Search results for: armed attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 787

Search results for: armed attack

457 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests

Authors: M. Cortés, E. Vera, O. Rojas

Abstract:

The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.

Keywords: acid sulfuric, concrete, corrosion, biogenic

Procedia PDF Downloads 378
456 Generativism in Language Design and Their Effects on String of Constructions

Authors: Christian Uchechukwu Gilbert

Abstract:

Generativism in language design investigates the framework on which varying sentence structures are built in the English language. Propounded by Noam Chomsky in 1965, the theory transforms sentences from an active structure to a passive one by the application of established rules of the theory. Resident in the body of syntax, the rules include movement, insertion, substitution, and deletion rules. Using the movement rule, the analysis is armed with the qualitative research method, on which the works of scholars were duly consulted for more insight and in line with the academic practice in research activities. The investigation showed that the rules of competent grammar explain the formulation of sentences in a language and how transformation takes place among sentences from a deep structure to a surface structure with accurate results. The structural differences that could be got through dative movement and the deletion of the preposition; passivisation got from an active sentence by the insertion of the preposition “by” a “be verb” and the aspect tense marker “–en”, held as the creative aspect of language vocabulary and the subject-auxiliary inversion that exchanges the auxiliary of a sentence with the subject of the same sentence thereby transforming a kennel sentence to a polar question, viewed as an external argument under θ-theory. Generativism in language design, therefore, changes available types of sentences and relates one form of linguistic category with others in language design.

Keywords: language, generate, transformation, structure, design

Procedia PDF Downloads 67
455 Becoming a Warrior: Conspiracy, Dramaturgy, and Follower Charisma on the Far Right

Authors: Anthony Albanese

Abstract:

While much of the literature concerning Max Weber’s concept of charisma has addressed the importance of the follower’s recognition of and devotion to the charismatic leader, very little has been said about the processes that lead to the development of follower charisma. This article examines this largely overlooked aspect of the concept, as doing so (1) exacts the dynamics behind charisma’s transferability by moving beyond follower-centric models that focus on the recognition of the leader and toward one that emphasizes the follower’s generation and exhibition of charisma, (2) bridges a crucial gap between the rather wanting “losers of modernization” thesis and the social actor’s proclivity to produce stories and self-cast in said stories, (3) presents authoritarian dispositions as a reaction to the weakening effects everydayness have on charisma, and (4) complicates Weber’s formulation by reassessing the role of continually demonstrable mastery. To illustrate these dynamics, one should turn to the January 6th Capitol attack in the United States.

Keywords: max weber, extremism, right-wing populism, charisma

Procedia PDF Downloads 91
454 Investigation of the Turbulent Cavitating Flows from the Viewpoint of the Lift Coefficient

Authors: Ping-Ben Liu, Chien-Chou Tseng

Abstract:

The objective of this study is to investigate the relationship between the lift coefficient and dynamic behaviors of cavitating flow around a two-dimensional Clark Y hydrofoil at 8° angle of attack, cavitation number of 0.8, and Reynolds number of 7.10⁵. The flow field is investigated numerically by using a vapor transfer equation and a modified turbulence model which applies the filter and local density correction. The results including time-averaged lift/drag coefficient and shedding frequency agree well with experimental observations, which confirmed the reliability of this simulation. According to the variation of lift coefficient, the cycle which consists of growth and shedding of cavitation can be divided into three stages, and the lift coefficient at each stage behaves similarly due to the formation and shedding of the cavity around the trailing edge.

Keywords: Computational Fluid Dynamics, cavitation, turbulence, lift coefficient

Procedia PDF Downloads 347
453 Aging Evaluation of Ammonium Perchlorate/Hydroxyl Terminated Polybutadiene-Based Solid Rocket Engine by Reactive Molecular Dynamics Simulation and Thermal Analysis

Authors: R. F. B. Gonçalves, E. N. Iwama, J. A. F. F. Rocco, K. Iha

Abstract:

Propellants based on Hydroxyl Terminated Polybutadiene/Ammonium Perchlorate (HTPB/AP) are the most commonly used in most of the rocket engines used by the Brazilian Armed Forces. This work aimed at the possibility of extending its useful life (currently in 10 years) by performing kinetic-chemical analyzes of its energetic material via Differential Scanning Calorimetry (DSC) and also performing computer simulation of aging process using the software Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS). Thermal analysis via DSC was performed in triplicates and in three heating ratios (5 ºC, 10 ºC, and 15 ºC) of rocket motor with 11 years shelf-life, using the Arrhenius equation to obtain its activation energy, using Ozawa and Kissinger kinetic methods, allowing comparison with manufacturing period data (standard motor). In addition, the kinetic parameters of internal pressure of the combustion chamber in 08 rocket engines with 11 years of shelf-life were also acquired, for comparison purposes with the engine start-up data.

Keywords: shelf-life, thermal analysis, Ozawa method, Kissinger method, LAMMPS software, thrust

Procedia PDF Downloads 124
452 Mineralogical Characteristics of Phosphates from the Djebel Onk Deposits: Treatment and Valorization of Co-Products

Authors: Samira Tlili, Amina Grairia, Sihem Benayache, Saida Bouyegh, Sabrina Ladjama, Abdelmoumen Guedri

Abstract:

Phosphorites from Djebel Onk Tebessa/Algeria deposit contain a CaO of 50-52 wt. % and P₂O₅ level of ≥ 30.20 wt. %. The microstructure revealed using a spectroscopy electronic microscope (SEM) consists of phosphate granules with an ovular form. In this investigation, we have identified phosphate with varying particle sizes using mineralogical methods. The phosphogypsum formed by the mineralization of natural phosphate has also been discovered. This co-product was formed during the attack on natural phosphates by sulfuric acid. This study demonstrated the effectiveness of the thermoanalytical technique of differential scanning calorimetry (DSC), X-ray diffraction, and EDS/MEB analysis. FTIR analyses also validated the identification of mineral phases with the observation of bands from structural phosphate groups.

Keywords: phosphate, Djebel Onk deposit, mineralogy, valorization, phosphogypsum

Procedia PDF Downloads 20
451 The Role of Police in Counterinsurgency: A Case Study of Tripura

Authors: Yagnik Patel

Abstract:

This paper will analyze and explain two main objectives. First, it will examine the emergence of the insurgency in the state of Tripura. The State of Tripura was facing the full blow of insurgency problem since 1978 after the formation of Tripura National Volunteers (TNV). But, the roots of this insurgency were found even before 1978. This study will analyze the roots and trajectory of insurgency in the Tripura. Second, it will examine the role played by the police in counterinsurgency in the State of Tripura. Even though state police are mandated for the maintenance of the law and order and public order (like every police), the state police of Tripura have played a significant role in curbing the insurgency by enhancing their counterinsurgency (COIN) capabilities and re-structuring the new comprehensive COIN doctrine. And by the end of May 2015, the State Government has lifted The Armed Forces (Special Powers) Act (AFSPA) from the State of Tripura, as declaiming of the violence. The fight against the insurgency, usually done by the military or para-military, but nowadays the police organization is also becoming a vital state apparatus. After Punjab police and Andhra Pradesh police, Tripura police have also successfully curbed the insurgency from the state. This was the third time when successful counterinsurgency did by the state police in India. This has shown the importance of the police in the fight against the insurgency. In this regard, this paper will use both quantitative and qualitative research methods for an explanatory case study to analyze and explain the roots, causes and the trajectory of insurgency in the state of Tripura and the role played by the police in COIN in Tripura. Along with this, the paper will also examine the successful ‘Police Model of Tripura’.

Keywords: counterinsurgency, insurgency, police, Tripura state rifles

Procedia PDF Downloads 186
450 Theoretical Evaluation of the Effect of Solvent on the Feasibility of the Reaction of 2-Chlorobenzimidazole With Four N,N′-Cyclic Azomethine Imines to Construct Polycyclic Benzimidazoles

Authors: Mohamed Abdoul-Hakim, A. Zeroual, H. Garmes

Abstract:

In this work, we theoretically evaluated the reactivity of four 4-methyl-3-oxo-1,2-pyrazolidinium ylides with 2-Chlorobenzimidazole in MeOH in basic medium using DFT at the B3LYP/6-311+G(d,p) level. The analysis of the results shows that apart from its ability to retain its electrons, the deprotonated 2-Chlorobenzimidazole has a higher nucleophilic character. The reaction requires energy input to initiate the nucleophilic attack of the 2-Chlorobenzimidazole anion, and the inclusion of the solvent effect facilitates the formation of two regioisomers via an intramolecular vinyl nucleophilic substitution (SNVi). The transition states of this latter step are stabilized by charge transfer interactions σ(N-C) →σ*(C-Cl) for the more favorable regioisomer and n(N)→σ*(C-Cl) for the other regioisomer.

Keywords: benzonitrile N-oxide, DFT, intramolecular vinyl nucleophilic substitution (SNVi), 4-methyl-3-OXO-1, 2-pyrazolidinium ylides

Procedia PDF Downloads 137
449 Preservation of Endocrine Function after Central Pancreatectomy without Anastomoses for a Mid Gland Pancreatic Insulinoma: A Case Report

Authors: Karthikeyan M., Paul M. J.

Abstract:

This abstract describes a case of central pancreatectomy (CP) for a 50-year-old woman with a neuroendocrine tumor in the mid-body of the pancreas. CP, a parenchyma-sparing surgical option, preserves the distal pancreas and spleen, reducing the risk of pancreatic endocrine and exocrine insufficiency compared to traditional resections. The patient, initially misdiagnosed with transient ischemic attack, presented with hypoglycemic symptoms and was found to have a pancreatic lesion. Post-operative results were positive, with a reduction in pancreatic drain volume and normalization of blood sugar levels. This case highlights CP's efficacy in treating centrally located pancreatic lesions while maintaining pancreatic function.

Keywords: central pancreatectomy without anastomosis, no endocrine deficiency on follow-op, less post-op hospital stay, less post-op complications

Procedia PDF Downloads 43
448 Insecurity as a Challenge to Nutritional Status of Children and Mothers in Dansadau, Maru Local Government Area Zamfara State, North Western Nigeria

Authors: Mohammed Hussaini

Abstract:

This paper discusses insecurity as a challenge to the nutritional Status of children and mothers in Dansadau, Maru Local Government area of Zamfara state, Northwestern Nigeria. A Descriptive survey design was used in the study. Objectives of the study were formulated to guide the study. 20 Health workers and 100 mothers were used as population of the study; the instrument validation for data collection was interview. The interview structure was validated by 3 experts, the data collected was analyzed and presented using descriptive standard score (Z-score). The study revealed that, Nutritional Status of children and mothers in Northwest Nigeria specifically Zamfara state is low. This mostly affect children and mother as a result of serious insecurity challenge in the region, consisting of banditry and kidnapping, killing of farmers, destruction of farmland, burning of farm products. The study recommended that the focus is on implementing strong communication strategies to enhance short-term relief initiatives, both governmental and non-governmental organizations should actively play a role in initiating lasting change, especially when tackling issues of insecurity and effectively addressing the rise of armed banditry and other security concerns requires a sophisticated and nuanced strategy.

Keywords: insecurity, malnutrition, children, mothers

Procedia PDF Downloads 54
447 Application of Co-Flow Jet Concept to Aircraft Lift Increase

Authors: Sai Likitha Siddanathi

Abstract:

Present project is aimed at increasing the amount of lift produced by typical airfoil. This is achieved by its modification into the co-flow jet structure where a new internal flow is created inside the airfoil from well-designed apertures on its surface. The limit where produced excess lift overcomes the weight of pumping system inserted in airfoil upper portion, and drag force is converted into thrust is discussed in terms of airfoil velocity and angle of attack. Two normal and co-flow jet models are numerically designed and experimental results for both fabricated normal airfoil and CFJ model have been tested in low subsonic wind tunnel. Application has been made to subsonic NACA 652-415 airfoil. Produced lift in CFJ airfoil indicates a maximum value up to a factor of 5 above normal airfoil nearby flow separation ie in relatively weak flow distribution.

Keywords: flow Jet, lift coefficient, drag coefficient, airfoil performance

Procedia PDF Downloads 354
446 HelpMeBreathe: A Web-Based System for Asthma Management

Authors: Alia Al Rayssi, Mahra Al Marar, Alyazia Alkhaili, Reem Al Dhaheri, Shayma Alkobaisi, Hoda Amer

Abstract:

We present in this paper a web-based system called “HelpMeBreathe” for managing asthma. The proposed system provides analytical tools, which allow better understanding of environmental triggers of asthma, hence better support of data-driven decision making. The developed system provides warning messages to a specific asthma patient if the weather in his/her area might cause any difficulty in breathing or could trigger an asthma attack. HelpMeBreathe collects, stores, and analyzes individuals’ moving trajectories and health conditions as well as environmental data. It then processes and displays the patients’ data through an analytical tool that leads to an effective decision making by physicians and other decision makers.

Keywords: asthma, environmental triggers, map interface, web-based systems

Procedia PDF Downloads 293
445 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 328
444 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study

Authors: Maged El-Sayed Mohamed

Abstract:

Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.

Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction

Procedia PDF Downloads 358
443 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study

Authors: Michael I. Okereke, Ambrose I. Akpoyomare

Abstract:

This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.

Keywords: blast resistance, blast enhancement, explosives, material behavior

Procedia PDF Downloads 371
442 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 236
441 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report

Authors: Khaled Alabduljabbar

Abstract:

Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.

Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy

Procedia PDF Downloads 87
440 An investigation of Leading Edge and Trailing Edge Corrugation for Low Reynolds Number Application

Authors: Syed Hassan Raza Shah, Mohammad Mohammad Ali

Abstract:

The flow over a smoothly profiled airfoil at a low Reynolds number is highly susceptible to separate even at a very low angle of attack. An investigation was made to study the effect of leading-edge and trailing-edge corrugation with the spanwise change in the ridges resulted due to the change in the chord length for an infinite wing. The wind tunnel results using NACA0018 wings revealed that leading and trailing edge corrugation did not have any benefit in terms of aerodynamic efficiency or delayed stall. The leading edge and trailing edge corrugation didn't change the lift curve slope, with the leading edge corrugation wing stalling first in the range of Reynolds number of 50,000 to 125,000.

Keywords: leading and trailing edge corrugations, low reynolds number, wind tunnel testing, NACA0018

Procedia PDF Downloads 289
439 Understanding the Complexities of Consumer Financial Spinning

Authors: Olivier Mesly

Abstract:

This research presents a conceptual framework termed “Consumer Financial Spinning” (CFS) to analyze consumer behavior in the financial/economic markets. This phenomenon occurs when consumers of high-stakes financial products accumulate unsustainable debt, leading them to detach from their initial financial hierarchy of needs, wealth-related goals, and preferences regarding their household portfolio of assets. The daring actions of these consumers, forming a dark financial triangle, are characterized by three behaviors: overconfidence, the use of rationed rationality, and deceitfulness. We show that we can incorporate CFS into the traditional CAPM and Markovitz’ portfolio optimization models to create a framework that explains such market phenomena as the global financial crisis, highlighting the antecedents and consequences of ill-conceived speculation. Because this is a conceptual paper, there is no methodology with respect to ground studies. However, we apply modeling principles derived from the data percolation methodology, which contains tenets explicating how to structure concepts. A simulation test of the proposed framework is conducted; it demonstrates the conditions under which the relationship between expected returns and risk may deviate from linearity. The analysis and conceptual findings are particularly relevant both theoretically and pragmatically as they shed light on the psychological conditions that drive intense speculation, which can lead to market turmoil. Armed with such understanding, regulators are better equipped to propose solutions before the economic problems become out of control.

Keywords: consumer financial spinning, rationality, deceitfulness, overconfidence, CAPM

Procedia PDF Downloads 46
438 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Saaid, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, experimental investigation, aerodynamic performance

Procedia PDF Downloads 435
437 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 372
436 July 15 Coup Attempt and the Use of New Communication Technologies

Authors: Yasemin Gulsen Yilmaz, Suleyman Hakan Yilmaz, Muhammet Erbay

Abstract:

The new communication technologies have gradually improved its efficiency in all fields of life and made its presence irreplaceable. These technologies which appear in every aspect of life differently showed itself during the failed coup attempt in Turkey too. The evening of July 15, 2016, have already taken its place in the Turkish political history. In the evening of July 15, Turkish nation confronted to a coup attempted by a group within the Turkish Armed Forces. That evening, the scene of the confrontation between the coup attempters and the resisting civilians were watched minute-by-minute by the people using the new communication technologies. Pro-coup soldiers and the resisting groups that came face to face in the streets of metropolitan cities, made their in-group communications by using new media tools very actively. New media turned into the most important weapon both for coup plotters and for those who resisted. In the morning of next day, whoever used these tools better had the upper hand. The civilians were successful in protecting democracy not only by resisting against tanks and bullets but also by following the internet, organising in social media, sharing information-photos on the net and telling large masses their experiences through these technologies. In this study, we focused on and analysed the use of new media both by coup soldiers and resisting civilians during the failed coup attempt in July 15. Within the scope of this study, coup attempt news that took place in printed media within one week were examined; the information about the use of new media tools during the night of failed coup were compiled; and it was determined how, to what extend and what for these tools were used and how effective they were.

Keywords: communication, July 15, new media, media

Procedia PDF Downloads 243
435 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 67
434 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 153
433 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 158
432 The Analyses of July 15 Coup Attempt through the Turkish Press

Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay

Abstract:

Military interventions have an important place in the Turkish Political History. Military interventions are commonly called coup in the society. By coup we mean that the armed forces seize political power either by a group of officer in the army or by chain of command. Coups not only weaken but also suspend the democracy in a country. All periods of coup created its own victims. Two military coups which took place in May 27, 1960 and September 12, 1980 are the most important ones in terms of political and social effect in the Turkish Political History. Apart these, March 12, 1971, February 28, 1997 and April 27, 2007 e-memorandum are the periods when Army submitted a memorandum and intervened the political government indirectly. Beside the memorandums and coups there were also many coup attempts that have been experienced in the Turkish Political History. In this study, we examined the coup attempted by FETO’s military members in the evening of July 15, 2016 from the point of the Turkish Press. Cumhuriyet, Haber Türk, Hürriyet, Milliyet, Sabah, Star, Yeni Akit and Yeni Şafak Newspapers which have different publication policies were examined within the scope of the study. The first pages of the newspapers dated July 16, 2016 were examined using content analysis method. The headlines, news, news headlines and the visual materials used for news were examined and the collected data were analysed.

Keywords: July 15, news, military coup, press

Procedia PDF Downloads 259
431 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 93
430 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 375
429 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 161
428 Sources of Occupational Stress among Teachers in Command Secondary Schools of Nigerian Army

Authors: Mary Esere, Mogbekeloluwa Fakokunde, Adetoun Idowu

Abstract:

Background: Working in a military setting could elicit some amount of stressful doses into ones system because of the attendant peculiar characteristics found in the military environment. Thus, this study was carried out to find out the sources of occupational stress among teachers in various Command Secondary Schools within 2 Division of Nigerian Army. Method: The study employed a survey method. Simple random sampling technique was used to select the schools in the Division. A total of 200 respondents participated in the study. Sources of Teachers’ Occupational Stress Questionnaire (STOSQ) was administered to the respondents to collect relevant data. The t-test and Analysis of Variance (ANOVA) statistics were used to test the hypotheses. Findings: From the study, it was discovered that teachers in this setting do experience occupational stress. Their major sources of stress bother on issues relating to salaries and allowances and staff welfare concerns. The findings also revealed that there were no significant differences in the sources of occupational stress among the teachers in respect to gender and marital status. Discussion: Based on these findings, it was recommended that the Appropriate Superior Authority (ASA) should reconstitute the proscribed Armed Forces Schools Management Board (AFSMB) where issues, such as staff salaries and welfare concerns for teachers working in the schools under the three services (Army, Navy, Airforce) will always be addressed. This will go a long way in enhancing the psychological well-being of the teachers.

Keywords: Nigerian army, occupational stress, sources, teachers

Procedia PDF Downloads 489