Search results for: cache timing attack
493 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 368492 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 96491 Chest Trauma and Early Pulmonary Embolism: The Risks
Authors: Vignesh Ratnaraj, Daniel Marascia, Kelly Ruecker
Abstract:
Purpose: Pulmonary embolism (PE) is a major cause of morbidity and mortality in trauma patients. Data suggests PE is occurring earlier in trauma patients, with attention being turned to possible de novo events. Here, we examine the incidence of early PE at a level 1 trauma center and examine the relationship with a chest injury. Method: A retrospective analysis was performed from a prospective trauma registry at a level 1 trauma center. All patients admitted from 1 January 2010 to 30 June 2019 diagnosed with PE following trauma were included. Early PE was considered a diagnosis within 72 hours of admission. The severity of the chest injury was determined by the Abbreviated Injury Score (AIS). Analysis of severe chest injury and incidence of early PE was performed using chi-square analysis. Sub-analysis on the timing of PE and PE location was also performed using chi-square analysis. Results: Chest injury was present in 125 of 184 patients diagnosed with PE. Early PE occurred in 28% (n=35) of patients with a chest injury, including 24.39% (n=10) with a severe chest injury. Neither chest injury nor severe chest injury determined the presence of early PE (p= > 0.05). Sub-analysis showed a trend toward central clots in early PE (37.14%, n=13) compared to late (27.78%, n=25); however, this was not found to be significant (p= > 0.05). Conclusion: PE occurs early in trauma patients, with almost one-third being diagnosed before 72 hours. This analysis does not support the paradigm that chest injury, nor severe chest injury, results in statistically significant higher rates of early PE. Interestingly, a trend toward early central PE was noted in those suffering chest trauma.Keywords: trauma, PE, chest injury, anticoagulation
Procedia PDF Downloads 102490 Plasma Actuator Application to Control Surfaces of a Model Aircraft
Authors: Yuta Moriyama, Etsuo Morishita
Abstract:
Plasma actuator is very effective to recover stall flows over an upper airfoil surface. We first manufacture the actuator, test the stability of the device by trial and error basis and find the conditions for steady operations. We visualize the flow around an airfoil in the smoke tunnel and observe the stall recovery. The plasma actuator is stationary device and has no moving parts, and it might be an ideal device to control a model aircraft. We can use the actuator not only as a stall recovery device but also as a spoiler. We put the actuator near the leading edge of an elevator of a model aircraft as a spoiler, and measure the aerodynamic forces by a three-component balance. We observe the effect of the plasma actuator on the aerodynamic forces and the device effectiveness changes depending on the angle of attack whether it is positive or negative. We also visualize the flow caused by the plasma actuator by a desk-top Schlieren photography which is otherwise very difficult in a low-speed wind tunnel experiment.Keywords: aerodynamics, plasma actuator, model aircraft, wind tunnel
Procedia PDF Downloads 373489 Fish Markets in Sierra Leone: Size, Structure, Distribution Networks and Opportunities for Aquaculture Development
Authors: Milton Jusu, Moses Koroma
Abstract:
Efforts by the Ministry of Fisheries and Marine Resources and its development partners to introduce “modern” aquaculture in Sierra Leone since the 1970s have not been successful. A number of reasons have been hypothesized, including the suggestion that the market infrastructure and demand for farmed fish were inadequate to stimulate large-scale and widespread aquaculture production in the country. We have assessed the size, structure, networks and opportunities in fish markets using a combination of Participatory Rural Appraisals (PRAs) and questionnaire surveys conducted in a sample of 29 markets (urban, weekly, wholesale and retail) and two hundred traders. The study showed that the local fish markets were dynamic, with very high variations in demand and supply. The markets sampled supplied between 135.2 and 9947.6 tonnes/year. Mean prices for fresh fish varied between US$1.12 and US$3.89/kg depending on species, with smoked catfish and shrimps commanding prices as high as US$7.4/kg. It is unlikely that marine capture fisheries can increase their current production levels, and these may, in fact, already be over-exploited and declining. Marine fish supplies are particularly low between July and September. More careful attention to the timing of harvests (rainy season, not dry season) and to species (catfish, not tilapia) (could help in the successful adoption of aquaculture.Keywords: fisheries and aquaculture, fish market, marine fish supplies, harvests
Procedia PDF Downloads 71488 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 87487 Astronomical Panels of Measuring and Dividing Time in Ancient Egypt
Authors: Mohamed Saeed Ahmed Salman
Abstract:
The ancient Egyptians used the stars to measure time or, in a more precise sense, as one of the astronomical means of measuring time. These methods differed throughout the historical ages. They began with simple observations of observing astronomical phenomena and watching them, such as observing the movements of the stars in the sky. The year, to know the days, nights, and other means used to help set the time when the sky overcast, and so the researcher tries through archaeological evidence to demonstrate the knowledge of the ancient Egyptian stars of heaven, and movements through the first pre-history. It is not believed that the astronomical information possessed by the Egyptian was limited, and simple, it was reaching a level of almost optimal in terms of importance, and the goal he wanted to reach the ancient Egyptian, and also help him to know the time, and the passage of time; which ended in finally trying to find a system of timing and calculation of time. It was noted that there were signs that the stellar creed was known, and prosperous, especially since the pre-family ages, and this is evident on the inscriptions that come back to that period. The Egyptian realized that some of the stars remain visible at night, The ancient Egyptian was familiar with the daily journey of the stars. This is what was adopted in many paragraphs of the texts of the pyramids and its references to the rise of the deceased king of the heavenly world between the stars of the eternal sky. It was noted that the ancient Egyptian link between the doctrine of the star, we find that the public The lunar was known to the ancient Egyptians, and sang it for two years, and the stellar solar; but it was based on the appearance of the star Sirius, and this is the first means used to measure time and know the calendar stars.Keywords: ancient Egyptian, astronomical panels, Egyptian, astronomical
Procedia PDF Downloads 21486 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 221485 A Study on Human Musculoskeletal Model for Cycle Fitting: Comparison with EMG
Authors: Yoon- Ho Shin, Jin-Seung Choi, Dong-Won Kang, Jeong-Woo Seo, Joo-Hack Lee, Ju-Young Kim, Dae-Hyeok Kim, Seung-Tae Yang, Gye-Rae Tack
Abstract:
It is difficult to study the effect of various variables on cycle fitting through actual experiment. To overcome such difficulty, the forward dynamics of a musculoskeletal model was applied to cycle fitting in this study. The measured EMG data were compared with the muscle activities of the musculoskeletal model through forward dynamics. EMG data were measured from five cyclists who do not have musculoskeletal diseases during three minutes pedaling with a constant load (150 W) and cadence (90 RPM). The muscles used for the analysis were the Vastus Lateralis (VL), Tibialis Anterior (TA), Bicep Femoris (BF), and Gastrocnemius Medial (GM). Person’s correlation coefficients of the muscle activity patterns, the peak timing of the maximum muscle activities, and the total muscle activities were calculated and compared. BIKE3D model of AnyBody (Anybodytech, Denmark) was used for the musculoskeletal model simulation. The comparisons of the actual experiments with the simulation results showed significant correlations in the muscle activity patterns (VL: 0.789, TA: 0.503, BF: 0.468, GM: 0.670). The peak timings of the maximum muscle activities were distributed at particular phases. The total muscle activities were compared with the normalized muscle activities, and the comparison showed about 10% difference in the VL (+10%), TA (+9.7%), and BF (+10%), excluding the GM (+29.4%). Thus, it can be concluded that muscle activities of model & experiment showed similar results. The results of this study indicated that it was possible to apply the simulation of further improved musculoskeletal model to cycle fitting.Keywords: musculoskeletal modeling, EMG, cycle fitting, simulation
Procedia PDF Downloads 568484 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 232483 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 153482 A Psychophysiological Evaluation of an Effective Recognition Technique Using Interactive Dynamic Virtual Environments
Authors: Mohammadhossein Moghimi, Robert Stone, Pia Rotshtein
Abstract:
Recording psychological and physiological correlates of human performance within virtual environments and interpreting their impacts on human engagement, ‘immersion’ and related emotional or ‘effective’ states is both academically and technologically challenging. By exposing participants to an effective, real-time (game-like) virtual environment, designed and evaluated in an earlier study, a psychophysiological database containing the EEG, GSR and Heart Rate of 30 male and female gamers, exposed to 10 games, was constructed. Some 174 features were subsequently identified and extracted from a number of windows, with 28 different timing lengths (e.g. 2, 3, 5, etc. seconds). After reducing the number of features to 30, using a feature selection technique, K-Nearest Neighbour (KNN) and Support Vector Machine (SVM) methods were subsequently employed for the classification process. The classifiers categorised the psychophysiological database into four effective clusters (defined based on a 3-dimensional space – valence, arousal and dominance) and eight emotion labels (relaxed, content, happy, excited, angry, afraid, sad, and bored). The KNN and SVM classifiers achieved average cross-validation accuracies of 97.01% (±1.3%) and 92.84% (±3.67%), respectively. However, no significant differences were found in the classification process based on effective clusters or emotion labels.Keywords: virtual reality, effective computing, effective VR, emotion-based effective physiological database
Procedia PDF Downloads 233481 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 302480 A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration
Authors: Manju Verma, Parag A. Deshpande
Abstract:
Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape.Keywords: ruthenium-porphyrin graphene, CO2 hydration, carbonic anhydrase, heterogeneous catalyst, density functional theory
Procedia PDF Downloads 259479 Delayed Contralateral Prophylactic Mastectomy (CPM): Reasons and Rationale for Patients with Unilateral Breast Cancer
Authors: C. Soh, S. Muktar, C. M. Malata, J. R. Benson
Abstract:
Introduction Reasons for requesting CPM include prevention of recurrence, peace of mind and moving on after breast cancer. Some women seek CPM as a delayed procedure but factors influencing this are poorly understood. Methods A retrospective analysis examined patients undergoing CPM as either an immediate or delayed procedure with or without breast reconstruction (BR) between January 2009 and December 2019. A cross-sectional survey based on validated questionnaires (5 point Likert scale) explored patients’ decision-making process in terms of timing of CPM and any BR. Results A total of 123 patients with unilateral breast cancer underwent CPM with 39 (32.5%) delayed procedures with or without BR. The response rate amongst patients receiving questionnaires (n=33) was 22/33 (66%). Within this delayed CPM cohort were three reconstructive scenarios 1) unilateral immediate BR with CPM (n=12); 2) delayed CPM with concomitant bilateral BR (n=22); 3) delayed bilateral BR after delayed CPM (n=3). Two patients had delayed CPM without BR. The most common reason for delayed CPM was to complete all cancer treatments (including radiotherapy) before surgery on the unaffected breast (score 2.91). The second reason was unavailability of genetic test results at the time of therapeutic mastectomy (score 2.64) whilst the third most cited reason was a subsequent change in family cancer history. Conclusion Factors for delayed CPM are patient-driven with few women spontaneously changing their mind having initially decided against immediate CPM for reasons also including surgical duration. CPM should be offered as a potentially delayed option with informed discussion of risks and benefits.Keywords: Breast Cancer, CPM, Prophylactic, Rationale
Procedia PDF Downloads 112478 Towards Resilient Cloud Computing through Cyber Risk Assessment
Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar
Abstract:
Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment
Procedia PDF Downloads 141477 Challenges of Teaching English as a Foreign Language in the Algerian Universities
Authors: Khedidja Benaicha Mati
Abstract:
The present research tries to highlight a very crucial issue which exists at the level of the faculty of Economics and Management at Chlef university. This issue is represented by the challenges and difficulties which face the teaching / learning process in the faculty on the part of the language teachers, the learners, and the administration staff, including mainly the absence of an agreed syllabus, lack of teaching materials, teachers’ qualifications and training, timing, coefficient, and lack of motivation and interest amongst students. All these negative factors make teaching and learning EFL rather ambiguous, ineffective and unsatisfactory. The students at the faculty of Economics and Management are looking for acquiring not only GE but also technical English to respond efficiently to the ongoing changes at the various levels most notably economy, business, technology, and sciences. Therefore, there is a need of ESP programmes which would focus on developing the communicative competence of the learners in their specific field of study or work. The aim of the present research is to explore the ways of improving the actual situation of teaching English in the faculty of Economics and to make the English courses more purposive, fulfilling and satisfactory. The sample population focused on second and third-year students of Economics from different specialties mainly commercial sciences, insurance and banking, accountancy, and management. This is done through a questionnaire which inquires students about their learning weaknesses, difficulties and challenges they encounter, and their expectations of the subject matter.Keywords: faculty of economics and management, challenges, teaching/ learning process, EFL, GE, ESP, English courses, communicative competence
Procedia PDF Downloads 506476 Between Ralph Waldo Emerson and the Dying Infidel
Authors: Michael Keller
Abstract:
Beyond the heterodoxy expressed in his now-famous 1838 address to the Harvard Divinity School, Emerson’s timing was particularly dangerous. Ideologically, New England faced a severe crisis of identity, as traditional categories of class and religion were growing increasingly unstable. Jones Very, influenced by Emerson, crossed the perceived border between acceptable religious zeal and insane enthusiasm. Abner Kneeland, on the other hand, crossed the uncomfortable border between post-Puritan Unitarian rationalism and blasphemous Enlightenment skepticism. More importantly, Kneeland oversaw a more overtly subversive brand of resistance (in the form of freethought periodicals) that not only threatened religious orthodoxy but also threatened to destabilize the class structure of New England. Very and Kneeland provide instructive case studies of how religious ideologies could run afoul of the social contract and the law itself. By looking closely at the social and religious forces that led to Kneeland’s prosecution for blasphemy, Jones Very’s forced committal to McLean Asylum, and Emerson’s escape from these fates, we gain a greater understanding of the shifting cultural landscape of 1830s New England. This paper will examine Emerson’s resistance to the traditional forces of class and ideology in Massachusetts by situating his early work in the context of the ideological battles of his time. More specifically, I will explore how Emerson was able to resist the conservative cultural forces of his time without experiencing the extremity of their wrath.Keywords: American literature, cultural studies, emerson, religious studies
Procedia PDF Downloads 141475 Re-Os Application to Petroleum System: Implications from the Geochronology and Oil-Source Correlation of Duvernay Petroleum System, Western Canadian Sedimentary Basin
Authors: Junjie Liu, David Selby, Mark Obermajer, Andy Mort
Abstract:
The inaugural application of Re-Os dating, which is based on the beta decay of 187Re to 187Os with a long half-life of 41.577 ± 0.12 Byr and initially used for sulphide minerals and organic rich rocks, to petroleum systems was performed on bitumen of the Polaris Mississippi Valley Type Pb-Zn deposit, Canada. To further our understanding of the Re-Os system and its application to petroleum systems, here we present a study on Duvernay Petroleum System, Western Canadian Sedimentary Basin. The Late Devonian Duvernay Formation organic-rich shales are the only source of the petroleum system. The Duvernay shales reached maturation only during the Laramide Orogeny (80 – 35 Ma) and the generated oil migrated short distances into the interfingering Leduc reefs and overlying Nisku carbonates with no or little secondary alteration post oil-generation. Although very low in Re and Os, the asphaltenes of Duvernay-sourced Leduc and Nisku oils define a Laramide Re-Os age. In addition, the initial Os isotope compositions of the oil samples are similar to that of the Os isotope composition of the Duvernay Formation at the time of oil generation, but are very different to other oil-prone intervals of the basin, showing the ability of the Os isotope composition as an inorganic oil-source correlation tool. In summary, the ability of the Re-Os geochronometer to record the timing of oil generation and trace the source of an oil is confirmed in the Re-Os study of Duvernay Petroleum System.Keywords: Duvernay petroleum system, oil generation, oil-source correlation, Re-Os
Procedia PDF Downloads 310474 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products
Authors: Varutorn Tulnawat, Padcharee Phasuk
Abstract:
This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.Keywords: border trade, dea, textile, garment
Procedia PDF Downloads 245473 NOx Prediction by Quasi-Dimensional Combustion Model of Hydrogen Enriched Compressed Natural Gas Engine
Authors: Anas Rao, Hao Duan, Fanhua Ma
Abstract:
The dependency on the fossil fuels can be minimized by using the hydrogen enriched compressed natural gas (HCNG) in the transportation vehicles. However, the NOx emissions of HCNG engines are significantly higher, and this turned to be its major drawback. Therefore, the study of NOx emission of HCNG engines is a very important area of research. In this context, the experiments have been performed at the different hydrogen percentage, ignition timing, air-fuel ratio, manifold-absolute pressure, load and engine speed. Afterwards, the simulation has been accomplished by the quasi-dimensional combustion model of HCNG engine. In order to investigate the NOx emission, the NO mechanism has been coupled to the quasi-dimensional combustion model of HCNG engine. The three NOx mechanism: the thermal NOx, prompt NOx and N2O mechanism have been used to predict NOx emission. For the validation purpose, NO curve has been transformed into NO packets based on the temperature difference of 100 K for the lean-burn and 60 K for stoichiometric condition. While, the width of the packet has been taken as the ratio of crank duration of the packet to the total burnt duration. The combustion chamber of the engine has been divided into three zones, with the zone equal to the product of summation of NO packets and space. In order to check the accuracy of the model, the percentage error of NOx emission has been evaluated, and it lies in the range of ±6% and ±10% for the lean-burn and stoichiometric conditions respectively. Finally, the percentage contribution of each NO formation has been evaluated.Keywords: quasi-dimensional combustion , thermal NO, prompt NO, NO packet
Procedia PDF Downloads 251472 Impact of Climate Shifting-Change on Rural People and Agricultural Life
Authors: Arshad A. Narejo, M. Javed Sheikh, G. Mujtaba Khushk, Naeem A Qureshi, M. Ali Sheikh
Abstract:
Climate change not only influences on agriculture activities but also has certain effects on daily human activities, as well as on overall human health. Keeping in view the significance and huge research gap on the issues, the researchers have found an opportunity to conduct a study in Sindh province of Pakistan, in which the issue of climate shifting/change regarding temperature and precipitation were discussed with the local farmers of district Hyderabad. The quantified perception was gathered on a reliable and valid scale from 200 respondents and was analyzed through SPSS and AMOS software. The result of this study revealed that the significant changes are being occurred in summer (r²=0.96; M=6.78) and winter seasons (r²=0.71; M=6.57), therefore it is leaving bad effects on human health (r²=0.96) and behavior of the local population (r²=0.70). In addition, the change in the cropping calendar, i.e., timing of sowing (r²=0.69; M=8.42) and harvesting (r²=0.79; M=8.27) of different crops have been altered due to changes in local weather patterns. Since the local farmers are also facing seed germination (r²=0.57; M=7.98) problems, it is therefore recommended that concerned authorities/departments should revise the agricultural calendar. Besides this, respondents were in opinion that actual summer starts even before the vacation and cold season starts when winter vacations ended. Thus, the government and other concerned departments should reconsider or reschedule the vacation regulation policy (r²=0.70) at least at the provincial level.Keywords: climate, climate shifting/change, impact on daily life, impact on agricultural activities
Procedia PDF Downloads 131471 A Non-Destructive Estimation Method for Internal Time in Perilla Leaf Using Hyperspectral Data
Authors: Shogo Nagano, Yusuke Tanigaki, Hirokazu Fukuda
Abstract:
Vegetables harvested early in the morning or late in the afternoon are valued in plant production, and so the time of harvest is important. The biological functions known as circadian clocks have a significant effect on this harvest timing. The purpose of this study was to non-destructively estimate the circadian clock and so construct a method for determining a suitable harvest time. We took eight samples of green busil (Perilla frutescens var. crispa) every 4 hours, six times for 1 day and analyzed all samples at the same time. A hyperspectral camera was used to collect spectrum intensities at 141 different wavelengths (350–1050 nm). Calculation of correlations between spectrum intensity of each wavelength and harvest time suggested the suitability of the hyperspectral camera for non-destructive estimation. However, even the highest correlated wavelength had a weak correlation, so we used machine learning to raise the accuracy of estimation and constructed a machine learning model to estimate the internal time of the circadian clock. Artificial neural networks (ANN) were used for machine learning because this is an effective analysis method for large amounts of data. Using the estimation model resulted in an error between estimated and real times of 3 min. The estimations were made in less than 2 hours. Thus, we successfully demonstrated this method of non-destructively estimating internal time.Keywords: artificial neural network (ANN), circadian clock, green busil, hyperspectral camera, non-destructive evaluation
Procedia PDF Downloads 299470 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 440469 A Socio-Technical Approach to Cyber-Risk Assessment
Authors: Kitty Kioskli, Nineta Polemi
Abstract:
Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005
Procedia PDF Downloads 165468 Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion
Authors: G. K. Guseynova, V. V. Krylov, L. T. Khamidova, N. A. Polunina, V. A. Lukyanchikov
Abstract:
The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed.Keywords: CBF, cerebral blood flow; CTA, external carotid artery; ICA, internal carotid artery; MCA, middle cerebral artery; MRA, magnetic resonance angiography; OEF, oxygen extraction fraction; TIA, transient ischaemic attack, ultrasound, low-flow bypass, anastomoses
Procedia PDF Downloads 42467 Analysis of Sulphur-Oxidizing Bacteria Attack on Concrete Based on Waste Materials
Authors: A. Eštoková, M. Kovalčíková, A. Luptáková, A. Sičáková, M. Ondová
Abstract:
Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching.Keywords: biocorrosion, concrete, leaching, bacteria
Procedia PDF Downloads 451466 A New Family of Flying Wing Low Reynolds Number Airfoils
Authors: Ciro Sobrinho Campolina Martins, Halison da Silva Pereira, Vitor Mainenti Leal Lopes
Abstract:
Unmanned Aerial vehicles (UAVs) has been used in a wide range of applications, from precise agriculture monitoring for irrigation and fertilization to military attack missions. Long range performance is required for many of these applications. Tailless aircrafts are commonly used as long-range configurations and, due to its small amount of stability, the airfoil shape design of its wings plays a central role on the performance of the airplane. In this work, a new family of flying wing airfoils is designed for low Reynolds number flows, typical of small-middle UAVs. Camber, thickness and their maximum positions in the chord are variables used for the airfoil geometry optimization. Aerodynamic non-dimensional coefficients were obtained by the well-established Panel Method. High efficient airfoils with small pitch moment coefficient are obtained from the analysis described and its aerodynamic polars are plotted.Keywords: airfoil design, flying wing, low Reynolds number, tailless aircraft, UAV
Procedia PDF Downloads 629465 Branding and Posting Strategy on Facebook Pages of Higher Education Institutions in Ontario, Canada in 2019-2020: A Quantitative and Qualitative Investigation
Authors: Mai To
Abstract:
Higher education institutions (HEIs) in Ontario, Canada have invested in social media presence for multiple purposes, such as branding, student’ engagement, and recruitment. To have a full picture of the social media strategy implemented by HEIs in Ontario, Canada, this study used a mixed-method approach to analyze Facebook posts’ characteristics and content. A total of 1789 Facebook posts from September 2019 to April 2020 of six selected HEIs were collected for analysis and coding based on five pre-determined branding positions: Elite, Nurturing, Campus, Outcome, and Commodity. Besides, the study also calculated the engagement rate for each social media practice to measure its effectiveness. The results show that there were not many differences in practices such as posting frequency, length, types, and timing among HEIs. However, the distribution of branding positions and content targeting future students versus current students was varied, although the HEIs employed all five branding positions and targeted the same lists of audiences. Some practices such as evening post for colleges and nurturing branding for universities attracted significantly higher engagement. This study provides a review of current social media practices and branding strategy, as well as informs the practices that can better engage the audiences.Keywords: branding, higher education, social media, student engagement, student recruitment
Procedia PDF Downloads 126464 Effect of Nickel Coating on Corrosion of Alloys in Molten Salts
Authors: Divya Raghunandanan, Bhavesh D. Gajbhiye, C. S. Sona, Channamallikarjun S. Mathpati
Abstract:
Molten fluoride salts are considered as potential coolants for next generation nuclear plants where the heat can be utilized for production of hydrogen and electricity. Among molten fluoride salts, FLiNaK (LiF-NaF-KF: 46.5-11.5-42 mol %) is a potential candidate for the coolant due to its superior thermophysical properties such as high temperature stability, boiling point, volumetric heat capacity and thermal conductivity. Major technical challenge in implementation is the selection of structural material which can withstand corrosive nature of FLiNaK. Corrosion study of alloys SS 316L, Hastelloy B, Ni-201 was performed in molten FLiNaK at 650°C. Nickel was found to be more resistant to corrosive attack in molten fluoride medium. Corrosion experiments were performed to study the effect of nickel coating on corrosion of alloys SS 316L and Hastelloy B. Weight loss of the alloys due to corrosion was measured and corrosion rate was estimated. The surface morphology of the alloys was analyzed by Scanning Electron Microscopy.Keywords: corrosion, FLiNaK, hastelloy, weight loss
Procedia PDF Downloads 441