Search results for: fully homomorphic encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1891

Search results for: fully homomorphic encryption

1771 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 32
1770 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 302
1769 Intrusion Detection Techniques in NaaS in the Cloud: A Review

Authors: Rashid Mahmood

Abstract:

The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.

Keywords: IDS, cloud, naas, detection

Procedia PDF Downloads 283
1768 Time-Domain Simulations of the Coupled Dynamics of Surface Riding Wave Energy Converter

Authors: Chungkuk Jin, Moo-Hyun Kim, HeonYong Kang

Abstract:

A surface riding (SR) wave energy converter (WEC) is designed and its feasibility and performance are numerically simulated by the author-developed floater-mooring-magnet-electromagnetics fully-coupled dynamic analysis computer program. The biggest advantage of the SR-WEC is that the performance is equally effective even in low sea states and its structural robustness is greatly improved by simply riding along the wave surface compared to other existing WECs. By the numerical simulations and actuator testing, it is clearly demonstrated that the concept works and through the optimization process, its efficiency can be improved.

Keywords: computer simulation, electromagnetics fully-coupled dynamics, floater-mooring-magnet, optimization, performance evaluation, surface riding, WEC

Procedia PDF Downloads 113
1767 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 227
1766 Winged Test Rocket with Fully Autonomous Guidance and Control for Realizing Reusable Suborbital Vehicle

Authors: Koichi Yonemoto, Hiroshi Yamasaki, Masatomo Ichige, Yusuke Ura, Guna S. Gossamsetti, Takumi Ohki, Kento Shirakata, Ahsan R. Choudhuri, Shinji Ishimoto, Takashi Mugitani, Hiroya Asakawa, Hideaki Nanri

Abstract:

This paper presents the strategic development plan of winged rockets WIRES (WInged REusable Sounding rocket) aiming at unmanned suborbital winged rocket for demonstrating future fully reusable space transportation technologies, such as aerodynamics, Navigation, Guidance and Control (NGC), composite structure, propulsion system, and cryogenic tanks etc., by universities in collaboration with government and industries, as well as the past and current flight test results.

Keywords: autonomous guidance and control, reusable rocket, space transportation system, suborbital vehicle, winged rocket

Procedia PDF Downloads 318
1765 Design, Prototyping, Integration, Flight Testing of a 20 cm Span Fully Autonomous Fixed Wing Micro Air Vehicle

Authors: Vivek Paul, Abel Nelly, Shoeb A Adeel, R. Tilak, S. Maheshwaran, S. Pulikeshi, Roshan Antony, C. S. Suraj

Abstract:

This paper presents the complete design and development cycle of a 20 cm span fixed wing micro air vehicle that was developed at CSIR-NAL, under the micro air vehicle development program. The design is a cropped delta flying wing MAV with a modified N22 airfoil of 12.3% thickness. The design was fabricated using the fused deposition method- RPT technique. COTS components were procured and integrated into this RPT prototype. A commercial autopilot that was proven in the earlier MAV designs was used for this MAV. The MAV was flown fully autonomous for 14mins at an open field. The flight data showed good performance as expected from the MAV design. The paper also describes about the process involved in the design of MAVs.

Keywords: autopilot, autonomous mode, flight testing, MAV, RPT

Procedia PDF Downloads 492
1764 Inverter Based Gain-Boosting Fully Differential CMOS Amplifier

Authors: Alpana Agarwal, Akhil Sharma

Abstract:

This work presents a fully differential CMOS amplifier consisting of two self-biased gain boosted inverter stages, that provides an alternative to the power hungry operational amplifier. The self-biasing avoids the use of external biasing circuitry, thus reduces the die area, design efforts, and power consumption. In the present work, regulated cascode technique has been employed for gain boosting. The Miller compensation is also applied to enhance the phase margin. The circuit has been designed and simulated in 1.8 V 0.18 µm CMOS technology. The simulation results show a high DC gain of 100.7 dB, Unity-Gain Bandwidth of 107.8 MHz, and Phase Margin of 66.7o with a power dissipation of 286 μW and makes it suitable candidate for the high resolution pipelined ADCs.

Keywords: CMOS amplifier, gain boosting, inverter-based amplifier, self-biased inverter

Procedia PDF Downloads 266
1763 An Implicit Methodology for the Numerical Modeling of Locally Inextensible Membranes

Authors: Aymen Laadhari

Abstract:

We present in this paper a fully implicit finite element method tailored for the numerical modeling of inextensible fluidic membranes in a surrounding Newtonian fluid. We consider a highly simplified version of the Canham-Helfrich model for phospholipid membranes, in which the bending force and spontaneous curvature are disregarded. The coupled problem is formulated in a fully Eulerian framework and the membrane motion is tracked using the level set method. The resulting nonlinear problem is solved by a Newton-Raphson strategy, featuring a quadratic convergence behavior. A monolithic solver is implemented, and we report several numerical experiments aimed at model validation and illustrating the accuracy of the proposed method. We show that stability is maintained for significantly larger time steps with respect to an explicit decoupling method.

Keywords: finite element method, level set, Newton, membrane

Procedia PDF Downloads 303
1762 A Review of In-Vehicle Network for Cloud Connected Vehicle

Authors: Hanbhin Ryu, Ilkwon Yun

Abstract:

Automotive industry targets to provide an improvement in safety and convenience through realizing fully autonomous vehicle. For partially realizing fully automated driving, Current vehicles already feature varieties of advanced driver assistance system (ADAS) for safety and infotainment systems for the driver’s convenience. This paper presents Cloud Connected Vehicle (CCV) which connected vehicles with cloud data center via the access network to control the vehicle for achieving next autonomous driving form and describes its features. This paper also describes the shortcoming of the existing In-Vehicle Network (IVN) to be a next generation IVN of CCV and organize the 802.3 Ethernet, the next generation of IVN, related research issue to verify the feasibility of using Ethernet. At last, this paper refers to additional considerations to adopting Ethernet-based IVN for CCV.

Keywords: autonomous vehicle, cloud connected vehicle, ethernet, in-vehicle network

Procedia PDF Downloads 441
1761 Numerical Prediction of Entropy Generation in Heat Exchangers

Authors: Nadia Allouache

Abstract:

The concept of second law is assumed to be important to optimize the energy losses in heat exchangers. The present study is devoted to the numerical prediction of entropy generation due to heat transfer and friction in a double tube heat exchanger partly or fully filled with a porous medium. The goal of this work is to find the optimal conditions that allow minimizing entropy generation. For this purpose, numerical modeling based on the control volume method is used to describe the flow and heat transfer phenomena in the fluid and the porous medium. Effects of the porous layer thickness, its permeability, and the effective thermal conductivity have been investigated. Unexpectedly, the fully porous heat exchanger yields a lower entropy generation than the partly porous case or the fluid case even if the friction increases the entropy generation.

Keywords: heat exchangers, porous medium, second law approach, turbulent flow

Procedia PDF Downloads 267
1760 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 266
1759 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 345
1758 Non-Homogeneity in a Thick Walled Rotating Circular Cylinder under Varying Pressure

Authors: Jatinder Kaur, Pankaj Thakur

Abstract:

The effect of pressure and temperature in non-homogeneous circular cylinder by taking non-homogeneity of material in terms of compressibility c=c₀r⁻ᵏ has been observed. From the results, it could be seen that for K<0, high pressure is required in the initial yielding state than for the case K >0. Under thermal conditions for value K<0, lesser amount of pressure is required for initial yielding, and further, the amount keeps on decreasing with an increase in temperature. Curves are drawn between pressure and radii ratio for initial and fully plastic state with and without temperature conditions. Further graphs between stresses (hoop and radial) and radii ratio for fully plastic state with and without temperature conditions are also drawn and concluded that hoop stresses become minimum with the increase in temperature as compared to radial stresses.

Keywords: cylinder, elastic, plastic, copper, steel, stresses, pressure, load

Procedia PDF Downloads 53
1757 Various Modification of Electrochemical Barrier Layer Thinning of Anodic Aluminum Oxide

Authors: W. J. Stępniowski, W. Florkiewicz, M. Norek, M. Michalska-Domańska, E. Kościuczyk, T. Czujko

Abstract:

In this paper, two options of anodic alumina barrier layer thinning have been demonstrated. The approaches varied with the duration of the voltage step. It was found that too long step of the barrier layer thinning process leads to chemical etching of the nanopores on their top. At the bottoms pores are not fully opened what is disadvantageous for further applications in nanofabrication. On the other hand, while the duration of the voltage step is controlled by the current density (value of the current density cannot exceed 75% of the value recorded during previous voltage step) the pores are fully opened. However, pores at the bottom obtained with this procedure have smaller diameter, nevertheless this procedure provides electric contact between the bare aluminum (substrate) and electrolyte, what is suitable for template assisted electrodeposition, one of the most cost-efficient synthesis method in nanotechnology.

Keywords: anodic aluminum oxide, anodization, barrier layer thinning, nanopores

Procedia PDF Downloads 301
1756 Comparative Study of Globalization and Homogenous Society: South Korea and Greek Society Reaction to Foreign Culture

Authors: Putri Mentari Racharjo

Abstract:

The development of current technology is simplifying globalization process. An easier globalization process and mobilization are increasing interactions among individuals and societies in different countries. It is also easier for foreign culture to enter a country and create changes to the society. Differences brought by foreign culture will most likely affect any society. It will be easier for heterogeneous society to accept new culture, considering that they have various cultures, and they are used to differences. So it will be easier for a heterogeneous society to accept new culture as long as the culture is not contrary to their essential values. However for a homogenous society, where they have only one language and culture, it will take a longer adjustment time to fully accept the new culture. There will be a tendency for homogenous societies to react in a more negative way to new culture. Greece and South Korea are the examples for homogeneous societies. Greece, a destination country for immigrants, is having a hard time adjusting themselves to accept many immigrants with many cultures. There are various discrimination cases of immigrants in Greece, when the Greek society cannot fully accept the new culture brought by immigrants. South Korea, a newly popular country with K-pop and K-dramas, is attracting people from all over the world to come to South Korea. However a homogenous South Korean society is also having a hard time to fully accept foreign cultures, resulting in many discrimination cases based on race and culture in South Korea. With a qualitative method through a case study and literature review, this article will discuss about Greek and South Korean societies reaction to new cultures as an effect of globalization.

Keywords: foreign culture, globalization, greece, homogenous society, South Korea

Procedia PDF Downloads 309
1755 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
1754 The Challenges of Implementing Building Information Modeling in Small-Medium Enterprises Architecture Firms in Indonesia

Authors: Furry A. Wilis, Dewi Larasati, Suhendri

Abstract:

Around 96% of architecture firms in Indonesia are classified as small-medium enterprises (SME). This number shows that the SME firms have an important role in architecture, engineering, and construction (AEC) industry in Indonesia. Some of them are still using conventional system (2D based) in arranging construction project documents. This system is fragmented and not fully well-coordinated, so causes many changes in the whole project cycle. Building information modeling (BIM), as a new developed system in Indonesian construction industry, has been assumed can decrease changes in the project. But BIM has not fully implemented in Indonesian AEC industry, especially in SME architecture firms. This article identifies the challenges of implementing BIM in SME architecture firms in Indonesia. Quantitative-explorative research with questionnaire was chosen to achieve the goal of this article. The scarcity of skilled BIM user, low demand from client, high investment cost, and the unwillingness of the firm to switch into BIM were found as the result of this paper.

Keywords: architecture consultants, BIM, SME, Indonesia

Procedia PDF Downloads 310
1753 Implicit Eulerian Fluid-Structure Interaction Method for the Modeling of Highly Deformable Elastic Membranes

Authors: Aymen Laadhari, Gábor Székely

Abstract:

This paper is concerned with the development of a fully implicit and purely Eulerian fluid-structure interaction method tailored for the modeling of the large deformations of elastic membranes in a surrounding Newtonian fluid. We consider a simplified model for the mechanical properties of the membrane, in which the surface strain energy depends on the membrane stretching. The fully Eulerian description is based on the advection of a modified surface tension tensor, and the deformations of the membrane are tracked using a level set strategy. The resulting nonlinear problem is solved by a Newton-Raphson method, featuring a quadratic convergence behavior. A monolithic solver is implemented, and we report several numerical experiments aimed at model validation and illustrating the accuracy of the presented method. We show that stability is maintained for significantly larger time steps.

Keywords: finite element method, implicit, level set, membrane, Newton method

Procedia PDF Downloads 278
1752 Fully Automated Methods for the Detection and Segmentation of Mitochondria in Microscopy Images

Authors: Blessing Ojeme, Frederick Quinn, Russell Karls, Shannon Quinn

Abstract:

The detection and segmentation of mitochondria from fluorescence microscopy are crucial for understanding the complex structure of the nervous system. However, the constant fission and fusion of mitochondria and image distortion in the background make the task of detection and segmentation challenging. In the literature, a number of open-source software tools and artificial intelligence (AI) methods have been described for analyzing mitochondrial images, achieving remarkable classification and quantitation results. However, the availability of combined expertise in the medical field and AI required to utilize these tools poses a challenge to its full adoption and use in clinical settings. Motivated by the advantages of automated methods in terms of good performance, minimum detection time, ease of implementation, and cross-platform compatibility, this study proposes a fully automated framework for the detection and segmentation of mitochondria using both image shape information and descriptive statistics. Using the low-cost, open-source python and openCV library, the algorithms are implemented in three stages: pre-processing, image binarization, and coarse-to-fine segmentation. The proposed model is validated using the mitochondrial fluorescence dataset. Ground truth labels generated using a Lab kit were also used to evaluate the performance of our detection and segmentation model. The study produces good detection and segmentation results and reports the challenges encountered during the image analysis of mitochondrial morphology from the fluorescence mitochondrial dataset. A discussion on the methods and future perspectives of fully automated frameworks conclude the paper.

Keywords: 2D, binarization, CLAHE, detection, fluorescence microscopy, mitochondria, segmentation

Procedia PDF Downloads 334
1751 Modified Montgomery for RSA Cryptosystem

Authors: Rupali Verma, Maitreyee Dutta, Renu Vig

Abstract:

Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence, efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitioned over two iterations such that parallel computations are performed. This reduces the critical path delay of proposed Montgomery design. The proposed design and RSA are implemented on Virtex 2 and Virtex 5 FPGAs. The two factors partitioning and parallelism have improved the frequency and throughput of proposed design.

Keywords: RSA, montgomery modular multiplication, 4:2 compressor, FPGA

Procedia PDF Downloads 383
1750 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 174
1749 Fully Printed Strain Gauges: A Comparison of Aerosoljet-Printing and Micropipette-Dispensing

Authors: Benjamin Panreck, Manfred Hild

Abstract:

Strain sensors based on a change in resistance are well established for the measurement of forces, stresses, or material fatigue. Within the scope of this paper, fully additive manufactured strain sensors were produced using an ink of silver nanoparticles. Their behavior was evaluated by periodic tensile tests. Printed strain sensors exhibit two advantages: Their measuring grid is adaptable to the use case and they do not need a carrier-foil, as the measuring structure can be printed directly onto a thin sprayed varnish layer on the aluminum specimen. In order to compare quality characteristics, the sensors have been manufactured using two different technologies, namely aerosoljet-printing and micropipette-dispensing. Both processes produce structures which exhibit continuous features (in contrast to what can be achieved with droplets during inkjet printing). Briefly summarized the results show that aerosoljet-printing is the preferable technology for specimen with non-planar surfaces whereas both technologies are suitable for flat specimen.

Keywords: aerosoljet-printing, micropipette-dispensing, printed electronics, printed sensors, strain gauge

Procedia PDF Downloads 178
1748 Genotyping of G/P No Typable Group a Rotavirus Strains Revealed G2 and G9 Genotype Circulations in Moroccan Children Fully Vaccinated with Rotarix™

Authors: H. Boulahyaoui, S. Alaoui Amine, C. Loutfi, H. El Annaz, N. Touil, El M. El Fahim, S. Mrani

Abstract:

Three Moroccan children fully vaccinated with Rotarix™ have been hospitalized for Rotavirus Gastroenteritis (RVGE) in the pediatric division of the Farabi Hospital, Oujda. Rotavirus G/P genotypes could not be typed because of their delayed crossing threshold (Ct) resolute with a group A rotavirus (RVA) real time RT-PCR. These strains were adapted to cell culture. All viruses replicated and caused extensive cytopathic effects after four or five passages in MA104 cell lines. Significant improvements have been obtained in the amount of viral particles. Each virus multiplied to a high titer (7.5 TCID50/ml). VP7 and VP4 partial gene sequencing revealed distinct genotypes compared to the Rotarix(®) vaccine strain. Two strains were of G2P[4] genotype whereas the third was G9P[8] genotype. Virus isolation while labor intensive, is recommended as a second test, especially when higher sensitivity for conventional RVA genotyping RT-PCR is needed. VP7 antigenic similarities between these strains and Rotarix were determined.

Keywords: esacpe-vaccine, Morocco, Rotarix, G2P[4], G9P[8]

Procedia PDF Downloads 307
1747 From 'Tabung Haji' to Fully Islamic Bank: Analysis of the Twenty Years of Creating Alternative Banking System in Malaysia

Authors: Maulana Ayoub Ali

Abstract:

Malayan Pilgrims Savings Corporation was introduced in 1963. Six years later, Malaysian Pilgrims Fund Board (Tabung Haji) was formed. The board used to collect funds from pilgrims who expected to perform pilgrimage in the future dates. Money was collected and kept as per given rules and procedures emanated from Islamic sources of law. Twenty years later, the country was ready to run a fully fledged Islamic bank where the Bank Islam Malaysia Berhad (BIMB) came into existence in the year 1983. This paper investigates stages of development of Islamic banking system in Malaysia from 1983 to date. This study discovered that Malaysia had enough time to make Islamic banking system works alongside conventional banking system and for sure, has successfully managed to come up with the comprehensive and workable financial system which accommodates both the conventional and Islamic banking. As a result, Malaysia stands to be the hub of Islamic banking products and services in the world today.

Keywords: Tabung Haji, Islamic Banks, conventional law, Malaysia

Procedia PDF Downloads 310
1746 Terminal Ballistic Analysis of Non-Filled and Water-Filled Tank

Authors: M. R. Aziz, W. Kuntjoro, N. V. David

Abstract:

This paper presents the ballistic terminal study of the non-filled and water-filled aluminum tank. The objective was to determine the failure stages for both cases. The tank was impacted by fragment simulating projectile (FSP) with 260 m/s for non-filled and 972 m/s for water-filled. The aluminum tank was 3 mm thick, 150 mm wide and 750 mm long. The ends of the tank were closed with two polymethyl methacrylate (PMMA) windows. The test was conducted at the Science and Technology Research Institute for Defense (STRIDE) Batu Arang, Selangor, Malaysia. The results showed four main stages for non-filled tank, which were first contact between FSP and the tank, partially perforated, fully perforated with FSP and plug still intact and lastly fully perforated with FSP and plug separated. Meanwhile, for the water-filled tank, there were seven main stages, which were first contact between FSP and the tank, partial perforation, full perforation, drag phase, cavity phase, bounce wave event and the collapse of the cavity.

Keywords: fragment simulating projectile, high speed camera, tensile test, terminal ballistic

Procedia PDF Downloads 269
1745 The Prodomain-Bound Form of Bone Morphogenetic Protein 10 is Biologically Active on Endothelial Cells

Authors: Austin Jiang, Richard M. Salmon, Nicholas W. Morrell, Wei Li

Abstract:

BMP10 is highly expressed in the developing heart and plays essential roles in cardiogenesis. BMP10 deletion in mice results in embryonic lethality due to impaired cardiac development. In adults, BMP10 expression is restricted to the right atrium, though ventricular hypertrophy is accompanied by increased BMP10 expression in a rat hypertension model. However, reports of BMP10 activity in the circulation are inconclusive. In particular it is not known whether in vivo secreted BMP10 is active or whether additional factors are required to achieve its bioactivity. It has been shown that high-affinity binding of the BMP10 prodomain to the mature ligand inhibits BMP10 signaling activity in C2C12 cells, and it was proposed that prodomain-bound BMP10 (pBMP10) complex is latent. In this study, we demonstrated that the BMP10 prodomain did not inhibit BMP10 signaling activity in multiple endothelial cells, and that recombinant human pBMP10 complex, expressed in mammalian cells and purified under native conditions, was fully active. In addition, both BMP10 in human plasma and BMP10 secreted from the mouse right atrium were fully active. Finally, we confirmed that active BMP10 secreted from mouse right atrium was in the prodomain-bound form. Our data suggest that circulating BMP10 in adults is fully active and that the reported vascular quiescence function of BMP10 in vivo is due to the direct activity of pBMP10 and does not require an additional activation step. Moreover, being an active ligand, recombinant pBMP10 may have therapeutic potential as an endothelial-selective BMP ligand, in conditions characterized by loss of BMP9/10 signaling.

Keywords: bone morphogenetic protein 10 (BMP10), endothelial cell, signal transduction, transforming growth factor beta (TGF-B)

Procedia PDF Downloads 247
1744 Correction Factors for Soil-Structure Interaction Predicted by Simplified Models: Axisymmetric 3D Model versus Fully 3D Model

Authors: Fu Jia

Abstract:

The effects of soil-structure interaction (SSI) are often studied using axial-symmetric three-dimensional (3D) models to avoid the high computational cost of the more realistic, fully 3D models, which require 2-3 orders of magnitude more computer time and storage. This paper analyzes the error and presents correction factors for system frequency, system damping, and peak amplitude of structural response computed by axisymmetric models, embedded in uniform or layered half-space. The results are compared with those for fully 3D rectangular foundations of different aspect ratios. Correction factors are presented for a range of the model parameters, such as fixed-base frequency, structure mass, height and length-to-width ratio, foundation embedment, soil-layer stiffness and thickness. It is shown that the errors are larger for stiffer, taller and heavier structures, deeper foundations and deeper soil layer. For example, for a stiff structure like Millikan Library (NS response; length-to-width ratio 1), the error is 6.5% in system frequency, 49% in system damping and 180% in peak amplitude. Analysis of a case study shows that the NEHRP-2015 provisions for reduction of base shear force due to SSI effects may be unsafe for some structures and need revision. The presented correction factor diagrams can be used in practical design and other applications.

Keywords: 3D soil-structure interaction, correction factors for axisymmetric models, length-to-width ratio, NEHRP-2015 provisions for reduction of base shear force, rectangular embedded foundations, SSI system frequency, SSI system damping

Procedia PDF Downloads 231
1743 Method and System of Malay Traditional Women Apparel Pattern Drafting for Hazi Attire

Authors: Haziyah Hussin

Abstract:

Hazi Attire software is purposely designed to be used for pattern drafting of the Malay Traditional Women Apparel. It is software created using LISP Program that works under AutoCAD engine and able to draft various patterns for Malay women apparels from fitted, semi-fitted and loose silhouettes. It is fully automatic and the user can select styles from the menu on the screen and enter the measurements. Within five seconds patterns are ready to be printed and sewn. Hazi Attire is different from other programmes available in the market since it is fully automatic, user-friendly and able to print selected pattern chosen quickly and accurately. With this software (Hazi Attire), the selected styles can be generated the pattern according to made-to-measure or standard sizes. It would benefit the apparel industries by reducing manufacturing lead time and cycle time.

Keywords: basic pattern, pattern drafting, toile, Malay traditional women apparel, the measurement parameters, fitted, semi-fitted and loose silhouette

Procedia PDF Downloads 230
1742 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 341