Search results for: black hole attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1778

Search results for: black hole attack

1388 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete

Authors: Gashaw Abebaw

Abstract:

Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.

Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan

Procedia PDF Downloads 115
1387 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 57
1386 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 30
1385 Explosion Mechanics of Aluminum Plates Subjected to the Combined Effect of Blast Wave and Fragment Impact Loading: A Multicase Computational Modeling Study

Authors: Atoui Oussama, Maazoun Azer, Belkassem Bachir, Pyl Lincy, Lecompte David

Abstract:

For many decades, researchers have been focused on understanding the dynamic behavior of different structures and materials subjected to fragment impact or blast loads separately. The explosion mechanics, as well as the impact physics studies dealing with the numerical modeling of the response of protective structures under the synergistic effect of a blast wave and the impact of fragments, are quite limited in the literature. This article numerically evaluates the nonlinear dynamic behavior and damage mechanisms of Aluminum plates EN AW-1050A- H24 under different combined loading scenarios varied by the sequence of the applied loads using the commercial software LS-DYNA. For one hand, with respect to the terminal ballistic field investigations, a Lagrangian (LAG) formulation is used to evaluate the different failure modes of the target material in case of a fragment impact. On the other hand, with respect to the blast field analysis, an Arbitrary Lagrangian-Eulerian (ALE) formulation is considered to study the fluid-structure interaction (FSI) of the shock wave and the plate in case of a blast loading. Four different loading scenarios are considered: (1) only blast loading, (2) only fragment impact, (3) blast loading followed by a fragment impact and (4) a fragment impact followed by blast loading. From the numerical results, it was observed that when the impact load is applied to the plate prior to the blast load, it suffers more severe damage due to the hole enlargement phenomenon and the effects of crack propagation on the circumference of the damaged zone. Moreover, it was found that the hole from the fragment impact loading was enlarged to about three times in diameter as compared to the diameter of the projectile. The validation of the proposed computational model is based in part on previous experimental data obtained by the authors and in the other part on experimental data obtained from the literature. A good correspondence between the numerical and experimental results is found.

Keywords: computational analysis, combined loading, explosion mechanics, hole enlargement phenomenon, impact physics, synergistic effect, terminal ballistic

Procedia PDF Downloads 175
1384 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 250
1383 Adsorption of Reactive Dye Using Entrapped nZVI

Authors: P. Gomathi Priya, M. E. Thenmozhi

Abstract:

Iron nanoparticles were used to cleanup effluents. This paper involves synthesis of iron nanoparticles chemically by sodium borohydride reduction of ammonium ferrous sulfate solution (FAS). Iron oxide nanoparticles have lesser efficiency of adsorption than Zero Valent Iron nanoparticles (nZVI). Glucosamine acts as a stabilizing agent and chelating agent to prevent Iron nanoparticles from oxidation. nZVI particles were characterized using Scanning Electron Microscopy (SEM). Thus, the synthesized nZVI was subjected to entrapment in biopolymer, viz. barium (Ba)-alginate beads. The beads were characterized using SEM. Batch dye degradation studies were conducted using Reactive black Water soluble Nontoxic Natural substances (WNN) dye which is one of the most hazardous dyes used in textile industries. Effect of contact time, effect of pH, initial dye concentration, adsorbent dosage, isotherm and kinetic studies were carried out.

Keywords: ammonium ferrous sulfate solution, barium, alginate beads, reactive black WNN dye, zero valent iron nanoparticles

Procedia PDF Downloads 325
1382 Navigating Politics of Black Marginalization: A Critical Reflection of the Guardian by John Grisham

Authors: Fayaz Ali Shah, Aleena Shehzad

Abstract:

The incidents of race or racial discrimination is still a part of the advanced and the so-called twenty-first-century America. It not only affects America's society but also greatly influences the third world countries due to the colonial approach by the British and America. Due to this discrimination, hundreds of Blacks in the US have been disappeared or prisoned for crimes they have not committed. The same sort of inequality can be seen in Pakistan due to the discrimination and prejudice by the Pakistani government and militants. Especially the tribal areas of Pakistan have been facing the worst in such situations. Thousands of people have been disappeared since 9/11 due to the adulterous approach by the government and military. The article is an approach to show the still racist view or Black marginalization, on the paradigm of racism, in the novel 'The Guardian' written by John Grisham. Also, it will enlighten readers about Pakistan's military and government approach towards discrimination, which creates great chaos in the country nowadays. The research will be qualitative and will use Critical Race Theory by Delgado and Steffencic for analysis.

Keywords: blacks, colonial, discrimination, disappeared, prison

Procedia PDF Downloads 180
1381 Investigation of the Use of Surface-Modified Waste Orange Pulp for the Adsorption of Remazol Black B

Authors: Ceren Karaman, Onur Karaman

Abstract:

The adsorption of Remazol Black B (RBB), an anionic dye, onto dried orange pulp (DOP) adsorbent prepared by only drying and by treating with cetyltrimetylammonium bromide (CTAB), a cationic surfactant, surface-modified orange pulp (SMOP) was studied in a stirred batch experiments system at 25°C. The adsorption of RBB on each adsorbent as a function of surfactant dosage, initial pH of the solution and initial dye concentration was investigated. The optimum amount of CTAB was found to be 25g/l. For RBB adsorption studies, while working pH value for the DOP adsorbent system was determined as 2.0, it was observed that this value shifted to 8.0 when the 25 g/l CTAB treated-orange pulp (SMOP) adsorbent was used. It was obtained that the adsorption rate and capacity increased to a certain value, and the adsorption efficiency decreased with increasing initial RBB concentration for both DOP and SMOP adsorbents at pH 2.0 and pH 8.0. While the highest adsorption capacity for DOP was determined as 62.4 mg/g at pH 2.0, and as 325.0 mg/g for SMOP at pH 8.0. As a result, it can be said that permanent cationic coating of the adsorbent surface by CTAB surfactant shifted the working pH from 2.0 to 8.0 and it increased the dye adsorption rate and capacity of orange pulp much more significantly at pH 8.0. The equilibrium RBB adsorption data on each adsorbent were best described by the Langmuir isotherm model. The adsorption kinetics of RBB on each adsorbent followed a pseudo-second-order model. Moreover, the intraparticle diffusion model was used to describe the kinetic data. It was found that diffusion is not the only rate controlling step. The adsorbent was characterized by the Brunauer–Emmett–Teller (BET) analysis, Fourier-transform-infrared (FTIR) spectroscopy, and scanning-electron-microscopy (SEM). The mechanism for the adsorption of RBB on the SMOP may include hydrophobic interaction, van der Waals interaction, stacking and electrostatic interaction.

Keywords: adsorption, Cetyltrimethylammonium Bromide (CTAB), orange pulp, Remazol Black B (RBB), surface modification

Procedia PDF Downloads 244
1380 Case Study; Drilled Shafts Installation in Difficult Site Conditions; Loose Sand and High Water Table

Authors: Anthony El Hachem, Hosam Salman

Abstract:

Selecting the most effective construction method for drilled shafts under the high phreatic surface can be a challenging task that requires effective communication between the design and construction teams. Slurry placement, temporary casing, and permanent casing are the three most commonly used installation techniques to ensure the stability of the drilled hole before casting the concrete. Each one of these methods has its implications on the installation and performance of the drilled piers. Drilled shafts were designed to support a fire wall for an Energy project in Central Texas. The subsurface consisted of interlayers of sands and clays of varying shear strengths. The design recommended that the shafts be installed with temporary casing or slurry displacement due to the anticipated groundwater seepage through granular soils. During the foundation construction, it was very difficult to maintain the stability of the hole, and the contractor requested to install the shafts using permanent casings. Therefore, the foundation design was modified to ensure that the cased shafts achieve the required load capacity. Effective and continuous communications between the owner, contractor and design team during field shaft installations to mitigate the unforeseen challenges helped the team to successfully complete the project.

Keywords: construction challenges, deep foundations, drilled shafts, loose sands underwater table, permanent casing

Procedia PDF Downloads 186
1379 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 245
1378 Marginalisation of an Age Old Culture. The Case of Female Cultural Initiation in Some South African Cultural Groups

Authors: Lesibana Rafapa

Abstract:

Accounts exist of circumcision-anchored cultural initiation in central Africa, East Africa, Southern Africa, North Africa, and West Africa -straddling states like Botswana, Kenya, Lesotho, Malawi, Senegal, South Africa, Zambia, and Zimbabwe. This attests to the continent-wide spread of this cultural practice. In this paper, the writer relates the cultural aspect of circumcision-subsuming initiation among black African cultural groups across the continent to the notion that African cultures are varied yet subscribe to a common central concept. The premise of the paper is that the common practice of initiation for both male and female children that have to be initiated by adults to the tradition and customs of a people coincides with such a central concept. The practice of traditional initiation is as broad as to encompass aspects of spirituality, morality, and social organisation, in the nature of the central concept of which it is a trans-sectional part. Cultural initiation, sometimes referred to as traditional circumcision, constitutes culture-determined rites of passage for the initiates. The study’s aim, the findings of which are presented in this paper, was to probe gender equality in the development and promotion of the cultural practice of initiation. The researcher intended to demonstrate how in South Africa, female circumcision is treated equally or marginalised in efforts of the democratic government to regulate and strengthen the practice of circumcision as part of its broader liberation programme meant to reverse politico-cultural bondage experienced during apartheid rule that the present black regime helped bring to an end. It is argued that the failure to regard female circumcision as equal to its male counterpart is a travesty of the black government’s legislation and policies espousing equality and the protection and empowerment of vulnerable and previously marginalised population groups that include black women. The writer did a desk-top study of the history and characteristics of female circumcision among the black Northern Sotho, VaTsonga, and VhaVenda cultural groups of the Limpopo Province, stretching north to the border of South Africa with Zimbabwe, as well as literature on how political and other authorities exert efforts to preserve and empower the practice. The findings were that male initiation is foregrounded and totalised to represent the practice of initiation as a whole, at the expense of its female counterpart facing marginalisation and unequal regard. It is outlined in this paper how such impoverishment of an otherwise woman-empowering cultural practice deprives hitherto black cultures that suffered brutal repression during apartheid of a fuller recovery much needed in the democratic era. The writer applies some aspects of postcolonial theory and some tropes of feminism in the discussion of an uneven status of cultural circumcision at the hands of present day powers that be.

Keywords: African cultures, female circumcision, gender equality, women empowerment

Procedia PDF Downloads 157
1377 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 187
1376 Storms Dynamics in the Black Sea in the Context of the Climate Changes

Authors: Eugen Rusu

Abstract:

The objective of the work proposed is to perform an analysis of the wave conditions in the Black Sea basin. This is especially focused on the spatial and temporal occurrences and on the dynamics of the most extreme storms in the context of the climate changes. A numerical modelling system, based on the spectral phase averaged wave model SWAN, has been implemented and validated against both in situ measurements and remotely sensed data, all along the sea. Moreover, a successive correction method for the assimilation of the satellite data has been associated with the wave modelling system. This is based on the optimal interpolation of the satellite data. Previous studies show that the process of data assimilation improves considerably the reliability of the results provided by the modelling system. This especially concerns the most sensitive cases from the point of view of the accuracy of the wave predictions, as the extreme storm situations are. Following this numerical approach, it has to be highlighted that the results provided by the wave modelling system above described are in general in line with those provided by some similar wave prediction systems implemented in enclosed or semi-enclosed sea basins. Simulations of this wave modelling system with data assimilation have been performed for the 30-year period 1987-2016. Considering this database, the next step was to analyze the intensity and the dynamics of the higher storms encountered in this period. According to the data resulted from the model simulations, the western side of the sea is considerably more energetic than the rest of the basin. In this western region, regular strong storms provide usually significant wave heights greater than 8m. This may lead to maximum wave heights even greater than 15m. Such regular strong storms may occur several times in one year, usually in the wintertime, or in late autumn, and it can be noticed that their frequency becomes higher in the last decade. As regards the case of the most extreme storms, significant wave heights greater than 10m and maximum wave heights close to 20m (and even greater) may occur. Such extreme storms, which in the past were noticed only once in four or five years, are more recent to be faced almost every year in the Black Sea, and this seems to be a consequence of the climate changes. The analysis performed included also the dynamics of the monthly and annual significant wave height maxima as well as the identification of the most probable spatial and temporal occurrences of the extreme storm events. Finally, it can be concluded that the present work provides valuable information related to the characteristics of the storm conditions and on their dynamics in the Black Sea. This environment is currently subjected to high navigation traffic and intense offshore and nearshore activities and the strong storms that systematically occur may produce accidents with very serious consequences.

Keywords: Black Sea, extreme storms, SWAN simulations, waves

Procedia PDF Downloads 240
1375 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 61
1374 Polyethylenimine-Ethoxylated Dual Interfacial Layers for High-Efficient Quantum Dot Light-Emitting Diodes

Authors: Woosuk Lee

Abstract:

We controlled the electron injection rate in inverted quantum dot light-emitting diode (QLED) by inserting PEIE layer between ZnO electron transport layer(ETL) and quantum dots(QDs) layer and successfully demonstrated high efficiency of QLEDs. The inverted QLED has the layer structure of ITO(cathode)/ ZnO NPs/PEIE/QDs/PEIE/P-TPD/MoO3/Al(anode). The PEIE between poly-TPD hole transport layer (HTL) and quantum dot emitting layer protects QD EML during HTL coating process and improves the surface morphology. In addition, the hole injection barrier is reduced by upshifting the valence band maximum (VBM) of QDs. An additional layer of PEIE was introduced between ZnO and QD to balance charge within QD emissive layer in device, which serves as an effective electron blocking layer without changing device operating condition such as turn-on voltage and emissive spectra. As a result, the optimized QLED with 5nm PEIE shows a ~36% improved current efficiency and external quantum efficiency (EQE) compared to the QLED without PEIE.(maximum current efficiency, and EQE are achieved 70cd/A and 17.3%, respectively). In particular, the maximum brightness of the optimized QLED dramatically improved by a factor of 2.3 relative to the QLED without PEIE. The main reasons for these QLED performance improvement are due to the suppressing the leakage current across the device and well confined exciton by inserting PEIE layers.

Keywords: quantum dot light-emitting diodes, interfacial layer, charge-injection balance, suppressing QD charging

Procedia PDF Downloads 178
1373 Econophysics: The Use of Entropy Measures in Finance

Authors: Muhammad Sheraz, Vasile Preda, Silvia Dedu

Abstract:

Concepts of econophysics are usually used to solve problems related to uncertainty and nonlinear dynamics. In the theory of option pricing the risk neutral probabilities play very important role. The application of entropy in finance can be regarded as the extension of both information entropy and the probability entropy. It can be an important tool in various financial methods such as measure of risk, portfolio selection, option pricing and asset pricing. Gulko applied Entropy Pricing Theory (EPT) for pricing stock options and introduced an alternative framework of Black-Scholes model for pricing European stock option. In this article, we present solutions to maximum entropy problems based on Tsallis, Weighted-Tsallis, Kaniadakis, Weighted-Kaniadakies entropies, to obtain risk-neutral densities. We have also obtained the value of European call and put in this framework.

Keywords: option pricing, Black-Scholes model, Tsallis entropy, Kaniadakis entropy, weighted entropy, risk-neutral density

Procedia PDF Downloads 294
1372 The Experiences of First-Generation Afro/Black Caribbean-American Women Navigating Sexual Pleasure and Their Bicultural Identity as a Result of Immigration

Authors: Jessie André

Abstract:

In the past 10 years, more studies have begun exploring the psychological impact of those who have been subjected to and have adopted two different cultures. Currently, there is no existing literature regarding how individuals with a bicultural identity navigate their often-conflicting cultures on topics such as sexual pleasure and sexual scripts. The purpose of this study was to explore how first-generation Afro/Black Caribbean-American women navigate their multiple cultural identities with regards to sexual pleasure and sexual scripts. This study contains an exploration of participants self-described challenges, attitudes, and beliefs associated to how they navigate and experience their sexuality. This research study uses an explanatory, qualitative method design with semi structured interviews to answer the primary and secondary research question. Research findings indicate that the later the age of immigration, the stronger their ties were to the culture from their country of origin, which affected their self-assessments of sexual desirability and sexual self-esteem. Findings also suggest that even though women who immigrated at a younger age had higher rates of difficulty navigating and identifying with their adopted culture’s sexual mores. These women also reported lower ratings of comfort voicing sexual desires and concerns to their partner and had lower self-ratings of feeling connected to their cultural identity. These participants had challenges utilizing the dual and conflicting sexual mores and rules they received from U.S. society and their country of origin, resulting in less pleasurable sexual experiences. Whereas women who immigrated at an older age reported having more pleasurable sexual experiences.

Keywords: bicultural identity, sexual pleasure, first-generation immigrants, afro/black caribbean-American

Procedia PDF Downloads 231
1371 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 144
1370 Optimizing Solids Control and Cuttings Dewatering for Water-Powered Percussive Drilling in Mineral Exploration

Authors: S. J. Addinell, A. F. Grabsch, P. D. Fawell, B. Evans

Abstract:

The Deep Exploration Technologies Cooperative Research Centre (DET CRC) is researching and developing a new coiled tubing based greenfields mineral exploration drilling system utilising down-hole water-powered percussive drill tooling. This new drilling system is aimed at significantly reducing the costs associated with identifying mineral resource deposits beneath deep, barren cover. This system has shown superior rates of penetration in water-rich, hard rock formations at depths exceeding 500 metres. With fluid flow rates of up to 120 litres per minute at 200 bar operating pressure to energise the bottom hole tooling, excessive quantities of high quality drilling fluid (water) would be required for a prolonged drilling campaign. As a result, drilling fluid recovery and recycling has been identified as a necessary option to minimise costs and logistical effort. While the majority of the cuttings report as coarse particles, a significant fines fraction will typically also be present. To maximise tool life longevity, the percussive bottom hole assembly requires high quality fluid with minimal solids loading and any recycled fluid needs to have a solids cut point below 40 microns and a concentration less than 400 ppm before it can be used to reenergise the system. This paper presents experimental results obtained from the research program during laboratory and field testing of the prototype drilling system. A study of the morphological aspects of the cuttings generated during the percussive drilling process shows a strong power law relationship for particle size distributions. This data is critical in optimising solids control strategies and cuttings dewatering techniques. Optimisation of deployable solids control equipment is discussed and how the required centrate clarity was achieved in the presence of pyrite-rich metasediment cuttings. Key results were the successful pre-aggregation of fines through the selection and use of high molecular weight anionic polyacrylamide flocculants and the techniques developed for optimal dosing prior to scroll decanter centrifugation, thus keeping sub 40 micron solids loading within prescribed limits. Experiments on maximising fines capture in the presence of thixotropic drilling fluid additives (e.g. Xanthan gum and other biopolymers) are also discussed. As no core is produced during the drilling process, it is intended that the particle laden returned drilling fluid is used for top-of-hole geochemical and mineralogical assessment. A discussion is therefore presented on the biasing and latency of cuttings representivity by dewatering techniques, as well as the resulting detrimental effects on depth fidelity and accuracy. Data pertaining to the sample biasing with respect to geochemical signatures due to particle size distributions is presented and shows that, depending on the solids control and dewatering techniques used, it can have unwanted influence on top-of-hole analysis. Strategies are proposed to overcome these effects, improving sample quality. Successful solids control and cuttings dewatering for water-powered percussive drilling is presented, contributing towards the successful advancement of coiled tubing based greenfields mineral exploration.

Keywords: cuttings, dewatering, flocculation, percussive drilling, solids control

Procedia PDF Downloads 244
1369 Investigation of the Kutta Condition Using Unsteady Flow

Authors: K. Bhojnadh, M. Fiddler, D. Cheshire

Abstract:

An investigation into the Kutta effect on the trailing edge of a subsonic aerofoil was conducted which led to an analysis using Ansys Fluent to determine the effect of flow separation over a NACA 0012 aerofoil. This aerofoil was subjected to oscillations to create an unsteady flow over the aerofoil, therefore, creating turbulence, with unsteady aerodynamics playing a key role to determine the flow regimes when the aerofoil is subjected to different angles of attack along with varying Reynolds numbers. Many theories were evolved to determine the flow parameters of a 2-D aerofoil in these unsteady conditions because they behave unpredictably at the trailing edge when subjected to a different angle of attack. The shear area observed in the boundary layer at the trailing edge tends towards an unsteady turbulent flow even at small angles of attack, creating drag as the flow separates, reducing the aerodynamic performance of aerofoil. In this paper, research was conducted to determine the effect of Kutta circulation over the aerofoil and the effect of that circulation in reducing the effect of pressure and boundary layer distribution over the aerofoil. The effect of circulation is observed by using Ansys Fluent by using varying flow parameters and differential schemes to observe the flow behaviour on the aerofoil. Initially, steady flow analysis was conducted on the aerofoil to determine the effect of circulation, and it was noticed that the effect of circulation could only be properly observed when the aerofoil is subjected to oscillations. Therefore, that was modelled by using Ansys user-defined functions, which define the motion of the aerofoil by creating a dynamic mesh on the aerofoil. Initial results were observed, and further development of the dynamic mesh functions in Ansys is taking place. This research will determine the overall basic principles of unsteady flow aerodynamics applied to the investigation of Kutta related circulation, and gives an indication regarding the generation of vortices which is discussed further in this paper.

Keywords: circulation, flow seperation, turbulence modelling, vortices

Procedia PDF Downloads 200
1368 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 152
1367 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 373
1366 Effect of Retained Austenite Stability in Corrosion Mechanism of Dual Phase High Carbon Steel

Authors: W. Handoko, F. Pahlevani, V. Sahajwalla

Abstract:

Dual-phase high carbon steels (DHCS) are commonly known for their improved strength, hardness, and abrasive resistance properties due to co-presence of retained austenite and martensite at the same time. Retained austenite is a meta-stable phase at room temperature, and stability of this phase governs the response of DHCS at different conditions. This research paper studies the effect of RA stability on corrosion behaviour of high carbon steels after they have been immersed into 1.0 M NaCl solution for various times. For this purpose, two different steels with different RA stabilities have been investigated. The surface morphology of the samples before and after corrosion attack was observed by secondary electron microscopy (SEM) and atomic force microscopy (AFM), along with the weight loss and Vickers hardness analysis. Microstructural investigations proved the preferential attack to retained austenite phase during corrosion. Hence, increase in the stability of retained austenite in dual-phase steels led to decreasing the weight loss rate.

Keywords: high carbon steel, austenite stability, atomic force microscopy, corrosion

Procedia PDF Downloads 207
1365 [Keynote Talk]: Software Reliability Assessment and Fault Tolerance: Issues and Challenges

Authors: T. Gayen

Abstract:

Although, there are several software reliability models existing today there does not exist any versatile model even today which can be used for the reliability assessment of software. Complex software has a large number of states (unlike the hardware) so it becomes practically difficult to completely test the software. Irrespective of the amount of testing one does, sometimes it becomes extremely difficult to assure that the final software product is fault free. The Black Box Software Reliability models are found be quite uncertain for the reliability assessment of various systems. As mission critical applications need to be highly reliable and since it is not always possible to ensure the development of highly reliable system. Hence, in order to achieve fault-free operation of software one develops some mechanism to handle faults remaining in the system even after the development. Although, several such techniques are currently in use to achieve fault tolerance, yet these mechanisms may not always be very suitable for various systems. Hence, this discussion is focused on analyzing the issues and challenges faced with the existing techniques for reliability assessment and fault tolerance of various software systems.

Keywords: black box, fault tolerance, failure, software reliability

Procedia PDF Downloads 422
1364 Beyond Black Friday: The Value of Collaborative Research on Seasonal Shopping Events and Behavior

Authors: Jasmin H. Kwon , Thomas M. Brinthaupt

Abstract:

There is a general lack of consumer behavior research on seasonal shopping events. Studying these kinds of events is interesting and important for several reasons. First, global shopping opportunities have implications for cross-cultural shopping events and effects on seasonal events in other countries. Second, seasonal shopping events are subject to economic conditions and may wane in popularity, especially with e-commerce options. Third, retailers can expand the success of their seasonal shopping events by taking advantage of cross-cultural opportunities. Fourth, it is interesting to consider how consumers from other countries might take advantage of different countries’ seasonal shopping events. Many countries have seasonal shopping events such as Black Friday. Research on these kinds of events can lead to the identification of cross-cultural similarities and differences in consumer behavior. We compared shopping motivations of college students who did (n=36) and did not (n=81) shop on Cyber Monday. The results showed that the groups did not differ significantly on any of the shopping motivation subscales. The Cyber Monday shoppers reported being significantly more likely to agree than disagree that their online shopping experience was enjoyable and exciting. They were more likely to disagree than agree that their experience was overwhelming. In addition, they agreed that they shopped only for deals, purchased the exact items they wanted, and thought that their efforts were worth it. Finally, they intended to shop again at next year’s Cyber Monday. It appears that there are many positive aspects to online seasonal shopping, independent of one’s typical shopping motivations. Different countries have seasonal events similar to the Black Friday and Cyber Monday shopping holiday (e.g., Boxing Day, Fukubukuro, China’s Singles Day). In Korea, there is increasing interest in taking advantage of U.S. Black Friday and Cyber Monday opportunities. Government officials are interested in adapting the U.S. holiday to Korean retailers, essentially recreating the Black Friday/Cyber Monday holiday there. Similarly, the Japanese Fukubukuro ('Lucky Bag') holiday is being adapted by other countries such as Korea and the U.S. International shipping support companies are also emerging that help customers to identify and receive products from other countries. U.S. department stores also provide free shipping on international orders for certain items. As these structural changes are occurring and new options for global shopping emerge, the need to understand the role of shoppers’ motivations becomes even more important. For example, the Cyber Monday results are particularly relevant to the new landscape with e-commerce and cross-cultural opportunities, since many of these events involve e-commerce. Within today’s global market, physical location of a retail store is no longer a limitation to growing one’s market share. From a consumer perspective, it is important to investigate how shopping motivations are related to e-commerce seasonal events. From a retail perspective, understanding the shopping motivations of international customers would help retailers to expand and better tailor their seasonal shopping events beyond the boundaries of their own countries. From a collaborative perspective, research on this topic can include interdisciplinary researchers, including those from fashion merchandising, marketing, retailing, and psychology.

Keywords: Black Friday, cross-cultural research, Cyber Monday, seasonal shopping behavior

Procedia PDF Downloads 393
1363 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 215
1362 Mixed Mode Fracture Analyses Using Finite Element Method of Edge Cracked Heavy Spinning Annulus Pulley

Authors: Bijit Kalita, K. V. N. Surendra

Abstract:

Rotating disk is one of the most indispensable parts of a rotating machine. Rotating disk has found many applications in the diverging field of science and technology. In this paper, we have taken into consideration the problem of a heavy spinning disk mounted on a rotor system acted upon by boundary traction. Finite element modelling is used at various loading condition to determine the mixed mode stress intensity factors. The effect of combined shear and normal traction on the boundary is incorporated in the analysis under the action of gravity. The variation near the crack tip is characterized in terms of the stress intensity factor (SIF) with an aim to find the SIF for a wide range of parameters. The results of the finite element analyses carried out on the compressed disk of a belt pulley arrangement using fracture mechanics concepts are shown. A total of hundred cases of the problem are solved for each of the variations in loading arc parameter and crack orientation using finite element models of the disc under compression. All models were prepared and analyzed for the uncracked disk, disk with a single crack at different orientation emanating from shaft hole as well as for a disc with pair of cracks emerging from the same center hole. Curves are plotted for various loading conditions. Finally, crack propagation paths are determined using kink angle concepts.

Keywords: crack-tip deformations, static loading, stress concentration, stress intensity factor

Procedia PDF Downloads 138
1361 Wellbore Stability Evaluation of Ratawi Shale Formation

Authors: Raed Hameed Allawi

Abstract:

Wellbore instability problems are considered the majority challenge for several wells in the Ratawi shale formation. However, it results in non-productive (NPT) time and increased well-drilling expenditures. This work aims to construct an integrated mechanical earth model (MEM) to predict the wellbore failure and design optimum mud weight to improve the drilling efficiency of future wells. The MEM was based on field data, including open-hole wireline logging and measurement data. Several failure criteria were applied in this work, including Modified Lade, Mogi-Coulomb, and Mohr-Coulomb that utilized to calculate the proper mud weight and practical drilling paths and orientations. Results showed that the leading cause of wellbore instability problems was inadequate mud weight. Moreover, some improper drilling practices and heterogeneity of Ratawi formation were additional causes of the increased risk of wellbore instability. Therefore, the suitable mud weight for safe drilling in the Ratawi shale formation should be 11.5-13.5 ppg. Furthermore, the mud weight should be increased as required depending on the trajectory of the planned well. The outcome of this study is as practical tools to reduce non-productive time and well costs and design future neighboring deviated wells to get high drilling efficiency. In addition, the current results serve as a reference for similar fields in that region because of the lacking of published studies regarding wellbore instability problems of the Ratawi Formation in southern Iraqi oilfields.

Keywords: wellbore stability, hole collapse, horizontal stress, MEM, mud window

Procedia PDF Downloads 183
1360 Environmentally Friendly KOH and NH4OH-KOH Pulping of Rice Straw

Authors: Omid Ghaffarzadeh Mollabashi, Sara Khorshidi, Hossein Kermanian Seyed, Majid Zabihzadeh

Abstract:

The main problem that hinders the intensive use of non-wood raw materials in papermaking industry is the environmental pollution caused by black liquor. As a matter of fact, black liquor of nonwood pulping is discharged to the environment due to the lack of recovery. Traditionally, NaOH pulping produces Na-based black liquor that may increase soil erosion and reduce soil permeability. With substitution of KOH/NH4OH with NaOH as the cooking liquor, K and N can act as a soil fertilizer while offering an environmentally acceptable disposal alternative. For this purpose, rice straw samples were pulped under the following conditions; Constant factors were: straw weight: 100 gram (based on oven dry), liquor to straw ratio 7:1 and maximum temperature, 170 and 180 ºC. Variable factors for KOH cooks were: KOH dosage of 14, 17 and %20 on oven dry of straw and times at maximum temperature of 60 and 90 minutes. For KOH-NH4OH cooks, KOH dosage of 5 and %10 and NH4OH dosage of 25 and %35, both based as oven dry of straw were applied. Besides, time at maximum temperature was 90 minutes. Yield ranges of KOH and KOH-NH4OH pulp samples were obtained from 37.28 to 48.62 and 45.63 to 48.08 percent, respectively. In addition, Kappa number ranged from 21.91 to 29.85 and 55.15 to 56.25, respectively. In comparison with soda, soda-AQ, cold soda, kraft, EDA (dissolving), De-Ethylene Glycol (dissolving), burst and tensile index for KOH pulp was more in similar cooking condition. With an exception of soda pulps, tear index of the mentioned pulp is more than all compared treatments. Therefore, it can be resulted that KOH pulping method is an appropriate choice for making paper of the rice straw. Also, compared to KOH-NH4OH, KOH pulping method is more appropriate choice because of better pulping results.

Keywords: environmentally friendly process, rice straw, NH4OH-KOH pulping, pulp properties

Procedia PDF Downloads 264
1359 Numerical Investigations on Dynamic Stall of a Pitching-Plunging Helicopter Blade Airfoil

Authors: Xie Kai, Laith K. Abbas, Chen Dongyang, Yang Fufeng, Rui Xiaoting

Abstract:

Effect of plunging motion on the pitch oscillating NACA0012 airfoil is investigated using computational fluid dynamics (CFD). A simulation model based on overset grid technology and k - ω shear stress transport (SST) turbulence model is established, and the numerical simulation results are compared with available experimental data and other simulations. Two cases of phase angle φ = 0, μ which represents the phase difference between the pitching and plunging motions of an airfoil are performed. Airfoil vortex generation, moving, and shedding are discussed in detail. Good agreements have been achieved with the available literature. The upward plunging motion made the equivalent angle of attack less than the actual one during pitching analysis. It is observed that the formation of the stall vortex is suppressed, resulting in a decrease in the lift coefficient and a delay of the stall angle. However, the downward plunging motion made the equivalent angle of attack higher the actual one.

Keywords: dynamic stall, pitching-plunging, computational fluid dynamics, helicopter blade rotor, airfoil

Procedia PDF Downloads 220