Search results for: impersonation attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 626

Search results for: impersonation attack

146 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 99
145 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 318
144 Effect of Palm Bunch Ash and Neem (Azardirachta indica A. Juss) Leaf Powder on Termite Infestation in Groundnut Field

Authors: K. O. Ogbedeh, C. P. Ekwe, G. O. Ihejirika, S. A. Dialoke, O. P. Onyewuchi, C. P. Anyanwu, I. E. Kalu

Abstract:

As one of the major pests of field crops, termites attack groundnut at all stages of its development, especially during prolonged dry spell. Effect of palm bunch ash and neem(Azardirachta indica A. Juss) leaf powder on termite infestation in groundnut field in Owerri, Nigeria was investigated in this study. The field trial was carried out in 2016 at the Teaching and Research Farm of the Federal University of Technology, Owerri, Nigeria. The experiment was laid out in a 3x3 Factorial fitted into a Randomized Complete Block Design (RCBD) with three replications. The treatments include three rates of palm bunch ash at 0.0 (control), 1.0 and 2.0tons/ha and three rates of neem leaf powder at 0.0(control), 1.0, 2.0 tons/ha respectively. Data were collected on percentage emergence, termite incidence and termite severity. These were subjected to analysis of variance (ANOVA), and means were separated using least significant difference at 5% level of probability. The result shows that there were no significant (P= 0.05) differences in percentage emergence amongst treatment means due to palm bunch ash and neem leaf powder applications. Contrarily, palm bunch ash at 2.0 tons/ha recorded the least termite incidence especially at twelve weeks after planting (12WAP) with a value of 22.20% while control plot maintained highest values at 6WAP (48.70%) and 12WAP (48.30%) respectively. Also palm bunch ash at 2.0tons/ha depressed termite severity more than other treatments especially at 2 and 4 WAP (0.56) respectively. Control plots on the other hand consistently maintained highest termite severity throughout the trial with the highest value at 2 and 12WAP (1.56). Conclusively, palm bunch ash exhibited highest depressive action against termite on groundnut especially at higher application value (2.0tons/ha).

Keywords: groundnut, incidence, neem, palm, severity, termites

Procedia PDF Downloads 229
143 Screening of Different Exotic Varieties of Potato through Adaptability Trial for Local Cultivation

Authors: Arslan Shehroz, Muhammad Amjad Ali, Amjad Abbas, Imran Ramzan, Muhammad Zunair Latif

Abstract:

Potato (Solanum tuberosum L.) is the 4th most important food crop of the world after wheat, rice and maize. It is the staple food in many European countries. Being rich in starch (one of the main three food ingredients) and having the highest productivity per unit area, has great potential to address the challenge of the food security. Processed potato is also used as chips and crisps etc as ‘fast food’. There are many biotic and abiotic factors which check the production of potato and become hurdle in achievement production potential of potato. 20 new varieties along with two checks were evaluated. Plant to plant and row to row distances were maintained as 20 cm and 75 cm, respectively. The trial was conducted according to the randomized complete block design with three replications. Normal agronomic and plant protection measures were carried out in the crop. It is revealed from the experiment that exotic variety 171 gave the highest yield of 35.5 t/ha followed by Masai with 31.0 t/ha tuber yield. The check variety Simply Red 24.2 t/ha yield, while the lowest tuber yield (1.5 t/ha) was produced by the exotic variety KWS-06-125. The maximum emergence was shown by the Variety Red Sun (89.7 %). The lowest emergence was shown by the variety Camel (71.7%). Regarding tuber grades, it was noted that the maximum Ration size tubers were produced by the exotic variety Compass (3.7%), whereas 11 varieties did not produce ration size tubers at all. The variety Red Sun produced lowest percentage of small size tubers (12.7%) whereas maximum small size tubers (93.0%) were produced by the variety Jitka. Regarding disease infestation, it was noted that the maximum scab incidence (4.0%) was recorded on the variety Masai, maximum rhizoctonia attack (60.0%) was recorded on the variety Camel and maximum tuber cracking (0.7%) was noted on the variety Vendulla.

Keywords: check variety, potato, potential and yield, trial

Procedia PDF Downloads 378
142 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil

Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke

Abstract:

Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.

Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM

Procedia PDF Downloads 223
141 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 361
140 Effect of Doping on Band Gap of Zinc Oxide and Degradation of Methylene Blue and Industrial Effluent

Authors: V. P. Borker, K. S. Rane, A. J. Bhobe, R. S. Karmali

Abstract:

Effluent of dye industries contains chemicals and organic dyes. Sometimes they are thrown in the water bodies without any treatment. This leads to environmental pollution and is detrimental to flora and fauna. Semiconducting oxide zinc oxide with wide bandgap 3.37 eV is used as a photocatalyst in degrading organic dyes using UV radiations. It generates electron-hole pair on exposure to UV light. If degradation is aimed at solar radiations, bandgap of zinc oxide is to be reduced so as to utilize visible radiation. Thus, in present study, zinc oxide, ZnO is synthesized from zinc oxalate, N doped zinc oxide, ZnO₁₋ₓNₓ from hydrazinated zinc oxalate, cadmium doped zinc oxide Zn₀.₉Cd₀.₁₀ and magnesium-doped zinc oxide Zn₀.₉Mg₀.₁₀ from mixed metal oxalate and hydrazinated mixed metal oxalate. The precursors were characterized by FTIR. They were decomposed to form oxides and XRD were recorded. The compounds were monophasic. Bandgap was calculated using Diffuse Reflectance Spectrum. The bandgap of ZnO was reduced to 3.24 because of precursor method of synthesis leading large surface area. The bandgap of Zn₀.₉Cd₀.₁₀ was 3.11 eV and that of Zn₀.₉Mg₀.₁₀ 3.41 eV. The lowest value was of ZnO₁₋ₓNₓ 3.09 eV. These oxides were used to degrade methylene blue, a model dye in sunlight. ZnO₁₋ₓNₓ was also used to degrade effluent of industry manufacturing colours, crayons and markers. It was observed that ZnO₁₋ₓNₓ acts as a good photocatalyst for degradation of methylene blue. It can degrade the solution within 120 minutes. Similarly, diluted effluent was decolourised using this oxide. Some colours were degraded using ZnO. Thus, the use of these two oxides could mineralize effluent. Lesser bandgap leads to more electro hole pair thus helps in the formation of hydroxyl ion radicals. These radicals attack the dye molecule, fragmentation takes place and it is mineralised.

Keywords: cadmium doped zinc oxide, dye degradation, dye effluent degradation, N doped zinc oxide, zinc oxide

Procedia PDF Downloads 168
139 Biotic Potential of Different Densities of Aphid Parasitoids, Diaeretiella rapae (Hymenoptera: Braconidae: Aphidiinae) Feeding on Brevicoryne brassicae

Authors: Muhammad Anjum Aqueel, Muhammad Jaffar Hussain, Abu Bakar Muhammad Raza

Abstract:

Diaeretiella rapae (M’Intosh) attack most of the aphid species. However, it is specialized in feeding on crucifer aphid, Brevicoryne brassicae. Biological potential of parasitoid is its density-dependency due to sharing of limited resources in few cases. The present study was carried out to check the biotic potential of D. rapae at its different densities (1, 2, 4, 8 and 10 pairs) on fixed number of B. brassicae (100 in number) as a host. The present study was performed under laboratory conditions (25 ± 2 ºC temperature and 65-70 % R.H.). Different biological parameters for parasitoid (e.g. percent parasitism, adult emergence, adult longevity and per pair parasitism) were evaluated to check its biotic potential. The present findings showed that maximum parasitism (43.09 % ± 0.63) was observed in highest density (10 pairs) and minimum parasitism (16.59 % ± 1.28) in lowest density (1 pair) of the parasitoid. Maximum adult emergence (80.31 % ± 1.33) was observed in highest density (10 pairs) and minimum parasitism (45.99 % ± 1.27) in lowest density (1 pair) of the parasitoid. In the case of adult longevity, highest (8.2 days ± 0.38) and lowest (6 days ± 0.32) longevity were observed in lowest (1 pair) and highest (10 pairs) densities of parasitoids respectively. However, per pair parasitism rate decreased with the increase in parasitoid densities due to intra-specific competition, developed between the parasitoids for parasitism. The positive but close relationship was observed between percent parasitism and adult emergence. The increase in parasitoid densities increased the percent parasitism and adult emergence of the parasitoid. So, we conclude that an inter-specific competition negatively affected the efficacy of parasitoids and may reduce the fitness of the emerging parasitoid.

Keywords: Diaeretiella rapae, Parasitoid densities, Percent parasitism, adult emergence

Procedia PDF Downloads 234
138 Multiple Version of Roman Domination in Graphs

Authors: J. C. Valenzuela-Tripodoro, P. Álvarez-Ruíz, M. A. Mateos-Camacho, M. Cera

Abstract:

In 2004, it was introduced the concept of Roman domination in graphs. This concept was initially inspired and related to the defensive strategy of the Roman Empire. An undefended place is a city so that no legions are established on it, whereas a strong place is a city in which two legions are deployed. This situation may be modeled by labeling the vertices of a finite simple graph with labels {0, 1, 2}, satisfying the condition that any 0-vertex must be adjacent to, at least, a 2-vertex. Roman domination in graphs is a variant of classic domination. Clearly, the main aim is to obtain such labeling of the vertices of the graph with minimum cost, that is to say, having minimum weight (sum of all vertex labels). Formally, a function f: V (G) → {0, 1, 2} is a Roman dominating function (RDF) in the graph G = (V, E) if f(u) = 0 implies that f(v) = 2 for, at least, a vertex v which is adjacent to u. The weight of an RDF is the positive integer w(f)= ∑_(v∈V)▒〖f(v)〗. The Roman domination number, γ_R (G), is the minimum weight among all the Roman dominating functions? Obviously, the set of vertices with a positive label under an RDF f is a dominating set in the graph, and hence γ(G)≤γ_R (G). In this work, we start the study of a generalization of RDF in which we consider that any undefended place should be defended from a sudden attack by, at least, k legions. These legions can be deployed in the city or in any of its neighbours. A function f: V → {0, 1, . . . , k + 1} such that f(N[u]) ≥ k + |AN(u)| for all vertex u with f(u) < k, where AN(u) represents the set of active neighbours (i.e., with a positive label) of vertex u, is called a [k]-multiple Roman dominating functions and it is denoted by [k]-MRDF. The minimum weight of a [k]-MRDF in the graph G is the [k]-multiple Roman domination number ([k]-MRDN) of G, denoted by γ_[kR] (G). First, we prove that the [k]-multiple Roman domination decision problem is NP-complete even when restricted to bipartite and chordal graphs. A problem that had been resolved for other variants and wanted to be generalized. We know the difficulty of calculating the exact value of the [k]-MRD number, even for families of particular graphs. Here, we present several upper and lower bounds for the [k]-MRD number that permits us to estimate it with as much precision as possible. Finally, some graphs with the exact value of this parameter are characterized.

Keywords: multiple roman domination function, decision problem np-complete, bounds, exact values

Procedia PDF Downloads 108
137 Seed Dressing and Foliar Spray of Green Bean (Phaseolus vulgaris L.) with Essential Oils and Disinfectants for Suppressing Root Rot and Wilt Incidence under Field Conditions

Authors: N. S. El-Mougy, M. M. Abdel-Kader, H. M. Abouelnasr

Abstract:

The efficacy of two essential oils applied as a bean seed dressing followed by seedlings foliar spray with four commercial disinfectants against root rot and wilt incidence was evaluated under field conditions. The essential oils, grape seed and peppermint oils and the disinfectants, Gold, Revarest, Klenva, Malva were applied. Chitosan and the fungicide Topsin-M were used as comparison treatment. Essential oils individually or combined with disinfectants were applied as a bean seed dressing. Furthermore, emerged bean plants were sprayed with the same treatments. Under laboratory conditions, growth inhibition effect was observed for the isolated, tested fungi R. solani and F. oxysporum when exposed to essential oils individually or combined with disinfectants. A high inhibitor effect was recorded for peppermint followed by grape seed oils. Concentrations of 1% and 2% of chitosan as well as Topsin M at 400 ppm showed complete reduction (100%) in the two fungal growths. Under field conditions, the obtained results showed that the applied treatments of chitosan had a superior effect on root rot and wilt disease incidence compared with other tested treatments. It was found that seed coating treatment provides good protection of emerged green bean seeds against the root pathogens attack compared with the fungicide and control treatments. Also, the application of seed dressing with essential oils accompanied by seedling spray demonstrated similar results. It was observed that essential oils had an enhancing effect against disease incidence when combined with disinfectants compared with their application. The obvious yield increase was significantly higher in all applied treatments than in fungicide and control.

Keywords: bean, disinfectants, essential oils, root rot, wilt

Procedia PDF Downloads 160
136 Save Lives: The Application of Geolocation-Awareness Service in Iranian Pre-hospital EMS Information Management System

Authors: Somayeh Abedian, Pirhossein Kolivand, Hamid Reza Lornejad, Amin Karampour, Ebrahim Keshavarz Safari

Abstract:

For emergency and relief service providers such as pre-hospital emergencies, quick arrival at the scene of an accident or any EMS mission is one of the most important requirements of effective service delivery. Response time (the interval between the time of the call and the time of arrival on scene) is a critical factor in determining the quality of pre-hospital Emergency Medical Services (EMS). This is especially important for heart attack, stroke, or accident patients. Location-based e-services can be broadly defined as any service that provides information pertinent to the current location of an active mobile handset or precise address of landline phone call at a specific time window, regardless of the underlying delivery technology used to convey the information. According to research, one of the effective methods of meeting this goal is determining the location of the caller via the cooperation of landline and mobile phone operators in the country. The follow-up of the Communications Regulatory Authority (CRA) organization has resulted in the receipt of two separate secured electronic web services. Thus, to ensure human privacy, a secure technical architecture was required for launching the services in the pre-hospital EMS information management system. In addition, to quicken medics’ arrival at the patient's bedside, rescue vehicles should make use of an intelligent transportation system to estimate road traffic using a GPS-based mobile navigation system independent of the Internet. This paper seeks to illustrate the architecture of the practical national model used by the Iranian EMS organization.

Keywords: response time, geographic location inquiry service (GLIS), location-based service (LBS), emergency medical services information system (EMSIS)

Procedia PDF Downloads 170
135 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness

Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan

Abstract:

Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.

Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis

Procedia PDF Downloads 142
134 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 77
133 Health Ramifications of Workplace Bullying: Gender, Race and Sexual Orientation as Risk Factors

Authors: Kathleen Canul

Abstract:

Bullying is on the rise according to several recent studies. Workplace bullying has garnered less attention than other forms yet incidence rates range from 35-45%. The consequences of being bullied at work are broad, ranging from physiological to psychological to occupational. As the bullying progresses, employees begin to exhibit physical and psychological symptoms. Blood pressure rises, along with other cardiac related concerns. For men, covert coping with job unfairness was associated with a four-fold risk of heart attack and death. Gastrointestinal distress, headaches, muscle tension, sleep disorders and exhaustion are also common. Workplace bullying appears to contribute to the risk of subsequent psychotropic medication, as well. Emotionally, anxiety and depression increase along with lowered self-esteem and problems concentrating on the duties of the job. In an attempt to cope, individuals may succumb to unhealthy practices involving food, alcohol and other drugs. Patterns of bullying vary by gender, race, and ethnicity, as well as sexual orientation, with women, ethnic minorities and LGBTQ employees reporting higher rates of bullying in the workplace. Not only is this an issue of inequity on the job, but also a problem of health disparities as there are few mental health professionals confident and competent in dealing with workplace bullying issues, and the lack of culturally competent clinicians exacerbates this inequality in receiving adequate care. Alone, the topic of workplace bullying is not unique; however, the diverse experiences of underrepresented groups who disproportionately are affected on the job and suffer untreated, health related concerns represent a significant and emerging problem requiring attention. Conference participants who have experienced, witnessed or help those bullied on the job would benefit most from this review of the literature on the consequences of bullying experienced by diverse and underrepresented groups in the workplace.

Keywords: bullying, ethnic minorities, health disparities, workplace conflict

Procedia PDF Downloads 280
132 Preventing Violent Extremism in Mozambique and Tanzania: A Survey to Measure Community Resilience

Authors: L. Freeman, D. Bax, V. K. Sapong

Abstract:

Community-based, preventative approaches to violent extremism may be effective and yet remain an underutilised method. In a realm where security approaches dominate, with the focus on countering violence extremism and combatting radicalisation, community resilience programming remains sparse. This paper will present a survey tool that aims to measure the risk and protective factors that can lead to violent extremism in Mozambique and Tanzania. Conducted in four districts in the Cabo Delgado region of Mozambique and one district in Pwani, Tanzania, the survey uses a combination of BRAVE-14, Afrocentric and context-specific questions in order to more fully understand community resilience opportunities and challenges in preventing and countering violent extremism. Developed in Australia and Canada to measure radicalisation risks in individuals and communities, BRAVE-14 is a tool not yet applied in the African continent. Given the emerging threat of Islamic extremism in Northern Mozambique and Eastern Tanzania, which both experience a combination of socio-political exclusion, resource marginalisation and religious/ideological motivations, the development of the survey is timely and fills a much-needed information gap in these regions. Not only have these Islamist groups succeeded in tapping into the grievances of communities by radicalising and recruiting individuals, but their presence in these regions has been characterised by extreme forms of violence, leaving isolated communities vulnerable to attack. The expected result of these findings will facilitate the contextualisation and comparison of the protective and risk factors that inhibit or promote the radicalisation of the youth in these communities. In identifying sources of resilience and vulnerability, this study emphasises the implementation of context-specific intervention programming and provides a strong research tool for understanding youth and community resilience to violent extremism.

Keywords: community resilience, Mozambique, preventing violent extremism, radicalisation, Tanzania

Procedia PDF Downloads 132
131 Impacts of Ibeju - Lekki New Town on Neighbouring Residents of Ibeju, Lagos Nigeria

Authors: Abolade Olajoke, Adigun Folasade Oyenike, Odunjo Oluronke Omolola Olaleye, Babajide Rotimi

Abstract:

Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%). Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment. Against the shortfall associated with unprecedented urbanization in most cities of the world, coupled with rapid expansion of outer boundaries, is the resultant birth of the development of new towns. The paper therefore examines the impacts of Ibeju - Lekki New Town on Neighbouring communities of Ibeju Lekki. Random systematic sampling was employed elicit relevant information from a total number of 269 residents at interval of five buildings in four neighbouring communities. Descriptive statistics was employed to test for the socioeconomic characteristics of respondents, problems faced by government officials during the implementation and monitoring process. Likert scale was employed to ascertain respondents view on the impact of the new town on neighbouring communities. Result from the findings shows that male (56.9%) are the most dominant occupant in the study area of which most (68.1%) fall within the most the active age group (18-39 and 40-59 years). Results further shows that 36% of the total respondents are traders and majority (32%) earn below government salary wage cap of ₦18000 thus indicating that majority of the respondents are petty traders. Results of findings from development authority reveals that the major problem encountered during monitoring and implementation is harassment of government officials (35%) Result of likert scale further show that new town has brought increase in intensity of land use within neighbouring communities (RAI 3.65), provision of job opportunity (RAI 3.57). This have consequently improve standard of living of the neighbouring community (RAI 3.27). On the contrary some (RAI 1.97) opined that attention should paid to provision of power supply and provision of recreation facilities (RAI I.63). The study recommends that government should make adequate provisions for basic facilities such power supply, adequate health care system, basic education and provision of healthy portable water. This should be given utmost priority to enhance the living condition of residents. To forestall attack from residents’ adequate security measures should be provided as backup for Government official during implementation and monitoring. Appropriate sanction to illegal occupants and demolition of illegal structures should be fully implemented, This will indubitably prevent haphazard development and also promote a liveable environment.

Keywords: new town, urbanization, infrastructure boundary

Procedia PDF Downloads 410
130 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 294
129 Multi-Functional Metal Oxides as Gas Sensors, Photo-Catalysts and Bactericides

Authors: Koyar Rane

Abstract:

Nano- to submicron size particles of narrow particle size distribution of semi-conducting TiO₂, ZnO, NiO, CuO, Fe₂O₃ have been synthesized by novel hydrazine method and tested for their gas sensing, photocatalytic and bactericidal activities and the behavior found to be enhanced when the oxides in the thin film forms, that obtained in a specially built spray pyrolysis reactor. Hydrazine method is novel in the sense, say, the UV absorption edge of the white pigment grade wide band gap (~3.2eV) TiO₂ and ZnO shifted to the visible region turning into yellowish particles, indicating modification occurring the band structure. The absorption in the visible region makes these oxides visible light sensitive photocatalysis in degrading pollutants, especially the organic dyes which otherwise increase the chemical oxygen demand of the drinking water, enabling the process feasible not under the harsh energetic UV radiation regime. The electromagnetic radiations on irradiation produce electron-hole pairs Semiconductor + hν → e⁻ + h⁺ The electron-hole pairs thus produced form Reactive Oxygen Species, ROS, on the surface of the semiconductors, O₂(adsorbed)+e⁻ → O₂• - superoxide ion OH-(surface)+h⁺ →•OH - Hydroxyl radical The ROS attack the organic material and micro-organisms. Our antibacterial studies indicate the metal oxides control the Biological Oxygen Demand (BOD) of drinking water which had beyond the safe level normally found in the municipal supply. Metal oxides in the thin film form show overall enhanced properties and the films are reusable. The results of the photodegradation and antibactericidal studies are discussed. Gas sensing studies too have been done to find the versatility of the multifunctional metal oxides.

Keywords: hydrazine method, visible light sensitive, photo-degradation of dyes, water/airborne pollutant

Procedia PDF Downloads 163
128 Quality and Qualitative Education for All, Panacea for Insecurity and Political Unrest in Nigeria

Authors: Babatunde Joel Todowede

Abstract:

It is a public knowledge that lack of quality and qualitative education breeds problems besetting Nigeria as a nation today. This paper entitled “Quality and Qualitative Education for all, panacea for insecurity and political unrest in Nigeria” seeks to explore how quality and qualitative education for all will tends to put an end to insecurity and political unrest in Nigeria as a Nation. It may be pertinent to note at this juncture that the development of any modern society or nation is primarily hinged on the functionality of its educational system. There is no developed nation in the world today, which does not owe its advancement to quality and qualitative education. In other words, Education is a vital instrument in the nation’s economic competitiveness, in its people, and in its communities. Hence, Education is not luxury to be cut in difficult economic times – it is an essential element of growth. In fact, education is the bedrock of any society that hopes to be numbered among the developed economies in the world. Nigeria, as a nation, has made continual efforts to assume its rightful place in education on the African continent, but has not been quite lucky. Interestingly however, Quality and Qualitative Education for all will come about if all stakeholders in the Education Sector perform their roles with skill and efficiency. Education is a very sensitive area, hence, needs to be passionate about education, and focused on building a future for the sector.” Quality and qualitative education instill significant core values in every student, which shape them into mature, caring and independent individuals. These values include commitment, collaboration, integrity, responsibility and respect. By imbibing these values in every aspect of their life, they are able to contribute their skills and talents while supporting each other in attaining their lifelong goals. This paper identified lack of proper education as the bane of insecurity and political unrest in the Country and urged the government to review the policy in a way that there will be quality and standard to check insurgency in the Country. More so, until the fallen standard of education in Nigeria is fixed to engage out of school children, the incessant attack on innocent Nigerians, particularly in the North East may get worse.

Keywords: quality and qualitative education, panacea, insecurity, political unrest

Procedia PDF Downloads 463
127 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 367
126 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 143
125 Bio–efficacy of Selected Plant extracts and Cypermethrin on Growth and Yield of Cowpea (Vigna unguiculata L.).

Authors: Akanji Kayode Ayanwusi., Akanji Elizabeth Nike, Bidmos Fuad Adetunji, Oladapo Olufemi Stephen

Abstract:

This experiment was conducted in Igboora, southwest Nigeria during the year 2022 planting season to determine the bio-efficacy of plant extracts (Jatropha curcas and Petiveria alliacea) and synthetic (Cypermethrin) insecticides against the insect pest of cowpea (Vigna unguiculata L.) and to determine its effect on the growth and yield of cowpea in the study area. Cowpea is one of the most important food and forage legumes in the semi-arid tropics. It is grown in 45 countries worldwide, including parts of Africa, Asia, Southern Europe, the Southern United States, and Central and South America. Cowpea production is considered too risky an enterprise by many growers because of its numerous pest problems. The treatments for the experiment consisted of two aqueous plant extracts (J.curcas and P. alliacea) at 50 /0 w/v and Cypermethrin 400 EC replicated three times including control in a randomized complete block design. Each plot measured 2.0 m by 2.0 m with 1.0 m inter-spaced per adjacent plot. The results from the study showed that different insect pests attack cowpea at different stages of growth. The insects observed were Bemisa tabaci, Callosobruchus maculatus, Megalurothrips sjostedti, and Maruca vitrata. High yields were obtained from plots treated with P. alliacea and synthetic insecticide (cypermethrin). J. curcas also produced optimum yield but lower than P. alliacea also P. alliacea treated plots had the least damaged pods while the untreated plots had the highest damaged pods, the plants extracts exhibited high insecticidal activities in this study, therefore P. alliacea leaves formulated as an insecticide is recommended for the control of insect pests of cowpea in the study area.

Keywords: plant extracts, yield, cypermethrin., cowpea

Procedia PDF Downloads 94
124 Numerical Investigation of Dynamic Stall over a Wind Turbine Pitching Airfoil by Using OpenFOAM

Authors: Mahbod Seyednia, Shidvash Vakilipour, Mehran Masdari

Abstract:

Computations for two-dimensional flow past a stationary and harmonically pitching wind turbine airfoil at a moderate value of Reynolds number (400000) are carried out by progressively increasing the angle of attack for stationary airfoil and at fixed pitching frequencies for rotary one. The incompressible Navier-Stokes equations in conjunction with Unsteady Reynolds Average Navier-Stokes (URANS) equations for turbulence modeling are solved by OpenFOAM package to investigate the aerodynamic phenomena occurred at stationary and pitching conditions on a NACA 6-series wind turbine airfoil. The aim of this study is to enhance the accuracy of numerical simulation in predicting the aerodynamic behavior of an oscillating airfoil in OpenFOAM. Hence, for turbulence modelling, k-ω-SST with low-Reynolds correction is employed to capture the unsteady phenomena occurred in stationary and oscillating motion of the airfoil. Using aerodynamic and pressure coefficients along with flow patterns, the unsteady aerodynamics at pre-, near-, and post-static stall regions are analyzed in harmonically pitching airfoil, and the results are validated with the corresponding experimental data possessed by the authors. The results indicate that implementing the mentioned turbulence model leads to accurate prediction of the angle of static stall for stationary airfoil and flow separation, dynamic stall phenomenon, and reattachment of the flow on the surface of airfoil for pitching one. Due to the geometry of the studied 6-series airfoil, the vortex on the upper surface of the airfoil during upstrokes is formed at the trailing edge. Therefore, the pattern flow obtained by our numerical simulations represents the formation and change of the trailing-edge vortex at near- and post-stall regions where this process determines the dynamic stall phenomenon.

Keywords: CFD, moderate Reynolds number, OpenFOAM, pitching oscillation, unsteady aerodynamics, wind turbine

Procedia PDF Downloads 203
123 Bilateral Thalamic Hypodense Lesions in Computing Tomography

Authors: Angelis P. Barlampas

Abstract:

Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.

Keywords: CNS, CT, thalamus, emergency department

Procedia PDF Downloads 121
122 Gendering the Political Crisis in Hong Kong: A Cultural Analysis of Spectatorship on Marvel Superhero Movies in Hong Kong

Authors: Chi S. Lee

Abstract:

Marvel superhero movies have obtained its unprecedented popularity around the globe. It is a dominant narrative in current scholarship on superhero studies that the political trauma of America, such as attack of September 11, and the masculinity represented in superhero genre are symbolically connected in a way of remasculinization, a standardized plot that before becoming a superhero, a man has to overcome its trauma in his life. Through this standardized plot, American audience finds their pleasure in the spectatorship of equating this plot of remasculinization with the situation of America, rewriting their traumatic memory and resolving around the economic, social, political, and psychological instability of precarity in their own context. Shifting the context to Hong Kong, where Marvel superhero movies have been reaching its dominant status in the local film market, this analysis finds its limitation in explaining the connection between text and context. This article aims to retain this connection through investigation of the Hong Kong audience’s spectatorship. It is argued that the masculinity represented in Marvel superhero movies no longer fits into the stereotypical image of superhero, but presents itself in crisis. This crisis is resolved by the technological excess of the superpower, namely, technological remasculinization. The technological remasculinization offers a sense of futurity through which it is felt that this remasculinization can be achieved in the foreseeable future instead of remaining imaginary and fictional. In this way, the political crisis of Hong Kong is gendered as masculinity in crisis which is worth being remasculinized in the future. This gendering process is a historical product as the symbolic equation between politics and masculinity has for long been encoded in the colonial history of Hong Kong. In short, Marvel superhero’s masculinity offers a sense of masculine hope for the Hong Kong audiences to overcome the political crisis they confront in reality through a postponed identification with the superhero’s masculinity. After the discussion of the Hong Kong audience’s spectatorship on Marvel superhero movies with the insights casted by spectatorship theory, above idea is generated.

Keywords: political crisis in Hong Kong, Marvel superhero movies, spectatorship, technological remasculinization

Procedia PDF Downloads 279
121 Advantages of Neural Network Based Air Data Estimation for Unmanned Aerial Vehicles

Authors: Angelo Lerro, Manuela Battipede, Piero Gili, Alberto Brandl

Abstract:

Redundancy requirements for UAV (Unmanned Aerial Vehicle) are hardly faced due to the generally restricted amount of available space and allowable weight for the aircraft systems, limiting their exploitation. Essential equipment as the Air Data, Attitude and Heading Reference Systems (ADAHRS) require several external probes to measure significant data as the Angle of Attack or the Sideslip Angle. Previous research focused on the analysis of a patented technology named Smart-ADAHRS (Smart Air Data, Attitude and Heading Reference System) as an alternative method to obtain reliable and accurate estimates of the aerodynamic angles. This solution is based on an innovative sensor fusion algorithm implementing soft computing techniques and it allows to obtain a simplified inertial and air data system reducing external devices. In fact, only one external source of dynamic and static pressures is needed. This paper focuses on the benefits which would be gained by the implementation of this system in UAV applications. A simplification of the entire ADAHRS architecture will bring to reduce the overall cost together with improved safety performance. Smart-ADAHRS has currently reached Technology Readiness Level (TRL) 6. Real flight tests took place on ultralight aircraft equipped with a suitable Flight Test Instrumentation (FTI). The output of the algorithm using the flight test measurements demonstrates the capability for this fusion algorithm to embed in a single device multiple physical and virtual sensors. Any source of dynamic and static pressure can be integrated with this system gaining a significant improvement in terms of versatility.

Keywords: aerodynamic angles, air data system, flight test, neural network, unmanned aerial vehicle, virtual sensor

Procedia PDF Downloads 221
120 Nationalization of the Social Life in Argentina: Accumulation of Capital, State Intervention, Labor Market, and System of Rights in the Last Decades

Authors: Mauro Cristeche

Abstract:

This work begins with a very simple question: How does the State spend? Argentina is witnessing a process of growing nationalization of social life, so it is necessary to find out the explanations of the phenomenon on the specific dynamic of the capitalist mode of production in Argentina and its transformations in the last decades. Then the new question is: what happened in Argentina that could explain this phenomenon? Since the seventies, the capital growth in Argentina faces deep competitive problems. Until that moment the agrarian wealth had worked as a compensation mechanism, but it began to find its limits. In the meantime, some important demographical and structural changes had happened. The strategy of the capitalist class had to become to seek in the cheapness of the labor force the main source of compensation of its weakness. As a result, a tendency to worsen the living conditions and fragmentation of the working class started to develop, manifested by unemployment, underemployment, and the fall of the purchasing power of the salary as a highlighted fact. As a consequence, it is suggested that the role of the State became stronger and public expenditure increased, as a historical trend, because it has to intervene to face the contradictions and constant growth problems posed by the development of capitalism in Argentina. On the one hand, the State has to guarantee the process of buying the cheapened workforce and at the same time the process of reproduction of the working class. On the other hand, it has to help to reproduce the individual capitals but needs to ‘attack’ them in different ways. This is why the role of the State is said to be the general political representative to the national portion of the total social capital. What will be studied is the dynamic of the intervention of the Argentine State in the context of the particular national process of capital growth, and its dynamics in the last decades. What this paper wants to show are the main general causes that could explain the phenomenon of nationalization of the social life and how it has impacted the life conditions of the working class and the system of rights.

Keywords: Argentina, nationalization, public policies, rights, state

Procedia PDF Downloads 136
119 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society

Authors: Ada Yurman

Abstract:

Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.

Keywords: militarism, political deviance, social construction, social control

Procedia PDF Downloads 112
118 Flow-Control Effectiveness of Convergent Surface Indentations on an Aerofoil at Low Reynolds Numbers

Authors: Neel K. Shah

Abstract:

Passive flow control on aerofoils has largely been achieved through the use of protrusions such as vane-type vortex generators. Consequently, innovative flow-control concepts should be explored in an effort to improve current component performance. Therefore, experimental research has been performed at The University of Manchester to evaluate the flow-control effectiveness of a vortex generator made in the form of a surface indentation. The surface indentation has a trapezoidal planform. A spanwise array of indentations has been applied in a convergent orientation around the maximum-thickness location of the upper surface of a NACA-0015 aerofoil. The aerofoil has been tested in a two-dimensional set-up in a low-speed wind tunnel at an angle of attack (AoA) of 3° and a chord-based Reynolds number (Re) of ~2.7 x 105. The baseline model has been found to suffer from a laminar separation bubble at low AoA. The application of the indentations at 3° AoA has considerably shortened the separation bubble. The indentations achieve this by shedding up-flow pairs of streamwise vortices. Despite the considerable reduction in bubble length, the increase in leading-edge suction due to the shorter bubble is limited by the removal of surface curvature and blockage (increase in surface pressure) caused locally by the convergent indentations. Furthermore, the up-flow region of the vortices, which locally weakens the pressure recovery around the trailing edge of the aerofoil by thickening the boundary layer, also contributes to this limitation. Due to the conflicting effects of the indentations, the changes in the pressure-lift and pressure-drag coefficients, i.e., cl,p and cd,p, are small. Nevertheless, the indentations have improved cl,p and cd,p beyond the uncertainty range, i.e., by ~1.30% and ~0.30%, respectively, at 3° AoA. The wake measurements show that turbulence intensity and Reynolds stresses have considerably increased in the indented case, thus implying that the indentations increase the viscous drag on the model. In summary, the convergent indentations are able to reduce the size of the laminar separation bubble, but conversely, they are not highly effective in reducing cd,p at the tested Reynolds number.

Keywords: aerofoil flow control, laminar separation bubbles, low Reynolds-number flows, surface indentations

Procedia PDF Downloads 226
117 Power Performance Improvement of 500W Vertical Axis Wind Turbine with Salient Design Parameters

Authors: Young-Tae Lee, Hee-Chang Lim

Abstract:

This paper presents the performance characteristics of Darrieus-type vertical axis wind turbine (VAWT) with NACA airfoil blades. The performance of Darrieus-type VAWT can be characterized by torque and power. There are various parameters affecting the performance such as chord length, helical angle, pitch angle and rotor diameter. To estimate the optimum shape of Darrieustype wind turbine in accordance with various design parameters, we examined aerodynamic characteristics and separated flow occurring in the vicinity of blade, interaction between flow and blade, and torque and power characteristics derived from it. For flow analysis, flow variations were investigated based on the unsteady RANS (Reynolds-averaged Navier-Stokes) equation. Sliding mesh algorithm was employed in order to consider rotational effect of blade. To obtain more realistic results we conducted experiment and numerical analysis at the same time for three-dimensional shape. In addition, several parameters (chord length, rotor diameter, pitch angle, and helical angle) were considered to find out optimum shape design and characteristics of interaction with ambient flow. Since the NACA airfoil used in this study showed significant changes in magnitude of lift and drag depending on an angle of attack, the rotor with low drag, long cord length and short diameter shows high power coefficient in low tip speed ratio (TSR) range. On the contrary, in high TSR range, drag becomes high. Hence, the short-chord and long-diameter rotor produces high power coefficient. When a pitch angle at which airfoil directs toward inside equals to -2° and helical angle equals to 0°, Darrieus-type VAWT generates maximum power.

Keywords: darrieus wind turbine, VAWT, NACA airfoil, performance

Procedia PDF Downloads 373