Search results for: blind signature protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1579

Search results for: blind signature protocol

1219 Evaluation of Condyle Alterations after Orthognathic Surgery with a Digital Image Processing Technique

Authors: Livia Eisler, Cristiane C. B. Alves, Cristina L. F. Ortolani, Kurt Faltin Jr.

Abstract:

Purpose: This paper proposes a technically simple diagnosis method among orthodontists and maxillofacial surgeons in order to evaluate discrete bone alterations. The methodology consists of a protocol to optimize the diagnosis and minimize the possibility for orthodontic and ortho-surgical retreatment. Materials and Methods: A protocol of image processing and analysis, through ImageJ software and its plugins, was applied to 20 pairs of lateral cephalometric images obtained from cone beam computerized tomographies, before and 1 year after undergoing orthognathic surgery. The optical density of the images was analyzed in the condylar region to determine possible bone alteration after surgical correction. Results: Image density was shown to be altered in all image pairs, especially regarding the condyle contours. According to measures, condyle had a gender-related density reduction for p=0.05 and condylar contours had their alterations registered in mm. Conclusion: A simple, viable and cost-effective technique can be applied to achieve the more detailed image-based diagnosis, not depending on the human eye and therefore, offering more reliable, quantitative results.

Keywords: bone resorption, computer-assisted image processing, orthodontics, orthognathic surgery

Procedia PDF Downloads 127
1218 Reconfigurable Consensus Achievement of Multi Agent Systems Subject to Actuator Faults in a Leaderless Architecture

Authors: F. Amirarfaei, K. Khorasani

Abstract:

In this paper, reconfigurable consensus achievement of a team of agents with marginally stable linear dynamics and single input channel has been considered. The control algorithm is based on a first order linear protocol. After occurrence of a LOE fault in one of the actuators, using the imperfect information of the effectiveness of the actuators from fault detection and identification module, the control gain is redesigned in a way to still reach consensus. The idea is based on the modeling of change in effectiveness as change of Laplacian matrix. Then as special cases of this class of systems, a team of single integrators as well as double integrators are considered and their behavior subject to a LOE fault is considered. The well-known relative measurements consensus protocol is applied to a leaderless team of single integrator as well as double integrator systems, and Gersgorin disk theorem is employed to determine whether fault occurrence has an effect on system stability and team consensus achievement or not. The analyses show that loss of effectiveness fault in actuator(s) of integrator systems affects neither system stability nor consensus achievement.

Keywords: multi-agent system, actuator fault, stability analysis, consensus achievement

Procedia PDF Downloads 313
1217 Decreasing the Oxidative Stress in Autistic Children: A Randomized Double-Blind Controlled Study With Palm Dates Fruit

Authors: Ammal Mokhtar Metwally, Amal Elsaied, Ghada A. Abdel-Latef, Ebtissam M. Salah El-Din, Hanaa R. M. Attia

Abstract:

The link between various diet therapies and autism is controversial and limited. Nutritional interventions aim to increase antioxidant levels suggesting a positive effect on the improvement of autism severity. In this study, the effectiveness of a 90-day Dates fruits consumption fruits (a non-pharmacological and risk-free option) on alleviating autism severity symptoms in individuals with ASD was investigated. The study examined also whether the baseline or improvements of some of the clinical and laboratory characteristics of the subjects affected their response to dates fruits intake on the severity of ASD symptoms. Methodology: This study involved a randomized controlled, double-blind 3-month dates fruits intake. 131 Egyptian children aged 3-12 years with confirmed ASD were enrolled in the study. cases were randomized in one of the three groups as follows; 1st regimen: Group I on 3 dates’ fruits/day (47 cases), 2nd regimen: Group II on 5 dates’ fruits/day (42 cases), and 3rd regimen: group III; nondates group (42 cases). ASD severity was assessed using both the Diagnostic and statistical manual of mental disorders, 5th ed. (DSM-V) criteria and the Childhood Autism Rating Scale (CARS) analysis. The following measures were assessed before and after the regimens: blood levels of three oxidative markers; Malondialdehyde (MDA), glutathione peroxidase (GPX1), and superoxide dismutase (SOD), nutritional, dietary assessment & anthropometric measurements Results: A significant reduction in the mean score of autism was detected based on CARS scores for those on dates’ regimens compared to those on non-dates (p < 0.01). Participants on 5 dates’ fruits/day for three months showed the highest improvement for autism severity based on both CARS and DSM5 compared to those in 3 dates’ fruits/day and non-dates groups. Responders to dates fruits intake as reflected on the Improvement of autism severity based on CARS diagnosis was detected among 78.7 % and 62.9 % based on CARS and DSM5 diagnosis, respectively. Responders had significant improvement in BMI z score and in the ratio levels of both MDA/SOD and MDA/GPX. Conclusion: The positive results of this study suggest that palm dates fruits could be recommended for children with ASD as adjuvant therapy on a daily regular basis to achieve consistent improvement of autism symptoms Objective: Investigate the effectiveness of a 90-day Dates fruits consumption fruits on alleviating autism severity symptoms in individuals with ASD and explore the clinical and laboratory characteristics of the subjects affected their response to dates fruits intake. Methodology: The study was a randomized controlled, double-blind for 3-month. 131 autistic Egyptian children aged 3-12 years were enrolled in one of the three groups; 1st: on 3 dates’ fruits/day (47 cases), 2nd: Group II on 5 dates’ fruits/day (42 cases), and 3rd: group III; nondates group (42 cases). Conclusion: The positive results of this study suggest that palm dates fruit (a non-pharmacological and risk-free option) could be recommended for children with ASD as adjuvant therapy on a daily regular basis to achieve consistent improvement of autism symptoms.

Keywords: autism spectrum disorders, palm dates fruits, CARS, DSM5, oxidative markers

Procedia PDF Downloads 59
1216 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 530
1215 Online Teaching and Learning Processes: Declarative and Procedural Knowledge

Authors: Eulalia Torras, Andreu Bellot

Abstract:

To know whether students’ achievements are the result of online interaction and not just a consequence of individual differences themselves, it seems essential to link the teaching presence and social presence to the types of knowledge built. The research aim is to analyze the social presence in relation to two types of knowledge, declarative and procedural. Qualitative methodology has been used. The analysis of the contents was based on an observation protocol that included community of enquiry indicators and procedural and declarative knowledge indicators. The research has been conducted in three phases that focused on an observational protocol and indicators, results and conclusions. Results show that the teaching-learning processes have been characterized by the patterns of presence and types of knowledge. Results also show the importance of social presence support provided by the teacher and the students, not only in regard to the nature of the instructional support but also concerning how it is presented to the student and the importance that is attributed to it in the teaching-learning process, that is, what it is that assistance is offered on. In this study, we find that the presence based on procedural guidelines and declarative reflection, the management of shared meaning on the basis of the skills and the evidence of these skills entail patterns of learning. Nevertheless, the importance that the teacher attributes to each support aspect has a bearing on the extent to which the students reflect more on the given task.

Keywords: education, online, teaching and learning processes, knowledge

Procedia PDF Downloads 192
1214 Dynamic Route Optimization in Vehicle Adhoc Networks: A Heuristics Routing Protocol

Authors: Rafi Ullah, Shah Muhammad Emaduddin, Taha Jilani

Abstract:

Vehicle Adhoc Networks (VANET) belongs to a special class of Mobile Adhoc Network (MANET) with high mobility. Network is created by road side vehicles equipped with communication devices like GPS and Wifi etc. Since the environment is highly dynamic due to difference in speed and high mobility of vehicles and weak stability of the network connection, it is a challenging task to design an efficient routing protocol for such an unstable environment. Our proposed algorithm uses heuristic for the calculation of optimal path for routing the packet efficiently in collaboration with several other parameters like geographical location, speed, priority, the distance among the vehicles, communication range, and networks congestion. We have incorporated probabilistic, heuristic and machine learning based approach inconsistency with the relay function of the memory buffer to keep the packet moving towards the destination. These parameters when used in collaboration provide us a very strong and admissible heuristics. We have mathematically proved that the proposed technique is efficient for the routing of packets, especially in a medical emergency situation. These networks can be used for medical emergency, security, entertainment and routing purposes.

Keywords: heuristics routing, intelligent routing, VANET, route optimization

Procedia PDF Downloads 151
1213 Multi Agent Based Pre-Hospital Emergency Management Architecture

Authors: Jaleh Shoshtarian Malak, Niloofar Mohamadzadeh

Abstract:

Managing pre-hospital emergency patients requires real-time practices and efficient resource utilization. Since we are facing a distributed Network of healthcare providers, services and applications choosing the right resources and treatment protocol considering patient situation is a critical task. Delivering care to emergency patients at right time and with the suitable treatment settings can save ones live and prevent further complication. In recent years Multi Agent Systems (MAS) introduced great solutions to deal with real-time, distributed and complicated problems. In this paper we propose a multi agent based pre-hospital emergency management architecture in order to manage coordination, collaboration, treatment protocol and healthcare provider selection between different parties in pre-hospital emergency in a self-organizing manner. We used AnyLogic Agent Based Modeling (ABM) tool in order to simulate our proposed architecture. We have analyzed and described the functionality of EMS center, Ambulance, Consultation Center, EHR Repository and Quality of Care Monitoring as main collaborating agents. Future work includes implementation of the proposed architecture and evaluation of its impact on patient quality of care improvement.

Keywords: multi agent systems, pre-hospital emergency, simulation, software architecture

Procedia PDF Downloads 390
1212 Isotopic Evidence (He, Ne, Ar) for Deep Fluid in the Caucasus Continental Collision Zone

Authors: Larisa Liamina, Vasily Lavrushin, Salvatore Inguaggiato

Abstract:

This study presents and summarizes the results of researching the isotopic signature of helium in the deep fluid eastern part of the Southern slope of the Greater Caucasus and the Lesser Caucasus (Azerbaijan and Armenia) for the period from 2010 to 2016. The results of isotope ratios of 3He/4He in 59 samples of the gas phase of geothermal fluids and mud volcanoes are presented. New data have been obtained not only on the isotopic ratios of helium, but also neon and argon. The R/Ra ratio was analyzed along the Ankara-Sevan ophiolite structure. The patterns of lateral variations of the 3He/4He ratio of different geological structural elements of the studied region are revealed.

Keywords: isotopes helium, deep fluids, tectonic structures, Caucasus

Procedia PDF Downloads 5
1211 Comparison of the Efficacy of Ketamine-Propofol versus Thiopental Sodium-Fentanyl in Procedural Sedation in the Emergency Department: A Randomized Double-Blind Clinical Trial

Authors: Maryam Bahreini, Mostafa Talebi Garekani, Fatemeh Rasooli, Atefeh Abdollahi

Abstract:

Introduction: Procedural sedation and analgesia have been desirable to handle painful procedures. The trend to find the agent with more efficacy and less complications is still controversial; thus, many sedative regimens have been studied. This study tried to assess the effectiveness and adverse effects of thiopental sodium-fentanyl with the known medication, ketamine-propofol for procedural sedation in the emergency department. Methods: Consenting patients were enrolled in this randomized double-blind trial to receive either 1:1 ketamine-propofol (KP) or thiopental-fentanyl (TF) 1:1 mg: Mg proportion on a weight-based dosing basis to reach the sedation level of American Society of Anesthesiologist class III/IV. The respiratory and hemodynamic complications, nausea and vomiting, recovery agitation, patient recall and satisfaction, provider satisfaction and recovery time were compared. The study was registered in Iranian randomized Control Trial Registry (Code: IRCT2015111325025N1). Results: 96 adult patients were included and randomized, 47 in the KP group and 49 in the TF group. 2.1% in the KP group and 8.1 % in the TF group experienced transient hypoxia leading to performing 4.2 % versus 8.1 % airway maneuvers for 2 groups, respectively; however, no statistically significant difference was observed between 2 combinations, and there was no report of endotracheal placement or further admission. Patient and physician satisfaction were significantly higher in the KP group. There was no difference in respiratory, gastrointestinal, cardiovascular and psychiatric adverse events, recovery time and patient recall of the procedure between groups. The efficacy and complications were not related to the type of procedure or patients’ smoking or addiction trends. Conclusion: Ketamine-propofol and thiopental-fentanyl combinations were effectively comparable although KP resulted in higher patient and provider satisfaction. It is estimated that thiopental fentanyl combination can be as potent and efficacious as ketofol with relatively similar incidence of adverse events in procedural sedation.

Keywords: adverse effects, conscious sedation, fentanyl, propofol, ketamine, safety, thiopental

Procedia PDF Downloads 187
1210 Combined Effect of Gender Differences and Fatiguing Task on Unipedal Postural Balance and Functional Mobility in Adults with Multiple Sclerosis

Authors: Sonda Jallouli, Omar Hammouda, Imen Ben Dhia, Salma Sakka, Chokri Mhiri, Mohamed Habib Elleuch, Abedlmoneem Yahia, Sameh Ghroubi

Abstract:

Multiple sclerosis (MS) is characterized by gender differences with affecting women two to four times more than men, but the disease progression is faster and more severe in men. Fatigue represents one of the most frequent and disabling symptoms related to MS. Results of previous studies regarding gender differences in fatigue perception in MS persons are contradictory. Besides, fatigue has been shown to affect negatively postural balance and functional mobility in MS persons. However, no study has taken into account gender differences in the response of these physical parameters to a fatiguing protocol in MS persons. Given the reduction of autonomy due to the alteration of these parameters induced by fatigue and the importance of gender differences in postural balance training programs in fatigued men and women with MS, the aim of this study was to investigate the effect of gender difference on unipedal postural balance and functional mobility after performing a fatiguing task in MS adults. Methods: Eleven women (30.29 ± 7.99 years) and seven men (30.91 ± 8.19 years) with relapsing-remitting MS performed a fatiguing protocol: three sets of the 5×sit to stand test (5-STST), six-minute walk test (6MWT) followed by three sets of the 5-STST. Unipedal balance, functional mobility, and fatigue perception were measured prefatigue (T0) and post fatigue (T3) using a clinical unipedal balance test, timed up and go test (TUGT), and analogic visual scale of fatigue (VASF), respectively. Heart rate (HR) and rate of perceived exertion (RPE) were recorded before, during and after the fatiguing task. Results: Compared to women, men showed an impairment of unipedal balance on the dominant leg (p<0.001, d=0.52) and mobility (p<0.001, d=3) via reducing unipedal stance time and increasing duration of TUGT execution, respectively. No gender differences were observed in 6MWT, 5-STST, HR, RPE and VASF scores. Conclusion: Fatiguing protocol negatively affected unipedal postural balance and mobility only in men. These gender differences were inconclusive but can be taken into account in postural balance rehabilitation programs for persons with MS.

Keywords: functional mobility, fatiguing exercises, multiple sclerosis, sex differences, unipedal balance

Procedia PDF Downloads 101
1209 Reverse Engineering Genius: Through the Lens of World Language Collaborations

Authors: Cynthia Briggs, Kimberly Gerardi

Abstract:

Over the past six years, the authors have been working together on World Language Collaborations in the Middle School French Program at St. Luke's School in New Canaan, Connecticut, USA. Author 2 brings design expertise to the projects, and both teachers have utilized the fabrication lab, emerging technologies, and collaboration with students. Each year, author 1 proposes a project scope, and her students are challenged to design and engineer a signature project. Both partners have improved the iterative process to ensure deeper learning and sustained student inquiry. The projects range from a 1:32 scale model of the Eiffel Tower that was CNC routed to a fully functional jukebox that plays francophone music, lights up, and can hold up to one thousand songs powered by Raspberry Pi. The most recent project is a Fragrance Marketplace, culminating with a pop-up store for the entire community to discover. Each student will learn the history of fragrance and the chemistry behind making essential oils. Students then create a unique brand, marketing strategy, and concept for their signature fragrance. They are further tasked to use the industrial design process (bottling, packaging, and creating a brand name) to finalize their product for the public Marketplace. Sometimes, these dynamic projects require maintenance and updates. For example, our wall-mounted, three-foot francophone clock is constantly changing. The most recent iteration uses Chat GPT to program the Arduino to reconcile the real-time clock shield and keep perfect time as each hour passes. The lights, motors, and sounds from the clock are authentic to each region, represented with laser-cut embellishments. Inspired by Michel Parmigiani, the history of Swiss watch-making, and the precision of time instruments, we aim for perfection with each passing minute. The authors aim to share exemplary work that is possible with students of all ages. We implemented the reverse engineering process to focus on student outcomes to refine our collaborative process. The products that our students create are prime examples of how the design engineering process is applicable across disciplines. The authors firmly believe that the past and present of World cultures inspire innovation.

Keywords: collaboration, design thinking, emerging technologies, world language

Procedia PDF Downloads 18
1208 Proposal of Commutation Protocol in Hybrid Sensors and Vehicular Networks for Intelligent Transport Systems

Authors: Taha Bensiradj, Samira Moussaoui

Abstract:

Hybrid Sensors and Vehicular Networks (HSVN), represent a hybrid network, which uses several generations of Ad-Hoc networks. It is used especially in Intelligent Transport Systems (ITS). The HSVN allows making collaboration between the Wireless Sensors Network (WSN) deployed on the border of the road and the Vehicular Network (VANET). This collaboration is defined by messages exchanged between the two networks for the purpose to inform the drivers about the state of the road, provide road safety information and more information about traffic on the road. Moreover, this collaboration created by HSVN, also allows the use of a network and the advantage of improving another network. For example, the dissemination of information between the sensors quickly decreases its energy, and therefore, we can use vehicles that do not have energy constraint to disseminate the information between sensors. On the other hand, to solve the disconnection problem in VANET, the sensors can be used as gateways that allow sending the messages received by one vehicle to another. However, because of the short communication range of the sensor and its low capacity of storage and processing of data, it is difficult to ensure the exchange of road messages between it and the vehicle, which can be moving at high speed at the time of exchange. This represents the time where the vehicle is in communication range with the sensor. This work is the proposition of a communication protocol between the sensors and the vehicle used in HSVN. The latter has as the purpose to ensure the exchange of road messages in the available time of exchange.

Keywords: HSVN, ITS, VANET, WSN

Procedia PDF Downloads 335
1207 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks

Authors: Ruchi Makani, B. V. R. Reddy

Abstract:

Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.

Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system

Procedia PDF Downloads 150
1206 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 350
1205 Dynamic Shock Bank Liquidity Analysis

Authors: C. Recommandé, J. C. Blind, A. Clavel, R. Gourichon, V. Le Gal

Abstract:

Simulations are developed in this paper with usual DSGE model equations. The model is based on simplified version of Smets-Wouters equations in use at European Central Bank which implies 10 macro-economic variables: consumption, investment, wages, inflation, capital stock, interest rates, production, capital accumulation, labour and credit rate, and allows take into consideration the banking system. Throughout the simulations, this model will be used to evaluate the impact of rate shocks recounting the actions of the European Central Bank during 2008.

Keywords: CC-LM, Central Bank, DSGE, liquidity shock, non-standard intervention

Procedia PDF Downloads 428
1204 Association of Post-Traumatic Stress Disorder with Work Performance amongst Emergency Medical Service Personnel, Karachi, Pakistan

Authors: Salima Kerai, Muhammad Islam, Uzma Khan, Nargis Asad, Junaid Razzak, Omrana Pasha

Abstract:

Background: Pre-hospital care providers are exposed to various kinds of stressors. Their daily exposure to diverse critical and traumatic incidents can lead to stress reactions like Post-Traumatic Stress Disorder (PTSD). Consequences of PTSD in terms of work loss can be catastrophic because of its compound effect on families, which affect them economically, socially and emotionally. Therefore, it is critical to assess the association between PTSD and Work performance in Emergency Medical Service (EMS) if exist any. Methods: This prospective observational study was carried out at AMAN EMS in Karachi, Pakistan. EMS personnel were screened for potential PTSD using impact of event scale-revised (IES-R). Work performance was assessed on basis of five variables; number of late arrivals to work, number of days absent, number of days sick, adherence to protocol and patient satisfaction survey over the period of 3 months. In order to model outcomes like number of late arrivals to work, days absent and days late; negative binomial regression was used whereas logistic regression was applied for adherence to protocol and linear for patient satisfaction scores. Results: Out of 536 EMS personnel, 525 were found to be eligible, of them 518 consented. However data on 507 were included because 7 left the job during study period. The mean score of PTSD was found to be 24.0 ± 12.2. However, weak and insignificant association was found between PTSD and work performance measures: number of late arrivals (RRadj 0.99; 95% CI 0.98-1.00), days absent (RRadj 0.98; 95% CI 0.96-0.99), days sick (Rradj 0.99; 95% CI 0.98 to 1.00), adherence to protocol (ORadj 1.01: 95% CI 0.99 to 1.04) and patient satisfaction (0.001% score; 95% CI -0.03% to 0.03%). Conclusion: No association was found between PTSD and Work performance in the selected EMS population in Karachi Pakistan. Further studies are needed to explore the phenomenon of resiliency in these populations. Moreover, qualitative work is required to explore perceptions and feelings like willingness to go to work, readiness to carry out job responsibilities.

Keywords: trauma, emergency medical service, stress, pakistan

Procedia PDF Downloads 309
1203 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 157
1202 Braille Code Matrix

Authors: Mohammed E. A. Brixi Nigassa, Nassima Labdelli, Ahmed Slami, Arnaud Pothier, Sofiane Soulimane

Abstract:

According to the world health organization (WHO), there are almost 285 million people with visual disability, 39 million of these people are blind. Nevertheless, there is a code for these people that make their life easier and allow them to access information more easily; this code is the Braille code. There are several commercial devices allowing braille reading, unfortunately, most of these devices are not ergonomic and too expensive. Moreover, we know that 90 % of blind people in the world live in low-incomes countries. Our contribution aim is to concept an original microactuator for Braille reading, as well as being ergonomic, inexpensive and lowest possible energy consumption. Nowadays, the piezoelectric device gives the better actuation for low actuation voltage. In this study, we focus on piezoelectric (PZT) material which can bring together all these conditions. Here, we propose to use one matrix composed by six actuators to form the 63 basic combinations of the Braille code that contain letters, numbers, and special characters in compliance with the standards of the braille code. In this work, we use a finite element model with Comsol Multiphysics software for designing and modeling this type of miniature actuator in order to integrate it into a test device. To define the geometry and the design of our actuator, we used physiological limits of perception of human being. Our results demonstrate in our study that piezoelectric actuator could bring a large deflection out-of-plain. Also, we show that microactuators can exhibit non uniform compression. This deformation depends on thin film thickness and the design of membrane arm. The actuator composed of four arms gives the higher deflexion and it always gives a domed deformation at the center of the deviceas in case of the Braille system. The maximal deflection can be estimated around ten micron per Volt (~ 10µm/V). We noticed that the deflection according to the voltage is a linear function, and this deflection not depends only on the voltage the voltage, but also depends on the thickness of the film used and the design of the anchoring arm. Then, we were able to simulate the behavior of the entire matrix and thus display different characters in Braille code. We used these simulations results to achieve our demonstrator. This demonstrator is composed of a layer of PDMS on which we put our piezoelectric material, and then added another layer of PDMS to isolate our actuator. In this contribution, we compare our results to optimize the final demonstrator.

Keywords: Braille code, comsol software, microactuators, piezoelectric

Procedia PDF Downloads 339
1201 Automating and Optimization Monitoring Prognostics for Rolling Bearing

Authors: H. Hotait, X. Chiementin, L. Rasolofondraibe

Abstract:

This paper presents a continuous work to detect the abnormal state in the rolling bearing by studying the vibration signature analysis and calculation of the remaining useful life. To achieve these aims, two methods; the first method is the classification to detect the degradation state by the AOM-OPTICS (Acousto-Optic Modulator) method. The second one is the prediction of the degradation state using least-squares support vector regression and then compared with the linear degradation model. An experimental investigation on ball-bearing was conducted to see the effectiveness of the used method by applying the acquired vibration signals. The proposed model for predicting the state of bearing gives us accurate results with the experimental and numerical data.

Keywords: bearings, automatization, optimization, prognosis, classification, defect detection

Procedia PDF Downloads 98
1200 Optrix: Energy Aware Cross Layer Routing Using Convex Optimization in Wireless Sensor Networks

Authors: Ali Shareef, Aliha Shareef, Yifeng Zhu

Abstract:

Energy minimization is of great importance in wireless sensor networks in extending the battery lifetime. One of the key activities of nodes in a WSN is communication and the routing of their data to a centralized base-station or sink. Routing using the shortest path to the sink is not the best solution since it will cause nodes along this path to fail prematurely. We propose a cross-layer energy efficient routing protocol Optrix that utilizes a convex formulation to maximize the lifetime of the network as a whole. We further propose, Optrix-BW, a novel convex formulation with bandwidth constraint that allows the channel conditions to be accounted for in routing. By considering this key channel parameter we demonstrate that Optrix-BW is capable of congestion control. Optrix is implemented in TinyOS, and we demonstrate that a relatively large topology of 40 nodes can converge to within 91% of the optimal routing solution. We describe the pitfalls and issues related with utilizing a continuous form technique such as convex optimization with discrete packet based communication systems as found in WSNs. We propose a routing controller mechanism that allows for this transformation. We compare Optrix against the Collection Tree Protocol (CTP) and we found that Optrix performs better in terms of convergence to an optimal routing solution, for load balancing and network lifetime maximization than CTP.

Keywords: wireless sensor network, Energy Efficient Routing

Procedia PDF Downloads 357
1199 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 442
1198 Independent Control over Surface Charge and Wettability Using Polyelectrolyte Architecture

Authors: Shanshan Guo, Xiaoying Zhu, Dominik Jańczewski, Koon Gee Neoh

Abstract:

Surface charge and wettability are two prominent physical factors governing cell adhesion and have been extensively studied in the literature. However, a comparison between the two driving forces in terms of their independent and cooperative effects in affecting cell adhesion is rarely explored on a systematic and quantitative level. Herein, we formulate a protocol which allows two-dimensional and independent control over both surface charge and wettability. This protocol enables the unambiguous comparison of the effects of these two properties on cell adhesion. This strategy is implemented by controlling both the relative thickness of polyion layers in the layer-by-layer assembly and the polyion side chain chemical structures. The 2D property matrix spans surface isoelectric point ranging from 5 to 9 and water contact angle from 35º to 70º, with other interferential factors (e.g. roughness) eliminated. The interplay between these two surface variables influences 3T3 fibroblast cell adhesion. The results show that both surface charge and wettability have an effect on its adhesion. The combined effects of positive charge and hydrophilicity led to the highest cell adhesion whereas negative charge and hydrophobicity led to the lowest cell adhesion. Our design strategy can potentially form the basis for studying the distinct behaviors of electrostatic force or wettability driven interfacial phenomena and serving as a reference in future studies assessing cell adhesion to surfaces with known charge and wettability within the property range studied here.

Keywords: cell adhesion, layer-by-layer, surface charge, surface wettability

Procedia PDF Downloads 240
1197 A Comparative Study of Virus Detection Techniques

Authors: Sulaiman Al amro, Ali Alkhalifah

Abstract:

The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.

Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based

Procedia PDF Downloads 446
1196 A Generalized Model for Performance Analysis of Airborne Radar in Clutter Scenario

Authors: Vinod Kumar Jaysaval, Prateek Agarwal

Abstract:

Performance prediction of airborne radar is a challenging and cumbersome task in clutter scenario for different types of targets. A generalized model requires to predict the performance of Radar for air targets as well as ground moving targets. In this paper, we propose a generalized model to bring out the performance of airborne radar for different Pulsed Repetition Frequency (PRF) as well as different type of targets. The model provides a platform to bring out different subsystem parameters for different applications and performance requirements under different types of clutter terrain.

Keywords: airborne radar, blind zone, clutter, probability of detection

Procedia PDF Downloads 440
1195 A Protocol of Procedures and Interventions to Accelerate Post-Earthquake Reconstruction

Authors: Maria Angela Bedini, Fabio Bronzini

Abstract:

The Italian experiences, positive and negative, of the post-earthquake are conditioned by long times and structural bureaucratic constraints, also motivated by the attempt to contain mafia infiltration and corruption. The transition from the operational phase of the emergency to the planning phase of the reconstruction project is thus hampered by a series of inefficiencies and delays, incompatible with the need for rapid recovery of the territories in crisis. In fact, intervening in areas affected by seismic events means at the same time associating the reconstruction plan with an urban and territorial rehabilitation project based on strategies and tools in which prevention and safety play a leading role in the regeneration of territories in crisis and the return of the population. On the contrary, the earthquakes that took place in Italy have instead further deprived the territories affected of the minimum requirements for habitability, in terms of accessibility and services, accentuating the depopulation process, already underway before the earthquake. The objective of this work is to address with implementing and programmatic tools the procedures and strategies to be put in place, today and in the future, in Italy and abroad, to face the challenge of the reconstruction of activities, sociality, services, risk mitigation: a protocol of operational intentions and firm points, open to a continuous updating and implementation. The methodology followed is that of the comparison in a synthetic form between the different Italian experiences of the post-earthquake, based on facts and not on intentions, to highlight elements of excellence or, on the contrary, damage. The main results obtained can be summarized in technical comparison cards on good and bad practices. With this comparison, we intend to make a concrete contribution to the reconstruction process, certainly not only related to the reconstruction of buildings but privileging the primary social and economic needs. In this context, the recent instrument applied in Italy of the strategic urban and territorial SUM (Minimal Urban Structure) and the strategic monitoring process become dynamic tools for supporting reconstruction. The conclusions establish, by points, a protocol of interventions, the priorities for integrated socio-economic strategies, multisectoral and multicultural, and highlight the innovative aspects of 'inversion' of priorities in the reconstruction process, favoring the take-off of 'accelerator' interventions social and economic and a more updated system of coexistence with risks. In this perspective, reconstruction as a necessary response to the calamitous event can and must become a unique opportunity to raise the level of protection from risks and rehabilitation and development of the most fragile places in Italy and abroad.

Keywords: an operational protocol for reconstruction, operational priorities for coexistence with seismic risk, social and economic interventions accelerators of building reconstruction, the difficult post-earthquake reconstruction in Italy

Procedia PDF Downloads 100
1194 Islamic Banking Adoption Model from Technology Prospective

Authors: Amer Alzaidi

Abstract:

Islamic banking is an alternative solution to those people who are worried about Riba (interest) in all forms of transaction while using banking services and products. Today, banks around the world have Islamic banking services and products the in one form or another. The use of Islamic banking is not only restricted to Muslims world but have reached to non-Muslim countries like UK, USA, Australia and Canada as well. Compared to conventional banking, the adoption rate of Islamic banking is low because of unawareness of customers, financial cost, and performance issues. The interest in Islamic banking by financial institutions as well as low adoption rate motivated us to look this matter into detail in order to identify Critical Success Factors, which are positively motivating customers to use Islamic banking services/ products and Critical Risk Factors, which have significantly negative effect on the adoption of Islamic banking. The CSFs and CRFs will be initially identified from the literature using methodology called Systematic Literature Review, followed by the empirical analysis of these factors using survey research method. Later, we will develop Islamic Banking Adoption Model (IBAM) to help banks to assess their Islamic banking strategic positioning and to improve their operational efficiency. The first potential contribution of this research study will be the development of IBAM protocol that will provide us guidelines for conducting our actual SLR. The second major contribution of this research will be the development of Islamic Banking Adoption Model (IBAM), and the third contribution of this research study will be the evaluation of the developed IBMA.

Keywords: Islamic banking, adoption model, protocol, technology

Procedia PDF Downloads 253
1193 Cannabis for the Treatment of Drug Resistant Epilepsy in Children

Authors: Sarah E. Casey

Abstract:

Epilepsy is the most common neurological disorder in children and approximately one-third of children with epilepsy have seizures that are uncontrolled on anticonvulsants alone. Cannabidiol is shown to be an effective treatment at reducing the amount of breakthrough seizures experienced by children with drug resistant epilepsy. Improvements in quality of life and overall condition were noted during cannabidiol treatment. Adverse side effects were experienced and were generally mild to moderate in nature. Additional double-blind, controlled studies with a more diverse sample population and standardized dosing are needed to ensure the efficacy and safety of cannabidiol use in children with drug resistant epilepsy.

Keywords: cannabis, drug resistant epilepsy, children, epilepsy

Procedia PDF Downloads 194
1192 Ex Situ Conservation of Neutraceutical Banana-Musa paradisiaca cv. Karibale Monthan

Authors: V. Krishna, Shashikumar

Abstract:

Edible Bananas (Musa spp.) are the major staple food for rural and urban consumers in India and an important source of rural income. The cultivar Musa paradisiaca cv. Karibale Monthan is an endemic cultivar of Malnad region of Karnataka and used as a glomolueroprotective neutraceutical to solve kidney problems. The protocol for mass multiplication of plantlets for this indigenous banana cultivar Karibale Monthan has not yet been standardized so far. In the present study, an attempt has been made to develop high frequency in vitro regeneration protocol and evaluation of morphoagronomic characteristics in the farmyard. The high frequency shoot initiation (93.33 %) was recorded at the synergetic effect of BAP (2 to 8mg/L), TDZ (0.1 to 1.2mg/L) and coconut water (0.1 to 1.2ml/L). It was optimized at the concentration 5 mg/l BAP, 0.5 mg/l TDZ and 0.5 ml/l coconut water with 15.90 ± 1.66 frequency of shoots per propagule. Supplementation of 1.0 mg/l IBA induces 5.33 ± 1.21 numbers of roots with a mean root length of 7.50 ± 1.87 roots. 99% of plantlets with distinct roots and shoots were successfully acclimatized in the green house and transferred to the field to evaluate the agro-morphological variations. The micropropagated plants showed significantly higher morphometric values for height of the plant (16.80±2.17), number of leaves (12.40±1.14), length of the bunch (56.20±2.17), weight of the bunch (13.60±1.14), number of hands in a bunch (11.40±1.14) and girth of the pseudostem (49.80±1.48) when compared with in vivo plants.

Keywords: banana cv. Karibale Monthan, neutraceutical, high-frequency regeneration, morphometric evaluation

Procedia PDF Downloads 255
1191 A Double-Blind, Randomized, Controlled Trial on N-Acetylcysteine for the Prevention of Acute Kidney Injury in Patients Undergoing Allogeneic Hematopoietic Stem Cell Transplantation

Authors: Sara Ataei, Molouk Hadjibabaie, Amirhossein Moslehi, Maryam Taghizadeh-Ghehi, Asieh Ashouri, Elham Amini, Kheirollah Gholami, Alireza Hayatshahi, Mohammad Vaezi, Ardeshir Ghavamzadeh

Abstract:

Acute kidney injury (AKI) is one of the complications of hematopoietic stem cell transplantation and is associated with increased mortality. N-acetylcysteine (NAC) is a thiol compound with antioxidant and vasodilatory properties that has been investigated for the prevention of AKI in several clinical settings. In the present study, we evaluated the effects of intravenous NAC on the prevention of AKI in allogeneic hematopoietic stem cell transplantation patients. A double-blind randomized placebo-controlled trial was conducted, and 80 patients were recruited to receive 100 mg/kg/day NAC or placebo as intermittent intravenous infusion from day -6 to day +15. AKI was determined on the basis of the Risk-Injury-Failure-Loss-Endstage renal disease and AKI Network criteria as the primary outcome. We assessed urine neutrophil gelatinase-associated lipocalin (uNGAL) on days -6, -3, +3, +9, and +15 as the secondary outcome. Moreover, transplant-related outcomes and NAC adverse reactions were evaluated during the study period. Statistical analysis was performed using appropriate parametric and non-parametric methods including Kaplan–Meier for AKI and generalized estimating equation for uNGAL. At the end of the trial, data from 72 patients were analyzed (NAC: 33 patients and placebo: 39 patients). Participants of each group were not different considering baseline characteristics. AKI was observed in 18% of NAC recipients and 15% of placebo group patients, and the occurrence pattern was not significantly different (p = 0.73). Moreover, no significant difference was observed between groups for uNGAL measures (p = 0.10). Transplant-related outcomes were similar for both groups, and all patients had successful engraftment. Three patients did not tolerate NAC because of abdominal pain, shortness of breath and rash with pruritus and were dropped from the intervention group before transplantation. However, the frequency of adverse reactions was not significantly different between groups. In conclusion, our findings could not show any clinical benefits from high-dose NAC particularly for AKI prevention in allogeneic hematopoietic stem cell transplantation patients.

Keywords: acute kidney injury, N-acetylcysteine, hematopoietic stem cell transplantation, urine neutrophil gelatinase-associated lipocalin, randomized controlled trial

Procedia PDF Downloads 410
1190 Trafficking of Women and Children and Solutions to Combat It: The Case of Nigeria

Authors: Olatokunbo Yakeem

Abstract:

Human trafficking is a crime against gross violations of human rights. Trafficking in persons is a severe socio-economic dilemma that affects the national and international dimensions. Human trafficking or modern-day-slavery emanated from slavery, and it has been in existence before the 6ᵗʰ century. Today, no country is exempted from dehumanizing human beings, and as a result, it has been an international issue. The United Nations (UN) presented the International Protocol to fight human trafficking worldwide, which brought about the international definition of human trafficking. The protocol is to prevent, suppress, and punish trafficking in persons, especially women and children. The trafficking protocol has a link with transnational organised crime rather than migration. Over a hundred and fifty countries nationwide have enacted their criminal and panel code trafficking legislation from the UN trafficking protocol. Sex trafficking is the most common type of exploitation of women and children. Other forms of this crime involve exploiting vulnerable victims through forced labour, child involvement in warfare, domestic servitude, debt bondage, and organ removal for transplantation. Trafficking of women and children into sexual exploitation represents the highest form of human trafficking than other types of exploitation. Trafficking of women and children can either happen internally or across the border. It affects all kinds of people, regardless of their race, social class, culture, religion, and education levels. However, it is more of a gender-based issue against females. Furthermore, human trafficking can lead to life-threatening infections, mental disorders, lifetime trauma, and even the victim's death. The study's significance is to explore why the root causes of women and children trafficking in Nigeria are based around poverty, entrusting children in the hands of relatives and friends, corruption, globalization, weak legislation, and ignorance. The importance of this study is to establish how the national, regional, and international organisations are using the 3P’s Protection, Prevention, and Prosecution) to tackle human trafficking. The methodology approach for this study will be a qualitative paradigm. The rationale behind this selection is that the qualitative method will identify the phenomenon and interpret the findings comprehensively. The data collection will take the form of semi-structured in-depth interviews through telephone and email. The researcher will use a descriptive thematic analysis to analyse the data by using complete coding. In summary, this study aims to recommend to the Nigerian federal government to include human trafficking as a subject in their educational curriculum for early intervention to prevent children from been coerced by criminal gangs. And the research aims to find the root causes of women and children trafficking. Also, to look into the effectiveness of the strategies in place to eradicate human trafficking globally. In the same vein, the research objective is to investigate how the anti-trafficking bodies such as law enforcement and NGOs collaborate to tackle the upsurge in human trafficking.

Keywords: children, Nigeria, trafficking, women

Procedia PDF Downloads 163