Search results for: bomb blast attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 826

Search results for: bomb blast attacks

376 Early-Age Cracking of Low Carbon Concrete Incorporating Ferronickel Slag as Supplementary Cementitious Material

Authors: Mohammad Khan, Arnaud Castel

Abstract:

Concrete viscoelastic properties such as shrinkage, creep, and associated relaxation are important in assessing the risk of cracking during the first few days after placement. This paper investigates the early-age mechanical and viscoelastic properties, restrained shrinkage-induced cracking and time to cracking of concrete incorporating ferronickel slag (FNS) as supplementary cementitious material. Compressive strength, indirect tensile strength and elastic modulus were measured. Tensile creep and drying shrinkage was measured on dog-bone shaped specimens. Restrained shrinkage induced stresses and concrete cracking age were assessed by using the ring test. Results revealed that early-age strength development of FNS blended concrete is lower than that of the corresponding ordinary Portland cement (OPC) concrete. FNS blended concrete showed significantly higher tensile creep. The risk of early-age cracking for the restrained specimens depends on the development of concrete tensile stress considering both restrained shrinkage and tensile creep and the development of the tensile strength. FNS blended concrete showed only 20% reduction in time to cracking compared to reference OPC concrete, and this reduction is significantly lower compared to fly ash and ground granulated blast furnace slag blended concretes at similar replacement level.

Keywords: ferronickel slag, restraint shrinkage, tensile creep, time to cracking

Procedia PDF Downloads 179
375 An Experimental Study on the Influence of Mineral Admixtures on the Fire Resistance of High-Strength Concrete

Authors: Ki-seok Kwon, Dong-woo Ryu, Heung-Youl Kim

Abstract:

Although high-strength concrete has many advantages over generic concrete at normal temperatures (around 20℃), it undergoes spalling at high temperatures, which constitutes its structurally fatal drawback. In this study, fire resistance tests were conducted for 3 hours in accordance with ASTM E119 on bearing wall specimens which were 3,000mm x 3,000mm x 300mm in dimensions to investigate the influence the type of admixtures would exert on the fire resistance performance of high-strength concrete. Portland cement, blast furnace slag, fly ash and silica fume were used as admixtures, among which 2 or 3 components were combined to make 7 types of mixtures. In 56MPa specimens, the severity of spalling was in order of SF5 > F25 > S65SF5 > S50. Specimen S50 where an admixture consisting of 2 components was added did not undergo spalling. In 70MPa specimens, the severity of spalling was in order of SF5 > F25SF5 > S45SF5 and the result was similar to that observed in 56MPa specimens. Acknowledgements— This study was conducted by the support of the project, “Development of performance-based fire safety design of the building and improvement of fire safety” (18AUDP-B100356-04) which is under the management of Korea Agency for Infrastructure Technology Advancement as part of the urban architecture research project for the Ministry of Land, Infrastructure and Transport, for which we extend our deep thanks.

Keywords: high strength concrete, mineral admixture, fire resistance, social disaster

Procedia PDF Downloads 139
374 Organizational Change in the FBI after 9/11: An Institutional Theoretical Analysis

Authors: Ben D. Atkins

Abstract:

This study will examine the impact of September 11, 2001, terrorist attacks on the organizational development of American federal law enforcement through focusing on the Federal Bureau of Investigation. Content analysis of discourse in a federal law enforcement practitioner publication along with official FBI statements will be used to gain a better understanding of FBI organizational changes that have taken place since the events of September 11, 2001. Analysis of content trends in the FBI Law Enforcement Bulletin and public discourse of FBI officials from 1999 to 2005 indicate that, in addition to structural changes, the bureau has also undergone a variety of cultural changes. The results offer some support for the institutional theoretical perspective, suggesting that post-9/11 organizational changes such as new mission priorities and the establishment of new branches were partially initiated due to a variety external pressures, which lends support for coercive isomorphism. Furthermore, structural changes are discussed in relation to the attainment and maintenance of organizational legitimacy.

Keywords: institutional theory, organizational theory, law enforcement, public administration

Procedia PDF Downloads 230
373 Activism: An Experiential Sharing of Impacts on Businesses and Ways to Engage Activists

Authors: Lee Kar Heng

Abstract:

Activists are people who use strong actions such as public protests or social media accusations in support of or opposition to controversial issues. While activism is the act of using such vigorous campaigns and actions to achieve political or social changes by the activists, today, the pressure and stresses from activism do not only grow in terms of civil rights but also in racial justice, labour reforms, and environmental change, to name a few. Some activism acts are constructive, but many are destructive, and they affect businesses as activists direct their sights on corporations, business entities, and organizations to achieve their supporting objectives beyond reasonable means. The paper attempts to share experiences of businesses being attacked by activists and how the attacks are mitigated. In sharing, this paper will discuss the effectiveness of the activist action and ways to react to them. The positive and negative impacts caused by activists' support action against corporations are also discussed.

Keywords: activism, conflicts, business, social responsibility

Procedia PDF Downloads 73
372 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 79
371 Robust and Transparent Spread Spectrum Audio Watermarking

Authors: Ali Akbar Attari, Ali Asghar Beheshti Shirazi

Abstract:

In this paper, we propose a blind and robust audio watermarking scheme based on spread spectrum in Discrete Wavelet Transform (DWT) domain. Watermarks are embedded in the low-frequency coefficients, which is less audible. The key idea is dividing the audio signal into small frames, and magnitude of the 6th level of DWT approximation coefficients is modifying based upon the Direct Sequence Spread Spectrum (DSSS) technique. Also, the psychoacoustic model for enhancing in imperceptibility, as well as Savitsky-Golay filter for increasing accuracy in extraction, is used. The experimental results illustrate high robustness against most common attacks, i.e. Gaussian noise addition, Low pass filter, Resampling, Requantizing, MP3 compression, without significant perceptual distortion (ODG is higher than -1). The proposed scheme has about 83 bps data payload.

Keywords: audio watermarking, spread spectrum, discrete wavelet transform, psychoacoustic, Savitsky-Golay filter

Procedia PDF Downloads 192
370 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 113
369 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 360
368 Performance of Air Cured Concrete Treated with Waterproofing Admixtures or Surface Treatments

Authors: Sirwan Kamal, Hsein Kew, Hamid Jahromi

Abstract:

This paper reports results of a study conducted to investigate strength, sorptivity, and permeability under pressure of concrete specimens, cured using a water-based curing compound. The specimens are treated with waterproofing admixtures or surface treatments to enhance performance while exposed to water. Four types of concrete specimens were prepared in the laboratory, Portland cement (CEM I), Portland-fly ash (CEM II/A-V), Blast-furnace cement (CEM III) and Portland-silica fume (CEM II/A-D). Concrete cubes were de-molded three hours after casting, and sprayed with a curing compound. Admixtures were added to the mix during batching, whereas surface treatments were applied on concrete after 28 days. Compressive strength test was carried out to assess the efficiency of curing compound to develop required strength. In addition, sorptivity and permeability tests were conducted to evaluate the performance of treated specimens with respect to water ingress. Results show that strength development in specimens cured with curing compound achieved up to 96% and 90% at 7 and 28 days respectively, compared to cubes cured in water. Moreover, specimens treated with waterproofing admixtures or surface treatments materials characterized by hydrophobic impregnation considerably reduced water penetration compared to untreated control cubes. On the other hand, cubes treated with admixtures or surface treatments materials characterized by crystalline effect were ineffective in reducing water penetration.

Keywords: admixtures, concrete, curing compound, surface treatments

Procedia PDF Downloads 126
367 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 45
366 Antibody Reactivity of Synthetic Peptides Belonging to Proteins Encoded by Genes Located in Mycobacterium tuberculosis-Specific Genomic Regions of Differences

Authors: Abu Salim Mustafa

Abstract:

The comparisons of mycobacterial genomes have identified several Mycobacterium tuberculosis-specific genomic regions that are absent in other mycobacteria and are known as regions of differences. Due to M. tuberculosis-specificity, the peptides encoded by these regions could be useful in the specific diagnosis of tuberculosis. To explore this possibility, overlapping synthetic peptides corresponding to 39 proteins predicted to be encoded by genes present in regions of differences were tested for antibody-reactivity with sera from tuberculosis patients and healthy subjects. The results identified four immunodominant peptides corresponding to four different proteins, with three of the peptides showing significantly stronger antibody reactivity and rate of positivity with sera from tuberculosis patients than healthy subjects. The fourth peptide was recognized equally well by the sera of tuberculosis patients as well as healthy subjects. Predication of antibody epitopes by bioinformatics analyses using ABCpred server predicted multiple linear epitopes in each peptide. Furthermore, peptide sequence analysis for sequence identity using BLAST suggested M. tuberculosis-specificity for the three peptides that had preferential reactivity with sera from tuberculosis patients, but the peptide with equal reactivity with sera of TB patients and healthy subjects showed significant identity with sequences present in nob-tuberculous mycobacteria. The three identified M. tuberculosis-specific immunodominant peptides may be useful in the serological diagnosis of tuberculosis.

Keywords: genomic regions of differences, Mycobacterium tuberculossis, peptides, serodiagnosis

Procedia PDF Downloads 177
365 Partial Replacement of GGBS in Concrete for Prevention of Natural Resources

Authors: M. Murmu, Govardhan, J. Satya Eswari

Abstract:

Concrete is the most common and widely used building material. Concrete is basically made of aggregates, both fine and coarse, glued by a cement paste which is made of cement and water. Each one of these constituents of concrete has a negative environmental impact and gives rise to different sustainability issues. The current concrete construction practice is unsustainable because, not only it consumes enormous quantities of stones, sand, and drinking water, but also one billion tons a year of cement, which is not an environment friendly material. Preventing the reduction of natural resources and enhancing the usage of waste materials has become a challenge to the scientist and engineers. A number of studies have been conducted concerning the protection of natural resources, prevention of environmental pollution and contribution to the economy by using this waste material. This paper outlines the influence of Ground Granulated Blast furnace Slag (GGBS) as partial replacement of fine aggregate on mechanical properties of concrete. The strength of concrete is determined having OPC binder, replaced the fine aggregate with15%, 30%, 45% respectively. For this purpose, characteristics concrete mix of M25 with partial replacement of cement with GGBS is used and the strength of concrete cubes and cylinder have determined. The strength of concrete specimens has been compared with the reference specimen. Also X-ray diffraction (XRD) and scanning electron microscope (SEM) tests have been performed to examine the hydration products and the microstructure of the tested specimens. A correlation has been established between the developmental strength concrete with and without GGBS through analysis of hydration products and the microstructure.

Keywords: GGBS, sand, concrete, workability

Procedia PDF Downloads 497
364 Experimental Investigation on the Shear Strength Parameters of Sand-Slag Mixtures

Authors: Ayad Salih Sabbar, Amin Chegenizadeh, Hamid Nikraz

Abstract:

Utilizing waste materials in civil engineering applications has a positive influence on the environment by reducing carbon dioxide emissions and issues associated with waste disposal. Granulated blast furnace slag (GBFS) is a by-product of the iron and steel industry, with millions of tons of slag being annually produced worldwide. Slag has been widely used in structural engineering and for stabilizing clay soils; however, studies on the effect of slag on sandy soils are scarce. This article investigates the effect of slag content on shear strength parameters through direct shear tests and unconsolidated undrained triaxial tests on mixtures of Perth sand and slag. For this purpose, sand-slag mixtures, with slag contents of 2%, 4%, and 6% by weight of samples, were tested with direct shear tests under three normal stress values, namely 100 kPa, 150 kPa, and 200 kPa. Unconsolidated undrained triaxial tests were performed under a single confining pressure of 100 kPa and relative density of 80%. The internal friction angles and shear stresses of the mixtures were determined via the direct shear tests, demonstrating that shear stresses increased with increasing normal stress and the internal friction angles and cohesion increased with increasing slag. There were no significant differences in shear stresses parameters when slag content rose from 4% to 6%. The unconsolidated undrained triaxial tests demonstrated that shear strength increased with increasing slag content.

Keywords: direct shear, shear strength, slag, UU test

Procedia PDF Downloads 475
363 The Old Man And The Sea: From A Gerotranscendence Perpective

Authors: Eng Lye, Ooi

Abstract:

The Old Man and The Sea is a novella written by Ernest Hemingway that depicts an old fisherman’ journey out into the deep sea in his pursuit to catch a big fish. Through this novella, Hemingway creates a world for his protagonist, Santiago who is portrayed as an old man who has gone eighty-four days without catching a fish, at last hooks an eighteen-foot marlin, the largest he ever known. The old man endures pain and struggles to bring back to shore. Looking through the lens of gerotranscendence, we can see that the old man has his dreams, and goals in life. In his pursuit for happiness, he has fought tirelessly to ward off the shark attacks and finally he won even though only half of his fish is left. Hemingway has portrayed Santiago as an old man as a transcendent self leaping from the dimension of “The Self” to the cosmic dimension with the personal and social relationship dimension in tow. The Old Man and The Sea offers a glimpse of the struggles of an old man, who is old and gaunt but spiritually undefeated in his battle out in the sea. He is surprisingly strong and powerful despite his old age, he respects the sea, the birds. the turtles, the sharks and the fish. He can endure suffering and is focussed on achieving his goals. This is what Hemingway has portrayed Santiago to be a gerotranscendent in the eyes of the gerotranscendental approach in respect of the changes and development as seen in Santiago, the protagonist in this novella.

Keywords: gerotranscendence, gerotranscendenatal, old man, the sea, hemingway

Procedia PDF Downloads 27
362 Relationship Between Behavioral Inhibition/Approach System, and Perceived Stress, Whit Control White Blood Cell In Multiple Sclerosis Patients

Authors: Amin Alvani

Abstract:

Multiple sclerosis (MS) is a chronic, often disabling disease in which the immune system attacks the myelin sheath of neurons in the central nervous system. The present study aimed to investigate the Relationship between behavioral inhibition/approach system (BIS-BAS) and perceived stress (PS) whit control white blood cell (WBC). 60 MS patients (male=36.7, female=63.3%; age range=15-65 participated in the study and completed the demographic questionnaire, the count blood cell (CBC) test, the behavioral Activation and behavioral inhibition scale (BIS-BAS), and the perceived stress Questionnaire (PSS-14). The results revealed that Between of BAS-reward responsiveness (BAS-DR) subscale and PS, in more than MS patient (BIS), there are increase WBC.

Keywords: behavioral inhibition/approach system, perceived stress, white blood cell, multiple sclerosis

Procedia PDF Downloads 81
361 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 350
360 Analysis of Pathogen Populations Occurring in Oilseed Rape Using DNA Sequencing Techniques

Authors: Elizabeth Starzycka-Korbas, Michal Starzycki, Wojciech Rybinski, Mirosława Dabert

Abstract:

For a few years, the populations of pathogenic fungi occurring in winter oilseed rape in Malyszyn were analyzed. Brassica napus L. in Poland and in the world is a source of energy for both the men (oil), and animals, as post-extraction middling, as well as a motor fuel (oil, biofuel) therefore studies of this type are very important. The species composition of pathogenic fungi can be an indicator of seed yield. The occurrence of oilseed rape pathogens during several years were analyzed using the sequencing method DNA ITS. The results were compared in the gene bank using the program NCBI / BLAST. In field conditions before harvest of oilseed rape presence of pathogens infesting B. napus has been assessed. For example, in 2015, 150 samples have been isolated and applied to PDA medium for the identification of belonging species. From all population has been selected mycelium of 83 isolates which were sequenced. Others (67 isolates) were pathogenic fungi of the genus Alternaria which are easily to recognize. The population of pathogenic species on oilseed rape have been identified after analyzing the DNA ITS and include: Leptosphaeria sp. 38 (L. maculans 25, L. biglobosa 13), Alternaria sp. 29, Fusarium sp. 3, Sclerotinia sclerotiorum 7, heterogeneous 6, total of 83 isolates. The genus Alternaria sp. fungi wear the largest share of B. napus pathogens in particular years. Another dangerous species for oilseed rape was Leptosphaeria sp. Populations of pathogens in each year were different. The number of pathogens occurring in the field and their composition is very important for breeders and farmers because of the possible selection of the most resistant genotypes for sowing in the next growing season.

Keywords: B. napus, DNA ITS Sequencing, pathogenic fungi, population

Procedia PDF Downloads 282
359 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 118
358 Mechanical Analysis of Pineapple Leaf Fiber Reinforced Polymer Composites

Authors: Jain Jyoti, Jain Shorab, Sinha Shishir

Abstract:

In the field of material engineering, composites are in great concern for their nonbiodegradability and their cost. In order to reduce its cost and weight, plant derived fibers witnessed miraculous triumph. Plant fibers can be of different types like seed fibers, blast fibers, leaf fibers, etc. Composites can be reinforced with exclusively one type of natural fiber or also can be combined with two or more different types of natural or synthetic fibers to boost up their specific properties. Among all natural fibers, wheat straw, bagasse, kenaf, pineapple leaf, banana, coir, ramie, flax, etc. pineapple leaf fibers have very good mechanical properties. Being hydrophilic in nature, pineapple leaf fibers have very less affinity towards all types of polymer matrixes like HDPE, LDPE, PET, epoxy, etc. Surface treatments like alkaline treatment in different concentrations were conducted to improve its adhesion and compatibility towards hydrophobic polymer matrix i.e. epoxy resin. Pineapple leaf fiber epoxy composites have been prepared using hand layup method. Effect of fiber loading and surface treatments have been studied for different mechanical properties i.e. tensile strength, flexural strength and impact properties of pineapple leaf fiber composites. Analysis of fiber morphology has also been studied using FTIR, XRD. Scanning electron microscopy has also been used to study and compare the morphology of untreated and treated fibers. Also, the fracture surface has been reviewed comparing the reported literature of other eminent researchers of this field.

Keywords: composite, mechanical, natural fiber, pineapple leaf fiber

Procedia PDF Downloads 253
357 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 331
356 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 141
355 Smoker Recognition from Lung X-Ray Images Using Convolutional Neural Network

Authors: Moumita Chanda, Md. Fazlul Karim Patwary

Abstract:

Smoking is one of the most popular recreational drug use behaviors, and it contributes to birth defects, COPD, heart attacks, and erectile dysfunction. To completely eradicate this disease, it is imperative that it be identified and treated. Numerous smoking cessation programs have been created, and they demonstrate how beneficial it may be to help someone stop smoking at the ideal time. A tomography meter is an effective smoking detector. Other wearables, such as RF-based proximity sensors worn on the collar and wrist to detect when the hand is close to the mouth, have been proposed in the past, but they are not impervious to deceptive variables. In this study, we create a machine that can discriminate between smokers and non-smokers in real-time with high sensitivity and specificity by watching and collecting the human lung and analyzing the X-ray data using machine learning. If it has the highest accuracy, this machine could be utilized in a hospital, in the selection of candidates for the army or police, or in university entrance.

Keywords: CNN, smoker detection, non-smoker detection, OpenCV, artificial Intelligence, X-ray Image detection

Procedia PDF Downloads 77
354 Bulk Electrical Resistivity of Geopolymer Mortars: The Effect of Binder Composition and Alkali Concentration

Authors: Mahdi Babaee, Arnaud Castel

Abstract:

One of the main hurdles for commercial adaptation of geopolymer concrete (GPC) as a low-embodied-carbon alternative for Portland cement concrete (PCC) is the durability aspects and its long-term performance in aggressive/corrosive environments. GPC is comparatively a new engineering material and in the absence of a track record of successful durability performance, proper experimental studies to investigate different durability-related characteristics of GPC seem inevitable. In this context, this paper aims to study the bulk electrical resistivity of geopolymer mortars fabricated of blends of low-calcium fly ash (FA) and ground granulated blast-furnace slag (GGBS). Bulk electrical resistivity is recognized as one of the most important parameters influencing the rate of corrosion of reinforcing bars during the propagation phase of corrosion. To investigate the effect of alkali concentration on the resistivity of the samples, 100x200 mm mortar cylinders were cast at different alkali concentration levels, whereas the modulus ratio (the molar ratio of SiO2/Na2O) was fixed for the mixes, and the bulk electrical resistivity was then measured. Also, the effect of the binder composition was assessed with respect to the ratio of FA to GGBS used. Results show a superior performance of samples with higher GGBS content. Lower concentration of the solution has increased the resistivity by reducing the amount of mobile alkali ions in the pore solution. Moreover, GGBS-based samples showed a much sharper increase in the electrical resistivity with decreasing the moisture content.

Keywords: bulk resistivity, corrosion, durability, geopolymer concrete

Procedia PDF Downloads 259
353 India’s Role in Afghanistan in the Post 9/11 Era

Authors: Fayiz Saifurahman

Abstract:

Afghanistan's geopolitically and geo-strategically location has remained the attention of Indian policy. On 11 September 2001, the terrorist attacks in the United States and the announcement of the United States, fight for international war against the Taliban in November 2001 provided India a chance to pursue its foreign policy goals of achieving a good position in the region and emerging as an international power. Therefore, post-9/11, India strengthened its efforts to re-establish its power in Afghanistan. The objectives of this study are to study the India-Afghanistan relation in the post 9/11 and to discuss the initial role of India in Afghanistan. The research method was conducted on a qualitative method based on descriptive. The research findings propose that; Indian foreign policy should be analyzed and increase its soft power. Afghanistan has definitely provided a significant occasion for India to increase its power in Afghanistan. In this linkage, Indian determinations have been to intrude all parts in Afghanistan to make them reliant on Indian cooperation.

Keywords: Afghanistan, war, power, policy.

Procedia PDF Downloads 229
352 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach

Authors: Alice Sanwald, Thomas Schober

Abstract:

We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.

Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack

Procedia PDF Downloads 427
351 YHV-Responsive Gene Expression under the Influence of PmRelish Regulation

Authors: Suwattana Visetnan, Premruethai Supungul, Sureerat Tang, Ikuo Hirono, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

In animals, infection by Gram-negative bacteria and certain viruses activates the Imd signaling pathway wherein the a NF-κB transcription factor, Relish, is a key regulatory protein for the synthesis of antimicrobial proteins. Infection by yellow head virus (YHV) activates the Imd pathway. To investigate the expression of genes involved in YHV infection and under the influence of PmRelish regulation, RNA interference and suppression subtractive hybridization (SSH) are employed. The genes in forward library expressed in shrimp after YHV infection and under the activity of PmRelish were obtained by subtracting the cDNAs from YHV-infected and PmRelish-knockdown shrimp with cDNAs from YHV-infected shrimp. Opposite subtraction gave a reverse library whereby an alternative set of genes under YHV infection and no PmRelish expression was obtained. Sequencing of 252 and 99 cDNA clones from the respective forward and reverse libraries were done and annotated through blast search against the GenBank sequences. Genes involved in defense and homeostasis were abundant in both libraries, 31% and 23% in the forward and reverse libraries, respectively. They were predominantly antimicrobial proteins, proteinases and proteinase inhibitors. The expression of antimicrobial protein genes, ALFPm3, crustinPm1, penaeidin3 and penaeidin5 were tested under PmRelish silencing and Gram-negative bacterium V. harveyi infection. Together with the results previously reported, the expression of penaeidin5 and also penaeidin3 but not ALFPm3 and crustinPm1 were under the regulation of PmRelish in the Imd pathway.

Keywords: relish, yellow head virus, penaeus monodon, antimicrobial proteins

Procedia PDF Downloads 209
350 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 350
349 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 195
348 Geopolymer Concrete: A Review of Properties, Applications and Limitations

Authors: Abbas Ahmed Albu Shaqraa

Abstract:

The concept of a safe environment and low greenhouse gas emissions is a common concern especially in the construction industry. The produced carbon dioxide (CO2) emissions are nearly a ton in producing only one ton of Portland cement, which is the primary ingredient of concrete. Current studies had investigated the utilization of several waste materials in producing a cement free concrete. The geopolymer concrete is a green material that results from the reaction of aluminosilicate material with an alkaline liquid. A summary of several recent researches in geopolymer concrete will be presented in this manuscript. In addition, the offered presented review considers the use of several waste materials including fly ash, granulated blast furnace slag, cement kiln dust, kaolin, metakaolin, and limestone powder as binding materials in making geopolymer concrete. Moreover, the mechanical, chemical and thermal properties of geopolymer concrete will be reviewed. In addition, the geopolymer concrete applications and limitations will be discussed as well. The results showed a high early compressive strength gain in geopolymer concrete when dry- heating or steam curing was performed. Also, it was stated that the outstanding acidic resistance of the geopolymer concrete made it possible to be used where the ordinary Portland cement concrete was doubtable. Thus, the commercial geopolymer concrete pipes were favored for sewer system in case of high acidic conditions. Furthermore, it was reported that the geopolymer concrete could stand up to 1200 °C in fire without losing its strength integrity whereas the Portland cement concrete was losing its function upon heating to some 100s °C only. However, the geopolymer concrete still considered as an emerging field and occupied mainly by the precast industries.

Keywords: geopolymer concrete, Portland cement concrete, alkaline liquid, compressive strength

Procedia PDF Downloads 215
347 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 154