Search results for: integrity pact
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 737

Search results for: integrity pact

317 Denoising Transient Electromagnetic Data

Authors: Lingerew Nebere Kassie, Ping-Yu Chang, Hsin-Hua Huang, , Chaw-Son Chen

Abstract:

Transient electromagnetic (TEM) data plays a crucial role in hydrogeological and environmental applications, providing valuable insights into geological structures and resistivity variations. However, the presence of noise often hinders the interpretation and reliability of these data. Our study addresses this issue by utilizing a FASTSNAP system for the TEM survey, which operates at different modes (low, medium, and high) with continuous adjustments to discretization, gain, and current. We employ a denoising approach that processes the raw data obtained from each acquisition mode to improve signal quality and enhance data reliability. We use a signal-averaging technique for each mode, increasing the signal-to-noise ratio. Additionally, we utilize wavelet transform to suppress noise further while preserving the integrity of the underlying signals. This approach significantly improves the data quality, notably suppressing severe noise at late times. The resulting denoised data exhibits a substantially improved signal-to-noise ratio, leading to increased accuracy in parameter estimation. By effectively denoising TEM data, our study contributes to a more reliable interpretation and analysis of underground structures. Moreover, the proposed denoising approach can be seamlessly integrated into existing ground-based TEM data processing workflows, facilitating the extraction of meaningful information from noisy measurements and enhancing the overall quality and reliability of the acquired data.

Keywords: data quality, signal averaging, transient electromagnetic, wavelet transform

Procedia PDF Downloads 64
316 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 465
315 Anti Staphylococcus aureus and Methicillin Resistant Staphylococcus aureus Action of Thermophilic Fungi Acrophialophora levis IBSD19 and Determination of Its Mode of Action Using Electron Microscopy

Authors: Shivankar Agrawal, Indira Sarangthem

Abstract:

Staphylococcus aureus and Methicillin-resistant Staphylococcus aureus (MRSA) remains one of the major causes of healthcare-associated and community-onset infections worldwide. Hence the search for non-toxic natural compounds having antibacterial activity has intensified for future drug development. The exploration of less studied niches of Earth can highly increase the possibility to discover novel bioactive compounds. Therefore, in this study, the cultivable fraction of fungi from the sediments of natural hot springs has been studied to mine potential fungal candidates with antibacterial activity against the human pathogen Staphylococcus aureus and Methicillin-resistant Staphylococcus aureus. We isolated diverse strains of thermophilic fungi from a collection of samples from sediment. Following a standard method, we isolated a promising thermophilic fungus strain IBSD19, identified as Acrophialophora levis, possessing the potential to produce an anti-Staphylococcus aureus agent. The growth conditions were optimized and scaled to fermentation, and its produced extract was subjected to chemical extraction. The ethyl acetate fraction was found to display significant activity against Staphylococcus aureus and MRSA with a minimum inhibitory concentration (MIC) of 0.5 mg/ml and 4 mg/ml, respectively. The cell membrane integrity assay and SEM suggested that the fungal metabolites cause bacteria clustering and further lysis of the cell.

Keywords: antibacterial activity, antioxidant, fungi, Staphylococcus aureus, MRSA, thermophiles

Procedia PDF Downloads 113
314 Correlation of P53 Gene Expression With Serum Alanine Transaminase Levels and Hepatitis B Viral Load in Cirrhosis and Hepatocellular Carcinoma Patients

Authors: Umme Shahera, Saifullah Munshi, Munira Jahan, Afzalun Nessa, Shahinul Alam, Shahina Tabassum

Abstract:

The development of HCC is a multi-stage process. Several extrinsic factors, such as aflatoxin, HBV, nutrition, alcohol, and trace elements are thought to initiate or/and promote the hepatocarcinogenesis. Alteration of p53 status is an important intrinsic factor in this process as p53 is essential for preventing inappropriate cell proliferation and maintaining genome integrity following genotoxic stress. This study was designed to assess the correlation of p53 gene expression with HBV-DNA and serum Alanine transaminase (ALT) in patients with cirrhosis and HCC. The study was conducted among 60 patients. The study population were divided into four groups (15 in each groups)-HBV positive cirrhosis, HBV negative cirrhosis, HBV positive HCC and HBV negative HCC. Expression of p53 gene was observed using real time PCR. P53 gene expressions in the above mentioned groups were correlated with serum ALT level and HBV viral load. p53 gene was significantly higher in HBV-positive patients with HCC than HBV-positive cirrhosis. Similarly, the expression of p53 was significantly higher in HBV-positive HCC than HBV-negative HCC patients. However, the expression of p53 was reduced in HBV-positive cirrhosis in comparison with HBV-negative cirrhosis. P53 gene expression in liver was not correlated with the serum levels of ALT in any of the study groups. HBV- DNA load also did not correlated with p53 gene expression in HBV positive HCC and HBV positive cirrhosis patients. This study shows that there was no significant change with the expression of p53 gene in any of the study groups with ALT level or viral load, though differential expression of p53 gene were observed in cirrhosis and HCC patients.

Keywords: P53, ALT, HBV-DNA, liver cirrhosis, hepatocellular carcinoma

Procedia PDF Downloads 70
313 Assessment of the Remains in Historic Urban Area Based on Spatial Prototype: Case Study on Jingmen City, China

Authors: Guangtong Xu, Yi He

Abstract:

Like most historic and cultural cities in China, the historic urban area of Jingmen city is facing a typical spatial problem of fragmentation and fuzzification. This study focuses on exploring a method for evaluating the existing values of historic urban area based on spatial prototype, a concept introduced into urban morphology from 'Archetype' in architectural typology. As the spatial elements and built-up relationship of historic city, spatial prototype has habitual structural characteristics and formal modulus. It is the inherent logic and order rules behind the scattered historic environment, providing a clue to understand the spatial characteristics and a basis for guiding the construction and conservation in historic urban areas. Three criteria, the resolution of historical elements, the completeness of historical structure and the renewal potential of associated land, were selected to construct the integrated assessment system. These three dimensions are linked to the spatial prototype and its constituent elements, as well as the transformation relationship in ancient and present day. The results showed that historic urban areas have changed from a holistic city to different existing types dominated by their historic structure elements. It is necessary to improve the pertinence of planning strategies and develop diversified management measures in the conservation scope of historic urban area. Moreover, a constructive-conservation strategy should be put forward to enhance the integrity of historic urban area based on the trace of spatial prototype and evaluation results.

Keywords: constructive conservation, existing value, historic urban area, spatial prototype

Procedia PDF Downloads 140
312 The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty

Authors: Isaias Teklia Berhe

Abstract:

A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the jus ad bellum case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission’s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia’s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of effectivites under international law, the sanctity of colonially determined boundaries, Ethiopia’s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission’s decision. The paper will also argue that the Commission confused Eritrea’s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the jus ad bellum case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled.

Keywords: armed attack, Eritrea, Ethiopia, self-defense, territorial integrity, use of force

Procedia PDF Downloads 263
311 Significance of Transient Data and Its Applications in Turbine Generators

Authors: Chandra Gupt Porwal, Preeti C. Porwal

Abstract:

Transient data reveals much about the machine's condition that steady-state data cannot. New technologies make this information much more available for evaluating the mechanical integrity of a machine train. Recent surveys at various stations indicate that simplicity is preferred over completeness in machine audits throughout the power generation industry. This is most clearly shown by the number of rotating machinery predictive maintenance programs in which only steady-state vibration amplitude is trended while important transient vibration data is not even acquired. Efforts have been made to explain what transient data is, its importance, the types of plots used for its display, and its effective utilization for analysis. In order to demonstrate the value of measuring transient data and its practical application in rotating machinery for resolving complex and persistent issues with turbine generators, the author presents a few case studies that highlight the presence of rotor instabilities due to the shaft moving towards the bearing centre in a 100 MM LMZ unit located in the Northern Capital Region (NCR), heavy misalignment noticed—especially after 2993 rpm—caused by loose coupling bolts, which prevented the machine from being synchronized for more than four months in a 250 MW KWU unit in the Western Region (WR), and heavy preload noticed at Intermediate pressure turbine (IPT) bearing near HP- IP coupling, caused by high points on coupling faces at a 500 MW KWU unit in the Northern region (NR), experienced at Indian power plants.

Keywords: transient data, steady-state-data, intermediate -pressure-turbine, high-points

Procedia PDF Downloads 33
310 Machine Learning Strategies for Data Extraction from Unstructured Documents in Financial Services

Authors: Delphine Vendryes, Dushyanth Sekhar, Baojia Tong, Matthew Theisen, Chester Curme

Abstract:

Much of the data that inform the decisions of governments, corporations and individuals are harvested from unstructured documents. Data extraction is defined here as a process that turns non-machine-readable information into a machine-readable format that can be stored, for instance, in a database. In financial services, introducing more automation in data extraction pipelines is a major challenge. Information sought by financial data consumers is often buried within vast bodies of unstructured documents, which have historically required thorough manual extraction. Automated solutions provide faster access to non-machine-readable datasets, in a context where untimely information quickly becomes irrelevant. Data quality standards cannot be compromised, so automation requires high data integrity. This multifaceted task is broken down into smaller steps: ingestion, table parsing (detection and structure recognition), text analysis (entity detection and disambiguation), schema-based record extraction, user feedback incorporation. Selected intermediary steps are phrased as machine learning problems. Solutions leveraging cutting-edge approaches from the fields of computer vision (e.g. table detection) and natural language processing (e.g. entity detection and disambiguation) are proposed.

Keywords: computer vision, entity recognition, finance, information retrieval, machine learning, natural language processing

Procedia PDF Downloads 89
309 Structural Analysis and Strengthening of the National Youth Foundation Building in Igoumenitsa, Greece

Authors: Chrysanthos Maraveas, Argiris Plesias, Garyfalia G. Triantafyllou, Konstantinos Petronikolos

Abstract:

The current paper presents a structural assessment and proposals for retrofit of the National Youth Foundation Building, an existing reinforced concrete (RC) building in the city of Igoumenitsa, Greece. The building is scheduled to be renovated in order to create a Municipal Cultural Center. The bearing capacity and structural integrity have been investigated in relation to the provisions and requirements of the Greek Retrofitting Code (KAN.EPE.) and European Standards (Eurocodes). The capacity of the existing concrete structure that makes up the two central buildings in the complex (buildings II and IV) has been evaluated both in its present form and after including several proposed architectural interventions. The structural system consists of spatial frames of columns and beams that have been simulated using beam elements. Some RC elements of the buildings have been strengthened in the past by means of concrete jacketing and have had cracks sealed with epoxy injections. Static-nonlinear analysis (Pushover) has been used to assess the seismic performance of the two structures with regard to performance level B1 from KAN.EPE. Retrofitting scenarios are proposed for the two buildings, including type Λ steel bracings and placement of concrete shear walls in the transverse direction in order to achieve the design-specification deformation in each applicable situation, improve the seismic performance, and reduce the number of interventions required.

Keywords: earthquake resistance, pushover analysis, reinforced concrete, retrofit, strengthening

Procedia PDF Downloads 267
308 Mass Media and Electoral Conflict Management in Kogi State, Nigeria

Authors: Okpanachi Linus Odiji, Chris Ogwu Attah

Abstract:

Election is no doubt widely assumed as one of the most suitable means of resolving political quagmires even though it has never been bereft of conflict which can manifest before, during, or after polls. What, however, advances democracy and promotes electoral integrity is the existence and effectiveness of institutional frameworks for electoral conflict management. Electoral conflicts are no doubt unique in the sense that they represent the struggles of people over the control of public resources. In most cases, the stakes involved are high and emotional that they do not only undermine inter-group relationship but also threaten national security. The need, therefore, for an effectively functional conflict management apparatus becomes imperative. While at the State level, there exist numerous governmental initiatives at various electoral stages aimed at managing conflicts, this paper examines the activities of the mass media, which is another prominent stakeholder in the electoral process. Even though media influence has increased tremendously in the last decade, researchers are yet to agree on its utility in the management of conflicts. Guided by the social responsibility theory of media reporting and drawing data from observed trends in Kogi state, the paper, which context analyses the 2019 gubernatorial election coverage in the state, observes both conflict escalation and de-escalation roles in the media. To mitigate conflict reporting misrepresentation, therefore, a common approach to conflict reporting should be designed and ordered by the National Broadcasting Commission as well as the Nigerian Press Council. This should be garnished with the training of journalists on conflict reporting and development of a standard conflict reporting procedure.

Keywords: conflict management, electoral conflict, mass media, media reporting

Procedia PDF Downloads 120
307 Pressure Relief in Prosthetic Sockets through Hole Implementation Using Different Materials

Authors: Gabi N. Nehme

Abstract:

Below-knee amputees commonly experience asymmetrical gait patterns. It is generally believed that ischemia is related to the formation of pressure sores due to uneven distribution of forces. Micro-vascular responses can reveal local malnutrition. Changes in local skin blood supply under various external loading conditions have been studied for a number of years. Radionuclide clearance, photo-plethysmography, trans-cutaneous oxygen tension along with other studies showed that the blood supply would be influenced by the epidermal forces, and the rate and the amount of blood supply would decrease with increased epidermal loads being shear forces or normal forces. Several cases of socket designs were investigated using Finite Element Model (FEM) and Design of Experiment (DOE) to increase flexibility and minimize the pressure at the limb/socket interface using ultra high molecular weight polyethylene (UHMWPE) and polyamide 6 (PA6) or Duraform. The pressure reliefs at designated areas where reducing thickness is involved are seen to be critical in determination of amputees’ comfort and are very important to clinical applications. Implementing a hole between the Patellar Tendon (PT) and Distal Tibia (DT) would decrease stiffness and increase prosthesis range of motion where flexibility is needed. In addition, displacement and prosthetic energy storage increased without compromising mechanical efficiency and prosthetic design integrity.

Keywords: patellar tendon, distal tibia, prosthetic socket relief areas, hole implementation

Procedia PDF Downloads 390
306 Comparative Fragility Analysis of Shallow Tunnels Subjected to Seismic and Blast Loads

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground structures are crucial components which required detailed analysis and design. Tunnels, for instance, are massively constructed as transportation infrastructures and utilities network especially in urban environments. Considering their prime importance to the economy and public safety that cannot be compromised, thus any instability to these tunnels will be highly detrimental to their performance. Recent experience suggests that tunnels become vulnerable during earthquakes and blast scenarios. However, a very limited amount of studies has been carried out to study and understanding the dynamic response and performance of underground tunnels under those unpredictable extreme hazards. In view of the importance of enhancing the resilience of these structures, the overall aims of the study are to evaluate probabilistic future performance of shallow tunnels subjected to seismic and blast loads by developing detailed fragility analysis. Critical non-linear time history numerical analyses using sophisticated finite element software Midas GTS NX have been presented about the current methods of analysis, taking into consideration of structural typology, ground motion and explosive characteristics, effect of soil conditions and other associated uncertainties on the tunnel integrity which may ultimately lead to the catastrophic failure of the structures. The proposed fragility curves for both extreme loadings are discussed and compared which provide significant information the performance of the tunnel under extreme hazards which may beneficial for future risk assessment and loss estimation.

Keywords: fragility analysis, seismic loads, shallow tunnels, blast loads

Procedia PDF Downloads 316
305 SPBAC: A Semantic Policy-Based Access Control for Database Query

Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage

Abstract:

Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.

Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML

Procedia PDF Downloads 64
304 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 155
303 Numerical Modal Analysis of a Multi-Material 3D-Printed Composite Bushing and Its Application

Authors: Paweł Żur, Alicja Żur, Andrzej Baier

Abstract:

Modal analysis is a crucial tool in the field of engineering for understanding the dynamic behavior of structures. In this study, numerical modal analysis was conducted on a multi-material 3D-printed composite bushing, which comprised a polylactic acid (PLA) outer shell and a thermoplastic polyurethane (TPU) flexible filling. The objective was to investigate the modal characteristics of the bushing and assess its potential for practical applications. The analysis involved the development of a finite element model of the bushing, which was subsequently subjected to modal analysis techniques. Natural frequencies, mode shapes, and damping ratios were determined to identify the dominant vibration modes and their corresponding responses. The numerical modal analysis provided valuable insights into the dynamic behavior of the bushing, enabling a comprehensive understanding of its structural integrity and performance. Furthermore, the study expanded its scope by investigating the entire shaft mounting of a small electric car, incorporating the 3D-printed composite bushing. The shaft mounting system was subjected to numerical modal analysis to evaluate its dynamic characteristics and potential vibrational issues. The results of the modal analysis highlighted the effectiveness of the 3D-printed composite bushing in minimizing vibrations and optimizing the performance of the shaft mounting system. The findings contribute to the broader field of composite material applications in automotive engineering and provide valuable insights for the design and optimization of similar components.

Keywords: 3D printing, composite bushing, modal analysis, multi-material

Procedia PDF Downloads 65
302 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 486
301 Down-Regulated Gene Expression of GKN1 and GKN2 as Diagnostic Markers for Gastric Cancer

Authors: Amer A. Hasan, Mehri Igci, Ersin Borazan, Rozhgar A. Khailany, Emine Bayraktar, Ahmet Arslan

Abstract:

Gastric cancer (GC) has high morbidity and fatality rate in various countries and is still one of the most frequent and deadly diseases. Novel mitogenic and motogenic Gastrokine1 (GKN1) and Gastrokine 2 (GKN2) genes that are highly expressed in the normal stomach epithelium and plays an important role in maintaining the integrity and homeostasis of stomach mucosal epithelial cells. Significant loss of copy number and mRNA transcript of GKN1 and GKN2 gene expression were frequently observed in all types of gastric cancer. In this study, 47 paired samples that were grouped according to the types of gastric cancer and the clinical characteristics of the patients, including gender and average of age were investigated with gene expression analysis and mutation screening by monetering RT-PCR, SSCP and nucleotide sequencing techniques. Both GKN1 and GKN2 genes were observed significantly reduced found by (Wilcoxon signed rank test; p<0.05). As a result of gene screening, no mutation (no different genotype) was detected. It is considered that gene mutations are not the cause of inactivation of gastrokines. In conclusion, the mRNA expression level of GKN1 and GKN2 genes statistically was decreased regardless the gender, age or cancer type of patients. Reduced of gastrokine genes seems to occur at the initial steps of cancer development. In order to understand the investigation between gastric cancer and diagnostic biomarker; further analysis is necessary.

Keywords: gastric cancer, diagnostic biomarker, nucleotide sequencing, semi-quantitative RT-PCR

Procedia PDF Downloads 452
300 Numerical and Experimental Analysis of Stiffened Aluminum Panels under Compression

Authors: Ismail Cengiz, Faruk Elaldi

Abstract:

Within the scope of the study presented in this paper, load carrying capacity and buckling behavior of a stiffened aluminum panel designed by adopting current ‘buckle-resistant’ design application and ‘Post –Buckling’ design approach were investigated experimentally and numerically. The test specimen that is stabilized by Z-type stiffeners and manufactured from aluminum 2024 T3 Clad material was test under compression load. Buckling behavior was observed by means of 3 – dimensional digital image correlation (DIC) and strain gauge pairs. The experimental study was followed by developing an efficient and reliable finite element model whose ability to predict behavior of the stiffened panel used for compression test is verified by compering experimental and numerical results in terms of load – shortening curve, strain-load curves and buckling mode shapes. While finite element model was being constructed, non-linear behaviors associated with material and geometry was considered. Finally, applicability of aluminum stiffened panel in airframe design against to composite structures was evaluated thorough the concept of ‘Structural Efficiency’. This study reveals that considerable amount of weight saving could be gained if the concept of ‘post-buckling design’ is preferred to the already conventionally used ‘buckle resistant design’ concept in aircraft industry without scarifying any of structural integrity under load spectrum.

Keywords: post-buckling, stiffened panel, non-linear finite element method, aluminum, structural efficiency

Procedia PDF Downloads 122
299 Selective Oxidation of 6Mn-2Si Advanced High Strength Steels during Intercritical Annealing Treatment

Authors: Maedeh Pourmajidian, Joseph R. McDermid

Abstract:

Advanced High Strength Steels are revolutionizing both the steel and automotive industries due to their high specific strength and ability to absorb energy during crash events. This allows manufacturers to design vehicles with significantly increased fuel efficiency without compromising passenger safety. To maintain the structural integrity of the fabricated parts, they must be protected from corrosion damage through continuous hot-dip galvanizing process, which is challenging due to selective oxidation of Mn and Si on the surface of this AHSSs. The effects of process atmosphere oxygen partial pressure and small additions of Sn on the selective oxidation of a medium-Mn C-6Mn-2Si advanced high strength steel was investigated. Intercritical annealing heat treatments were carried out at 690˚C in an N2-5%H2 process atmosphere under dew points ranging from –50˚C to +5˚C. Surface oxide chemistries, morphologies, and thicknesses were determined at a variety of length scales by several techniques, including SEM, TEM+EELS, and XPS. TEM observations of the sample cross-sections revealed the transition to internal oxidation at the +5˚C dew point. EELS results suggested that the internal oxides network was composed of a multi-layer oxide structure with varying chemistry from oxide core towards the outer part. The combined effect of employing a known surface active element as a function of process atmosphere on the surface structure development and the possible impact on reactive wetting of the steel substrates by the continuous galvanizing zinc bath will be discussed.

Keywords: 3G AHSS, hot-dip galvanizing, oxygen partial pressure, selective oxidation

Procedia PDF Downloads 374
298 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 184
297 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 44
296 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 19
295 Structural and Modal Analyses of an s1223 High-Lift Airfoil Wing for Drone Design

Authors: Johnson Okoduwa Imumbhon, Mohammad Didarul Alam, Yiding Cao

Abstract:

Structural analyses are commonly employed to test the integrity of aircraft component systems in the design stage to demonstrate the capability of the structural components to withstand what it was designed for, as well as to predict potential failure of the components. The analyses are also essential for weight minimization and selecting the most resilient materials that will provide optimal outcomes. This research focuses on testing the structural nature of a high-lift low Reynolds number airfoil profile design, the Selig S1223, under certain loading conditions for a drone model application. The wing (ribs, spars, and skin) of the drone model was made of carbon fiber-reinforced polymer and designed in SolidWorks, while the finite element analysis was carried out in ANSYS mechanical in conjunction with the lift and drag forces that were derived from the aerodynamic airfoil analysis. Additionally, modal analysis was performed to calculate the natural frequencies and the mode shapes of the wing structure. The structural strain and stress determined the minimal deformations under the wing loading conditions, and the modal analysis showed the prominent modes that were excited by the given forces. The research findings from the structural analysis of the S1223 high-lift airfoil indicated that it is applicable for use in an unmanned aerial vehicle as well as a novel reciprocating-airfoil-driven vertical take-off and landing (VTOL) drone model.

Keywords: CFRP, finite element analysis, high-lift, S1223, strain, stress, VTOL

Procedia PDF Downloads 187
294 Conflict, Confusion or Compromise: Violence against Women, A Case Study of Pakistan

Authors: Farhat Jabeen, Syed Asfaq Hussain Bukhari

Abstract:

In the wake of the contemporary period the basic objective of the research paper points out that socio-cultural scenario of Pakistan reveals that gender-based violence is deep rooted in the society irrespective of language and ethnicity. This paper would reconnaissance the possibility reforms in Pakistan for diminishing of violence. Women are not given their due role, rights, and respect. Furthermore, they are treated as chattels. This presentation will cover the socio-customary practices in the context of discrimination, stigmatization, and violence against women. This paper envisages justice in a broader sense of recognition of rights for women, and masculine structure of society, socio-customary practices and discrimination against women are a very serious concern which needs to be understood as a multidimensional problem. The paper will specially focus on understanding the existing obstacles of women in Pakistan in the constitutional scenario. Women stumble across discrimination and human rights manipulations, voluptuous violation and manipulation including domestic viciousness and are disadvantaged by laws, strategies, and programming that do not take their concerns into considerations. This presentation examines the role of honour killings among Pakistani community. This affects their self-assurance and capability to elevation integrity campaign where gender inequalities and discrimination in social, legal domain are to be put right. This paper brings to light the range of practices, laws and legal justice regarding the status of women and also covers attitude towards compensations for murders/killings, domestic violence, rape, adultery, social behavior and recourse to justice.

Keywords: discrimination, cultural, women, violence

Procedia PDF Downloads 296
293 Geopolymer Concrete: A Review of Properties, Applications and Limitations

Authors: Abbas Ahmed Albu Shaqraa

Abstract:

The concept of a safe environment and low greenhouse gas emissions is a common concern especially in the construction industry. The produced carbon dioxide (CO2) emissions are nearly a ton in producing only one ton of Portland cement, which is the primary ingredient of concrete. Current studies had investigated the utilization of several waste materials in producing a cement free concrete. The geopolymer concrete is a green material that results from the reaction of aluminosilicate material with an alkaline liquid. A summary of several recent researches in geopolymer concrete will be presented in this manuscript. In addition, the offered presented review considers the use of several waste materials including fly ash, granulated blast furnace slag, cement kiln dust, kaolin, metakaolin, and limestone powder as binding materials in making geopolymer concrete. Moreover, the mechanical, chemical and thermal properties of geopolymer concrete will be reviewed. In addition, the geopolymer concrete applications and limitations will be discussed as well. The results showed a high early compressive strength gain in geopolymer concrete when dry- heating or steam curing was performed. Also, it was stated that the outstanding acidic resistance of the geopolymer concrete made it possible to be used where the ordinary Portland cement concrete was doubtable. Thus, the commercial geopolymer concrete pipes were favored for sewer system in case of high acidic conditions. Furthermore, it was reported that the geopolymer concrete could stand up to 1200 °C in fire without losing its strength integrity whereas the Portland cement concrete was losing its function upon heating to some 100s °C only. However, the geopolymer concrete still considered as an emerging field and occupied mainly by the precast industries.

Keywords: geopolymer concrete, Portland cement concrete, alkaline liquid, compressive strength

Procedia PDF Downloads 197
292 Marine Litter and Microplastic Pollution in Mangrove Sediments in The Sea of Oman

Authors: Muna Al-Tarshi, Dobretsov Sergey, Wenresti Gallardo

Abstract:

Marine litter pollution is a global concern that has wide-ranging ecological, societal, and economic implications, along with potential health risks for humans. In Oman, inadequate solid waste management has led to the accumulation of litter in mangrove ecosystems. However, there is a dearth of information on marine litter and microplastic pollution in Omani mangroves, impeding the formulation of effective mitigation strategies. To address this knowledge gap, we conducted a comprehensive assessment of marine litter and microplastics in mangrove sediments in the Sea of Oman. Our study measured the average abundance of marine litter, which ranged from 0.83±1.03 to 19.42±8.52 items/m2. Notably, plastics constituted the majority of litter, accounting for 73-96% of all items, with soft plastics being the most prevalent. Furthermore, we investigated microplastic concentrations in the sediments, finding levels ranging from 6 to 256 pieces /kg. Among the studied areas, afforested mangroves in Al-Sawadi exhibited the highest average abundance of microplastics (27.52±5.32 pieces/ kg), while the Marine Protected Area Al Qurum had the lowest average abundance (0.60±1.12 pieces /kg). These findings significantly contribute to our understanding of marine litter and microplastic pollution in Omani mangroves. They provide valuable baseline data for future monitoring initiatives and the development of targeted management strategies. Urgent action is needed to implement effective waste management practices and interventions to protect the ecological integrity of mangrove ecosystems in Oman and mitigate the risks associated with marine litter and microplastics.

Keywords: microplastics, anthropogenic marine litter, ftir, polymer, khawr, mangrove, sediment

Procedia PDF Downloads 63
291 Corrosion Risk Assessment/Risk Based Inspection (RBI)

Authors: Lutfi Abosrra, Alseddeq Alabaoub, Nuri Elhaloudi

Abstract:

Corrosion processes in the Oil & Gas industry can lead to failures that are usually costly to repair, costly in terms of loss of contaminated product, in terms of environmental damage and possibly costly in terms of human safety. This article describes the results of the corrosion review and criticality assessment done at Mellitah Gas (SRU unit) for pressure equipment and piping system. The information gathered through the review was intended for developing a qualitative RBI study. The corrosion criticality assessment has been carried out by applying company procedures and industrial recommended practices such as API 571, API 580/581, ASME PCC 3, which provides a guideline for establishing corrosion integrity assessment. The corrosion review is intimately related to the probability of failure (POF). During the corrosion study, the process units are reviewed by following the applicable process flow diagrams (PFDs) in the presence of Mellitah’s personnel from process engineering, inspection, and corrosion/materials and reliability engineers. The expected corrosion damage mechanism (internal and external) was identified, and the corrosion rate was estimated for every piece of equipment and corrosion loop in the process units. A combination of both Consequence and Likelihood of failure was used for determining the corrosion risk. A qualitative consequence of failure (COF) for each individual item was assigned based on the characteristics of the fluid as per its flammability, toxicity, and pollution into three levels (High, Medium, and Low). A qualitative probability of failure (POF)was applied to evaluate the internal and external degradation mechanism, a high-level point-based (0 to 10) for the purpose of risk prioritizing in the range of Low, Medium, and High.

Keywords: corrosion, criticality assessment, RBI, POF, COF

Procedia PDF Downloads 48
290 A Comparative Analysis of Traditional and Advanced Methods in Evaluating Anti-corrosion Performance of Sacrificial and Barrier Coatings

Authors: Kazem Sabet-Bokati, Ilia Rodionov, Marciel Gaier, Kevin Plucknett

Abstract:

Protective coatings play a pivotal role in mitigating corrosion and preserving the integrity of metallic structures exposed to harsh environmental conditions. The diversity of corrosive environments necessitates the development of protective coatings suitable for various conditions. Accurately selecting and interpreting analysis methods is crucial in identifying the most suitable protective coatings for the various corrosive environments. This study conducted a comprehensive comparative analysis of traditional and advanced methods to assess the anti-corrosion performance of sacrificial and barrier coatings. The protective performance of pure epoxy, zinc-rich epoxy, and cold galvanizing coatings was evaluated using salt spray tests, together with electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization methods. The performance of each coating was thoroughly differentiated under both atmospheric and immersion conditions. The distinct protective performance of each coating against atmospheric corrosion was assessed using traditional standard methods. Additionally, the electrochemical responses of these coatings in immersion conditions were systematically studied, and a detailed discussion on interpreting the electrochemical responses is provided. Zinc-rich epoxy and cold galvanizing coatings offer superior anti-corrosion performance against atmospheric corrosion, while the pure epoxy coating excels in immersion conditions.

Keywords: corrosion, barrier coatings, sacrificial coatings, salt-spray, EIS, polarization

Procedia PDF Downloads 34
289 Fire Protection Performance of Different Industrial Intumescent Coatings for Steel Beams

Authors: Serkan Kocapinar, Gülay Altay

Abstract:

This study investigates the efficiency of two different industrial intumescent coatings which have different types of certifications, in the fire protection performance in steel beams in the case of ISO 834 fire for 2 hours. A better understanding of industrial intumescent coatings, which assure structural integrity and prevent a collapse of steel structures, is needed to minimize the fire risks in steel structures. A comparison and understanding of different fire protective intumescent coatings, which are Product A and Product B, are used as a thermal barrier between the steel components and the fire. Product A is tested according to EN 13381-8 and BS 476-20,22 and is certificated by ISO Standards. Product B is tested according to EN 13381-8 and ASTM UL-94 and is certificated by the Turkish Standards Institute (TSE). Generally, fire tests to evaluate the fire performance of steel components are done numerically with commercial software instead of experiments due to the high cost of an ISO 834 fire test in a furnace. Hence, there is a gap in the literature about the comparisons of different certificated intumescent coatings for fire protection in the case of ISO 834 fire in a furnace experiment for 2 hours. The experiment was carried out by using two 1-meter UPN 200 steel sections. Each one was coated by different industrial intumescent coatings. A furnace was used by the Turkish Standards Institute (TSE) for the experiment. The temperature of the protected steels and the inside of the furnace was measured with the help of 24 thermocouples which were applied before the intumescent coatings during the two hours for the performance of intumescent coatings by getting a temperature-time curve of steel components. FIN EC software was used to determine the critical temperatures of protected steels, and Abaqus was used for thermal analysis to get theoretical results to compare with the experimental results.

Keywords: fire safety, structural steel, ABAQUS, thermal analysis, FIN EC, intumescent coatings

Procedia PDF Downloads 78
288 Improving Biodegradation Behavior of Fabricated WE43 Magnesium Alloy by High-Temperature Oxidation

Authors: Jinge Liu, Shuyuan Min, Bingchuan Liu, Bangzhao Yin, Bo Peng, Peng Wen, Yun Tian

Abstract:

WE43 magnesium alloy can be additively manufactured via laser powder bed fusion (LPBF) for biodegradable applications, but the as-built WE43 exhibits an excessively rapid corrosion rate. High-temperature oxidation (HTO) was performed on the as-built WE43 to improve its biodegradation behavior. A sandwich structure including an oxide layer at the surface, a transition layer in the middle, and the matrix was generated influenced by the oxidation reaction and diffusion of RE atoms when heated at 525 ℃for 8 hours. The oxide layer consisted of Y₂O₃ and Nd₂O₃ oxides with a thickness of 2-3 μm. The transition layer is composed of α-Mg and Y₂O₃ with a thickness of 60-70 μm, while Mg24RE5 could be observed except α-Mg and Y₂O₃. The oxide layer and transition layer appeared to have an effective passivation effect. The as-built WE43 lost 40% weight after the in vitro immersion test for three days and finally broke into debris after seven days of immersion. The high-temperature oxidation samples kept the structural integrity and lost only 6.88 % weight after 28-day immersion. The corrosion rate of HTO samples was significantly controlled, which improved the biocompatibility of the as-built WE43 at the same time. The samples after HTO had better osteogenic capability according to ALP activity. Moreover, as built WE43 performed unqualified in cell adhesion and hemolytic test due to its excessively rapid corrosion rate. While as for HTO samples, cells adhered well, and the hemolysis ratio was only 1.59%.

Keywords: laser powder bed fusion, biodegradable metal, high temperature oxidation, biodegradation behavior, WE43

Procedia PDF Downloads 78