CINXE.COM
Search results for: 4-to-1 decryption failure
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: 4-to-1 decryption failure</title> <meta name="description" content="Search results for: 4-to-1 decryption failure"> <meta name="keywords" content="4-to-1 decryption failure"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="4-to-1 decryption failure" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="4-to-1 decryption failure"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2431</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: 4-to-1 decryption failure</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2431</span> Overcoming 4-to-1 Decryption Failure of the Rabin Cryptosystem</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Rezal%20Kamel%20Ariffin">Muhammad Rezal Kamel Ariffin</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Asyraf%20Asbullah"> Muhammad Asyraf Asbullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The square root modulo problem is a known primitive in designing an asymmetric cryptosystem. It was first attempted by Rabin. Decryption failure of the Rabin cryptosystem caused by the 4-to-1 decryption output is overcome efficiently in this work. The proposed scheme to overcome the decryption failure issue (known as the AAβ-cryptosystem) is constructed using a simple mathematical structure, it has low computational requirements and would enable communication devices with low computing power to deploy secure communication procedures efficiently. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rabin%20cryptosystem" title="Rabin cryptosystem">Rabin cryptosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure" title=" 4-to-1 decryption failure"> 4-to-1 decryption failure</a>, <a href="https://publications.waset.org/abstracts/search?q=square%20root%20modulo%20problem" title=" square root modulo problem"> square root modulo problem</a>, <a href="https://publications.waset.org/abstracts/search?q=integer%20factorization%20problem" title=" integer factorization problem"> integer factorization problem</a> </p> <a href="https://publications.waset.org/abstracts/21804/overcoming-4-to-1-decryption-failure-of-the-rabin-cryptosystem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21804.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2430</span> Evolutionary Methods in Cryptography </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wafa%20Slaibi%20Alsharafat">Wafa Slaibi Alsharafat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Genetic algorithms (GA) are random algorithms as random numbers that are generated during the operation of the algorithm determine what happens. This means that if GA is applied twice to optimize exactly the same problem it might produces two different answers. In this project, we propose an evolutionary algorithm and Genetic Algorithm (GA) to be implemented in symmetric encryption and decryption. Here, user's message and user secret information (key) which represent plain text to be transferred into cipher text. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GA" title="GA">GA</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=crossover" title=" crossover"> crossover</a> </p> <a href="https://publications.waset.org/abstracts/21507/evolutionary-methods-in-cryptography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2429</span> A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mabrouka%20Algherinai">Mabrouka Algherinai</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Karkouri"> Fatma Karkouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SMS" title="SMS">SMS</a>, <a href="https://publications.waset.org/abstracts/search?q=RSA" title=" RSA"> RSA</a>, <a href="https://publications.waset.org/abstracts/search?q=McEliece" title=" McEliece"> McEliece</a>, <a href="https://publications.waset.org/abstracts/search?q=RABIN" title=" RABIN"> RABIN</a> </p> <a href="https://publications.waset.org/abstracts/97665/a-comparative-analysis-of-asymmetric-encryption-schemes-on-android-messaging-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97665.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">163</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2428</span> An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Belmeguenai">A. Belmeguenai</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Mansouri"> K. Mansouri</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Djemili"> R. Djemili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20filter%20generator" title="nonlinear filter generator">nonlinear filter generator</a>, <a href="https://publications.waset.org/abstracts/search?q=stream%20ciphers" title=" stream ciphers"> stream ciphers</a>, <a href="https://publications.waset.org/abstracts/search?q=speech%20encryption" title=" speech encryption"> speech encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20analysis" title=" security analysis"> security analysis</a> </p> <a href="https://publications.waset.org/abstracts/39095/an-algorithm-based-on-the-nonlinear-filter-generator-for-speech-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39095.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2427</span> Statistical Analysis of Failure Cases in Aerospace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20H.%20Lv">J. H. Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20Z.%20Wang"> W. Z. Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=S.W.%20Liu"> S.W. Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The major concern in the aviation industry is the flight safety. Although great effort has been put onto the development of material and system reliability, the failure cases of fatal accidents still occur nowadays. Due to the complexity of the aviation system, and the interaction among the failure components, the failure analysis of the related equipment is a little difficult. This study focuses on surveying the failure cases in aviation, which are extracted from failure analysis journals, including Engineering Failure Analysis and Case studies in Engineering Failure Analysis, in order to obtain the failure sensitive factors or failure sensitive parts. The analytical results show that, among the failure cases, fatigue failure is the largest in number of occurrence. The most failed components are the disk, blade, landing gear, bearing, and fastener. The frequently failed materials consist of steel, aluminum alloy, superalloy, and titanium alloy. Therefore, in order to assure the safety in aviation, more attention should be paid to the fatigue failures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aerospace" title="aerospace">aerospace</a>, <a href="https://publications.waset.org/abstracts/search?q=disk" title=" disk"> disk</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20analysis" title=" failure analysis"> failure analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=fatigue" title=" fatigue"> fatigue</a> </p> <a href="https://publications.waset.org/abstracts/77819/statistical-analysis-of-failure-cases-in-aerospace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2426</span> Implementation of Achterbahn-128 for Images Encryption and Decryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aissa%20Belmeguenai">Aissa Belmeguenai</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Mansouri"> Khaled Mansouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Achterbahn-128" title="Achterbahn-128">Achterbahn-128</a>, <a href="https://publications.waset.org/abstracts/search?q=stream%20cipher" title=" stream cipher"> stream cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20encryption" title=" image encryption"> image encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20analysis" title=" security analysis"> security analysis</a> </p> <a href="https://publications.waset.org/abstracts/20401/implementation-of-achterbahn-128-for-images-encryption-and-decryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20401.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">532</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2425</span> Failure Localization of Bipolar Integrated Circuits by Implementing Active Voltage Contrast</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yiqiang%20Ni">Yiqiang Ni</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuanlong%20Chen"> Xuanlong Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Enliang%20Li"> Enliang Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Linting%20Zheng"> Linting Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Shizheng%20Yang"> Shizheng Yang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bipolar ICs are playing an important role in military applications, mainly used in logic gates, such as inverter and NAND gate. The defect of metal break located on the step is one of the main failure mechanisms of bipolar ICs, resulting in open-circuit or functional failure. In this situation, general failure localization methods like optical beam-induced resistance change (OBIRCH) and photon emission microscopy (PEM) might not be fully effective. However, active voltage contrast (AVC) can be used as a voltage probe, which may pinpoint the incorrect potential and thus locate the failure position. Two case studies will be present in this paper on how to implement AVC for failure localization, and the detailed failure mechanism will be discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bipolar%20IC" title="bipolar IC">bipolar IC</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20localization" title=" failure localization"> failure localization</a>, <a href="https://publications.waset.org/abstracts/search?q=metal%20break" title=" metal break"> metal break</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20failure" title=" open failure"> open failure</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20contrast" title=" voltage contrast"> voltage contrast</a> </p> <a href="https://publications.waset.org/abstracts/132527/failure-localization-of-bipolar-integrated-circuits-by-implementing-active-voltage-contrast" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132527.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">291</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2424</span> A Universal Approach to Categorize Failures in Production</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Konja%20Kn%C3%BCppel">Konja Knüppel</a>, <a href="https://publications.waset.org/abstracts/search?q=Gerrit%20Meyer"> Gerrit Meyer</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Nyhuis"> Peter Nyhuis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The increasing interconnectedness and complexity of production processes raise the susceptibility of production systems to failure. Therefore, the ability to respond quickly to failures is increasingly becoming a competitive factor. The research project "Sustainable failure management in manufacturing SMEs" is developing a methodology to identify failures in the production and select preventive and reactive measures in order to correct failures and to establish sustainable failure management systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=failure%20categorization" title="failure categorization">failure categorization</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20management" title=" failure management"> failure management</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20performance" title=" logistic performance"> logistic performance</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20optimization" title=" production optimization"> production optimization</a> </p> <a href="https://publications.waset.org/abstracts/2637/a-universal-approach-to-categorize-failures-in-production" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2423</span> Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20B.%20R.%20Hazarika">A. B. R. Hazarika</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=encryption" title="encryption">encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=decryption" title=" decryption"> decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20protocol" title=" internet protocol"> internet protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=microwave" title=" microwave"> microwave</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20telephony" title=" mobile telephony"> mobile telephony</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20key%20encryption" title=" quantum key encryption"> quantum key encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20dots" title=" quantum dots"> quantum dots</a> </p> <a href="https://publications.waset.org/abstracts/89901/quantum-dots-with-microwave-propagation-in-future-quantum-internet-protocol-for-mobile-telephony" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89901.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2422</span> The Influence of Winding Angle on Functional Failure of FRP Pipes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roham%20Rafiee">Roham Rafiee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadi%20Hesamsadat"> Hadi Hesamsadat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, a parametric finite element modeling is developed to analyze failure modes of FRP pipes subjected to internal pressure. First-ply failure pressure and functional failure pressure was determined by a progressive damage modeling and then it is validated using experimental observations. The influence of both winding angle and fiber volume fraction is studied on the functional failure of FRP pipes and it corresponding pressure. It is observed that despite the fact that increasing fiber volume fraction will enhance the mechanical properties, it will be resulted in lower values for functional failure pressure. This shortcoming can be compensated by modifying the winding angle in angle plies of pipe wall structure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=composite%20pipe" title="composite pipe">composite pipe</a>, <a href="https://publications.waset.org/abstracts/search?q=functional%20failure" title=" functional failure"> functional failure</a>, <a href="https://publications.waset.org/abstracts/search?q=progressive%20modeling" title=" progressive modeling"> progressive modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=winding%20angle" title=" winding angle"> winding angle</a> </p> <a href="https://publications.waset.org/abstracts/1399/the-influence-of-winding-angle-on-functional-failure-of-frp-pipes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1399.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">545</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2421</span> An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lee%20Feng%20Koo">Lee Feng Koo</a>, <a href="https://publications.waset.org/abstracts/search?q=Tze%20Jin%20Wong"> Tze Jin Wong</a>, <a href="https://publications.waset.org/abstracts/search?q=Pang%20Hung%20Yiu"> Pang Hung Yiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Nik%20Mohd%20Asri%20Nik%20Long"> Nik Mohd Asri Nik Long</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decryption" title="decryption">decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve" title=" elliptic curve"> elliptic curve</a>, <a href="https://publications.waset.org/abstracts/search?q=greater%20common%20divisor" title=" greater common divisor"> greater common divisor</a> </p> <a href="https://publications.waset.org/abstracts/97382/an-attack-on-the-lucas-based-el-gamal-cryptosystem-in-the-elliptic-curve-group-over-finite-field-using-greater-common-divisor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2420</span> Failure Cases Analysis in Petrochemical Industry</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20W.%20Liu">S. W. Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20H.%20Lv"> J. H. Lv</a>, <a href="https://publications.waset.org/abstracts/search?q=W.%20Z.%20Wang"> W. Z. Wang </a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the failure accidents in petrochemical industry have been frequent, and have posed great security problems in personnel and property. The improvement of petrochemical safety is highly requested in order to prevent re-occurrence of severe accident. This study focuses on surveying the failure cases occurred in petrochemical field, which were extracted from journals of engineering failure, including engineering failure analysis and case studies in engineering failure analysis. The relation of failure mode, failure mechanism, type of components, and type of materials was analyzed in this study. And the analytical results showed that failures occurred more frequently in vessels and piping among the petrochemical equipment. Moreover, equipment made of carbon steel and stainless steel accounts for the majority of failures compared to other materials. This may be related to the application of the equipment and the performance of the material. In addition, corrosion failures were the largest in number of occurrence in the failure of petrochemical equipment, in which stress corrosion cracking accounts for a large proportion. This may have a lot to do with the service environment of the petrochemical equipment. Therefore, it can be concluded that the corrosion prevention of petrochemical equipment is particularly important. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cases%20analysis" title="cases analysis">cases analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion" title=" corrosion"> corrosion</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=petrochemical%20industry" title=" petrochemical industry"> petrochemical industry</a> </p> <a href="https://publications.waset.org/abstracts/77797/failure-cases-analysis-in-petrochemical-industry" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77797.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2419</span> Performance Assessment of Three Unit Redundant System with Environmental and Human Failure Using Copula Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have studied the reliability measures of a system, which consists of two subsystems i.e. subsystem-1 and subsystem-2 in series configuration under different types of failure. The subsystem-1 has three identical units in parallel configuration and operating under 2-out-of-3: G policy and connected to subsystem-2 in series configuration. Each subsystem has different types of failure and repair rates. An important cause for failure of system is unsuitability of the environmental conditions, like overheating, weather conditions, heavy rainfall, storm etc. The environmental failure is taken into account in the proposed repairable system. Supplementary variable technique is used to study of system and some traditional measures such as; availability, reliability, MTTF and profit function are obtained for different values of parameters. In the proposed model, some particular cases of failure rates are explicitly studied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20failure" title="environmental failure">environmental failure</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20failure" title=" human failure"> human failure</a>, <a href="https://publications.waset.org/abstracts/search?q=availability" title=" availability"> availability</a>, <a href="https://publications.waset.org/abstracts/search?q=MTTF" title=" MTTF"> MTTF</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=profit%20analysis" title=" profit analysis"> profit analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a> </p> <a href="https://publications.waset.org/abstracts/46343/performance-assessment-of-three-unit-redundant-system-with-environmental-and-human-failure-using-copula-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46343.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2418</span> A Failure Investigations of High-Temperature Hydrogen Attack at Plat Forming Unit Furnace Elbow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Altoumi%20Alndalusi">Altoumi Alndalusi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> High-temperature hydrogen attack (HTHA) failure is the common phenomena at elevated temperature in hydrogen environment in oil and gas field. The failure occurred once after four years at the internal surface of Platforming elbow. Both visual and microscopic examinations revealed that the failure was initiated due to blistering forming followed by large cracking at the inner surface. Crack morphology showed that the crack depth was about 50% of material wall thickness and its behavior generally was intergranular. This study concluded that the main reason led to failure due to incorrect material selection comparing to the platforming conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decarburization" title="decarburization">decarburization</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20affected%20zone" title=" heat affected zone"> heat affected zone</a>, <a href="https://publications.waset.org/abstracts/search?q=morphology" title=" morphology"> morphology</a>, <a href="https://publications.waset.org/abstracts/search?q=partial%20pressure" title=" partial pressure"> partial pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=plate%20form" title=" plate form"> plate form</a> </p> <a href="https://publications.waset.org/abstracts/97396/a-failure-investigations-of-high-temperature-hydrogen-attack-at-plat-forming-unit-furnace-elbow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97396.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2417</span> Overview on the Failure in the Multiphase Mechanical Seal in Centrifugal Pumps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aydin%20Azizi">Aydin Azizi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Al.%20Azizi"> Ahmed Al. Azizi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mechanical seals are essential components in centrifugal pumps since they help in controlling leaking out of the liquid that is pumped under pressure. Unlike the common types of packaging, mechanical seals are highly efficient and they reduce leakage by a great extent. However, all multiphase mechanical seals leak and they are subject to failure. Some of the factors that have been recognized to their failure include excessive heating, open seal faces, as well as environment related factors that trigger failure of the materials used to manufacture seals. The proposed research study will explore the failure of multiphase mechanical seal in centrifugal pumps. The objective of the study includes how to reduce the failure in multiphase mechanical seals and to make them more efficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mechanical%20seals" title="mechanical seals">mechanical seals</a>, <a href="https://publications.waset.org/abstracts/search?q=centrifugal%20pumps" title=" centrifugal pumps"> centrifugal pumps</a>, <a href="https://publications.waset.org/abstracts/search?q=multi%20phase%20failure" title=" multi phase failure"> multi phase failure</a>, <a href="https://publications.waset.org/abstracts/search?q=excessive%20heating" title=" excessive heating"> excessive heating</a> </p> <a href="https://publications.waset.org/abstracts/44065/overview-on-the-failure-in-the-multiphase-mechanical-seal-in-centrifugal-pumps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2416</span> Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Misha%20Alexander">Misha Alexander</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20B.%20Waykar"> S. B. Waykar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decryption" title="decryption">decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20visual%20secret%20sharing" title=" natural visual secret sharing"> natural visual secret sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20images" title=" natural images"> natural images</a>, <a href="https://publications.waset.org/abstracts/search?q=noisy%20share" title=" noisy share"> noisy share</a>, <a href="https://publications.waset.org/abstracts/search?q=pixel%20swapping" title=" pixel swapping"> pixel swapping</a> </p> <a href="https://publications.waset.org/abstracts/33268/secret-sharing-in-visual-cryptography-using-nvss-and-data-hiding-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2415</span> A Bathtub Curve from Nonparametric Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eduardo%20C.%20Guardia">Eduardo C. Guardia</a>, <a href="https://publications.waset.org/abstracts/search?q=Jose%20W.%20M.%20Lima"> Jose W. M. Lima</a>, <a href="https://publications.waset.org/abstracts/search?q=Afonso%20H.%20M.%20Santos"> Afonso H. M. Santos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a nonparametric method to obtain the hazard rate “Bathtub curve” for power system components. The model is a mixture of the three known phases of a component life, the decreasing failure rate (DFR), the constant failure rate (CFR) and the increasing failure rate (IFR) represented by three parametric Weibull models. The parameters are obtained from a simultaneous fitting process of the model to the Kernel nonparametric hazard rate curve. From the Weibull parameters and failure rate curves the useful lifetime and the characteristic lifetime were defined. To demonstrate the model the historic time-to-failure of distribution transformers were used as an example. The resulted “Bathtub curve” shows the failure rate for the equipment lifetime which can be applied in economic and replacement decision models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bathtub%20curve" title="bathtub curve">bathtub curve</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20analysis" title=" failure analysis"> failure analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=lifetime%20estimation" title=" lifetime estimation"> lifetime estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=parameter%20estimation" title=" parameter estimation"> parameter estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=Weibull%20distribution" title=" Weibull distribution"> Weibull distribution</a> </p> <a href="https://publications.waset.org/abstracts/10780/a-bathtub-curve-from-nonparametric-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10780.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">445</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2414</span> Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Singh">V. V. Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=linux%20operating%20system" title=" linux operating system"> linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable "> supplementary variable </a> </p> <a href="https://publications.waset.org/abstracts/33606/performance-analysis-of-linux-operating-system-connected-in-lan-using-gumbel-hougaard-family-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2413</span> Implantology Failure: Epidemiological Survey among Tunisian Dentists</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faten%20Khanfir">Faten Khanfir</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Tlili"> Mohamed Tlili</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Medeb%20Hamrouni"> Ali Medeb Hamrouni</a>, <a href="https://publications.waset.org/abstracts/search?q=Raki%20Selmi"> Raki Selmi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20S.%20Khalfi"> M. S. Khalfi</a>, <a href="https://publications.waset.org/abstracts/search?q=Faten%20Ben%20Amor"> Faten Ben Amor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: dental implant failure is a major concern for the clinician and the patient. Objectives: The aim of our study is to investigate the way in which 100 Tunisian dentists carried implant treatment for their patients from the early phase of planning and selection of patients to the placement of the implant in order to look for the implant failure factors. Results: significant correlations were found between failure rates > 5 and their corresponding factors as the number of implants placed (p = 0.001<0, 05), smoking (0.046 <0.05), unbalanced diabetes (0.03<0.05), aseptic protocol (= 0.004< 0.05) and the drilling speed (0,002<0.05) Conclusion: It seems that the number of implant placed, smoking, diabetes, aseptic protocol, and the drilling speed may contribute to dental implant failure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=failure" title="failure">failure</a>, <a href="https://publications.waset.org/abstracts/search?q=implants" title=" implants"> implants</a>, <a href="https://publications.waset.org/abstracts/search?q=survey" title=" survey"> survey</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=osseointegration" title=" osseointegration"> osseointegration</a> </p> <a href="https://publications.waset.org/abstracts/144098/implantology-failure-epidemiological-survey-among-tunisian-dentists" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144098.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2412</span> Image Encryption Using Eureqa to Generate an Automated Mathematical Key</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Halima%20Adel%20Halim%20Shnishah">Halima Adel Halim Shnishah</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Mulvaney"> David Mulvaney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20encryption%20algorithms" title="image encryption algorithms">image encryption algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=Eureqa" title=" Eureqa"> Eureqa</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20measurements" title=" statistical measurements"> statistical measurements</a>, <a href="https://publications.waset.org/abstracts/search?q=automated%20key%20generation" title=" automated key generation"> automated key generation</a> </p> <a href="https://publications.waset.org/abstracts/79042/image-encryption-using-eureqa-to-generate-an-automated-mathematical-key" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79042.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2411</span> Stochastic Analysis of Linux Operating System through Copula Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Vir%20Singh">Vijay Vir Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work is focused studying the Linux operating system connected in a LAN (local area network). The STAR topology (to be called subsystem-1) and BUS topology (to be called subsystem-2) are taken into account, which are placed at two different locations and connected to a server through a hub. In the both topologies BUS topology and STAR topology, we have assumed n clients. The system has two types of failures i.e. partial failure and complete failure. Further, the partial failure has been categorized as minor and major partial failure. It is assumed that the minor partial failure degrades the sub-systems and the major partial failure make the subsystem break down mode. The system may completely fail due to failure of server hacking and blocking etc. The system is studied using supplementary variable technique and Laplace transform by using different types of failure and two types of repair. The various measures of reliability for example, availability of system, reliability of system, MTTF, profit function for different parametric values have been discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title="star topology">star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20topology" title=" bus topology"> bus topology</a>, <a href="https://publications.waset.org/abstracts/search?q=blocking" title=" blocking"> blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=hacking" title=" hacking"> hacking</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux%20operating%20system" title=" Linux operating system"> Linux operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=Gumbel-Hougaard%20family%20copula" title=" Gumbel-Hougaard family copula"> Gumbel-Hougaard family copula</a>, <a href="https://publications.waset.org/abstracts/search?q=supplementary%20variable" title=" supplementary variable"> supplementary variable</a> </p> <a href="https://publications.waset.org/abstracts/48060/stochastic-analysis-of-linux-operating-system-through-copula-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2410</span> A Partially Accelerated Life Test Planning with Competing Risks and Linear Degradation Path under Tampered Failure Rate Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fariba%20Azizi">Fariba Azizi</a>, <a href="https://publications.waset.org/abstracts/search?q=Firoozeh%20Haghighi"> Firoozeh Haghighi</a>, <a href="https://publications.waset.org/abstracts/search?q=Viliam%20Makis"> Viliam Makis</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a method to model the relationship between failure time and degradation for a simple step stress test where underlying degradation path is linear and different causes of failure are possible. It is assumed that the intensity function depends only on the degradation value. No assumptions are made about the distribution of the failure times. A simple step-stress test is used to shorten failure time of products and a tampered failure rate (TFR) model is proposed to describe the effect of the changing stress on the intensities. We assume that some of the products that fail during the test have a cause of failure that is only known to belong to a certain subset of all possible failures. This case is known as masking. In the presence of masking, the maximum likelihood estimates (MLEs) of the model parameters are obtained through an expectation-maximization (EM) algorithm by treating the causes of failure as missing values. The effect of incomplete information on the estimation of parameters is studied through a Monte-Carlo simulation. Finally, a real example is analyzed to illustrate the application of the proposed methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cause%20of%20failure" title="cause of failure">cause of failure</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20degradation%20path" title=" linear degradation path"> linear degradation path</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability%20function" title=" reliability function"> reliability function</a>, <a href="https://publications.waset.org/abstracts/search?q=expectation-maximization%20algorithm" title=" expectation-maximization algorithm"> expectation-maximization algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=intensity" title=" intensity"> intensity</a>, <a href="https://publications.waset.org/abstracts/search?q=masked%20data" title=" masked data"> masked data</a> </p> <a href="https://publications.waset.org/abstracts/70878/a-partially-accelerated-life-test-planning-with-competing-risks-and-linear-degradation-path-under-tampered-failure-rate-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70878.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2409</span> Fear-of-Failure and Woman Entrepreneurship: Comparative Analysis Austria Versus USA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magdalena%20Meusburger">Magdalena Meusburger</a>, <a href="https://publications.waset.org/abstracts/search?q=Caroline%20Hofer"> Caroline Hofer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement of woman entrepreneurship in the last decade has been a vital driver for social and economic development. Despite the positive evolution, women entrepreneurs are still underrepresented in entrepreneurial ecosystems. Fear-of-failure is a major factor affecting their entrepreneurial activity. This survey-based research focuses on aspiring and established entrepreneurial women in Austria and in the USA. It explores and compares the extent to which fear-of-failure influences their self-employment and their aspirations to become self-employed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=entrepreneurial%20ecosystems" title="entrepreneurial ecosystems">entrepreneurial ecosystems</a>, <a href="https://publications.waset.org/abstracts/search?q=fear-of-failure" title=" fear-of-failure"> fear-of-failure</a>, <a href="https://publications.waset.org/abstracts/search?q=female%20entrepreneurship" title=" female entrepreneurship"> female entrepreneurship</a>, <a href="https://publications.waset.org/abstracts/search?q=woman%20entrepreneurship" title=" woman entrepreneurship"> woman entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/154949/fear-of-failure-and-woman-entrepreneurship-comparative-analysis-austria-versus-usa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154949.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">364</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2408</span> The Struggle to teach/learn English as a Foreign Language in Turkiye: A Critical Report</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gizem%20Yilmazel">Gizem Yilmazel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Turkiye has been facing failure in English language teaching despite long years of English studies during mandatory education. A body of research studying the reasons of the failure in the literature exists yet the problem has not been solved and English language education is still a phenomenon in Turkiye. The failure is mostly attributed to the methods used in English education (Grammar Translation Method), lack of exposure to the language, inability to practice the language, financial difficulties, the belief of abroad experience necessity, national examinations, and conservative institutional policies. The findings are evident and tangible yet the problem persists. This paper aims to bring the issue a critical perspective and discuss the reasons of the failure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EFL" title="EFL">EFL</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20perspective" title=" critical perspective"> critical perspective</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20education" title=" language education"> language education</a> </p> <a href="https://publications.waset.org/abstracts/184730/the-struggle-to-teachlearn-english-as-a-foreign-language-in-turkiye-a-critical-report" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184730.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">54</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2407</span> Non-Circular Carbon Fiber Reinforced Polymers Chainring Failure Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Elmikaty">A. Elmikaty</a>, <a href="https://publications.waset.org/abstracts/search?q=Z.%20Thanawarothon"> Z. Thanawarothon</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Mezeix"> L. Mezeix</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a finite element model to simulate the teeth failure of non-circular composite chainring. Model consists of the chainring and a part of the chain. To reduce the size of the model, only the first 11 rollers are simulated. In order to validate the model, it is firstly applied to a circular aluminum chainring and evolution of the stress in the teeth is compared with the literature. Then, effect of the non-circular shape is studied through three different loading positions. Strength of non-circular composite chainring and failure scenario is investigated. Moreover, two composite lay-ups are proposed to observe the influence of the stacking. Results show that composite material can be used but the lay-up has a large influence on the strength. Finally, loading position does not have influence on the first composite failure that always occurs in the first tooth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CFRP" title="CFRP">CFRP</a>, <a href="https://publications.waset.org/abstracts/search?q=composite%20failure" title=" composite failure"> composite failure</a>, <a href="https://publications.waset.org/abstracts/search?q=FEA" title=" FEA"> FEA</a>, <a href="https://publications.waset.org/abstracts/search?q=non-circular%20chainring" title=" non-circular chainring"> non-circular chainring</a> </p> <a href="https://publications.waset.org/abstracts/76708/non-circular-carbon-fiber-reinforced-polymers-chainring-failure-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2406</span> Influence of Intelligence and Failure Mindsets on Parent's Failure Feedback</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Kalaouze">Sarah Kalaouze</a>, <a href="https://publications.waset.org/abstracts/search?q=Maxine%20Iannucelli"> Maxine Iannucelli</a>, <a href="https://publications.waset.org/abstracts/search?q=Kristen%20Dunfield"> Kristen Dunfield</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Children’s implicit beliefs regarding intelligence (i.e., intelligence mindsets) influence their motivation, perseverance, and success. Previous research suggests that the way parents perceive failure influences the development of their child’s intelligence mindsets. We invited 151 children-parent dyads (Age= 5–6 years) to complete a series of difficult puzzles over zoom. We assessed parents’ intelligence and failure mindsets using questionnaires and recorded parents’ person/performance-oriented (e.g., “you are smart” or "you were almost able to complete that one) and process-oriented (e.g., “you are trying really hard” or "maybe if you place the bigger pieces first") failure feedback. We were interested in observing the relation between parental mindsets and the type of feedback provided. We found that parents’ intelligence mindsets were not predictive of the feedback they provided children. Failure mindsets, on the other hand, were predictive of failure feedback. Parents who view failure-as-debilitating provided more person-oriented feedback, focusing on performance and personal ability. Whereas parents who view failure-as-enhancing provided process-oriented feedback, focusing on effort and strategies. Taken all together, our results allow us to determine that although parents might already have a growth intelligence mindset, they don’t necessarily have a failure-as-enhancing mindset. Parents adopting a failure-as-enhancing mindset would influence their children to view failure as a learning opportunity, further promoting practice, effort, and perseverance during challenging tasks. The focus placed on a child’s learning, rather than their performance, encourages them to perceive intelligence as malleable (growth mindset) rather than fix (fixed mindset). This implies that parents should not only hold a growth mindset but thoroughly understand their role in the transmission of intelligence beliefs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mindset%28s%29" title="mindset(s)">mindset(s)</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=parental%20feedback" title=" parental feedback"> parental feedback</a>, <a href="https://publications.waset.org/abstracts/search?q=parents" title=" parents"> parents</a> </p> <a href="https://publications.waset.org/abstracts/151326/influence-of-intelligence-and-failure-mindsets-on-parents-failure-feedback" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151326.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2405</span> Failure Analysis of Windshield Glass of Automobiles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bhupinder%20Kaur">Bhupinder Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20P.%20Pandey"> O. P. Pandey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An automobile industry is using variety of materials for better comfort and utility. The present work describes the details of failure analysis done for windshield glass of a four-wheeler class. The failure occurred in two different models of the heavy duty class of four wheelers, which analysed separately. The company reported that the failure has occurred only in their rear windshield when vehicles parked under shade for several days. These glasses were characterised by dilatometer, differential thermal analyzer, and X-ray diffraction. The glasses were further investigated under scanning electron microscope with energy dispersive X-ray spectroscopy and X-ray dot mapping. The microstructural analysis of the glasses done at the surface as well as at the fractured area indicates that carbon as an impurity got segregated as banded structure throughout the glass. Since carbon absorbs higher heat, it causes thermal mismatch to the entire glass system, and glass shattered down. In this work, the details of sequential analysis done to predict the cause of failure are present. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=failure" title="failure">failure</a>, <a href="https://publications.waset.org/abstracts/search?q=windshield" title=" windshield"> windshield</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20mismatch" title=" thermal mismatch"> thermal mismatch</a>, <a href="https://publications.waset.org/abstracts/search?q=carbon" title=" carbon"> carbon</a> </p> <a href="https://publications.waset.org/abstracts/122092/failure-analysis-of-windshield-glass-of-automobiles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122092.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2404</span> Binary Decision Diagram Based Methods to Evaluate the Reliability of Systems Considering Failure Dependencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siqi%20Qiu">Siqi Qiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yijian%20Zheng"> Yijian Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Xin%20Guo%20Ming"> Xin Guo Ming</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In many reliability and risk analysis, failures of components are supposed to be independent. However, in reality, the ignorance of failure dependencies among components may render the results of reliability and risk analysis incorrect. There are two principal ways to incorporate failure dependencies in system reliability and risk analysis: implicit and explicit methods. In the implicit method, failure dependencies can be modeled by joint probabilities, correlation values or conditional probabilities. In the explicit method, certain types of dependencies can be modeled in a fault tree as mutually independent basic events for specific component failures. In this paper, explicit and implicit methods based on BDD will be proposed to evaluate the reliability of systems considering failure dependencies. The obtained results prove the equivalence of the proposed implicit and explicit methods. It is found that the consideration of failure dependencies decreases the reliability of systems. This observation is intuitive, because more components fail due to failure dependencies. The consideration of failure dependencies helps designers to reduce the dependencies between components during the design phase to make the system more reliable. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reliability%20assessment" title="reliability assessment">reliability assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20dependencies" title=" failure dependencies"> failure dependencies</a>, <a href="https://publications.waset.org/abstracts/search?q=binary%20decision%20diagram" title=" binary decision diagram"> binary decision diagram</a> </p> <a href="https://publications.waset.org/abstracts/67235/binary-decision-diagram-based-methods-to-evaluate-the-reliability-of-systems-considering-failure-dependencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67235.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2403</span> Dissection of the Impact of Diabetes Type on Heart Failure across Age Groups: A Systematic Review of Publication Patterns on PubMed</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazanin%20Ahmadi%20Daryakenari">Nazanin Ahmadi Daryakenari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Diabetes significantly influences the risk of heart failure. The interplay between distinct types of diabetes, heart failure, and their distribution across various age groups remains an area of active exploration. This study endeavors to scrutinize the age group distribution in publications addressing Type 1 and Type 2 diabetes and heart failure on PubMed while also examining the evolving publication trends. Methods: We leveraged E-utilities and RegEx to search and extract publication data from PubMed using various mesh terms. Subsequently, we conducted descriptive statistics and t-tests to discern the differences between the two diabetes types and the distribution across age groups. Finally, we analyzed the temporal trends of publications concerning both types of diabetes and heart failure. Results: Our findings revealed a divergence in the age group distribution between Type 1 and Type 2 diabetes within heart failure publications. Publications discussing Type 2 diabetes and heart failure were more predominant among older age groups, whereas those addressing Type 1 diabetes and heart failure displayed a more balanced distribution across all age groups. The t-test revealed no significant difference in the means between the two diabetes types. However, the number of publications exploring the relationship between Type 2 diabetes and heart failure has seen a steady increase over time, suggesting an escalating interest in this area. Conclusion: The dissection of publication patterns on PubMed uncovers a pronounced association between Type 2 diabetes and heart failure within older age groups. This highlights the critical need to comprehend the distinct age group differences when examining diabetes and heart failure to inform and refine targeted prevention and treatment strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Type%201%20diabetes" title="Type 1 diabetes">Type 1 diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=Type%202%20diabetes" title=" Type 2 diabetes"> Type 2 diabetes</a>, <a href="https://publications.waset.org/abstracts/search?q=heart%20failure" title=" heart failure"> heart failure</a>, <a href="https://publications.waset.org/abstracts/search?q=age%20groups" title=" age groups"> age groups</a>, <a href="https://publications.waset.org/abstracts/search?q=publication%20patterns" title=" publication patterns"> publication patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=PubMed" title=" PubMed"> PubMed</a> </p> <a href="https://publications.waset.org/abstracts/174151/dissection-of-the-impact-of-diabetes-type-on-heart-failure-across-age-groups-a-systematic-review-of-publication-patterns-on-pubmed" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2402</span> Six Failure Points Innovators and Entrepreneurs Risk Falling into: An Exploratory Study of Underlying Emotions and Behaviors of Self- Perceived Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katarzyna%20Niewiadomska">Katarzyna Niewiadomska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many technology startups fail to achieve a worthwhile return on investment for their funders, founders, and employees. Failures in product development, to-market strategy, sales, and delivery are commonly recognized. Founder failures are not as obvious and harder to identify. This paper explores six critical failure points that entrepreneurs and innovators are susceptible to and aims to link their emotional intelligence and behavioral profile to the points at which they experienced self-perceived failure. A model of six failure points from the perspective of the technology entrepreneur ranging from pre-startup to maturity is provided. By analyzing emotional and behavioral profile data from entrepreneurs and recording in-person accounts, certain key emotional and behavioral clusters contributing to each failure point are determined, and several underlying factors are defined and discussed. Recommendations that support entrepreneurs and innovators stalling at each failure point are given. This work can enable stakeholders to evaluate founder emotional and behavioral profiles and to take risk-mitigating action, either through coaching or through more robust team creation, to avoid founder-related company failure. The paper will be of interest to investors funding startups, executives leading them and mentors supporting them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behavior" title="behavior">behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20intelligence" title=" emotional intelligence"> emotional intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneur" title=" entrepreneur"> entrepreneur</a>, <a href="https://publications.waset.org/abstracts/search?q=failure" title=" failure"> failure</a> </p> <a href="https://publications.waset.org/abstracts/80255/six-failure-points-innovators-and-entrepreneurs-risk-falling-into-an-exploratory-study-of-underlying-emotions-and-behaviors-of-self-perceived-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80255.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">229</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=81">81</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=82">82</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=4-to-1%20decryption%20failure&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>