Search results for: signature reversal
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 327

Search results for: signature reversal

327 Abnormal Features of Two Quasiparticle Rotational Bands in Rare Earths

Authors: Kawalpreet Kalra, Alpana Goel

Abstract:

The behaviour of the rotational bands should be smooth but due to large amount of inertia and decreased pairing it is not so. Many experiments have been done in the last few decades, and a large amount of data is available for comprehensive study in this region. Peculiar features like signature dependence, signature inversion, and signature reversal are observed in many two quasiparticle rotational bands of doubly odd and doubly even nuclei. At high rotational frequencies, signature and parity are the only two good quantum numbers available to label a state. Signature quantum number is denoted by α. Even-angular momentum states of a rotational band have α =0, and the odd-angular momentum states have α =1. It has been observed that the odd-spin members lie lower in energy up to a certain spin Ic; the normal signature dependence is restored afterwards. This anomalous feature is termed as signature inversion. The systematic of signature inversion in high-j orbitals for doubly odd rare earth nuclei have been done. Many unusual features like signature dependence, signature inversion and signature reversal are observed in rotational bands of even-even/odd-odd nuclei. Attempts have been made to understand these phenomena using several models. These features have been analyzed within the framework of the Two Quasiparticle Plus Rotor Model (TQPRM).

Keywords: rotational bands, signature dependence, signature quantum number, two quasiparticle

Procedia PDF Downloads 141
326 Two Quasiparticle Rotor Model for Deformed Nuclei

Authors: Alpana Goel, Kawalpreet Kalra

Abstract:

The study of level structures of deformed nuclei is the most complex topic in nuclear physics. For the description of level structure, a simple model is good enough to bring out the basic features which may then be further refined. The low lying level structures of these nuclei can, therefore, be understood in terms of Two Quasiparticle plus axially symmetric Rotor Model (TQPRM). The formulation of TQPRM for deformed nuclei has been presented. The analysis of available experimental data on two quasiparticle rotational bands of deformed nuclei present unusual features like signature dependence, odd-even staggering, signature inversion and signature reversal in two quasiparticle rotational bands of deformed nuclei. These signature effects are well discussed within the framework of TQPRM. The model is well efficient in reproducing the large odd-even staggering and anomalous features observed in even-even and odd-odd deformed nuclei. The effect of particle-particle and the Coriolis coupling is well established from the model. Detailed description of the model with implications to deformed nuclei is presented in the paper.

Keywords: deformed nuclei, signature effects, signature inversion, signature reversal

Procedia PDF Downloads 140
325 Separating Permanent and Induced Magnetic Signature: A Simple Approach

Authors: O. J. G. Somsen, G. P. M. Wagemakers

Abstract:

Magnetic signature detection provides sensitive detection of metal objects, especially in the natural environment. Our group is developing a tabletop setup for magnetic signatures of various small and model objects. A particular issue is the separation of permanent and induced magnetization. While the latter depends only on the composition and shape of the object, the former also depends on the magnetization history. With common deperming techniques, a significant permanent signature may still remain, which confuses measurements of the induced component. We investigate a basic technique of separating the two. Measurements were done by moving the object along an aluminum rail while the three field components are recorded by a detector attached near the center. This is done first with the rail parallel to the Earth magnetic field and then with anti-parallel orientation. The reversal changes the sign of the induced- but not the permanent magnetization so that the two can be separated. Our preliminary results on a small iron block show excellent reproducibility. A considerable permanent magnetization was indeed present, resulting in a complex asymmetric signature. After separation, a much more symmetric induced signature was obtained that can be studied in detail and compared with theoretical calculations.

Keywords: magnetic signature, data analysis, magnetization, deperming techniques

Procedia PDF Downloads 428
324 Application of Signature Verification Models for Document Recognition

Authors: Boris M. Fedorov, Liudmila P. Goncharenko, Sergey A. Sybachin, Natalia A. Mamedova, Ekaterina V. Makarenkova, Saule Rakhimova

Abstract:

In modern economic conditions, the question of the possibility of correct recognition of a signature on digital documents in order to verify the expression of will or confirm a certain operation is relevant. The additional complexity of processing lies in the dynamic variability of the signature for each individual, as well as in the way information is processed because the signature refers to biometric data. The article discusses the issues of using artificial intelligence models in order to improve the quality of signature confirmation in document recognition. The analysis of several possible options for using the model is carried out. The results of the study are given, in which it is possible to correctly determine the authenticity of the signature on small samples.

Keywords: signature recognition, biometric data, artificial intelligence, neural networks

Procedia PDF Downloads 116
323 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 358
322 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce

Authors: Wenjie Qin, Kewei Lv

Abstract:

In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.

Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP

Procedia PDF Downloads 202
321 Online Authenticity Verification of a Biometric Signature Using Dynamic Time Warping Method and Neural Networks

Authors: Gałka Aleksandra, Jelińska Justyna, Masiak Albert, Walentukiewicz Krzysztof

Abstract:

An offline signature is well-known however not the safest way to verify identity. Nowadays, to ensure proper authentication, i.e. in banking systems, multimodal verification is more widely used. In this paper the online signature analysis based on dynamic time warping (DTW) coupled with machine learning approaches has been presented. In our research signatures made with biometric pens were gathered. Signature features as well as their forgeries have been described. For verification of authenticity various methods were used including convolutional neural networks using DTW matrix and multilayer perceptron using sums of DTW matrix paths. System efficiency has been evaluated on signatures and signature forgeries collected on the same day. Results are presented and discussed in this paper.

Keywords: dynamic time warping, handwritten signature verification, feature-based recognition, online signature

Procedia PDF Downloads 136
320 An Architecture Based on Capsule Networks for the Identification of Handwritten Signature Forgery

Authors: Luisa Mesquita Oliveira Ribeiro, Alexei Manso Correa Machado

Abstract:

Handwritten signature is a unique form for recognizing an individual, used to discern documents, carry out investigations in the criminal, legal, banking areas and other applications. Signature verification is based on large amounts of biometric data, as they are simple and easy to acquire, among other characteristics. Given this scenario, signature forgery is a worldwide recurring problem and fast and precise techniques are needed to prevent crimes of this nature from occurring. This article carried out a study on the efficiency of the Capsule Network in analyzing and recognizing signatures. The chosen architecture achieved an accuracy of 98.11% and 80.15% for the CEDAR and GPDS databases, respectively.

Keywords: biometrics, deep learning, handwriting, signature forgery

Procedia PDF Downloads 45
319 Offline Signature Verification Using Minutiae and Curvature Orientation

Authors: Khaled Nagaty, Heba Nagaty, Gerard McKee

Abstract:

A signature is a behavioral biometric that is used for authenticating users in most financial and legal transactions. Signatures can be easily forged by skilled forgers. Therefore, it is essential to verify whether a signature is genuine or forged. The aim of any signature verification algorithm is to accommodate the differences between signatures of the same person and increase the ability to discriminate between signatures of different persons. This work presented in this paper proposes an automatic signature verification system to indicate whether a signature is genuine or not. The system comprises four phases: (1) The pre-processing phase in which image scaling, binarization, image rotation, dilation, thinning, and connecting ridge breaks are applied. (2) The feature extraction phase in which global and local features are extracted. The local features are minutiae points, curvature orientation, and curve plateau. The global features are signature area, signature aspect ratio, and Hu moments. (3) The post-processing phase, in which false minutiae are removed. (4) The classification phase in which features are enhanced before feeding it into the classifier. k-nearest neighbors and support vector machines are used. The classifier was trained on a benchmark dataset to compare the performance of the proposed offline signature verification system against the state-of-the-art. The accuracy of the proposed system is 92.3%.

Keywords: signature, ridge breaks, minutiae, orientation

Procedia PDF Downloads 122
318 First Order Reversal Curve Method for Characterization of Magnetic Nanostructures

Authors: Bashara Want

Abstract:

One of the key factors limiting the performance of magnetic memory is that the coercivity has a distribution with finite width, and the reversal starts at the weakest link in the distribution. So one must first know the distribution of coercivities in order to learn how to reduce the width of distribution and increase the coercivity field to obtain a system with narrow width. First Order Reversal Curve (FORC) method characterizes a system with hysteresis via the distribution of local coercivities and, in addition, the local interaction field. The method is more versatile than usual conventional major hysteresis loops that give only the statistical behaviour of the magnetic system. The FORC method will be presented and discussed at the conference.

Keywords: magnetic materials, hysteresis, first-order reversal curve method, nanostructures

Procedia PDF Downloads 55
317 Signature Verification System for a Banking Business Process Management

Authors: A. Rahaf, S. Liyakathunsia

Abstract:

In today’s world, unprecedented operational pressure is faced by banks that test the efficiency, effectiveness, and agility of their business processes. In a typical banking process, a person’s authorization is usually based on his signature on most all of the transactions. Signature verification is considered as one of the highly significant information needed for any bank document processing. Banks usually use Signature Verification to authenticate the identity of individuals. In this paper, a business process model has been proposed in order to increase the quality of the verification process and to reduce time and needed resources. In order to understand the current process, a survey has been conducted and distributed among bank employees. After analyzing the survey, a process model has been created using Bizagi modeler which helps in simulating the process after assigning time and cost of it. The outcomes show that the automation of signature verification process is highly recommended for a banking business process.

Keywords: business process management, process modeling, quality, Signature Verification

Procedia PDF Downloads 393
316 Triangular Geometric Feature for Offline Signature Verification

Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad

Abstract:

Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.

Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier

Procedia PDF Downloads 349
315 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 272
314 Microwave Imaging by Application of Information Theory Criteria in MUSIC Algorithm

Authors: Majid Pourahmadi

Abstract:

The performance of time-reversal MUSIC algorithm will be dramatically degrades in presence of strong noise and multiple scattering (i.e. when scatterers are close to each other). This is due to error in determining the number of scatterers. The present paper provides a new approach to alleviate such a problem using an information theoretic criterion referred as minimum description length (MDL). The merits of the novel approach are confirmed by the numerical examples. The results indicate the time-reversal MUSIC yields accurate estimate of the target locations with considerable noise and multiple scattering in the received signals.

Keywords: microwave imaging, time reversal, MUSIC algorithm, minimum description length (MDL)

Procedia PDF Downloads 306
313 The Forensic Handwriting Analysis of a Painter’s Signature: Claude Monet’s Case

Authors: Olivia Rybak-Karkosz

Abstract:

This paper's purpose was to present a case study on a questioned Claude Monet's signature forensic handwriting analysis. It is an example taken from the author’s experience as a court handwriting expert. A comparative study was conducted to determine whether the signature resembles similarities (and if so, to what measure) with the features representing the writing patterns and their natural variability typical for Claude Monet. It was conducted to check whether all writing features are within the writer's normal range of variation. The paper emphasizes the difficulties and challenges encountered by the forensic handwriting expert while analysing the questioned signature.

Keywords: artist’s signatures, authenticity of an artwork, forensic handwriting analysis, graphic-comparative method

Procedia PDF Downloads 70
312 Top-Down Influences to Multistable Perception: Evidence from Temporal Dynamics

Authors: Daria N. Podvigina, Tatiana V. Chernigovskaya

Abstract:

We have studied the temporal characteristics of bistable perception of the stimuli of two types: one involves alterations in a perceived depth and another one has an ambiguous content. We used the Necker lattice and lines of shadowed circles ambiguously perceived either as spheres or holes as stimuli of the first type. The Winson figure (the Eskimo/Indian picture) was a stimulus of the second type. We have analyzed how often the reversals occurred (reversal rate) and for how long each of the two interpretations, or percepts, was observed during one presentation (stability durations). For all three ambiguous images the reversal rate and the stability durations had similar values, which provide another evidence for a significant role of top-down processes in multistable perception.

Keywords: multistable perception, perceived depth, reversal rate, top-down processes

Procedia PDF Downloads 554
311 Effect of Interlayer Coupling in Co/Al2O3/Co

Authors: Niru Chowdhury, Subhankar Bedanta, Alexander Weber, Thomas Brueckel

Abstract:

We show the effect of interlayer coupling on magnetization reversal in purely dipolar coupled magnetic multilayers. Longitudinal magneto-optic Kerr microscopy (LMOKE) has been performed on [Co(10nm)/Al2O3(t)/Co(10nm)] for various thicknesses of Al2O3(t). We will show that inter-layer coupling interactions lead to layer-by-layer reversal in the magnetic multilayers. Also transverse component of magnetization was observed for higher thickness of the spacer layer.

Keywords: Interlayer coupling, Magnetic domains, Magneto – Optic Kerr effect microscopy, Magnetization reversal, Magnetic thin film

Procedia PDF Downloads 372
310 Examination of Forged Signatures Printed by Means of Fabrication in Terms of Their Relation to the Perpetrator

Authors: Salim Yaren, Nergis Canturk

Abstract:

Signatures are signs that are handwritten by person in order to confirm values such as information, amount, meaning, time and undertaking that bear on a document. It is understood that the signature of a document and the accuracy of the information on the signature is accepted and approved. Forged signatures are formed by forger without knowing and seeing original signature of person that forger will imitate and as a result of his/her effort for hiding typical characteristics of his/her own signatures. Forged signatures are often signed by starting with the initials of the first and last name or persons of the persons whose fake signature will be signed. The similarities in the signatures are completely random. Within the scope of the study, forged signatures are collected from 100 people both their original signatures and forged signatures signed referring to 5 imaginary people. These signatures are compared for 14 signature analyzing criteria by 2 signature analyzing experts except the researcher. 1 numbered analyzing expert who is 9 year experience in his/her field evaluated signatures of 39 (39%) people right and of 25 (25%) people wrong and he /she made any evaluations for signatures of 36 (36%) people. 2 numbered analyzing expert who is 16 year experienced in his/her field evaluated signatures of 49 (49%) people right and 28 (28%) people wrong and he /she made any evaluations for signatures of 23 (23%) people. Forged signatures that are signed by 24 (24%) people are matched by two analyzing experts properly, forged signatures that are signed by 8 (8%) people are matched wrongfully and made up signatures that are signed by 12 (12%) people couldn't be decided by both analyzing experts. Signatures analyzing is a subjective topic so that analyzing and comparisons take form according to education, knowledge and experience of the expert. Consequently, due to the fact that 39% success is achieved by analyzing expert who has 9 year professional experience and 49% success is achieved by analyzing expert who has 16 year professional experience, it is seen that success rate is directly proportionate to knowledge and experience of the expert.

Keywords: forensic signature, forensic signature analysis, signature analysis criteria, forged signature

Procedia PDF Downloads 101
309 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 316
308 Effects of Aromatase Inhibitor (Fadrozole) Induced Sex-Reversal in Chicken (Gimmizah strain) on Morphology

Authors: Hatem Shreha

Abstract:

Aromatase inhibitors administered before sexual differentiation of the gonads can induce sex reversal in female chickens (phenotypic male). To analyze the process of sex reversal, we have followed for several months the changes induced by Fadrozole, a nonsteroidal aromatase inhibitor on the morphology of female sex-reversed and female sex-reversed supplemented with L-tyrosine which was previously shown to stimulate the release of Gn Rh. Fadrozole (1mg/egg) was injected into eggs on day four of incubation, phenotypic males and phenotypic males treated with L-tyrosine and males hatched from eggs injected Fadrozole were sacrificed by slaughtering at 16 weeks old and the remaining chicks were sacrificed at 28 weeks old. Both sexes from control chickens were sacrificed at the same age (16 &28 weeks). Hatchability, behavior, body weight, shank length, comb weight, testes weight, blood cells count and wattle weight of sex reversal were tested at 16 and 28 weeks. The results showed that body weight, comb weight, wattles weight and shank length of sex-reversed females were significantly different from control female. Behavior of phenotypic males and phenotypic males fed on L- tyrosine showed aggressive sexual behavior like that of control males and absence of laying behavior. In conclusion our results confirm that Fedrazole injection in eggs before sex differentiation produce a male behavior and morphological index of male in female chicken.

Keywords: sex reversal, fadrozole, phenotypic male, L- tyrosine

Procedia PDF Downloads 586
307 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 450
306 Effects of Aromatase Inhibitor on Morphology and Body Shape in Sex-Reversal Chicken: Gimmizah Strain

Authors: Hatem Ashur Masoud Shreha

Abstract:

Aromatase inhibitors administered before sexual differentiation of the gonads in chicken embryo can induce sex reversal in female layer chickens (phenotypic male). To analyze the process of sex reversal, we have followed for several months the changes induced by Fadrozole, a nonsteroidal aromatase inhibitor on morphology of female sex-reversed and female sex-reversed supplemented with L-tyrosine which was previously shown to stimulate release of Gn Rh. Fadrozole (1mg/egg) was injected into eggs on day four of incubation before sex differentiation. phenotypic males and phenotypic males treated with L-tyrosine and males hatched from eggs injected Fadrozole were sacrificed by slaughtering at 16 weeks old and the remaining chicks were sacrificed at 28 weeks old. Both sexes from control chickens were sacrificed at the same age (16 &28 weeks). Hatchability, behavior, body weight, shank length, comb weight, testes weight, blood cells count and wattle weight of sex reversal were tested at 16 and 28 weeks. The results showed that body weight, comb weight, wattles weight and shank length of sex-reversed females were significantly different from control female. Behavior of phenotypic males and phenotypic males fed on L-tyrosine showed aggressive sexual behavior like that of control males and absence of laying behavior. In conclusion our results confirm that Fadrazole injection in eggs before sex differentiation produce a male behavior and morphological index of male in female chicken.

Keywords: sex-reversal, fadrozole, phenotypic male, L-tyrosine

Procedia PDF Downloads 426
305 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 120
304 A New Approach to Predicting Physical Biometrics from Behavioural Biometrics

Authors: Raid R. O. Al-Nima, S. S. Dlay, W. L. Woo

Abstract:

A relationship between face and signature biometrics is established in this paper. A new approach is developed to predict faces from signatures by using artificial intelligence. A multilayer perceptron (MLP) neural network is used to generate face details from features extracted from signatures, here face is the physical biometric and signatures is the behavioural biometric. The new method establishes a relationship between the two biometrics and regenerates a visible face image from the signature features. Furthermore, the performance efficiencies of our new technique are demonstrated in terms of minimum error rates compared to published work.

Keywords: behavioural biometric, face biometric, neural network, physical biometric, signature biometric

Procedia PDF Downloads 448
303 Study of the S-Bend Intake Hammershock Based on Improved Delayed Detached Eddy Simulation

Authors: Qun-Feng Zhang, Pan-Pan Yan, Jun Li, Jun-Qing Lei

Abstract:

Numerical investigation of hammershock propagation in the S-bend intake caused by engine surge has been conducted by using Improved Delayed Detach-Eddy Simulation (IDDES). The effects of surge signatures on hammershock characteristics are obtained. It was shown that once the hammershock is produced, it moves upward to the intake entrance quickly with constant speed, however, the strength of hammershock keeps increasing. Meanwhile, being influenced by the centrifugal force, the hammershock strength on the larger radius side is much larger. Hammershock propagation speed and strength are sensitive to the ramp upgradient of surge signature. A larger ramp up gradient results in higher propagation speed and greater strength. Nevertheless, ramp down profile of surge signature have no obvious effect on the propagation speed and strength of hammershock. Increasing the maximum value of surge signature leads to enhance in the intensity of hammershock, they approximately match quadratic function distribution law.

Keywords: hammershock, IDDES, S-bend, surge signature

Procedia PDF Downloads 263
302 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 389
301 Timing of Ileostomy Closure Following Rectal Cancer Surgery at an Australian Regional Hospital

Authors: Tedman Cheuk-Yiu Chau, Xavier Harvey, Hung Nguyen

Abstract:

Defunctioning ileostomies are frequently used as an adjunct to low anterior resection in the surgical treatment of rectal cancer. Despite reducing the rate of clinically relevant anastomotic leak, the burden of defunctioning ileostomy is significant, with up to two-thirds of patients reporting stoma-related morbidity. International data have demonstrated an increased risk of bowel dysfunction and lower quality of life in patients with delayed closure (greater than six months post-surgery). While timely reversal is safe and cost-effective, the time to the reversal in Australian and New Zealand public hospitals is not described in the published literature. Thus, it is important to assess the current timeliness of ileostomy closure in the Australian regional context and examine the reasons for the delay. A retrospective analysis of ileostomy closure in Launceston General Hospital (LGH) patients treated with low/ultra low anterior resection for rectal cancer between 2012 and 2019 was undertaken. 94 cases of rectal adenocarcinoma undergoing ultralow anterior resection were examined over the years between 2012-2019. Amongst these, 21 cases (22.3%) were not reversed due to disease progress, death prior to reversal, or surgical complication. Demographics, disease status, surgical technique, and hospital inpatient events of these cases were examined. An average waiting time of 213.2 days was noted. Reasons for the delay include non-specified/prolonged hospital waiting time (54%), delayed or complicated chemotherapy course (13%), surgical complication (11%), advanced age, and frailty(5%). Complication of a delayed ileostomy reversal includes post-operation ileus and the development of an incisional hernia. We conclude that a delayed reversal of ileostomy can contribute to a higher incidence of stoma-related co-morbidities and contribute to a longer hospital stay and therefore use of public hospital resources.

Keywords: anterior resection, colorectal surgery, ileostomy reversal, rectal cancer

Procedia PDF Downloads 65
300 Thinking in a Foreign Language Overcomes the Developmental Reversal in Risky Decision-Making: The Foreign Language Effect in Risky Decision-Making

Authors: Rendong Cai, Bei Peng, Yanping Dong

Abstract:

In risk decision making, individuals are found to be susceptible to 'frames': people tend to be risk averse when the choice is described in terms of potential 'gains' (gain frame), whereas they tend to be risk seeking when the same choice is described in terms of potential 'losses' (loss frame); this effect is termed the framing effect. The framing effect has been well documented and some studies even find a developmental reversal in the framing effect: The more experience an individual has in a certain field, the easier for him to be influenced by the frame relevant to the field, resulting in greater decision inconsistency. Recent studies reported that using a foreign language can reduce the framing effect. However, it is not clear whether foreign language use can overcome the developmental reversal in the framing effect. The present study investigated three potential factors that may influence the developmental reversal in the framing effect: specialized knowledge of the participants, the language in which the problem is presented, and the types of problems. The present study examined the decision making behavior of 188 Chinese-English bilinguals who majored in Finance, with a group of 277 English majors as the control group. They were asked to solve a financial problem (experimental condition) and a life problem (control condition). Each problem was presented in one of the following four versions: native language-gain frame, foreign language-gain frame, native language-loss frame, and foreign language-loss frame. Results revealed that for the life problem, under the native condition, both groups were affected by the frame; but under the foreign condition, this framing effect disappeared for the financial majors. This confirmed that foreign language use modulates framing effects in general decision making, which served as an effective baseline. For the financial problem, under the native condition, only the financial major was observed to be influenced by the frame, which was a developmental reversal; under the foreign condition, however, this framing effect disappeared. The results provide further empirical evidence for the universal of the developmental reversal in risky decision making. More importantly, the results suggest that using a foreign language can overcome such reversal, which has implications for the reduction of decision biases in professionals. The findings also shed new light on the complex interaction between general decision-making and bilingualism.

Keywords: the foreign language effect, developmental reversals, the framing effect, bilingualism

Procedia PDF Downloads 348
299 A Pedagogical Case Study on Consumer Decision Making Models: A Selection of Smart Phone Apps

Authors: Yong Bum Shin

Abstract:

This case focuses on Weighted additive difference, Conjunctive, Disjunctive, and Elimination by aspects methodologies in consumer decision-making models and the Simple additive weighting (SAW) approach in the multi-criteria decision-making (MCDM) area. Most decision-making models illustrate that the rank reversal phenomenon is unpreventable. This paper presents that rank reversal occurs in popular managerial methods such as Weighted Additive Difference (WAD), Conjunctive Method, Disjunctive Method, Elimination by Aspects (EBA) and MCDM methods as well as such as the Simple Additive Weighting (SAW) and finally Unified Commensurate Multiple (UCM) models which successfully addresses these rank reversal problems in most popular MCDM methods in decision-making area.

Keywords: multiple criteria decision making, rank inconsistency, unified commensurate multiple, analytic hierarchy process

Procedia PDF Downloads 58
298 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 102