Search results for: Hungarian diagnostic protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2160

Search results for: Hungarian diagnostic protocol

2130 Diagnostic Assessment for Mastery Learning of Engineering Students with a Bayesian Network Model

Authors: Zhidong Zhang, Yingchen Yang

Abstract:

In this study, a diagnostic assessment model for Mastery Engineering Learning was established based on a group of undergraduate students who studied in an engineering course. A diagnostic assessment model can examine both students' learning process and report achievement results. One very unique characteristic is that the diagnostic assessment model can recognize the errors and anything blocking students in their learning processes. The feedback is provided to help students to know how to solve the learning problems with alternative strategies and help the instructor to find alternative pedagogical strategies in the instructional designs. Dynamics is a core course in which is a common course being shared by several engineering programs. This course is a very challenging for engineering students to solve the problems. Thus knowledge acquisition and problem-solving skills are crucial for student success. Therefore, developing an effective and valid assessment model for student learning are of great importance. Diagnostic assessment is such a model which can provide effective feedback for both students and instructor in the mastery of engineering learning.

Keywords: diagnostic assessment, mastery learning, engineering, bayesian network model, learning processes

Procedia PDF Downloads 128
2129 Evaluation of Routing Protocols in Mobile Adhoc Networks

Authors: Anu Malhotra

Abstract:

An Ad-hoc network is one that is an autonomous, self configuring network made up of mobile nodes connected via wireless links. Ad-hoc networks often consist of nodes, mobile hosts (MH) or mobile stations (MS, also serving as routers) connected by wireless links. Different routing protocols are used for data transmission in between the nodes in an adhoc network. In this paper two protocols (OLSR and AODV) are analyzed on the basis of two parameters i.e. time delay and throughput with different data rates. On the basis of these analysis, we observed that with same data rate, AODV protocol is having more time delay than the OLSR protocol whereas throughput for the OLSR protocol is less compared to the AODV protocol.

Keywords: routing adhoc, mobile hosts, mobile stations, OLSR protocol, AODV protocol

Procedia PDF Downloads 474
2128 Urinary Neutrophil Gelatinase Associated Lipocalin as Diagnostic Biomarkers for Lupus Nephritis

Authors: Lorena GóMez Escorcia, Gustavo Aroca MartíNez, Jose Luiz Villarreal, Elkin Navarro Quiroz

Abstract:

Lupus nephritis (LN) is a high-cost disease, occurring in about half of patients with Systemic Lupus Erythematosus (SLE). Renal biopsy constitutes the only protocol that, to date, allows a correct diagnosis of the level of renal involvement in these patients. However, this procedure can have various adverse effects such as kidney bleeding, muscle bleeding, infection, pain, among others. Therefore, the development of new diagnostic alternatives is required. The neutrophil gelatinase-associated lipocalin (NGAL) has been emerging as a novel biomarker of acute kidney injury. The aim of this study was to assess urinary NGAL levels as a marker for disease activity in patients with lupus nephritis. For this work included 50 systemic lupus erythematosus (SLE) patients, 50 with active lupus nephritis (LN), and 50 without autoimmune and renal disease as controls. TNGAL in urine samples was measured by enzyme-linked immunosorbent assay (ELISA). The results revealed that patients with kidney damage had an elevated urinary NGAL as compared to patients with lupus without kidney damage and controls (p <0.005), and the mean of uNGAL was (28.72 ± 4.53), (19.51 ± 4.72), (8.91 ± 3.37) respectively. Measurement of urinary NGAL levels showed a very good diagnostic performance for discriminating patients with Lupus nephritis from SLE without renal damage and of control individuals.

Keywords: lupus nephritis, biomarker, NGAL, urine samples

Procedia PDF Downloads 182
2127 Multi-Sender MAC Protocol Based on Temporal Reuse in Underwater Acoustic Networks

Authors: Dongwon Lee, Sunmyeng Kim

Abstract:

Underwater acoustic networks (UANs) have become a very active research area in recent years. Compared with wireless networks, UANs are characterized by the limited bandwidth, long propagation delay and high channel dynamic in acoustic modems, which pose challenges to the design of medium access control (MAC) protocol. The characteristics severely affect network performance. In this paper, we study a MS-MAC (Multi-Sender MAC) protocol in order to improve network performance. The proposed protocol exploits temporal reuse by learning the propagation delays to neighboring nodes. A source node locally calculates the transmission schedules of its neighboring nodes and itself based on the propagation delays to avoid collisions. Performance evaluation is conducted using simulation, and confirms that the proposed protocol significantly outperforms the previous protocol in terms of throughput.

Keywords: acoustic channel, MAC, temporal reuse, UAN

Procedia PDF Downloads 320
2126 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 418
2125 A Study of EFL Learners with Different Goal Orientations in Response to Cognitive Diagnostic Reading Feedback

Authors: Yuxuan Tang

Abstract:

Cognitive diagnostic assessment has received much attention in second language education, and assessment for it can provide pedagogically useful feedback for language learners. However, there is a lack of research on how students interpret and use cognitive diagnostic feedback. Thus the present study aims to adopt a mixed-method approach mainly to explore the relationship between the goal-orientation and students' response to cognitive diagnostic feedback. Almost 200 Chinese undergraduates from two universities in Xi'an, China, will be invited to do a cognitive diagnostic reading test, and each student will receive specialized cognitive diagnostic feedback, comprising of students' reading attributes mastery level generated by applying a well-selected cognitive diagnostic model, students' perceived reading ability assessed by a self-assessing questionnaire and students’ level position in the whole class. And a goal-orientation questionnaire and a self-generated questionnaire on the perception of feedback will be given to students the moment they receive feedback. In addition, interviews of students will be conducted on their future plans to see whether they have awareness of carrying out studying plans. The study aims to find a new perspective towards how students use and interpret cognitive diagnostic feedback in terms of their different goal-orientation (self-based, task-based, and other-based goals) by applying the newest goal orientation model, which is an important construct of motivation in psychology, seldom researched under language learning area. And the study is expected to provide evidence on how diagnostic feedback promotes students' learning under the educational belief of assessment for learning. Practically speaking, according to the personalized diagnostic feedback, students can take remedial self-learning more purposefully, and teachers can target students' weaknesses to adjust teaching methods and carry out tailored teaching.

Keywords: assessment for learning, cognitive diagnostic assessment, goal-orientation, personalized feedback

Procedia PDF Downloads 108
2124 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 306
2123 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 153
2122 Enhancing the Interpretation of Group-Level Diagnostic Results from Cognitive Diagnostic Assessment: Application of Quantile Regression and Cluster Analysis

Authors: Wenbo Du, Xiaomei Ma

Abstract:

With the empowerment of Cognitive Diagnostic Assessment (CDA), various domains of language testing and assessment have been investigated to dig out more diagnostic information. What is noticeable is that most of the extant empirical CDA-based research puts much emphasis on individual-level diagnostic purpose with very few concerned about learners’ group-level performance. Even though the personalized diagnostic feedback is the unique feature that differentiates CDA from other assessment tools, group-level diagnostic information cannot be overlooked in that it might be more practical in classroom setting. Additionally, the group-level diagnostic information obtained via current CDA always results in a “flat pattern”, that is, the mastery/non-mastery of all tested skills accounts for the two highest proportion. In that case, the outcome does not bring too much benefits than the original total score. To address these issues, the present study attempts to apply cluster analysis for group classification and quantile regression analysis to pinpoint learners’ performance at different proficiency levels (beginner, intermediate and advanced) thus to enhance the interpretation of the CDA results extracted from a group of EFL learners’ reading performance on a diagnostic reading test designed by PELDiaG research team from a key university in China. The results show that EM method in cluster analysis yield more appropriate classification results than that of CDA, and quantile regression analysis does picture more insightful characteristics of learners with different reading proficiencies. The findings are helpful and practical for instructors to refine EFL reading curriculum and instructional plan tailored based on the group classification results and quantile regression analysis. Meanwhile, these innovative statistical methods could also make up the deficiencies of CDA and push forward the development of language testing and assessment in the future.

Keywords: cognitive diagnostic assessment, diagnostic feedback, EFL reading, quantile regression

Procedia PDF Downloads 123
2121 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs

Authors: Navneet Kaur, Amarpreet Singh

Abstract:

In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.

Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network

Procedia PDF Downloads 321
2120 Steps toward the Support Model of Decision-Making in Hungary: The Impact of the Article 12 of the UN Convention on the Rights of Persons with Disabilities on the Hungarian National Legislation

Authors: Szilvia Halmos

Abstract:

Hungary was one of the first countries to sign and ratify the UN Convention on the Rights of Persons with Disabilities (hereinafter: CRPD). Consequently, Hungary assumed an obligation under international law to review the national law in the light of the Article 12 of the CRPD requiring the States parties to guarantee the equality of persons with disabilities in terms of legal capacity, and to replace the regimes of substitute decision-making by the instruments of supported decision-making. This article is often characterized as one of the key norms of the CRPD, since the legal autonomy of the persons with disabilities is an essential precondition of their participation in the social life on an equal basis with others, envisaged by the social paradigm of disability. This paper examines the impact of the CRPD on the relevant Hungarian national legal norms, with special focus on the relevant rules of the recently codified Civil Code. The employed research methodologies include (1) the specification of the implementation requirements imposed by the Article 12 of the CRPD, (2) the determination of the indicators of the appropriate implementation, (3) the critical analysis of compliance of the relevant Hungarian legal regulation with the indicators, (4) with respect to the relevant case law of the Hungarian Constitutional Court and ordinary courts, the European Court of Human Rights and the Committee of Rights of Persons with Disabilities and (5) to the available empirical figures on the functioning of substitute and supported decision-making regimes. It will be established that the new Civil Code has made large steps toward the equality of persons with disabilities in terms of legal capacity and the support model of decision-making by the introduction of some specific instruments of supported decision-making and the restriction of the application of guardianship. Nevertheless, the regulation currently in effect fails to represent some crucial principles of the Article 12 of the CRPD, such as the non-discrimination of persons with psycho-social disabilities, the support of the articulation of the will and preferences of the individual instead of his/her best interest in the course of decision-making. The changes in the practice of the substitute and the support model brought about by the new legal norms can also be assessed as significant, however, so far unsatisfactory. The number of registered supporters is rather low, and the preconditions of the effective functioning of the support (e.g. the proper training of the supporters) are not ensured.

Keywords: Article 12 of the UN CRPD, Hungarian law on legal capacity, persons with intellectual and psycho-social disabilities, supported decision-making

Procedia PDF Downloads 266
2119 PM Electrical Machines Diagnostic: Methods Selected

Authors: M. Barański

Abstract:

This paper presents a several diagnostic methods designed to electrical machines especially for permanent magnets (PM) machines. Those machines are commonly used in small wind and water systems and vehicles drives. Those methods are preferred by the author in periodic diagnostic of electrical machines. The special attention should be paid to diagnostic method of turn-to-turn insulation and vibrations. Both of those methods were created in Institute of Electrical Drives and Machines Komel. The vibration diagnostic method is the main thesis of author’s doctoral dissertation. This is method of determination the technical condition of PM electrical machine basing on its own signals is the subject of patent application No P.405669. Specific structural properties of machines excited by permanent magnets are used in this method - electromotive force (EMF) generated due to vibrations. There was analysed number of publications which describe vibration diagnostic methods and tests of electrical machines with permanent magnets and there was no method found to determine the technical condition of such machine basing on their own signals.

Keywords: electrical vehicle, generator, main insulation, permanent magnet, thermography, turn-to-traction drive, turn insulation, vibrations

Procedia PDF Downloads 365
2118 Evaluating the Implementation of a Quality Management System in the COVID-19 Diagnostic Laboratory of a Tertiary Care Hospital in Delhi

Authors: Sukriti Sabharwal, Sonali Bhattar, Shikhar Saxena

Abstract:

Introduction: COVID-19 molecular diagnostic laboratory is the cornerstone of the COVID-19 disease diagnosis as the patient’s treatment and management protocol depend on the molecular results. For this purpose, it is extremely important that the laboratory conducting these results adheres to the quality management processes to increase the accuracy and validity of the reports generated. We started our own molecular diagnostic setup at the onset of the pandemic. Therefore, we conducted this study to generate our quality management data to help us in improving on our weak points. Materials and Methods: A total of 14561 samples were evaluated by the retrospective observational method. The quality variables analysed were classified into pre-analytical, analytical, and post-analytical variables, and the results were presented in percentages. Results: Among the pre-analytical variables, sample leaking was the most common cause of the rejection of samples (134/14561, 0.92%), followed by non-generation of SRF ID (76/14561, 0.52%) and non-compliance to triple packaging (44/14561, 0.3%). The other pre-analytical aspects assessed were incomplete patient identification (17/14561, 0.11%), insufficient quantity of samples (12/14561, 0.08%), missing forms/samples (7/14561, 0.04%), samples in the wrong vials/empty VTM tubes (5/14561, 0.03%) and LIMS entry not done (2/14561, 0.01%). We are unable to obtain internal quality control in 0.37% of samples (55/14561). We also experienced two incidences of cross-contamination among the samples resulting in false-positive results. Among the post-analytical factors, a total of 0.07% of samples (11/14561) could not be dispatched within the stipulated time frame. Conclusion: Adherence to quality control processes is foremost for the smooth running of any diagnostic laboratory, especially the ones involved in critical reporting. Not only do the indicators help in keeping in check the laboratory parameters but they also allow comparison with other laboratories.

Keywords: laboratory quality management, COVID-19, molecular diagnostics, healthcare

Procedia PDF Downloads 126
2117 Protocol for Consumer Research in Academia for Community Marketing Campaigns

Authors: Agnes J. Otjen, Sarah Keller

Abstract:

A Montana university has used applied consumer research in experiential learning with non-profit clients for over a decade. Through trial and error, a successful protocol has been established from problem statement through formative research to integrated marketing campaign execution. In this paper, we describe the protocol and its applications. Analysis was completed to determine the effectiveness of the campaigns and the results of how pre- and post-consumer research mark societal change because of media.

Keywords: consumer, research, marketing, communications

Procedia PDF Downloads 99
2116 Concordance of Maghrebian Place Names in Hungarian School Atlases

Authors: Malak Alasli

Abstract:

Hungarians come to use geographic names that are foreign to their environment and language in diverse settings, hence the aim of trying to adapt them to their own linguistic context. The Maghreb region (Morocco, Algeria, and Tunisia) uses both Arabic and French in presenting the place names. Consequently, the lexicographical treatment of the toponym will, therefore, consist of both the presentation of the toponymic term and the pronunciation of the entries. The motivation behind this approach is the need for a better identification of the place in question by avoiding ambiguities, and for more respect to the heritage by conforming to the right use of toponyms both in written as well as in oral practice. The goal is to provide Hungarians with a set of data by attempting a system of transliteration from French/Arabic to Hungarian, where the place names of the Maghreb are transliterated for more efficient usage. To examine the importance of toponyms’ pronunciation, the latter were collected from several 20th and 21st Hungarian school atlases. Most people meet, for the first time, foreign place names in school, hence the choice of solely extracting place names from school atlases as sample data. Interviews targeted university students, where they were asked to pronounce the place names collected. Results revealed the intricacy behind the pronunciation. Two main conclusions emerged; Hungarian students encountered challenges reading the toponyms, and Arabic speakers could not identify the names either, which causes a cut in communication. Ergo, the importance of elaborating on the pronunciation of toponyms. Concordance is where you find variants of a name. Therefore, a chart was put forward including all the name variants obtained from various references with their Arabic transcription indicating any changes that may have occurred, and the origin of the denomination (Roman, Berber, etc.). A case will also be added for comments and observations. This work embraces a dual purpose. It will provide information to Hungarians on the official names of foreign places in case of occurring changes; for instance, 'El-goléa, Algeria' (used in a latest edition of a school atlas) has now the official name of 'El Ménia'. It will also serve as a reference for knowing the correct and precise forms of place names’ pronunciation.

Keywords: concordance, onomastics, settlement names, school atlases

Procedia PDF Downloads 88
2115 Path-Spin to Spin-Spin Hybrid Quantum Entanglement: A Conversion Protocol

Authors: Indranil Bayal, Pradipta Panchadhyayee

Abstract:

Path-spin hybrid entanglement generated and confined in a single spin-1/2 particle is converted to spin-spin hybrid interparticle entanglement, which finds its important applications in quantum information processing. This protocol uses beam splitter, spin flipper, spin measurement, classical channel, unitary transformations, etc., and requires no collective operation on the pair of particles whose spin variables share complete entanglement after the accomplishment of the protocol. The specialty of the protocol lies in the fact that the path-spin entanglement is transferred between spin degrees of freedom of two separate particles initially possessed by a single party.

Keywords: entanglement, path-spin entanglement, spin-spin entanglement, CNOT operation

Procedia PDF Downloads 168
2114 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery

Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman

Abstract:

Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.

Keywords: CGA, IPv6, NDP, SEND

Procedia PDF Downloads 363
2113 The Maximum Throughput Analysis of UAV Datalink 802.11b Protocol

Authors: Inkyu Kim, SangMan Moon

Abstract:

This IEEE 802.11b protocol provides up to 11Mbps data rate, whereas aerospace industry wants to seek higher data rate COTS data link system in the UAV. The Total Maximum Throughput (TMT) and delay time are studied on many researchers in the past years This paper provides theoretical data throughput performance of UAV formation flight data link using the existing 802.11b performance theory. We operate the UAV formation flight with more than 30 quad copters with 802.11b protocol. We may be predicting that UAV formation flight numbers have to bound data link protocol performance limitations.

Keywords: UAV datalink, UAV formation flight datalink, UAV WLAN datalink application, UAV IEEE 802.11b datalink application

Procedia PDF Downloads 358
2112 The Combination Of Aortic Dissection Detection Risk Score (ADD-RS) With D-dimer As A Diagnostic Tool To Exclude The Diagnosis Of Acute Aortic Syndrome (AAS)

Authors: Mohamed Hamada Abdelkader Fayed

Abstract:

Background: To evaluate the diagnostic accuracy of (ADD-RS) with D-dimer as a screening test to exclude AAS. Methods: We conducted research for the studies examining the diagnostic accuracy of (ADD- RS)+ D-dimer to exclude the diagnosis of AAS, We searched MEDLINE, Embase, and Cochrane of Trials up to 31 December 2020. Results: We identified 3 studies using (ADD-RS) with D-dimer as a diagnostic tool for AAS, involving 3261 patients were AAS was diagnosed in 559(17.14%) patients. Overall results showed that the pooled sensitivities were 97.6 (95% CI 0.95.6, 99.6) at (ADD-RS)≤1(low risk group) with D-dimer and 97.4(95% CI 0.95.4,, 99.4) at (ADD-RS)>1(High risk group) with D-dimer., the failure rate was 0.48% at low risk group and 4.3% at high risk group respectively. Conclusions: (ADD-RS) with D-dimer was a useful screening test with high sensitivity to exclude Acute Aortic Syndrome.

Keywords: aortic dissection detection risk score, D-dimer, acute aortic syndrome, diagnostic accuracy

Procedia PDF Downloads 189
2111 A Multilevel Authentication Protocol: MAP in VANET for Human Safety

Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed

Abstract:

Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.

Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay

Procedia PDF Downloads 265
2110 Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony

Authors: A. B. R. Hazarika

Abstract:

In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps.

Keywords: encryption, decryption, internet protocol, microwave, mobile telephony, quantum key encryption, quantum dots

Procedia PDF Downloads 141
2109 A Fast and Robust Protocol for Reconstruction and Re-Enactment of Historical Sites

Authors: Sanaa I. Abu Alasal, Madleen M. Esbeih, Eman R. Fayyad, Rami S. Gharaibeh, Mostafa Z. Ali, Ahmed A. Freewan, Monther M. Jamhawi

Abstract:

This research proposes a novel reconstruction protocol for restoring missing surfaces and low-quality edges and shapes in photos of artifacts at historical sites. The protocol starts with the extraction of a cloud of points. This extraction process is based on four subordinate algorithms, which differ in the robustness and amount of resultant. Moreover, they use different -but complementary- accuracy to some related features and to the way they build a quality mesh. The performance of our proposed protocol is compared with other state-of-the-art algorithms and toolkits. The statistical analysis shows that our algorithm significantly outperforms its rivals in the resultant quality of its object files used to reconstruct the desired model.

Keywords: meshes, point clouds, surface reconstruction protocols, 3D reconstruction

Procedia PDF Downloads 415
2108 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 93
2107 Asynchronous Low Duty Cycle Media Access Control Protocol for Body Area Wireless Sensor Networks

Authors: Yasin Ghasemi-Zadeh, Yousef Kavian

Abstract:

Wireless body area networks (WBANs) technology has achieved lots of popularity over the last decade with a wide range of medical applications. This paper presents an asynchronous media access control (MAC) protocol based on B-MAC protocol by giving an application for medical issues. In WBAN applications, there are some serious problems such as energy, latency, link reliability (quality of wireless link) and throughput which are mainly due to size of sensor networks and human body specifications. To overcome these problems and improving link reliability, we concentrated on MAC layer that supports mobility models for medical applications. In the presented protocol, preamble frames are divided into some sub-frames considering the threshold level. Actually, the main reason for creating shorter preambles is the link reliability where due to some reasons such as water, the body signals are affected on some frequency bands and causes fading and shadowing on signals, therefore by increasing the link reliability, these effects are reduced. In case of mobility model, we use MoBAN model and modify that for some more areas. The presented asynchronous MAC protocol is modeled by OMNeT++ simulator. The results demonstrate increasing the link reliability comparing to B-MAC protocol where the packet reception ratio (PRR) is 92% also covers more mobility areas than MoBAN protocol.

Keywords: wireless body area networks (WBANs), MAC protocol, link reliability, mobility, biomedical

Procedia PDF Downloads 344
2106 Specialized Building Terminology of the 19th Century

Authors: Klara Kroftova, Martin Ebel

Abstract:

Human history is characterized by continuous evolution. As mankind developed, so did crafts, doctrine, and, of course, language. Each field of human activity, science, and art or architecture has its own vocabulary, terms with its specific, well-defined meaning. These are words or phrases that may have a general meaning in a certain context, but which, when used in specific contexts, are characterized by their expertise. The development of architecture in this area is, therefore, closely related to the development of architecture. People discovered new building materials, building constructions, decorating, furnishings, etc. and with each new knowledge came a new name. Architecture and construction were specific to individual nations, but throughout human history, they were also copied differently from other nations. Thus, the terminology of the Czech language was established, but also adopted from foreign languages. In this paper, we will focus on the linguistic analysis of terms that we most often encounter in the study of 19th-century architecture in the Austro-Hungarian Monarchy. The article is supplemented by a small picture dictionary.

Keywords: tenement houses, 19th century, terminology, Austro-Hungarian monarchy

Procedia PDF Downloads 103
2105 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum

Authors: Priyanka Jani

Abstract:

The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.

Keywords: pediatric, medication, protocol, errors

Procedia PDF Downloads 273
2104 Preventing the Septic Shock in an Oncological Patient with Febrile Neutropenia Submitted to Chemotherapy: The Nurse's Responsibility

Authors: Hugo Reis, Isabel Rabiais

Abstract:

The main purpose of the present study is to understand the nurse’s responsibility in preventing the septic shock in an oncological patient with febrile neutropenia submitted to chemotherapy. In order to do it, an integrative review of literature has been conducted. In the research done in many databases, it was concluded that only 7 out of 5202 articles compiled the entire inclusion standard present in the strict protocol of research, being this made up by all different methodologies. On the research done in the 7 articles it has resulted 8 text macro-units associated to different nursing interventions: ‘Health Education’; ‘Prophylactic Therapy Administration’; ‘Scales Utilization’; ‘Patient Evaluation’; ‘Environment Control’; ‘Performance of Diagnostic Auxiliary Exams’; ‘Protocol Enforcement/Procedure Guidelines’; ‘Antibiotic Therapy Administration’. Concerning the prevalence/result’s division there can be identified many conclusions: the macro-units ‘Patient Evaluation’, ‘Performance of Diagnostic Auxiliary Exams’, and ‘Antibiotic Therapy Administration’ present themselves to be the most prevalent in the research – 6 in 7 occurrences (approximately 85.7%). Next, the macro-unit ‘Protocol Enforcement/Procedure Guidelines’ presents itself as an important expression unit – being part of 5 out of the 7 analyzed studies (approximately 71.4%). The macro-unit ‘Health Education’, seems to be in the same way, an important expression unit – 4 out of the 7 (or approximately 57%). The macro-unit ‘Scales Utilization’, represents a minor part in the research done – it’s in only 2 out of the 7 cases (approximately 28.6%). On the other hand, the macro-units ‘Prophylactic Therapy Administration’ and ‘Environment Control’ are the two categories with fewer results in the research - 1 out of the 7 cases, the same as approximately 14.3% of the research results. Every research done to the macro-unit ‘Antibiotic Therapy Administration’ agreed to refer that the intervention should be strictly done, in a period of time less than one hour after diagnosing the fever, with the purpose of controlling the quick spread of infection – minimizing its seriousness. Identifying these interventions contributes, concluding that, to adopt strategies in order to prevent the phenomenon that represents a daily scenario responsible for the cost´s increase in health institutions, being at the same time responsible for the high morbidity rates and mortality increase associated with this specific group of patients.

Keywords: febrile neutropenia, oncology nursing, patient, septic shock

Procedia PDF Downloads 182
2103 Effect of Common Yoga Protocol on Reaction Time of Football Players

Authors: Vikram Singh

Abstract:

The objective of the study was to study the effectiveness of common yoga protocol on reaction time (simple visual reaction time-SVRT measured in milliseconds/seconds) of male football players in the age group of 15 to 21 years. The 40 boys were randomly assigned into two groups i.e. control and experimental. SVRT for both the groups were measured on day-1 and post intervention (common yoga protocol here) was measured after 45 days of training to the experimental group only. One way ANOVA (Univariate analysis) and Independent t-test using SPSS 23 statistical package was applied to get and analyze the results. There was a significant difference after 45 days of yoga protocol in simple visual reaction time of experimental group (p = .032), t (33.05) = 3.881, p = .000 (two-tailed). Null hypothesis (that there would be no post measurement differences in reaction times of control and experimental groups) was rejected. Where p<.05. Therefore alternate hypothesis was accepted.

Keywords: footballers, t-test, yoga protocol, reaction time

Procedia PDF Downloads 231
2102 Emerging Research Trends in Routing Protocol for Wireless Sensor Network

Authors: Subhra Prosun Paul, Shruti Aggarwal

Abstract:

Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.

Keywords: analysis, routing protocol, research trends, wireless sensor network

Procedia PDF Downloads 188
2101 A Genetic Algorithm Based Sleep-Wake up Protocol for Area Coverage in WSNs

Authors: Seyed Mahdi Jameii, Arash Nikdel, Seyed Mohsen Jameii

Abstract:

Energy efficiency is an important issue in the field of Wireless Sensor Networks (WSNs). So, minimizing the energy consumption in this kind of networks should be an essential consideration. Sleep/wake scheduling mechanism is an efficient approach to handling this issue. In this paper, we propose a Genetic Algorithm-based Sleep-Wake up Area Coverage protocol called GA-SWAC. The proposed protocol puts the minimum of nodes in active mode and adjusts the sensing radius of each active node to decrease the energy consumption while maintaining the network’s coverage. The proposed protocol is simulated. The results demonstrate the efficiency of the proposed protocol in terms of coverage ratio, number of active nodes and energy consumption.

Keywords: wireless sensor networks, genetic algorithm, coverage, connectivity

Procedia PDF Downloads 487