Search results for: internal attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3041

Search results for: internal attack

2741 Haematological and Internal Organs Characteristics of Rabbit Bucks Feed Boiled Pigeon Pea (Cajanus Cajan) Seed Meal

Authors: N. S. Okoro

Abstract:

An experiment was conducted to determine the growth performance, blood parameters and reproductive characteristics of 8-week old male weaner rabbits fed 2% boiled pigeon pea seed meal. The study lasted for 16 weeks. Results showed that hematological parameters of the two groups of rabbit bucks were not significantly affected (p > 0.05) by the treatment, meaning that the PPSM was adequate for maintaining the blood parameters at the normal levels. The 20% boiled PPSM significantly affected (P < 0.05) serum Alanine Aminotransferase (ALT) (67.72±2.5 I.U/I) more than the ALT (57.50±2.02 I.U/I) of the control, which is an indication of liver problem. The globulin level (3.00 ± 0.23g/dl) of the 20% boiled PPSM group was significantly higher than that of the control (2.60±0.06 g/dl), indicating that the test diet did not alter protein metabolism in the rabbits. Boiled pigeon pea seed meal supported organ weight and testicular development in rabbit bucks, suggesting that boiling reduced the level of the anti-nutritional factors in pigeon pea seed meal. Thus, 20% boiled pigeon pea can be included in diets of rabbits without adverse effect on blood parameters and internal organs characteristics.

Keywords: hematology, internal organs, Pigeon pea, rabbits, serum biochemistry

Procedia PDF Downloads 395
2740 Effect of Damping on Performance of Magnetostrictive Vibration Energy Harvester

Authors: Mojtaba Ghodsi, Hamidreza Ziaifar, Morteza Mohammadzaheri, Payam Soltani

Abstract:

This article presents an analytical model to estimate the harvested power from a Magnetostrictive cantilevered beam with tip excitation. Furthermore, the effects of internal and external damping on harvested power are investigated. The magnetostrictive material in this harvester is Galfenol. In comparison to other popular smart materials like Terfenol-D, Galfenol has higher strength and machinability. In this article, first, a mechanical model of the Euler-Bernoulli beam is employed to calculate the deflection of the harvester. Then, the magneto-mechanical equation of Galfenol is combined with Faraday's law to calculate the generated voltage of the Magnetostrictive cantilevered beam harvester. Finally, the beam model is incorporated in the aforementioned combination. The results show that a 30×8.5×1 mm Galfenol cantilever beam harvester with 80 turn pickup coil can generate up to 3.7 mV and 9 mW. Furthermore, sensitivity analysis made by Response Surface Method (RSM) shows that the harvested power is only sensitive to the internal damping coefficient.

Keywords: internal damping coefficient, external damping coefficient, euler-bernoulli, energy harvester, galfenol, magnetostrictive, response surface method

Procedia PDF Downloads 113
2739 The Effect of Mechanical Stress on the Magnetic Structure and Properties of Ferromagnetic Microwires in Glass Insulation

Authors: N. N. Orlova, A. S. Aronin, Yu. P. Kabanov, S. I. Bozhko, V. S. Gornakov

Abstract:

We have investigated the change of the magnetic structure and the hysteresis properties of iron-based microwires after decreasing levels of internal mechanical stresses. The magnetic structure was investigated by the method of magneto-optical indicator film and the method of magnetic force microscopy. The hysteresis properties were studied by the vibrating sample magnetometer. The stresses were decreased by removing the glass coat and/or by low-temperature isothermal annealing. Previously, the authors carried out experimentally investigation of the magnetic structure of Fe-based microwire using these methods. According to the obtained results the domain structure of a microwire with a positive magnetostriction is composed of the inner cylindrical domains with the magnetization along the wire axis and the surface layer of the ring shape domains with the radial direction of magnetization. Surface ring domains with opposite magnetization direction (i.e., to the axis or from the axis) alternate with each other. For the first time the size of magnetic domains was determined experimentally. In this study it was found that in the iron-based microwires the value of the coercive force can be reduce more than twice by decreasing levels of internal mechanical stresses. Decrease of the internal stress value by the relaxation annealing influence on the magnetic structure. So in the as-prepared microwires observed local deviations of the magnetization of the magnetic core domains from the axis of the wire. After low-temperature annealing the local deviations of magnetization is not observed.

Keywords: amorphous microwire, magnetic structure, internal stress, hysteresis properties, ferromagnetic

Procedia PDF Downloads 569
2738 Modeling of Coupled Mechanical State and Diffusion in Composites with Impermeable Fibers

Authors: D. Gueribiz, F. Jacquemin, S. Fréour

Abstract:

During their service life, composite materials are submitted to humid environments. The moisture absorbed by their matrix polymer induced internal stresses which can lead to multi-scale damage and may reduce the lifetime of composite structures. The estimation of internal stresses is based at a first on realistic evaluation of the diffusive behavior of composite materials. Generally, the modeling and simulation of the diffusive behavior of composite materials are extensively investigated through decoupled models based on the assumption of Fickien behavior. For these approaches, the concentration and the deformation (or stresses), the two state variables of the problem considered are governed by independent equations which are solved separately. In this study, a model coupling diffusive behavior with stresses state for a polymer matrix composite reinforced with impermeable fibers is proposed, the investigation of diffusive behavior is based on a more general thermodynamic approach which introduces a dependence of diffusive behavior on internal stresses state. The coupled diffusive behavior modeling was established in first for homogeneous and isotropic matrix and it is, thereafter, extended to impermeable unidirectional composites.

Keywords: composites materials, moisture diffusion, effective moisture diffusivity, coupled moisture diffusion

Procedia PDF Downloads 308
2737 Successful Management of a Boy with Mild Persistent Asthma: A Longitudinal Case

Authors: A. Lubis, L. Setiawati, A. R. Setyoningrum, A. Suryawan, Irwanto

Abstract:

Asthma is a condition that causing chronic health problems in children. In addition to basic therapy against disease, we must try to reduce the impact of chronic health problems and also optimize their medical aspect of growth and development. A boy with mild asthma attack frequent episode did not showed any improvement with medical treatment and his asthma control test was 11. From radiologic examination he got hyperaerated lung and billateral sinusitis maxillaris; skin test results were house dust, food and pet allergy; an overweight body; bad school grades; psychological and environmental problem. We followed and evaluated this boy in 6 months, treated holistically. Even we could not do much on environmental but no more psychological and school problems, his on a good bodyweight and his asthma control test was 22. A case of a child with mild asthma attack frequent episode was reported. Asthma clinical course show no significant improvement when other predisposing factor is not well-controlled and a child’s growth and development may be affected. Improving condition of the patient can be created with the help of loving and caring way of nurturing from the parents and supportive peer group. Therefore, continuous and consistent monitoring is required because prognosis of asthma is generally good when regularly and properly controlled.

Keywords: asthma, chronic health problems, growth, development

Procedia PDF Downloads 229
2736 Underage Internal Migration from Rural to Urban Areas of Ethiopia: The Perspective of Social Marketing in Controlling Child Labor

Authors: Belaynesh Tefera, Ahmed Mohammed, Zelalem Bayisa

Abstract:

This study focuses on the issue of underage internal migration from rural to urban areas in Ethiopia, specifically in the context of child labor. It addresses the significant disparities in living standards between rural and urban areas, which motivate individuals from rural areas to migrate to urban areas in search of better economic opportunities. The study was conducted in Addis Ababa, where there is a high prevalence of underage internal migrants engaged in child labor due to extreme poverty in rural parts of the country. The aim of this study is to explore the life experiences of shoe-makers who have migrated from rural areas of Ethiopia to Addis Ababa. The focus is on understanding the factors that push these underage individuals to migrate, the challenges they face, and the implications for child labor. This study adopts a qualitative approach, using semistructured face-to-face interviews with underage migrants. A total of 27 interviews were conducted in Addis Ababa, Ethiopia, until the point of data saturation. The criteria for selecting interviewees include working as shoemakers and migrating to Addis Ababa underage, below 16 years old. The interviews were audio-taped, transcribed into Amharic, and then translated into English for analysis. The study reveals that the major push factors for underage internal migration are socioeconomic and environmental factors. Despite improvements in living standards for underage migrants and their families, there is a high prevalence of child labor and lack of access to education among them. Most interviewees migrated without the accompaniment of their family members and faced various challenges, including sleeping on the streets. This study highlights the role of social marketing in addressing the issues of underage internal migration and child labor. It suggests that social marketing can be an effective strategy to protect children from abuse, loneliness, and harassment during their migration process. The data collection involved conducting in-depth interviews with the underage migrants. The interviews were transcribed and translated for analysis. The analysis focused on identifying common themes and patterns within the interview data. The study addresses the factors contributing to underage internal migration, the challenges faced by underage migrants, the prevalence of child labor, and the potential role of social marketing in addressing these issues. The study concludes that although Ethiopia has policies against child internal migration, it is difficult to protect underage laborers who migrate from rural to urban areas due to the voluntary nature of their migration. The study suggests that social marketing can serve as a solution to protect children from abuse and other challenges faced during migration.

Keywords: underage, internal migration, social marketing, child labor, Ethiopia

Procedia PDF Downloads 78
2735 Second Order Cone Optimization Approach to Two-stage Network DEA

Authors: K. Asanimoghadam, M. Salahi, A. Jamalian

Abstract:

Data envelopment analysis is an approach to measure the efficiency of decision making units with multiple inputs and outputs. The structure of many decision making units also has decision-making subunits that are not considered in most data envelopment analysis models. Also, the inputs and outputs of the decision-making units usually are considered desirable, while in some real-world problems, the nature of some inputs or outputs are undesirable. In this thesis, we study the evaluation of the efficiency of two stage decision-making units, where some outputs are undesirable using two non-radial models, the SBM and the ASBM models. We formulate the nonlinear ASBM model as a second order cone optimization problem. Finally, we compare two models for both external and internal evaluation approaches for two real world example in the presence of undesirable outputs. The results show that, in both external and internal evaluations, the overall efficiency of ASBM model is greater than or equal to the overall efficiency value of the SBM model, and in internal evaluation, the ASBM model is more flexible than the SBM model.

Keywords: network DEA, conic optimization, undesirable output, SBM

Procedia PDF Downloads 194
2734 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 341
2733 Effects of Gender on Kinematics Kicking in Soccer

Authors: Abdolrasoul Daneshjoo

Abstract:

Soccer is a game which draws more attention in different countries especially in Brazil. Kicking among different skills in soccer and soccer players is an excellent role for the success and preference of a team. The way of point gaining in this game is passing the ball over the goal lines which are gained by shoot skill in attack time and or during the penalty kicks.Regarding the above assumption, identifying the effective factors in instep kicking in different distances shoot with maximum force and high accuracy or pass and penalty kick, may assist the coaches and players in raising qualitative level of performing the skill.The aim of the present study was to study of a few kinematical parameters in instep kicking from 5 and 7 meter distance among the male and female elite soccer players.24 right dominant lower limb subjects (12 males and 12 females) among Tehran elite soccer players with average and the standard deviation (22.5 ± 1.5) & (22.08± 1.31) years, height of (179.5 ± 5.81) & (164.3 ± 4.09) cm, weight of (69.66 ± 4.09) & (53.16 ± 3.51) kg, %BMI (21.06 ± .731) & (19.67 ± .709), having playing history of (4 ± .73) & (3.08 ± .66) years respectively participated in this study. They had at least two years of continuous playing experience in Tehran soccer league.For sampling player's kick; Kinemetrix Motion analysis with three cameras with 1000 Hz was used. Five reflective markers were placed laterally on the kicking leg over anatomical points (the iliac crest, major trochanter, lateral epicondyle of femur, lateral malleolus, and lateral aspect of distal head of the fifth metatarsus). Instep kick was filmed, with one step approach and 30 to 45 degrees angle from stationary ball. Three kicks were filmed, one kick selected for further analyses. Using Kinemetrix 3D motion analysis software, the position of the markers was analyzed. Descriptive statistics were used to describe the mean and standard deviation, while the analysis of variance, and independent t-test (P < 0.05) were used to compare the kinematic parameters between two genders.Among the evaluated parameters, the knee acceleration, the thigh angular velocity, the angle of knee proportionately showed significant relationship with consequence of kick. While company performance on 5m in 2 genders, significant differences were observed in internal – external displacement of toe, ankle, hip and the velocity of toe, ankle and the acceleration of toe and the angular velocity of pelvic, thigh and before time contact . Significant differences showed the internal – external displacement of toe, the ankle, the knee and the hip, the iliac crest and the velocity of toe, the ankle and acceleration of ankle and angular velocity of the pelvic and the knee.

Keywords: biomechanics, kinematics, instep kicking, soccer

Procedia PDF Downloads 502
2732 An MrPPG Method for Face Anti-Spoofing

Authors: Lan Zhang, Cailing Zhang

Abstract:

In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.

Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG

Procedia PDF Downloads 178
2731 Effect of Silt Presence on Shear Strength Parameters of Unsaturated Sandy Soils

Authors: R. Ziaie Moayed, E. Khavaninzadeh, M. Ghorbani Tochaee

Abstract:

Direct shear test is widely used in soil mechanics experiment to determine the shear strength parameters of granular soils. For analysis of soil stability problems such as bearing capacity, slope stability and lateral pressure on soil retaining structures, the shear strength parameters must be known well. In the present study, shear strength parameters are determined in silty-sand mixtures. Direct shear tests are performed on 161 Firoozkooh sand with different silt content at a relative density of 70% in three vertical stress of 100, 150, and 200 kPa. Wet tamping method is used for soil sample preparation, and the results include diagrams of shear stress versus shear deformation and sample height changes against shear deformation. Accordingly, in different silt percent, the shear strength parameters of the soil such as internal friction angle and dilation angle are calculated and compared. According to the results, when the sample contains up to 10% silt, peak shear strength and internal friction angle have an upward trend. However, if the sample contains 10% to 50% of silt a downward trend is seen in peak shear strength and internal friction angle.

Keywords: shear strength parameters, direct shear test, silty sand, shear stress, shear deformation

Procedia PDF Downloads 163
2730 Corporate Governance Role of Audit Committees in the Banking Sector: Evidence from Libya

Authors: Abdulaziz Abdulsaleh

Abstract:

This study aims at identifying the practices that should be taken into consideration by audit committees as a tool of corporate governance in Libyan commercial banks by investigating various perceptions on this topic. The study is based on a questionnaire submitted to audit committees ‘members at Libyan commercial banks, directors of internal audit departments as well as members of board of directors at these banks in addition to a number of external auditors and academic staff from Libyan universities. The study reveals that the role of audit committees has to be shifted from traditional areas of accounting to a broader role including functions related to financial reporting, audit planning, support the independence of internal and external auditors, acting as a channel of communication between external auditors and board of directors, reviewing external audit, and evaluating internal control systems. Although the study is a starting point in developing a framework of good audit committees’ practices in Libya, it is believed that the adoption of its results can result in enhancing the corporate governance practices not only in the banking sector but also in the entire corporate sector in Libya.

Keywords: audit committees, corporate governance, commercial banks, Libya

Procedia PDF Downloads 402
2729 Haematological and Internal Organs Characteristics of Rabbit Bucks Fed Boiled Pigeon Pea (Cajanus Cajan) Seed Meal

Authors: Nnennaya Samuel Okoro

Abstract:

An experiment was conducted to determine the growth performance, blood parameters and reproductive characteristics of 8-week old male weaner rabbits fed 20% boiled pigeon pea seed meal (PPSM). The study lasted for 16 weeks. Results showed that haematological parameters of the two groups of rabbit bucks were not significantly affected (P>0.05) by the treatment, meaning that the PPSM was adequate for maintaining the blood parameters at the normal levels. The 20% boiled PPSM significantly affected (P<0.05) serum Alanine Aminotransferase (ALT) (67.72±2.5 I.U/I) more than the ALT (57.50±2.02 I.U/I) of the control, which is an indication of liver problem. The globulin level (3.00 ± 0.23 g/d) of the 20% boiled PPSM group was significantly higher than that of the control (2.60±0.06 g/dl), indicating that the test diet did not alter protein metabolism in the rabbits. Boiled pigeon pea seed meal supported organ weight and testicular development in rabbit bucks, suggesting that boiling reduced the level of the anti-nutritional factors in pigeon pea seed meal. Thus, 20% boiled pigeon pea can be included in diets of rabbits without adverse effect on blood parameters and internal organs characteristics.

Keywords: haematology, internal organs, pigeon pea, rabbits, serum biochemistry

Procedia PDF Downloads 250
2728 Acculturation and Urban Related Identity of Turk and Kurd Internal Migrants

Authors: Melek Göregenli, Pelin Karakuş

Abstract:

This present study explored the acculturation strategies and urban related identity of Turk and Kurd internal migrants from different regions of Turkey who resettled in three big cities in the west. Besides we aimed at a comparative analysis of acculturation strategies and urban-related identity of voluntary and internally displaced Kurd migrants. Particularly we explored the role of migration type, satisfaction with migration decision, urban-related identity and several socio demographic variables as predictors of Kurds’ integration strategy preference. The sample consisted of 412 adult participants from Izmir (64 females, 86 males); Ankara (76 females, 75 males); and Istanbul (43 females, 64 males and four unreported). In terms of acculturation strategies, assimilation was found to be the most preferred acculturation attitude among Turks whereas separation was found to be most endorsed acculturation attitude among Kurds. The migrants in Izmir were found to prefer assimilation whereas the migrants in Ankara prefer separation. Concerning urban-related identity mean scores, Turks reported higher urban-related identity scores than Kurds. Furthermore the internal migrants in Izmir were found to score higher in urban-related identity than the migrants living in Istanbul and Ankara. The results of the regression analysis revealed that gender, length of residence and migration type were the significant predictors of integration preference of Kurds. Thus, whereas gender and migration type had significant negative associations; length of residence had positive significant associations with Kurds integration preference. Compared to female Kurds, male Kurds were found to be more integrated. Furthermore, voluntary Kurd migrants were more favour of integration than internally displaced Kurds. The findings supported the significant associations between acculturation strategies and urban-related identity with either group.

Keywords: acculturation, forced migration, internal displacement, internal migration, Turkey, urban-related identity

Procedia PDF Downloads 363
2727 Parametric Analysis of Syn-gas Fueled SOFC with Internal Reforming

Authors: Sanjay Tushar Choudhary

Abstract:

This paper focuses on the thermodynamic analysis of Solid Oxide Fuel Cell (SOFC). In the present work the SOFC has been modeled to work with internal reforming of fuel which takes place at high temperature and direct energy conversion from chemical energy to electrical energy takes place. The fuel-cell effluent is a high-temperature steam which can be used for co-generation purposes. Syn-gas has been used here as fuel which is essentially produced by steam reforming of methane in the internal reformer of the SOFC. A thermodynamic model of SOFC has been developed for planar cell configuration to evaluate various losses in the energy conversion process within the fuel cell. Cycle parameters like fuel utilization ratio and the air-recirculation ratio have been varied to evaluate the thermodynamic performance of the fuel cell. Output performance parameters like terminal voltage, cell-efficiency and power output have been evaluated for various values of current densities. It has been observed that a combination of a lower value of air-circulation ratio and higher values of fuel utilization efficiency gives a better overall thermodynamic performance.

Keywords: current density, SOFC, suel utilization factor, recirculation ratio

Procedia PDF Downloads 508
2726 An Analysis of Human Resource Management Policies for Constructing Employer Brands in the Logistics Sector

Authors: Müberra Yüksel, Ömer Faruk Görçün

Abstract:

The purpose of the present study is to investigate the role of strategic human resource management (SHRM) in constructing "employer branding" in logistics. Prior research does not focus on internal stakeholders, that is, employees. Despite the fact that logistic sector has become customer-oriented, the focus is solely on service quality as the unique aspect of logistic companies for competitive advantage. With an increasing interest lately in internal marketing of the employer brand, the emphasis is on the value that human capital brings to the firm which cannot be imitated. `Employer branding` has been the application of branding and relationship marketing principles for competitive advantage in SHRM. Employer branding is an organizing framework for human resource managers since it represents an organization’s efforts to promote, both within and outside, a coherent view of what makes the firm different and desirable as an employer, i.e., the distinct “employer brand personality” and "employee value propositions" (EVP) offered. The presumption of employer branding enhanced by internal marketing is to make customer-conscious employees to handle services better by being aligned with business mission and goals. Starting from internal customers and analyzing the gaps of EVP by using analytical hierarchy process methodology (AHP) and inquiring whether these brand values are communicated and conceived well may be the initial steps in our proposal for employer branding in logistics sector. This empirical study aims to fill this research gap within the context of an emergent market- Turkey, which is located at a hub of transportation and logistics.

Keywords: Strategic Human Resource Management (SHRM), employer branding, Employee Value Propositions (EVP), Analytical Hierarchy Process (AHP), logistics

Procedia PDF Downloads 343
2725 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview

Authors: Yasmeen Cheema, Parvinder Singh

Abstract:

The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.

Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack

Procedia PDF Downloads 230
2724 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 414
2723 Parental Perceptions and Practices toward Childhood Asthma

Authors: Amani K. Abu-Shaheen, Abdullah Nofal, Humariya Heena

Abstract:

Introduction: Parental perceptions and practices are important for improving the asthma outcomes in children; indeed, evidence shows that parents of asthmatic children harbor considerable misperceptions of the disease. Objective: To identify the prevalence of asthma and to investigate the perceptions and practices of parents toward asthma and its management in Saudi children. Methods: A two-stage cross-sectional survey of 2000 parents of children aged 3–15 years from schools located in all five districts of Riyadh province located in central Saudi Arabia, was conducted. Data collection was accomplished using a self-administered questionnaire based on information obtained from the literature. Results: Of 1450 children whose parents participated in the study, 600 had asthma, dyspnea, or chest allergy. The overall number of children with parental reports of ever having been diagnosed with asthma was 478 (32.9%). The majority of parents (321, 53.5%) believed that asthma was a hereditary disease. Of these parents, 361 (60.3%) were concerned about side effects of inhaled steroids, and 192 (32%) about development of dependency on asthma medications. Three hundred sixty seven (61.2%) parents reported that they could treat the asthma attack at home and almost 76% of parents went to pediatric emergency department during asthma attack. Conclusions: In this study, the overall prevalence of children whose parents reported that they were diagnosed with asthma was high (32.9%). Furthermore, parents of children with asthma had misperceptions regarding asthma and exhibited ineffective practices in its management. To improve asthma care and compliance, adequate education should be provided to parents.

Keywords: asthma, management, parents, quality of life

Procedia PDF Downloads 274
2722 The Complementary Effect of Internal Control System and Whistleblowing Policy on Prevention and Detection of Fraud in Nigerian Deposit Money Banks

Authors: Dada Durojaye Joshua

Abstract:

The study examined the combined effect of internal control system and whistle blowing policy while it pursues the following specific objectives, which are to: examine the relationship between monitoring activities and fraud’s detection and prevention; investigate the effect of control activities on fraud’s detection and prevention in Nigerian Deposit Money Banks (DMBs). The population of the study comprises the 89,275 members of staff in the 20 DMBs in Nigeria as at June 2019. Purposive and convenient sampling techniques were used in the selection of the 80 members of staff at the supervisory level of the Internal Audit Departments of the head offices of the sampled banks, that is, selecting 4 respondents (Audit Executive/Head, Internal Control; Manager, Operation Risk Management; Head, Financial Crime Control; the Chief Compliance Officer) from each of the 20 DMBs in Nigeria. A standard questionnaire was adapted from 2017/2018 Internal Control Questionnaire and Assessment, Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity. It was modified to serve the purpose for which it was meant to serve. It was self-administered to gather data from the 80 respondents at the respective headquarters of the sampled banks at their respective locations across Nigeria. Two likert-scales was used in achieving the stated objectives. A logit regression was used in analysing the stated hypotheses. It was found that effect of monitoring activities using the construct of conduct of ongoing or separate evaluation (COSE), evaluation and communication of deficiencies (ECD) revealed that monitoring activities is significant and positively related to fraud’s detection and prevention in Nigerian DMBS. So also, it was found that control activities using selection and development of control activities (SDCA), selection and development of general controls over technology to prevent financial fraud (SDGCTF), development of control activities that gives room for transparency through procedures that put policies into actions (DCATPPA) contributed to influence fraud detection and prevention in the Nigerian DMBs. In addition, it was found that transparency, accountability, reliability, independence and value relevance have significant effect on fraud detection and prevention ibn Nigerian DMBs. The study concluded that the board of directors demonstrated independence from management and exercises oversight of the development and performance of internal control. Part of the conclusion was that there was accountability on the part of the owners and preparers of the financial reports and that the system gives room for the members of staff to account for their responsibilities. Among the recommendations was that the management of Nigerian DMBs should create and establish a standard Internal Control System strong enough to deter fraud in order to encourage continuity of operations by ensuring liquidity, solvency and going concern of the banks. It was also recommended that the banks create a structure that encourages whistleblowing to complement the internal control system.

Keywords: internal control, whistleblowing, deposit money banks, fraud prevention, fraud detection

Procedia PDF Downloads 80
2721 Complementary Effect of Wistleblowing Policy and Internal Control System on Prevention and Detection of Fraud in Nigerian Deposit Money Banks

Authors: Dada Durojaye Joshua

Abstract:

The study examined the combined effect of internal control system and whistle blowing policy while it pursues the following specific objectives, which are to: examine the relationship between monitoring activities and fraud’s detection and prevention; investigate the effect of control activities on fraud’s detection and prevention in Nigerian Deposit Money Banks (DMBs). The population of the study comprises the 89,275 members of staff in the 20 DMBs in Nigeria as at June 2019. Purposive and convenient sampling techniques were used in the selection of the 80 members of staff at the supervisory level of the Internal Audit Departments of the head offices of the sampled banks, that is, selecting 4 respondents (Audit Executive/Head, Internal Control; Manager, Operation Risk Management; Head, Financial Crime Control; the Chief Compliance Officer) from each of the 20 DMBs in Nigeria. A standard questionnaire was adapted from 2017/2018 Internal Control Questionnaire and Assessment, Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity. It was modified to serve the purpose for which it was meant to serve. It was self-administered to gather data from the 80 respondents at the respective headquarters of the sampled banks at their respective locations across Nigeria. Two likert-scales was used in achieving the stated objectives. A logit regression was used in analysing the stated hypotheses. It was found that effect of monitoring activities using the construct of conduct of ongoing or separate evaluation (COSE), evaluation and communication of deficiencies (ECD) revealed that monitoring activities is significant and positively related to fraud’s detection and prevention in Nigerian DMBS. So also, it was found that control activities using selection and development of control activities (SDCA), selection and development of general controls over technology to prevent financial fraud (SDGCTF), development of control activities that gives room for transparency through procedures that put policies into actions (DCATPPA) contributed to influence fraud detection and prevention in the Nigerian DMBs. In addition, it was found that transparency, accountability, reliability, independence and value relevance have significant effect on fraud detection and prevention ibn Nigerian DMBs. The study concluded that the board of directors demonstrated independence from management and exercises oversight of the development and performance of internal control. Part of the conclusion was that there was accountability on the part of the owners and preparers of the financial reports and that the system gives room for the members of staff to account for their responsibilities. Among the recommendations was that the management of Nigerian DMBs should create and establish a standard Internal Control System strong enough to deter fraud in order to encourage continuity of operations by ensuring liquidity, solvency and going concern of the banks. It was also recommended that the banks create a structure that encourages whistleblowing to complement the internal control system.

Keywords: internal control, whistleblowing, deposit money banks, fraud prevention, fraud detection

Procedia PDF Downloads 72
2720 Effect of Packing Ratio on Fire Spread across Discrete Fuel Beds: An Experimental Analysis

Authors: Qianqian He, Naian Liu, Xiaodong Xie, Linhe Zhang, Yang Zhang, Weidong Yan

Abstract:

In the wild, the vegetation layer with exceptionally complex fuel composition and heterogeneous spatial distribution strongly affects the rate of fire spread (ROS) and fire intensity. Clarifying the influence of fuel bed structure on fire spread behavior is of great significance to wildland fire management and prediction. The packing ratio is one of the key physical parameters describing the property of the fuel bed. There is a threshold value of the packing ratio for ROS, but little is known about the controlling mechanism. In this study, to address this deficiency, a series of fire spread experiments were performed across a discrete fuel bed composed of some regularly arranged laser-cut cardboards, with constant wind speed and different packing ratios (0.0125-0.0375). The experiment aims to explore the relative importance of the internal and surface heat transfer with packing ratio. The dependence of the measured ROS on the packing ratio was almost consistent with the previous researches. The data of the radiative and total heat fluxes show that the internal heat transfer and surface heat transfer are both enhanced with increasing packing ratio (referred to as ‘Stage 1’). The trend agrees well with the variation of the flame length. The results extracted from the video show that the flame length markedly increases with increasing packing ratio in Stage 1. Combustion intensity is suggested to be increased, which, in turn, enhances the heat radiation. The heat flux data shows that the surface heat transfer appears to be more important than the internal heat transfer (fuel preheating inside the fuel bed) in Stage 1. On the contrary, the internal heat transfer dominates the fuel preheating mechanism when the packing ratio further increases (referred to as ‘Stage 2’) because the surface heat flux keeps almost stable with the packing ratio in Stage 2. As for the heat convection, the flow velocity was measured using Pitot tubes both inside and on the upper surface of the fuel bed during the fire spread. Based on the gas velocity distribution ahead of the flame front, it is found that the airflow inside the fuel bed is restricted in Stage 2, which can reduce the internal heat convection in theory. However, the analysis indicates not the influence of inside flow on convection and combustion, but the decreased internal radiation of per unit fuel is responsible for the decrease of ROS.

Keywords: discrete fuel bed, fire spread, packing ratio, wildfire

Procedia PDF Downloads 142
2719 The Effects of L-Arginine Supplementation on Clinical Symptoms, Quality of Life, and Anal Internal Sphincter Pressure in Patients with Chronic Anal Fissure

Authors: Masoumeh Khailghi Sikaroudi, Mohsen Masoodi, Fazad Shidfar, Meghdad Sedaghat

Abstract:

Background: The hypertonicity of internal anal sphincter resting pressure is one of the main reasons for chronic anal fissures. The aim of this study is to assess the effect of oral administration of L-arginine on anal fissure symptom improvement by relaxation of the internal anal sphincter. Method: Seventy-six chronic anal fissure patients (age: 18-65 years) took part in this randomized, double-blind, placebo-controlled trial study from February 2019 to October 2020 at Rasoul-e-Akram Hospital, Tehran, Iran. Participants were allocated into treatment (L-arginine) or placebo groups. They took a 1000 mg capsule three times a day for one month and were followed up at the end of the first and third months after receiving the intervention. Clinical symptoms, anal sphincter resting pressure, and quality of life (QoL) were completed at baseline and the end of the study. Result: The analysis of data was shown significant improvement in bleeding, fissure size, and pain within each group; however, this effect was more seen in the arginine group compared to the control group at the end of the study (P-values<0.001). Following that, a significant increase in QoL was seen just in patients who were treated with arginine (P-value=0.006). Also, the comparison of anal pressures to baseline and between groups at the end of the study showed a significant reduction in sphincter pressure in treated patients (P-value<0.001, =0.049; respectively). Conclusion: Oral administration of 3000 mg L-arginine can heal chronic anal fissures by reducing anal internal sphincter pressure with fewer side effects. However, a long-term study with more follow-up is recommended.

Keywords: L-arginine, anal fissure, sphincter pressure, clinical symptoms, quality of life

Procedia PDF Downloads 71
2718 A Negotiation Model for Understanding the Role of International Law in Foreign Policy Crises

Authors: William Casto

Abstract:

Studies that consider the actual impact of international law upon foreign affairs crises are flawed by an unrealistic model of decision making. The common, unexamined assumption is that a nation has a unitary executive or ruler who considers a wide variety of considerations, including international law, in attempting to resolve a crisis. To the extent that negotiation theory is considered, the focus is on negotiations between or among nations. The unsettling result is a shallow focus that concentrates on each country’s public posturing about international law. The country-to-country model ignores governments’ internal negotiations that lead to their formal position in a crisis. The model for foreign policy crises needs to be supplemented to include a model of internal negotiations. Important foreign policy decisions come from groups within a government committee, advisers, etc. Within these groups, participants may have differing agendas and resort to international law to bolster their positions. To understand the influence of international law in international crises, these internal negotiations must be considered. These negotiations are crucial to creating a foreign policy agenda or recommendations. External negotiations between the two nations are significant, but the internal negotiations provide a better understanding of the actual influence of international law upon international crises. Discovering the details of specific internal negotiations is quite difficult but not necessarily impossible. The present proposal will use a specific crisis to illustrate the role of international law. In 1861 during the American Civil War, a United States navy captain stopped a British mail ship and removed two ambassadors of the rebelling southern states. The result was what is commonly called the Trent Affair. In the wake of the captain’s unauthorized and rash action, Great Britain seriously considered going to war against the United States. A detailed analysis of the Trent Affair is possible using the available and extensive internal British correspondence and memoranda to reach an understanding of the effect of international law upon decision making. The extensive trove of internal British documents is particularly valuable because in 1861, the only effective means of communication was face-to-face or through letters. Telephones did not exist, and travel by horse and carriage was tedious. The British documents tell us how individual participants viewed the process. We can approach an accurate understanding of what actually happened as the British government strove to resolve the crisis. For example, British law officers initially concluded that the American captain’s rash act was permissible under international law. Later, the law officers revised their opinion. A model of internal negotiation is particularly valuable because it strips away nations’ public posturing about disputed international law principles. In internal decision making, there is room for meaningful debate over the relevant principles. This fluid debate tells how international law is used to develop a hard, public bargaining position. The Trent Affair indicates that international law had an actual influence upon the crisis and that law was not mere window dressing for the government’s public position.

Keywords: foreign affairs crises, negotiation, international law, Trent affair

Procedia PDF Downloads 127
2717 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 397
2716 Internal Generation of Revenues in Higher Education: Comparative Case Study of Polytechnic Institutions in Nigeria

Authors: Oluwole A. Solanke

Abstract:

This article explores internal generation of revenues in higher education institutions. The research focuses on how polytechnic institutions in Nigeria generate other sources of revenues to augment government subventions and tuition fees. The study provides a qualitative case study and triangulation data on three polytechnics representing tertiary institution structure of federal, state and private ownership in Nigeria. The article argues that dependence on government subventions by the public polytechnics and tuition fees by private polytechnic would not provide funding adequacy for the activities of the institutions under study. Findings revealed that there are basically seven themes; guest houses; poly consult; part-time courses; tuition fees; capitation fees; ownership contribution; and printing and business centre by which the polytechnics generate additional sources of revenues in the management of the institutions. The research concludes that for the polytechnics to gain financial adequacy, entrepreneurial activities must be embarked upon vigorously by stakeholders of the polytechnics as this is the only way by which financial self-reliance can be achieved.

Keywords: entrepreneurial, government subventions, internal generation, polytechnics, revenues

Procedia PDF Downloads 266
2715 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 184
2714 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 102
2713 Determination of Optimum Torque of an Internal Combustion Engine by Exergy Analysis

Authors: Veena Chaudhary, Rakesh P. Gakkhar

Abstract:

In this study, energy and exergy analysis are applied to the experimental data of an internal combustion engine operating on conventional diesel cycle. The experimental data are collected using an engine unit which enables accurate measurements of fuel flow rate, combustion air flow rate, engine load, engine speed and all relevant temperatures. First and second law efficiencies are calculated for different engine speed and compared. Results indicate that the first law (energy) efficiency is maximum at 1700 rpm whereas exergy efficiency is maximum and exergy destruction is minimum at 1900 rpm.

Keywords: diesel engine, exergy destruction, exergy efficiency, second law of thermodynamics

Procedia PDF Downloads 329
2712 Peculiarities of Internal Friction and Shear Modulus in 60Co γ-Rays Irradiated Monocrystalline SiGe Alloys

Authors: I. Kurashvili, G. Darsavelidze, T. Kimeridze, G. Chubinidze, I. Tabatadze

Abstract:

At present, a number of modern semiconductor devices based on SiGe alloys have been created in which the latest achievements of high technologies are used. These devices might cause significant changes to networking, computing, and space technology. In the nearest future new materials based on SiGe will be able to restrict the A3B5 and Si technologies and firmly establish themselves in medium frequency electronics. Effective realization of these prospects requires the solution of prediction and controlling of structural state and dynamical physical –mechanical properties of new SiGe materials. Based on these circumstances, a complex investigation of structural defects and structural-sensitive dynamic mechanical characteristics of SiGe alloys under different external impacts (deformation, radiation, thermal cycling) acquires great importance. Internal friction (IF) and shear modulus temperature and amplitude dependences of the monocrystalline boron-doped Si1-xGex(x≤0.05) alloys grown by Czochralski technique is studied in initial and 60Co gamma-irradiated states. In the initial samples, a set of dislocation origin relaxation processes and accompanying modulus defects are revealed in a temperature interval of 400-800 ⁰C. It is shown that after gamma-irradiation intensity of relaxation internal friction in the vicinity of 280 ⁰C increases and simultaneously activation parameters of high temperature relaxation processes reveal clear rising. It is proposed that these changes of dynamical mechanical characteristics might be caused by a decrease of the dislocation mobility in the Cottrell atmosphere enriched by the radiation defects.

Keywords: internal friction, shear modulus, gamma-irradiation, SiGe alloys

Procedia PDF Downloads 143