Search results for: shoulder surfing attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 803

Search results for: shoulder surfing attack

383 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 254
382 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 352
381 The Potential of On-Demand Shuttle Services to Reduce Private Car Use

Authors: B. Mack, K. Tampe-Mai, E. Diesch

Abstract:

Findings of an ongoing discrete choice study of future transport mode choice will be presented. Many urban centers face the triple challenge of having to cope with ever increasing traffic congestion, environmental pollution, and greenhouse gas emission brought about by private car use. In principle, private car use may be diminished by extending public transport systems like bus lines, trams, tubes, and trains. However, there are limits to increasing the (perceived) spatial and temporal flexibility and reducing peak-time crowding of classical public transport systems. An emerging new type of system, publicly or privately operated on-demand shuttle bus services, seem suitable to ameliorate the situation. A fleet of on-demand shuttle busses operates without fixed stops and schedules. It may be deployed efficiently in that each bus picks up passengers whose itineraries may be combined into an optimized route. Crowding may be minimized by limiting the number of seats and the inter-seat distance for each bus. The study is conducted as a discrete choice experiment. The choice between private car, public transport, and shuttle service is registered as a function of several push and pull factors (financial costs, travel time, walking distances, mobility tax/congestion charge, and waiting time/parking space search time). After the completion of the discrete choice items, the study participant is asked to rate the three modes of transport with regard to the pull factors of comfort, safety, privacy, and opportunity to engage in activities like reading or surfing the internet. These ratings are entered as additional predictors into the discrete choice experiment regression model. The study is conducted in the region of Stuttgart in southern Germany. N=1000 participants are being recruited. Participants are between 18 and 69 years of age, hold a driver’s license, and live in the city or the surrounding region of Stuttgart. In the discrete choice experiment, participants are asked to assume they lived within the Stuttgart region, but outside of the city, and were planning the journey from their apartment to their place of work, training, or education during the peak traffic time in the morning. Then, for each item of the discrete choice experiment, they are asked to choose between the transport modes of private car, public transport, and on-demand shuttle in the light of particular values of the push and pull factors studied. The study will provide valuable information on the potential of switching from private car use to the use of on-demand shuttles, but also on the less desirable potential of switching from public transport to on-demand shuttle services. Furthermore, information will be provided on the modulation of these switching potentials by pull and push factors.

Keywords: determinants of travel mode choice, on-demand shuttle services, private car use, public transport

Procedia PDF Downloads 168
380 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 85
379 Plasma Actuator Application to Control Surfaces of a Model Aircraft

Authors: Yuta Moriyama, Etsuo Morishita

Abstract:

Plasma actuator is very effective to recover stall flows over an upper airfoil surface. We first manufacture the actuator, test the stability of the device by trial and error basis and find the conditions for steady operations. We visualize the flow around an airfoil in the smoke tunnel and observe the stall recovery. The plasma actuator is stationary device and has no moving parts, and it might be an ideal device to control a model aircraft. We can use the actuator not only as a stall recovery device but also as a spoiler. We put the actuator near the leading edge of an elevator of a model aircraft as a spoiler, and measure the aerodynamic forces by a three-component balance. We observe the effect of the plasma actuator on the aerodynamic forces and the device effectiveness changes depending on the angle of attack whether it is positive or negative. We also visualize the flow caused by the plasma actuator by a desk-top Schlieren photography which is otherwise very difficult in a low-speed wind tunnel experiment.

Keywords: aerodynamics, plasma actuator, model aircraft, wind tunnel

Procedia PDF Downloads 359
378 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 67
377 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 209
376 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa

Authors: Eddy K. Mukadi

Abstract:

The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.

Keywords: asthma crisis, intensive care, general hospital, Kinshasa

Procedia PDF Downloads 218
375 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 138
374 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 289
373 A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration

Authors: Manju Verma, Parag A. Deshpande

Abstract:

Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape.

Keywords: ruthenium-porphyrin graphene, CO2 hydration, carbonic anhydrase, heterogeneous catalyst, density functional theory

Procedia PDF Downloads 241
372 Geometrical Analysis of an Atheroma Plaque in Left Anterior Descending Coronary Artery

Authors: Sohrab Jafarpour, Hamed Farokhi, Mohammad Rahmati, Alireza Gholipour

Abstract:

In the current study, a nonlinear fluid-structure interaction (FSI) biomechanical model of atherosclerosis in the left anterior descending (LAD) coronary artery is developed to perform a detailed sensitivity analysis of the geometrical features of an atheroma plaque. In the development of the numerical model, first, a 3D geometry of the diseased artery is developed based on patient-specific dimensions obtained from the experimental studies. The geometry includes four influential geometric characteristics: stenosis ratio, plaque shoulder-length, fibrous cap thickness, and eccentricity intensity. Then, a suitable strain energy density function (SEDF) is proposed based on the detailed material stability analysis to accurately model the hyperelasticity of the arterial walls. The time-varying inlet velocity and outlet pressure profiles are adopted from experimental measurements to incorporate the pulsatile nature of the blood flow. In addition, a computationally efficient type of structural boundary condition is imposed on the arterial walls. Finally, a non-Newtonian viscosity model is implemented to model the shear-thinning behaviour of the blood flow. According to the results, the structural responses in terms of the maximum principal stress (MPS) are affected more compared to the fluid responses in terms of wall shear stress (WSS) as the geometrical characteristics are varying. The extent of these changes is critical in the vulnerability assessment of an atheroma plaque.

Keywords: atherosclerosis, fluid-Structure interaction modeling, material stability analysis, and nonlinear biomechanics

Procedia PDF Downloads 78
371 Parsonage Turner Syndrome PTS, Case Report

Authors: A. M. Bumbea, A. Musetescu, P. Ciurea, A. Bighea

Abstract:

Objectives: The authors present a Parsonage Turner syndrome, a rare disease characterized by onset in apparently healthy person with shoulder and/or arm pain, sensory deficit, motor deficit. The causes are not established, could be determinate by vaccination, postoperative, immunologic disease, post traumatic etc. Methods: The authors present a woman case, 32 years old, (in 2006), no medical history, with arm pain and no other symptom. The onset was sudden with pain at very high level quantified as 10 to a 0 to 10 scale, with no response to classical analgesic and corticoids. The only drugs which can reduce the intensity of pain were oxycodone hydrochloride, 60 mg daily and pregabalinum150 mg daily. After two weeks the intensity of pain was reduced to 5. The patient started a rehabilitation program. After 6 weeks the patient associated sensory and motor deficit. We performed electromyography for upper limb that showed incomplete denervation with reduced neural transmission speed. The patient receives neurotrophic drugs and painkillers for a long period and physical and kinetic therapy. After 6 months the pain was reduced to level 2 and the patient maintained only 150 mg pregabalinum for another 6 months. Then, the evaluation showed no pain but general amiotrophy in upper limb. Results: At the evaluation in 2009, the patient developed a rheumatoid syndrome with tender and swelling joints, but no positive inflammation test, no antibodies or rheumatoid factor. After two years, in 2011 the patient develops an increase of antinuclear antibodies. This context certifies the diagnosis of lupus and the patient receives the specific therapy. Conclusions: This case is not a typical case of onset of lupus with PTS, but the onset of PTS could include the onset of an immune disease.

Keywords: lupus, arm pain, patient, swelling

Procedia PDF Downloads 320
370 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 121
369 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products

Authors: Varutorn Tulnawat, Padcharee Phasuk

Abstract:

This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.

Keywords: border trade, dea, textile, garment

Procedia PDF Downloads 238
368 Exoskeleton-Enhanced Manufacturing: A Study Exploring Psychological and Physical Effects on Assembly Operators' Wellbeing

Authors: Iveta Eimontaite, Sarah R. Fletcher, Michele Surico, Alfio Minissale, Fabio F. Abba

Abstract:

Industry 4.0 offers possibilities for increased production volumes and greater efficiency whilst at the same time presenting new opportunities and challenges for the human workforce. Exoskeletons have been used in healthcare and are now starting to be adopted in manufacturing. The potential benefits of reducing fatigue and physical strain are attractive prospects of the technology for industry; however, the novelty of exoskeletons and surrounding ethical issues raise concerns amongst the stakeholders. The current case study investigated the introduction of an upper body exoskeleton designed to support posture but not increase physical strength in a factory over three time points: before the exoskeleton was introduced, and one and two months post-introduction once operators had experienced working with it. The main focus was to evaluate changes in operators' workload, situation awareness, technology self-efficacy, and physical discomfort following the introduction of the exoskeleton. After using the exoskeleton over two months, operators reported a decrease in temporal demand and an increase in performance of the NASA TLX instrument. Furthermore, over the second month, operators' self-reported technology self-efficacy scores increased, but at the same time, their situation awareness decreased. Interestingly, operators' physical discomfort after using the exoskeleton for two months increased from not uncomfortable to quite uncomfortable in the shoulder, arm, and middle back regions. The results suggest that self-perceived task efficiency improved; however, increased discomfort and decreased situation awareness scores indicate that two months might not be long enough for the exoskeleton to be integrated into operators’ mental body schema. The paper will discuss further implications and suggestions for exoskeleton introduction to manufacturing environments.

Keywords: exoskeleton, manufacturing, mental workload, physical discomfort, situation awareness, technology self-efficacy

Procedia PDF Downloads 120
367 The Comparison of Forward Head Posture Measurements between Dominant and Non-Dominant Sides in Male Football Players and Non-Athletes

Authors: Mohamed Gomaa Mohamed

Abstract:

Background and purpose: Ideal posture involves a minimal amount of stress or strain on various body segments which are aligned and worked in harmony to protect the body from injury or progressive deformity. One of most common faulty posture encountered in clinical setting is forward head posture (FHP) that was considered one of the main predictors for neck pain. Furthermore, FHP may predispose to thoracic outlet syndrome, temporomandibular joint dysfunction, shoulder pain and headache. The large financial burden related to neck disorders management raises the need to improve the quality of assessment and rehabilitation of FHP. So, the purpose of the study is to compare between measurements of FHP as indicated with craniovertebral (CVA) and gaze angles assessed from dominant and non-dominant sides in football players who extensively use their dominant side and non-athletic subjects. Participants: Twenty-four subjects were divided into 12 football players and 12 non-athletic subjects. Methods: CVA and gaze angles were assessed through photogrammetric method. Photos were taken from dominant and non-dominant sides of the subjects while assuming standing position. Paired t-test was used to assess angles differences between dominant and non-dominant sides of the subjects. Since there were no statistical differences between CVA and gaze angles measured from dominant and non-dominant sides in each group, we pooled data together to become 24 measurements for each group (12 from dominant and 12 from non-dominant). Independent t-test was used to assess angles differences between football players and non-athletic subjects. Results: No significant differences were found between CVA and gaze angles measured from dominant and non-dominant sides of both groups (P>0.05). Also, there were no significant differences between CVA and gaze angles measured from football players and non-athletic subjects (P>0.05). Conclusion: FHP can be assessed from dominant or non-dominant sides interchangeably either in football players or non-athletic subjects. Furthermore, playing football has no impact on measurements of FHP when compared to non-athletic subjects.

Keywords: dominant side, forward head posture, football players, non-dominant side

Procedia PDF Downloads 237
366 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 426
365 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 145
364 Modifications in Design of Lap Joint of Fiber Metal Laminates

Authors: Shaher Bano, Samia Fida, Asif Israr

Abstract:

The continuous development and exploitation of materials and designs have diverted the attention of the world towards the use of robust composite materials known as fiber-metal laminates in many high-performance applications. The hybrid structure of fiber metal laminates makes them a material of choice for various applications such as aircraft skin panels, fuselage floorings, door panels and other load bearing applications. The synergistic effect of properties of metals and fibers reinforced laminates are responsible for their high damage tolerance as the metal element provides better fatigue and impact properties, while high stiffness and better corrosion properties are inherited from the fiber reinforced matrix systems. They are mostly used as a layered structure in different joint configurations such as lap and but joints. The FML layers are usually bonded with each other using either mechanical fasteners or adhesive bonds. This research work is also focused on modification of an adhesive bonded joint as a single lap joint of carbon fibers based CARALL FML has been modified to increase interlaminar shear strength and avoid delamination. For this purpose different joint modification techniques such as the introduction of spews and shoulder to modify the bond shape and use of nanofillers such as carbon nano-tubes as a reinforcement in the adhesive materials, have been utilized to improve shear strength of lap joint of the adhesively bonded FML layers. Both the simulation and experimental results showed that lap joint with spews and shoulders configuration have better properties due to stress distribution over a large area at the corner of the joint. The introduction of carbon nanotubes has also shown a positive effect on shear stress and joint strength as they act as reinforcement in the adhesive bond material.

Keywords: adhesive joint, Carbon Reinforced Aluminium Laminate (CARALL), fiber metal laminates, spews

Procedia PDF Downloads 290
363 Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion

Authors: G. K. Guseynova, V. V. Krylov, L. T. Khamidova, N. A. Polunina, V. A. Lukyanchikov

Abstract:

The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed.

Keywords: CBF, cerebral blood flow; CTA, external carotid artery; ICA, internal carotid artery; MCA, middle cerebral artery; MRA, magnetic resonance angiography; OEF, oxygen extraction fraction; TIA, transient ischaemic attack, ultrasound, low-flow bypass, anastomoses

Procedia PDF Downloads 23
362 The Effects of Impact Forces and Kinematics of Two Different Stance Position at Straight Punch Techniques in Boxing

Authors: Bergun Meric Bingul, Cigdem Bulgan, Ozlem Tore, Mensure Aydin, Erdal Bal

Abstract:

The aim of the study was to compare the effects of impact forces and some kinematic parameters with two different straight punch stance positions in boxing. 9 elite boxing athletes from the Turkish National Team (mean age± SD 19.33±2.11 years, mean height 174.22±3.79 cm, mean weight 66.0±6.62 kg) participated in this study as voluntarily. Boxing athletes performed one trial in straight punch technique for each two different stance positions (orthodox and southpaw stances) at sandbag. The trials were recorded at a frequency of 120Hz using eight synchronized high-speed cameras (Oqus 7+), which were placed, approximately at right- angles to one another. The three-dimensional motion analysis was performed with a Motion Capture System (Qualisys, Sweden). Data was transferred to Windows-based data acquisition software, which was QTM (Qualisys Track Manager). 11 segment models were used for determination of the kinematic variables (Calf, leg, punch, upperarm, lowerarm, trunk). Also, the sandbag was markered for calculation of the impact forces. Wand calibration method (with T stick) was used for field calibration. The mean velocity and acceleration of the punch; mean acceleration of the sandbag and angles of the trunk, shoulder, hip and knee were calculated. Stance differences’ data were compared with Wilcoxon test for using SPSS 20.0 program. According to the results, there were statistically significant differences found in trunk angle on the sagittal plane (yz) (p<0.05). There was a significant difference also found in sandbag acceleration and impact forces between stance positions (p < 0.05). Boxing athletes achieved more impact forces and accelerations in orthodox stance position. It is recommended that to use an orthodox stance instead of southpaw stance in straight punch technique especially for creating more impact forces.

Keywords: boxing, impact force, kinematics, straight punch, orthodox, southpaw

Procedia PDF Downloads 309
361 Analysis of Sulphur-Oxidizing Bacteria Attack on Concrete Based on Waste Materials

Authors: A. Eštoková, M. Kovalčíková, A. Luptáková, A. Sičáková, M. Ondová

Abstract:

Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching.

Keywords: biocorrosion, concrete, leaching, bacteria

Procedia PDF Downloads 437
360 The Predictors of Head and Neck Cancer-Head and Neck Cancer-Related Lymphedema in Patients with Resected Advanced Head and Neck Cancer

Authors: Shu-Ching Chen, Li-Yun Lee

Abstract:

The purpose of the study was to identify the factors associated with head and neck cancer-related lymphoedema (HNCRL)-related symptoms, body image, and HNCRL-related functional outcomes among patients with resected advanced head and neck cancer. A cross-sectional correlational design was conducted to examine the predictors of HNCRL-related functional outcomes in patients with resected advanced head and neck cancer. Eligible patients were recruited from a single medical center in northern Taiwan. Consecutive patients were approached and recruited from the Radiation Head and Neck Outpatient Department of this medical center. Eligible subjects were assessed for the Symptom Distress Scale–Modified for Head and Neck Cancer (SDS-mhnc), Brief International Classification of Functioning, Disability and Health (ICF) Core Set for Head and Neck Cancer (BCSQ-H&N), Body Image Scale–Modified (BIS-m), The MD Anderson Head and Neck Lymphedema Rating Scale (MDAHNLRS), The Foldi’s Stages of Lymphedema (Foldi’s Scale), Patterson’s Scale, UCLA Shoulder Rating Scale (UCLA SRS), and Karnofsky’s Performance Status Index (KPS). The results showed that the worst problems with body HNCRL functional outcomes. Patients’ HNCRL symptom distress and performance status are robust predictors across over for overall HNCRL functional outcomes, problems with body HNCRL functional outcomes, and activity and social functioning HNCRL functional outcomes. Based on the results of this period research program, we will develop a Cancer Rehabilitation and Lymphedema Care Program (CRLCP) to use in the care of patients with resected advanced head and neck cancer.

Keywords: head and neck cancer, resected, lymphedema, symptom, body image, functional outcome

Procedia PDF Downloads 241
359 A New Family of Flying Wing Low Reynolds Number Airfoils

Authors: Ciro Sobrinho Campolina Martins, Halison da Silva Pereira, Vitor Mainenti Leal Lopes

Abstract:

Unmanned Aerial vehicles (UAVs) has been used in a wide range of applications, from precise agriculture monitoring for irrigation and fertilization to military attack missions. Long range performance is required for many of these applications. Tailless aircrafts are commonly used as long-range configurations and, due to its small amount of stability, the airfoil shape design of its wings plays a central role on the performance of the airplane. In this work, a new family of flying wing airfoils is designed for low Reynolds number flows, typical of small-middle UAVs. Camber, thickness and their maximum positions in the chord are variables used for the airfoil geometry optimization. Aerodynamic non-dimensional coefficients were obtained by the well-established Panel Method. High efficient airfoils with small pitch moment coefficient are obtained from the analysis described and its aerodynamic polars are plotted.

Keywords: airfoil design, flying wing, low Reynolds number, tailless aircraft, UAV

Procedia PDF Downloads 615
358 Effect of Nickel Coating on Corrosion of Alloys in Molten Salts

Authors: Divya Raghunandanan, Bhavesh D. Gajbhiye, C. S. Sona, Channamallikarjun S. Mathpati

Abstract:

Molten fluoride salts are considered as potential coolants for next generation nuclear plants where the heat can be utilized for production of hydrogen and electricity. Among molten fluoride salts, FLiNaK (LiF-NaF-KF: 46.5-11.5-42 mol %) is a potential candidate for the coolant due to its superior thermophysical properties such as high temperature stability, boiling point, volumetric heat capacity and thermal conductivity. Major technical challenge in implementation is the selection of structural material which can withstand corrosive nature of FLiNaK. Corrosion study of alloys SS 316L, Hastelloy B, Ni-201 was performed in molten FLiNaK at 650°C. Nickel was found to be more resistant to corrosive attack in molten fluoride medium. Corrosion experiments were performed to study the effect of nickel coating on corrosion of alloys SS 316L and Hastelloy B. Weight loss of the alloys due to corrosion was measured and corrosion rate was estimated. The surface morphology of the alloys was analyzed by Scanning Electron Microscopy.

Keywords: corrosion, FLiNaK, hastelloy, weight loss

Procedia PDF Downloads 430
357 Violence and Unintentional Injuries among Secondary School Students in Jordan

Authors: Malakeh Zuhdi Malak, Mahmoud Taher Kalaldeh

Abstract:

In Jordan, no available data exists regarding violence and unintentional injuries among secondary school students aged 15-19 years. The purpose of this study was to assess the violence and unintentional injuries among those students, and to compare these two behaviors between male and female students. A descriptive cross-sectional design was carried out on randomly selected eight comprehensive secondary schools (four schools for females and four schools for males) from the public school educational directorate located in Amman. A modified Arabic version of the General School Health Survey questionnaire was used to measure violence and unintentional injuries. A sample of 750 secondary school students was studied. The findings showed that 26.8 % of students had been physically attacked. Overall, 43.3 % of students had been involved in a physical fight and 20.1% of them had been bullied. Overall, 45.3% of students were seriously injured. There was a difference between male and female students regarding to physical attack, physical fight, and serious injuries. In conclusion, it is necessary to develop effective training program in life skills for students that functions to reduce risk-taking behaviors that often leading to violence and unintentional injuries.

Keywords: secondary school students, violence, unintentional injuries, bullying

Procedia PDF Downloads 357
356 Exploring Service Performance of Area-Based Bus Service for Dhaka: A Case Study of Dhaka Chaka

Authors: Md. Musfiqur Rahman Bhuiya Nidalia Islam, Hossain Mohiuddin, Md. Kawser Bin Zaman

Abstract:

Dhaka North City Corporation introduced first area-based bus service on 10 August 2016 to run through Gulshan and Banani area to dilute sufferings of the people which started with the ban on movement of the bus in these areas after Holy Artisan terrorist attack. This study explores service quality performance of Dhaka Chaka on the basis of information provided by its riders on a questionnaire survey. Total thirteen service quality indicators have been ranked on a scale of 1-5, and they have been classified under three latent variables based on their correlation using eigenvalue and rotated factor matrix derived through factor analysis process. Mean, and skewness has been calculated for each indicator. It has been found that ticket price and ticketing system have relatively poor average service quality rank than other factors. All other factors have moderately good performance. The study also suggests some recommendation to improve service quality of Dhaka Chaka based on the interrelation between considered parameters.

Keywords: area based bus service, eigen value, factor analysis, correlation

Procedia PDF Downloads 173
355 Investigation of Flow Effects of Soundwaves Incident on an Airfoil

Authors: Thirsa Sherry, Utkarsh Shrivastav, Kannan B. T., Iynthezhuton K.

Abstract:

The field of aerodynamics and aeroacoustics remains one of the most poignant and well-researched fields of today. The current paper aims to investigate the predominant problem concerning the effects of noise of varying frequencies and waveforms on airflow surrounding an airfoil. Using a single speaker beneath the airfoil at different positions, we wish to simulate the effects of sound directly impinging on an airfoil and study its direct effects on airflow. We wish to study the same using smoke visualization methods with incense as our smoke-generating material in a variable-speed subsonic wind tunnel. Using frequencies and wavelengths similar to those of common engine noise, we wish to simulate real-world conditions of engine noise interfering with airflow and document the arising trends. These results will allow us to look into the real-world effects of noise on airflow and how to minimize them and expand on the possible relation between waveforms and noise. The parameters used in the study include frequency, Reynolds number, waveforms, angle of attack, and the effects on airflow when varying these parameters.

Keywords: engine noise, aeroacoustics, acoustic excitation, low speed

Procedia PDF Downloads 84
354 Awareness about Work-Related Hazards Causing Musculoskeletal Disorders

Authors: Bintou Jobe

Abstract:

Musculo-skeletal disorders (MSDs) are injuries or disorders of the spine disc, muscle strains, and low back injuries. It remains a major cause of occupational illness. Findings: Due to poor grips during handling, it is possible for neck, shoulder, arm, knees, ankle, fingers, waist, lower back injuries, and other muscle joints to be affected. Pregnant women are more prone to physical and hormonal changes, which lead to the relaxation of supporting ligaments. MSD continues to pose a global concern due to its impact on workers worldwide. The prevalence of the disorder is high, according to research into the workforce in Europe and developing countries. The causes are characterized by long working hours, insufficient rest breaks, poor posture, repetitive motion, poor manual handling techniques, psychological stress, and poor nutrition. To prevent MSD, the design mainly involves avoiding and assessing the risk. However, clinical solutions, policy governance, and minimizing manual labour are also an alternative. In addition, eating a balanced diet and teamwork force are key to elements in minimising the risk. This review aims to raise awareness and promote cost effectiveness prevention and understanding of MSD through research and identify proposed solutions to recognise the underlying causes of MSDs in the construction sectors. The methodology involves a literature review approach, engaging with the policy landscape of MSD, synthesising publications on MSD and a wider range of academic publications. In conclusion, training on effective manual handling techniques should be considered, and Personal Protective Equipment should be a last resort. The implementation of training guidelines has yielded significant benefits.

Keywords: musculoskeletal disorder work related, MSD, manual handling, work hazards

Procedia PDF Downloads 49