OPEH. The following databases were searched on 28th July 2023: Medline, Scopus, International Bibliography of the Social Sciences (IBSS)‎, Applied Social Sciences Index & Abstracts (ASSIA)‎, Association for Computing Machinery Digital Library (ACMDL) and Policy commons. A search strategy was developed in collaboration with an academic librarian. The presentation will include: An introduction to OPEH and digital exclusion Overview of the results of this review: OPEH usage of digital platforms Current digital interventions available The role of support organisations Current gaps in the evidence, future research and recommendations for policy and practice

Keywords: homeless, digital exclusion, aging, technology

Procedia PDF Downloads 78
9785 Building User Behavioral Models by Processing Web Logs and Clustering Mechanisms

Authors: Madhuka G. P. D. Udantha, Gihan V. Dias, Surangika Ranathunga

Abstract:

Today Websites contain very interesting applications. But there are only few methodologies to analyze User navigations through the Websites and formulating if the Website is put to correct use. The web logs are only used if some major attack or malfunctioning occurs. Web Logs contain lot interesting dealings on users in the system. Analyzing web logs has become a challenge due to the huge log volume. Finding interesting patterns is not as easy as it is due to size, distribution and importance of minor details of each log. Web logs contain very important data of user and site which are not been put to good use. Retrieving interesting information from logs gives an idea of what the users need, group users according to their various needs and improve site to build an effective and efficient site. The model we built is able to detect attacks or malfunctioning of the system and anomaly detection. Logs will be more complex as volume of traffic and the size and complexity of web site grows. Unsupervised techniques are used in this solution which is fully automated. Expert knowledge is only used in validation. In our approach first clean and purify the logs to bring them to a common platform with a standard format and structure. After cleaning module web session builder is executed. It outputs two files, Web Sessions file and Indexed URLs file. The Indexed URLs file contains the list of URLs accessed and their indices. Web Sessions file lists down the indices of each web session. Then DBSCAN and EM Algorithms are used iteratively and recursively to get the best clustering results of the web sessions. Using homogeneity, completeness, V-measure, intra and inter cluster distance and silhouette coefficient as parameters these algorithms self-evaluate themselves to input better parametric values to run the algorithms. If a cluster is found to be too large then micro-clustering is used. Using Cluster Signature Module the clusters are annotated with a unique signature called finger-print. In this module each cluster is fed to Associative Rule Learning Module. If it outputs confidence and support as value 1 for an access sequence it would be a potential signature for the cluster. Then the access sequence occurrences are checked in other clusters. If it is found to be unique for the cluster considered then the cluster is annotated with the signature. These signatures are used in anomaly detection, prevent cyber attacks, real-time dashboards that visualize users, accessing web pages, predict actions of users and various other applications in Finance, University Websites, News and Media Websites etc.

Keywords: anomaly detection, clustering, pattern recognition, web sessions

Procedia PDF Downloads 288
9784 Assessment of Microalgal Lipids by Enhancing EPA and DHA for Integration into Infant Milk Formulas

Authors: Rkia Lbouhmadi, Mir Youssef

Abstract:

Fatty acids such as DocosaHexaenoic Acid (DHA) and EicosaPentaenoic Acid (EPA) are of growing interest for their positive impact on human health. Oils rich in omega-3 are in high demand, particularly for incorporation into infant milk. Generally omega-3 fatty acids are extracted from oily fish, putting additional pressure on global fish stocks that is experiencing an over exploitation. Therefore, this present work aimed to study the capacity of tree different strains of microalgae for producing lipids rich on Omega-3 fatty acids such as EPA and DHA that can be used to enrich infantile milk. Three different strains were selected for this study; Parachlorella kessleri (GEPEA UMR-CNRS6144, University of Nantes) and Cyclotella spp and Scenedesmus spp (collected from different water bodies that are located in the region of Agadir, Morocco). it examined the impact of various culture conditions on EPA and DHA accumulation in three strains. Lipid composition was analyzed using GC-MS and FTIR. Following a comparative analysis between regular and microalgal oil-supplemented formula milk was carried out by incorporating large droplets of fat containing microalgal fatty acids coated with added phospholipids into the formula milk. Results indicated that culture conditions such as light intensity affected fatty acides production. With 40% increase in Polyunsaturated Fatty Acids (PUFA) compared to Saturated Fatty Acids (SFA). In conclusion, it exploratory study indicates that incorporating large milk phospholipid-coated lipid droplets enriched with microalgae lipids into infant formula may offer improved nutritional benefits for newborns, resembling human milk.

Keywords: microalgae oil, INFANT MILK, EPA, DHA

Procedia PDF Downloads 47
9783 Modeling the Human Harbor: An Equity Project in New York City, New York USA

Authors: Lauren B. Birney

Abstract:

The envisioned long-term outcome of this three-year research, and implementation plan is for 1) teachers and students to design and build their own computational models of real-world environmental-human health phenomena occurring within the context of the “Human Harbor” and 2) project researchers to evaluate the degree to which these integrated Computer Science (CS) education experiences in New York City (NYC) public school classrooms (PreK-12) impact students’ computational-technical skill development, job readiness, career motivations, and measurable abilities to understand, articulate, and solve the underlying phenomena at the center of their models. This effort builds on the partnership’s successes over the past eight years in developing a benchmark Model of restoration-based Science, Technology, Engineering, and Math (STEM) education for urban public schools and achieving relatively broad-based implementation in the nation’s largest public school system. The Billion Oyster Project Curriculum and Community Enterprise for Restoration Science (BOP-CCERS STEM + Computing) curriculum, teacher professional developments, and community engagement programs have reached more than 200 educators and 11,000 students at 124 schools, with 84 waterfront locations and Out of School of Time (OST) programs. The BOP-CCERS Partnership is poised to develop a more refined focus on integrating computer science across the STEM domains; teaching industry-aligned computational methods and tools; and explicitly preparing students from the city’s most under-resourced and underrepresented communities for upwardly mobile careers in NYC’s ever-expanding “digital economy,” in which jobs require computational thinking and an increasing percentage require discreet computer science technical skills. Project Objectives include the following: 1. Computational Thinking (CT) Integration: Integrate computational thinking core practices across existing middle/high school BOP-CCERS STEM curriculum as a means of scaffolding toward long term computer science and computational modeling outcomes. 2. Data Science and Data Analytics: Enabling Researchers to perform interviews with Teachers, students, community members, partners, stakeholders, and Science, Technology, Engineering, and Mathematics (STEM) industry Professionals. Collaborative analysis and data collection were also performed. As a centerpiece, the BOP-CCERS partnership will expand to include a dedicated computer science education partner. New York City Department of Education (NYCDOE), Computer Science for All (CS4ALL) NYC will serve as the dedicated Computer Science (CS) lead, advising the consortium on integration and curriculum development, working in tandem. The BOP-CCERS Model™ also validates that with appropriate application of technical infrastructure, intensive teacher professional developments, and curricular scaffolding, socially connected science learning can be mainstreamed in the nation’s largest urban public school system. This is evidenced and substantiated in the initial phases of BOP-CCERS™. The BOP-CCERS™ student curriculum and teacher professional development have been implemented in approximately 24% of NYC public middle schools, reaching more than 250 educators and 11,000 students directly. BOP-CCERS™ is a fully scalable and transferable educational model, adaptable to all American school districts. In all settings of the proposed Phase IV initiative, the primary beneficiary group will be underrepresented NYC public school students who live in high-poverty neighborhoods and are traditionally underrepresented in the STEM fields, including African Americans, Latinos, English language learners, and children from economically disadvantaged households. In particular, BOP-CCERS Phase IV will explicitly prepare underrepresented students for skilled positions within New York City’s expanding digital economy, computer science, computational information systems, and innovative technology sectors.

Keywords: computer science, data science, equity, diversity and inclusion, STEM education

Procedia PDF Downloads 58
9782 A Systematic Review on Dietary Interventions for Iron Deficiency Anemia (IDA) in Under-Five Children in Nigeria

Authors: Justina Ijeoma Ezebuwa, Catherine C. Ikewuchi, Eka B. Essien, Francis C. Anacletus

Abstract:

Iron deficiency anemia (IDA) is a significant problem in Nigeria, especially in children under five. Intervention options for treating anemia in under-five children have also been the subject of research. This study aims to synthesize the evidence on dietary interventions for managing iron deficiency anemia in under-five children in Nigeria. This study uses a systematic review method to collect relevant studies to answer the research questions and a narrative synthesis to analyze and synthesize the findings of this study. Cochrane, PubMed, and ScienceDirect databases were thoroughly searched, and five (5) articles were selected for this study. The results show that dietary interventions, such as daily multi-nutrient fortified dairy-based drinks, biofortified (yellow/ white) cassava rich in pro-vitamin A, iron supplementation in foods, and ready-to-use therapeutic food (RUTF) may be relevant to the management of iron deficiency anemia in under-five children in Nigeria. The study also shows that daily multi-nutrient fortified dairy-based drinks may be more effective, feasible, and culturally acceptable for managing anemia in under-5 children in Nigeria. In addition, daily multi-nutrient fortified dairy-based drinks and ready-to-use therapeutic food (RUTF) were reported to have the potential to improve the growth, cognitive development, and overall health outcomes of under-five children with iron deficiency anemia in Nigeria. Recommendations for future studies in this research area and for public health practitioners and policymakers were provided.

Keywords: dietary intervention, iron deficiency anemia, under-five children, Nigeria

Procedia PDF Downloads 70
9781 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 525
9780 Lost Maritime Culture in the Netherlands: Linking Material and Immaterial Datasets for a Modern Day Perception of the Late Medieval Maritime Cultural Landscape of the Zuiderzee Region

Authors: Y. T. van Popta

Abstract:

This paper focuses on the never thoroughly examined yet in native relevant late medieval maritime cultural landscape of the former Zuiderzee (A.D. 1170-1932) in the center part of the Netherlands. Especially the northeastern part of the region, nowadays known as the Noordoostpolder, testifies of the dynamic battle of the Dutch against the water. This highly dynamic maritime region developed from a lake district into a sea and eventually into a polder. By linking physical and cognitive datasets from the Noordoostpol-der region in a spatial environment, new information on a late medieval maritime culture is brought to light, giving the opportunity to: (i) create a modern day perception on the late medieval maritime cultural landscape of the region and (ii) to underline the value of interdisciplinary and spatial research in maritime archaeology in general. Since the large scale reclamations of the region (A.D. 1932-1968), many remains have been discovered of a drowned and eroded late medieval maritime culture, represented by lost islands, drowned settlements, cultivated lands, shipwrecks and socio-economic networks. Recent archaeological research has proved the existence of this late medieval maritime culture by the discovery of the remains of the drowned settlement Fenehuysen (Veenhuizen) and its surroundings. The fact that this settlement and its cultivated surroundings remained hidden for so long proves that a large part of the maritime cultural landscape is ‘invisible’ and can only be found by extensive interdisciplinary research.

Keywords: drowned settlements, late middle ages, lost islands, maritime cultural landscape, the Netherlands

Procedia PDF Downloads 213
9779 Impact of Lobular Carcinoma in situ on Local Recurrence in Breast Cancer Treated with Breast Conservation Therapy: A Systematic Review and Meta-Analysis

Authors: Christopher G. Harris, Guy D. Eslick

Abstract:

Purpose: Lobular carcinoma in situ (LCIS) is a known risk factor for breast cancer of unclear significance when detected in association with invasive carcinoma. This meta-analysis aims to determine the impact of LCIS on local recurrence risk for individuals with breast cancer treated with breast conservation therapy to help guide appropriate treatment strategies. Methods: We identified relevant studies from five electronic databases. Studies were deemed suitable for inclusion where they compared patients with invasive breast cancer and concurrent LCIS to those with breast cancer alone, all patients underwent breast conservation therapy (lumpectomy with adjuvant radiation therapy), and local recurrence was evaluated. Recurrence data were pooled by use of a random effects model. Results: From 1488 citations screened by our search, 8 studies were deemed suitable for inclusion. These studies comprised of 908 cases and 10638 controls. Median follow-up time was 90 months. There was a significantly increased overall risk of local breast cancer recurrence for individuals with LCIS in association with breast cancer following breast conservation therapy [pOR 1.87; 95% CI 1.14-3.04; p = 0.012]. The risk of local recurrence was non-significantly increased at 5 [pOR 1.09; 95% CI 0.48-2.48; p = 0.828] and 10 years [pOR 1.90; 95% CI 0.89-4.06; p = 0.096]. Conclusions: Individuals with LCIS in association with invasive breast cancer have an increased risk of local recurrence following breast conservation therapy. This supports consideration of aggressive local control of LCIS by way of completion mastectomy or re-excision for certain high-risk patients.

Keywords: breast cancer, breast conservation therapy, lobular carcinoma in situ, lobular neoplasia, local recurrence, meta-analysis

Procedia PDF Downloads 160
9778 Rail Corridors between Minimal Use of Train and Unsystematic Tightening of Population: A Methodological Essay

Authors: A. Benaiche

Abstract:

In the current situation, the automobile has become the main means of locomotion. It allows traveling long distances, encouraging urban sprawl. To counteract this trend, the train is often proposed as an alternative to the car. Simultaneously, the favoring of urban development around public transport nodes such as railway stations is one of the main issues of the coordination between urban planning and transportation and the keystone of the sustainable urban development implementation. In this context, this paper focuses on the study of the spatial structuring dynamics around the railway. Specifically, it is a question of studying the demographic dynamics in rail corridors of Nantes, Angers and Le Mans (Western France) basing on the radiation of railway stations. Consequently, the methodology is concentrated on the knowledge of demographic weight and gains of these corridors, the index of urban intensity and the mobility behaviors (workers’ travels, scholars' travels, modal practices of travels). The perimeter considered to define the rail corridors includes the communes of urban area which have a railway station and communes with an access time to the railway station is less than fifteen minutes by car (time specified by the Regional Transport Scheme of Travelers). The main tools used are the statistical data from the census of population, the basis of detailed tables and databases on mobility flows. The study reveals that the population is not tightened along rail corridors and train use is minimal despite the presence of a nearby railway station. These results lead to propose guidelines to make the train, a real vector of mobility across the rail corridors.

Keywords: coordination between urban planning and transportation, rail corridors, railway stations, travels

Procedia PDF Downloads 243
9777 A CORDIC Based Design Technique for Efficient Computation of DCT

Authors: Deboraj Muchahary, Amlan Deep Borah Abir J. Mondal, Alak Majumder

Abstract:

A discrete cosine transform (DCT) is described and a technique to compute it using fast Fourier transform (FFT) is developed. In this work, DCT of a finite length sequence is obtained by incorporating CORDIC methodology in radix-2 FFT algorithm. The proposed methodology is simple to comprehend and maintains a regular structure, thereby reducing computational complexity. DCTs are used extensively in the area of digital processing for the purpose of pattern recognition. So the efficient computation of DCT maintaining a transparent design flow is highly solicited.

Keywords: DCT, DFT, CORDIC, FFT

Procedia PDF Downloads 478
9776 Effects of Folic Acid, Alone or in Combination with Other Nutrients on Homocysteine Level and Cognitive Function in Older People: A Systematic Review

Authors: Jiayan Gou, Kexin He, Xin Zhang, Fei Wang, Liuni Zou

Abstract:

Background: Homocysteine is a high-risk factor for cognitive decline, and folic acid supplementation can lower homocysteine levels. However, current clinical research results are inconsistent, and the effects of folic acid on homocysteine levels and cognitive function in older people are inconsistent. Objective: The objective of this study is to systematically evaluate the effects of folic acid alone or in combination with other nutrients on homocysteine levels and cognitive function in older adults. Methods: Systematic searches were conducted in five databases, including PubMed, Embase, the Cochrane Library, Web of Science, and CINAHL, from inception to June 1, 2023. Randomized controlled trials were included investigating the effects of folic acid alone or in combination with other nutrients on cognitive function in older people. Results: 17 articles were included, with six focusing on the effects of folic acid alone and 11 examining folic acid in combination with other nutrients. The study included 3,100 individuals aged 60 to 83.2 years, with a relatively equal gender distribution (approximately 51.82% male). Conclusion: Folic acid alone or combined with other nutrients can effectively lower homocysteine level and improve cognitive function in patients with mild cognitive impairment. But for patients with Alzheimer's disease and dementia, the intervention only can reduce the homocysteine level, but the improvement in cognitive function is not significant. In healthy older people, high baseline homocysteine levels (>11.3 μmol/L) and good ω-3 fatty acid status (>590 μmol/L) can enhance the improvement effect of folic acid on cognitive function. This trial has been registered on PROSPERO as CRD42023433096.

Keywords: B-complex vitamins, cognitive function, folic acid, homocysteine

Procedia PDF Downloads 71
9775 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 271