12,276 research outputs found
The effect of a startle-eliciting device on the foraging success of individual harbor seals (Phoca vitulina)
Pinniped predation on commercially and ecologically important prey has been a source of conflict for centuries. In the Salish Sea, harbor seals (Phoca vitulina) are suspected of impeding the recovery of culturally and ecologically critical Pacific salmon (Oncorhynchus spp.). In Fall 2020, a novel deterrent called Targeted Acoustic Startle Technology (TAST) was deployed at Whatcom Creek to deter harbor seals from preying on fall runs of hatchery chum (O. keta) and Chinook (O. tshawytscha) salmon in Bellingham, Washington, USA. Field observations were conducted in 2020 to compare the presence and foraging success of individual harbor seals across sound exposure (TAST-on) and control (TAST-off) conditions. Observations conducted the previous (2019) and following (2021) years were used to compare the effects observed in 2020 to two control years. Using photo-identification, individual seals were associated with foraging successes across all 3 years of the study. Generalized linear mixed models showed a significant 45.6% reduction in the duration (min) individuals remained at the creek with TAST on, and a significant 43.8% reduction in the overall foraging success of individuals. However, the observed effect of TAST varied across individual seals. Seals that were observed regularly within one season were more likely to return the year after, regardless of TAST treatment. Generalized linear models showed interannual variation in the number of seals present and salmon consumed. However, the effect of TAST in 2020 was greater than the observed variation across years. Our analyses suggest TAST can be an effective tool for managing pinniped predation, although alternate strategies such as deploying TAST longer-term and using multi-unit setups to increase coverage could help strengthen its effects. Future studies should further examine the individual variability found in this study.Peer reviewe
A Spark Of Emotion: The Impact of Electrical Facial Muscle Activation on Emotional State and Affective Processing
Facial feedback, which involves the brain receiving information about the activation of facial muscles, has the potential to influence our emotional states and judgments. The extent to which this applies is still a matter of debate, particularly considering a failed replication of a seminal study. One factor contributing to the lack of replication in facial feedback effects may be the imprecise manipulation of facial muscle activity in terms of both degree and timing. To overcome these limitations, this thesis proposes a non-invasive method for inducing precise facial muscle contractions, called facial neuromuscular electrical stimulation (fNMES). I begin by presenting a systematic literature review that lays the groundwork for standardising the use of fNMES in psychological research, by evaluating its application in existing studies. This review highlights two issues, the lack of use of fNMES in psychology research and the lack of parameter reporting. I provide practical recommendations for researchers interested in implementing fNMES. Subsequently, I conducted an online experiment to investigate participants' willingness to participate in fNMES research. This experiment revealed that concerns over potential burns and involuntary muscle movements are significant deterrents to participation. Understanding these anxieties is critical for participant management and expectation setting. Subsequently, two laboratory studies are presented that investigated the facial FFH using fNMES. The first study showed that feelings of happiness and sadness, and changes in peripheral physiology, can be induced by stimulating corresponding facial muscles with 5âseconds of fNMES. The second experiment showed that fNMES-induced smiling alters the perception of ambiguous facial emotions, creating a bias towards happiness, and alters neural correlates of face processing, as measured with event-related potentials (ERPs). In summary, the thesis presents promising results for testing the facial feedback hypothesis with fNMES and provides practical guidelines and recommendations for researchers interested in using fNMES for psychological research
Binge-like administration of alcohol mixed to energy drinks to male adolescent rats severely impacts on mesocortical dopaminergic function in adulthood: A behavioral, neurochemical and electrophysiological study
A growing body of evidence indicates that the practice of consuming alcohol mixed with energy drinks (ED) (AMED) in a binge drinking pattern is significantly diffusing among the adolescent population. This behavior, aimed at increasing the intake of alcohol, raises serious concerns about its long-term effects. Epidemiological studies suggest that AMED consumption might increase vulnerability to alcohol abuse and have a gating effect on the use of illicit drugs. The medial prefrontal cortex (mPFC) is involved in the modulation of the reinforcing effects of alcohol and of impulsive behavior and plays a key role in the development of addiction. In our study, we used a binge-like protocol of administration of alcohol, ED, or AMED in male adolescent rats, to mimic the binge-like intake behavior observed in humans, in order to evaluate whether these treatments could differentially affect the function of mesocortical dopaminergic neurons in adulthood. We did so by measuring: i) physiological sensorimotor gating; ii) voluntary alcohol consumption and dopamine transmission before, during, and after presentation of alcohol; iii) electrophysiological activity of VTA dopaminergic neurons and their sensitivity to a challenge with alcohol. Our results indicate that exposure to alcohol, ED, or AMED during adolescence induces differential adaptive changes in the function of mesocortical dopaminergic neurons and, in particular, that AMED exposure decreases their sensitivity to external stimuli, possibly laying the foundation for the altered behaviors observed in adulthood
Authentication enhancement in command and control networks: (a study in Vehicular Ad-Hoc Networks)
Intelligent transportation systems contribute to improved traffic safety by facilitating real time communication between vehicles. By using wireless channels for communication, vehicular networks are susceptible to a wide range of attacks, such as impersonation, modification, and replay. In this context, securing data exchange between intercommunicating terminals, e.g., vehicle-to-everything (V2X) communication, constitutes a technological challenge that needs to be addressed. Hence, message authentication is crucial to safeguard vehicular ad-hoc networks (VANETs) from malicious attacks. The current state-of-the-art for authentication in VANETs relies on conventional cryptographic primitives, introducing significant computation and communication overheads. In this challenging scenario, physical (PHY)-layer authentication has gained popularity, which involves leveraging the inherent characteristics of wireless channels and the hardware imperfections to discriminate between wireless devices. However, PHY-layerbased authentication cannot be an alternative to crypto-based methods as the initial legitimacy detection must be conducted using cryptographic methods to extract the communicating terminal secret features. Nevertheless, it can be a promising complementary solution for the reauthentication problem in VANETs, introducing what is known as âcross-layer authentication.â This thesis focuses on designing efficient cross-layer authentication schemes for VANETs, reducing the communication and computation overheads associated with transmitting and verifying a crypto-based signature for each transmission. The following provides an overview of the proposed methodologies employed in various contributions presented in this thesis.
1. The first cross-layer authentication scheme: A four-step process represents this approach: initial crypto-based authentication, shared key extraction, re-authentication via a PHY challenge-response algorithm, and adaptive adjustments based on channel conditions. Simulation results validate its efficacy, especially in low signal-to-noise ratio (SNR) scenarios while proving its resilience against active and passive attacks.
2. The second cross-layer authentication scheme: Leveraging the spatially and temporally correlated wireless channel features, this scheme extracts high entropy shared keys that can be used to create dynamic PHY-layer signatures for authentication. A 3-Dimensional (3D) scattering Doppler emulator is designed to investigate the schemeâs performance at different speeds of a moving vehicle and SNRs. Theoretical and hardware implementation analyses prove the schemeâs capability to support high detection probability for an acceptable false alarm value †0.1 at SNR â„ 0 dB and speed †45 m/s.
3. The third proposal: Reconfigurable intelligent surfaces (RIS) integration for improved authentication: Focusing on enhancing PHY-layer re-authentication, this proposal explores integrating RIS technology to improve SNR directed at designated vehicles. Theoretical analysis and practical implementation of the proposed scheme are conducted using a 1-bit RIS, consisting of 64 Ă 64 reflective units. Experimental results show a significant improvement in the Pd, increasing from 0.82 to 0.96 at SNR = â 6 dB for multicarrier communications.
4. The fourth proposal: RIS-enhanced vehicular communication security: Tailored for challenging SNR in non-line-of-sight (NLoS) scenarios, this proposal optimises key extraction and defends against denial-of-service (DoS) attacks through selective signal strengthening. Hardware implementation studies prove its effectiveness, showcasing improved key extraction performance and resilience against potential threats.
5. The fifth cross-layer authentication scheme: Integrating PKI-based initial legitimacy detection and blockchain-based reconciliation techniques, this scheme ensures secure data exchange. Rigorous security analyses and performance evaluations using network simulators and computation metrics showcase its effectiveness, ensuring its resistance against common attacks and time efficiency in message verification.
6. The final proposal: Group key distribution: Employing smart contract-based blockchain technology alongside PKI-based authentication, this proposal distributes group session keys securely. Its lightweight symmetric key cryptography-based method maintains privacy in VANETs, validated via Ethereumâs main network (MainNet) and comprehensive computation and communication evaluations.
The analysis shows that the proposed methods yield a noteworthy reduction, approximately ranging from 70% to 99%, in both computation and communication overheads, as compared to the conventional approaches. This reduction pertains to the verification and transmission of 1000 messages in total
Mesoscale modelling of the dynamic tensile strength enhancement of concrete in spalling tests using interface elements
The dynamic tensile strength of concrete has been experimentally reported to increase significantly with the increase of imposed strain rates. However, the intrinsic mechanisms accounting for the strength increase are not well understood so far. This paper presented numerical simulations based on the spalling technique to further explore mechanisms of the dynamic responses of concrete under impact loadings. Numerical results have been verified and validated against experimental evidence with various strain rates. The validity of utilizing the Novikov acoustic processing approximation for obtaining the spalling strength of concrete is identified and discussed. Results demonstrate that this indirect processing approach could overestimate the spalling strength because real material behavior tends to deviate from its basic assumption. Mechanisms accounting for the spalling strength increase from key aspects including the meso-structure, the strain rate-dependent material behaviour, the micro-crack inertia, and the structural inertial are also identified accordingly. Results demonstrate that the increment of concrete dynamic tensile strength in spalling tests is mainly caused by the strain rate-dependent material behaviour which should be incorporated in the material constitutive description. Besides that, the material heterogeneity also makes a considerable contribution to the increase of dynamic tensile strength in spalling tests and this contribution becomes increasingly prominent with the increase of the imposed strain rates. On the other hand, the structure inertial and the micro-crack inertial have little effect on the increase of spalling strength of concrete and thus may be ignored within the imposed strain rate range in spalling tests.</p
A Holistic Analysis of Internet of Things (IoT) Security : Principles, Practices, and New Perspectives
Peer reviewedPublisher PD
New Signal and Algorithms for 5G/6G High Precision Train Positioning in Tunnel with Leaky Coaxial Cable
High precision train positioning is a crucial component of intelligent transportation systems. Tunnels are commonly encountered in subways and mountainous regions. As part of the communication system infrastructure, Leaky CoaXial (LCX) Cable is widely equipped as antenna in tunnels with many advantages. LCX positioning holds great promise as a technology for rail applications in the upcoming B5G (beyond-5G) and 6G eras. This paper focuses on the LCX positioning methodology and proposes two novel algorithms along with a novel communication-positioning integration signal. Firstly, a novel algorithm called Multiple Slot Distinction (MSD) LCX positioning algorithm is proposed. The algorithm utilizes a generated pseudo spectrum to fully utilize the coupled signals radiated from different slots of LCX. This approach offers higher time resolution compared to traditional methods. To further improve the positioning accuracy to centimeter-level and increase the measuring frequency for fast trains, a novel communication-positioning integration signal is designed. It consists of traditional Positioning Reference Signal (PRS) and a significantly low power Fine Ranging Signal (FRS). FRS is configured to be continuous and superposed onto the cellular signal using Non-Orthogonal Multiple Access (NOMA) principle to minimize its interference to communication. A two-stage LCX positioning method is then executed: At the first stage, the closest slot between the receiver and LCX is estimated by the proposed MSD algorithm using PRS; At the second stage, centimeter-level positioning is achieved by tracking the carrier phase of the continuous FRS. This process is assisted by the closest slot estimation, which helps mitigate interference between neighboring slots and eliminate the integer ambiguities. Simulation results show our proposed LCX position methodology outperforms the existing ones and offer great potentials for future implementations
An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution
Searchable Symmetric Encryption (SSE) has come to be as an integral cryptographic approach in a world where digital privacy is essential. The capacity to search through encrypted data whilst maintaining its integrity meets the most important demand for security and confidentiality in a society that is increasingly dependent on cloud-based services and data storage. SSE offers efficient processing of queries over encrypted datasets, allowing entities to comply with data privacy rules while preserving database usability. Our research goes into this need, concentrating on the development and thorough testing of an SSE system based on Curtmolaâs architecture and employing Advanced Encryption Standard (AES) in Cypher Block Chaining (CBC) mode. A primary goal of the research is to conduct a thorough evaluation of the security and performance of the system. In order to assess search performance, a variety of database settings were extensively tested, and the system's security was tested by simulating intricate threat scenarios such as count attacks and leakage abuse. The efficiency of operation and cryptographic robustness of the SSE system are critically examined by these reviews
Predicting incident heart failure from population-based nationwide electronic health records: protocol for a model development and validation study
Introduction Heart failure (HF) is increasingly common and associated with excess morbidity, mortality, and healthcare costs. Treatment of HF can alter the disease trajectory and reduce clinical events in HF. However, many cases of HF remain undetected until presentation with more advanced symptoms, often requiring hospitalisation. Predicting incident HF is challenging and statistical models are limited by performance and scalability in routine clinical practice. An HF prediction model implementable in nationwide electronic health records (EHRs) could enable targeted diagnostics to enable earlier identification of HF.
Methods and analysis We will investigate a range of development techniques (including logistic regression and supervised machine learning methods) on routinely collected primary care EHRs to predict risk of new-onset HF over 1, 5 and 10 years prediction horizons. The Clinical Practice Research Datalink (CPRD)-GOLD dataset will be used for derivation (training and testing) and the CPRD-AURUM dataset for external validation. Both comprise large cohorts of patients, representative of the population of England in terms of age, sex and ethnicity. Primary care records are linked at patient level to secondary care and mortality data. The performance of the prediction model will be assessed by discrimination, calibration and clinical utility. We will only use variables routinely accessible in primary care.
Ethics and dissemination Permissions for CPRD-GOLD and CPRD-AURUM datasets were obtained from CPRD (ref no: 21_000324). The CPRD ethical approval committee approved the study. The results will be submitted as a research paper for publication to a peer-reviewed journal and presented at peer-reviewed conferences.
Trial registration details The study was registered on Clinical Trials.gov (NCT 05756127). A systematic review for the project was registered on PROSPERO (registration number: CRD42022380892)
LIPIcs, Volume 251, ITCS 2023, Complete Volume
LIPIcs, Volume 251, ITCS 2023, Complete Volum
- âŠ