Search results for: file tampering attack
313 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse
Authors: Maryam Vaezi
Abstract:
In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party
Procedia PDF Downloads 338312 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications
Authors: Assem M. F. Sallam, Ah. El-S. Makled
Abstract:
This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink
Procedia PDF Downloads 277311 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 118310 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network
Authors: Phillip Garrad, Saritha Unnikrishnan
Abstract:
The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing
Procedia PDF Downloads 110309 A Game-Based Product Modelling Environment for Non-Engineer
Authors: Guolong Zhong, Venkatesh Chennam Vijay, Ilias Oraifige
Abstract:
In the last 20 years, Knowledge Based Engineering (KBE) has shown its advantages in product development in different engineering areas such as automation, mechanical, civil and aerospace engineering in terms of digital design automation and cost reduction by automating repetitive design tasks through capturing, integrating, utilising and reusing the existing knowledge required in various aspects of the product design. However, in primary design stages, the descriptive information of a product is discrete and unorganized while knowledge is in various forms instead of pure data. Thus, it is crucial to have an integrated product model which can represent the entire product information and its associated knowledge at the beginning of the product design. One of the shortcomings of the existing product models is a lack of required knowledge representation in various aspects of product design and its mapping to an interoperable schema. To overcome the limitation of the existing product model and methodologies, two key factors are considered. First, the product model must have well-defined classes that can represent the entire product information and its associated knowledge. Second, the product model needs to be represented in an interoperable schema to ensure a steady data exchange between different product modelling platforms and CAD software. This paper introduced a method to provide a general product model as a generative representation of a product, which consists of the geometry information and non-geometry information, through a product modelling framework. The proposed method for capturing the knowledge from the designers through a knowledge file provides a simple and efficient way of collecting and transferring knowledge. Further, the knowledge schema provides a clear view and format on the data that needed to be gathered in order to achieve a unified knowledge exchange between different platforms. This study used a game-based platform to make product modelling environment accessible for non-engineers. Further the paper goes on to test use case based on the proposed game-based product modelling environment to validate the effectiveness among non-engineers.Keywords: game-based learning, knowledge based engineering, product modelling, design automation
Procedia PDF Downloads 155308 Behavioral Responses of Coccinella septempunctata and Diaeretiella rapae toward Semiochemicals and Plant Extract
Authors: Muhammad Tariq, Bushra Siddique, Muhammad Naeem, Asim Gulzar
Abstract:
The chemical ecology of natural enemies can play a pivotal role in any Integrated Pest Management (IPM) program. Different chemical cues help to correspond in the diversity of associations between prey and host plant species. Coccinellaseptempunctata and Diaeretiellarapae have the abilities to explore several chemical cues released by plants under herbivore attack that may enhance their efficiency of foraging. In this study, the behavioral responses of Coccinellaseptempunctata and Diaeretiellarapae were examined under the application of two semiochemicals and a plant extract and their combinations using four-arm olfactometer. The bioassay was consists of a pairwise treatment comparison. Data pertaining to the preference of C. septempunctata and D. rapae after treatment application were recorded and analyzed statistically. The mean number of entries and time spent of Coccinellaseptempunctata and D. rapaewere greater in arms treated with E-β-Farnesene. However, the efficacy of E-β-Farnesene was enhanced when combined with β-pinene. Thus, the mean number of entries and time spent of C. septempunctata and D. rapaewere highest in arms treated with the combination of E-β-Farnesene x β-pinene as compared with other treatments. The current work has demonstrated that the insect-derived semiochemicals may enhance the efficacy of natural enemies when applied in combination.Keywords: olfectometer, parasitoid, predator, preference
Procedia PDF Downloads 145307 Synthesis and Characterization of Some New Diamines and Their Thermally Stable Polyimides
Authors: Zill-E-Huma, Humaira Siddiqi
Abstract:
This paper comprises of synthesis of thermally stable, mechanically strong polyimides. The polyimides were considered as most diverse class of polymers having unlimited applications. They were widely used as optical wave guides, in aerospace, for gas separation, as biomaterials and in electronics. Here the focus was to increase thermal stability and mechanical strength of polyimides. For this purpose two monomers were synthesized and were further polymerized via anhydrides to polyimides. The monomer diamines were synthesized by nucleophilic attack of aniline/2-fluoro aniline on hydroxy benzaldehydes. The two diamines synthesized were 3-(bis(4-aminophenyl) methyl) phenol (3OHDA) and 4-(bis(4-amino-3-fluorophenyl) methyl) phenol (2F4OHDA). These diamines were then reacted with dianhydrides to get polyimides. Two neat polyimides of both diamines with pyromellitic dianhydride (PMDA) and one neat polyimide of 4'-(Hexafluoroisopropylidene) diphthalic dianhydride (6FDA) with 3OHDA were synthesized. To compare the properties of synthesized polyimides like thermal stability, rigidity, flexibility, toughness etc. a commercial diamine oxydianiline (ODA) was used. Polyimides from oxydianiline were basically rigid. Nine different polyimide blends were synthesized from 3OHDA and commercial diamines ODA to have a better comparison of properties. TGA and mechanical testing results showed that with the increase in the percentage of 3OHDA in comparison to ODA the flexibility, toughness, strength of polyimide, thermal stability goes on increasing. So, synthesized diamines were responsible for improvement of properties of polyimides.Keywords: diamines, dianhydrides, oxydianiline, polyimides
Procedia PDF Downloads 303306 Durability of a Cementitious Matrix Based on Treated Sediments
Authors: Mahfoud Benzerzour, Mouhamadou Amar, Amine Safhi, Nor-Edine Abriak
Abstract:
Significant volumes of sediment are annually dredged in France and all over the world. These materials may, in fact, be used beneficially as supplementary cementitious material. This paper studies the durability of a new cement matrix based on marine dredged sediment of Dunkirk-Harbor (north of France). Several techniques are used to characterize the raw sediment such as physical properties, chemical analyses, and mineralogy. The XRD analysis revealed quartz, calcite, kaolinite as main mineral phases. In order to eliminate organic matter and activate some of those minerals, the sediment is calcined at a temperature of 850°C for 1h. Moreover, four blended mortars were formulated by mixing a portland cement (CEM I 52,5 N) and the calcined sediment as partial cement substitute (0%, 10%, 20% and 30%). Reference mortars, based on the blended cement, were then prepared. This re-use cannot be substantiating and efficient without a durability study. In this purpose, the following tests, mercury porosity, accessible water porosity, chloride permeability, freezing and thawing, external sulfate attack, alkali aggregates reaction, compressive and bending strength tests were conducted on those mortars. The results of most of those tests evidenced the fact that the mortar that contains 10% of the treated sediment is efficient and durable as the reference mortar itself. That would infer that the presence of these calcined sediment improves mortar general behavior.Keywords: sediment, characterization, calcination, substitution, durability
Procedia PDF Downloads 257305 Value-Based Argumentation Frameworks and Judicial Moral Reasoning
Authors: Sonia Anand Knowlton
Abstract:
As the use of Artificial Intelligence is becoming increasingly integrated in virtually every area of life, the need and interest to logically formalize the law and judicial reasoning is growing tremendously. The study of argumentation frameworks (AFs) provides promise in this respect. AF’s provide a way of structuring human reasoning using a formal system of non-monotonic logic. P.M. Dung first introduced this framework and demonstrated that certain arguments must prevail and certain arguments must perish based on whether they are logically “attacked” by other arguments. Dung labelled the set of prevailing arguments as the “preferred extension” of the given argumentation framework. Trevor Bench-Capon’s Value-based Argumentation Frameworks extended Dung’s AF system by allowing arguments to derive their force from the promotion of “preferred” values. In VAF systems, the success of an attack from argument A to argument B (i.e., the triumph of argument A) requires that argument B does not promote a value that is preferred to argument A. There has been thorough discussion of the application of VAFs to the law within the computer science literature, mainly demonstrating that legal cases can be effectively mapped out using VAFs. This article analyses VAFs from a jurisprudential standpoint to provide a philosophical and theoretical analysis of what VAFs tell the legal community about the judicial reasoning, specifically distinguishing between legal and moral reasoning. It highlights the limitations of using VAFs to account for judicial moral reasoning in theory and in practice.Keywords: nonmonotonic logic, legal formalization, computer science, artificial intelligence, morality
Procedia PDF Downloads 75304 Outbreak of Pulmonary Tuberculosis in Cojutepeque Military Brigade, El Salvador, July 2013
Authors: Juan Santos Garcia
Abstract:
Introduction: Tuberculosis is a chronic granulomatous disease caused by a microorganism called Mycobacterium tuberculosis, it has the capacity to spread from the lungs to other parts of the body. Globally, the rate per 100 thousand inhabitants has varied from 136 in 2007 to 122 in 2012; while in the region of the Americas has been much lower: 32 cases per 100,000 in 2007, to 29 in 2012. In El Salvador have also varied incidence rates from 2007 to 2012, from 27.4 cases per 100 000 population to 32 in the period indicated. Methods: Screening was performed with smear and chest X-ray at 80 military personnel from Military Brigade # 5 of El Salvador. Besides HIV tests were taken at the positive cases, which are also made interview, investigating demographic, clinical, laboratory and risk factors data. Frequencies, percentages and rates were calculated using Excel page. The rates were calculated for each of the 5 military bedrooms (called A, B, C, D, and E). Results: Attack rate was 18.75% in the bedroom C. the index case was identified and two secondary cases, with an exposure period of 59 days. Only the index case presented symptoms: cough, fever and weight loss. The other two cases had no symptoms. Discussion: We found a rate of tuberculosis 526 times higher than the national rate. He was also 12.5 times higher than that found in other studies in closed populations such as school facilities. It was not possible to make association analysis.Keywords: tuberculosis, outbreak, military brigade, chronic granulomatous disease
Procedia PDF Downloads 261303 Aerodynamics and Aeroelastics Studies of Hanger Bridge with H-Beam Profile Using Wind Tunnel
Authors: Matza Gusto Andika, Malinda Sabrina, Syarie Fatunnisa
Abstract:
Aerodynamic and aeroelastics studies on the hanger bridge profile are important to analyze the aerodynamic phenomenon and Aeroelastics stability of hanger. Wind tunnel tests were conducted on a model of H-beam profile from hanger bridge. The purpose of this study is to investigate steady aerodynamic characteristics such as lift coefficient (Cl), drag coefficient (Cd), and moment coefficient (Cm) under the different angle of attack for preliminary prediction of aeroelastics stability problems. After investigation the steady aerodynamics characteristics from the model, dynamic testing is also conducted in wind tunnel to know the aeroelastics phenomenon which occurs at the H-beam hanger bridge profile. The studies show that the torsional vortex induced vibration occur when the wind speed is 7.32 m/s until 9.19 m/s with maximum amplitude occur when the wind speed is 8.41 m/s. The result of wind tunnel testing is matching to hanger vibration where occur in the field, so wind tunnel studies has successful to model the problem. In order that the H-beam profile is not good enough for the hanger bridge and need to be modified to minimize the Aeroelastics problem. The modification can be done with structure dynamics modification or aerodynamics modification.Keywords: aerodynamics, aeroelastic, hanger bridge, h-beam profile, vortex induced vibration, wind tunnel
Procedia PDF Downloads 350302 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete
Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei
Abstract:
The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.Keywords: admixture, granite dust, permeability, pozzolans
Procedia PDF Downloads 161301 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 159300 Simplified Measurement of Occupational Energy Expenditure
Authors: J. Wicks
Abstract:
Aim: To develop a simple methodology to allow collected heart rate (HR) data from inexpensive wearable devices to be expressed in a suitable format (METs) to quantitate occupational (and recreational) activity. Introduction: Assessment of occupational activity is commonly done by utilizing questionnaires in combination with prescribed MET levels of a vast range of previously measured activities. However for any individual the intensity of performing a specific activity can vary significantly. Ideally objective measurement of individual activity is preferred. Though there are a wide range of HR recording devices there is a distinct lack methodology to allow processing of collected data to quantitate energy expenditure (EE). The HR index equation expresses METs in relation to relative HR i.e. the ratio of activity HR to resting HR. The use of this equation provides a simple utility for objective measurement of EE. Methods: During a typical occupational work period of approximately 8 hours HR data was recorded using a Polar RS 400 wrist monitor. Recorded data was downloaded to a Windows PC and non HR data was stripped from the ASCII file using ‘Notepad’. The HR data was exported to a spread sheet program and sorted by HR range into a histogram format. Three HRs were determined, namely a resting HR (the HR delimiting the lowest 30 minutes of recorded data), a mean HR and a peak HR (the HR delimiting the highest 30 minutes of recorded data). HR indices were calculated (mean index equals mean HR/rest HR and peak index equals peak HR/rest HR) with mean and peak indices being converted to METs using the HR index equation. Conclusion: Inexpensive HR recording devices can be utilized to make reasonable estimates of occupational (or recreational) EE suitable for large scale demographic screening by utilizing the HR index equation. The intrinsic value of the HR index equation is that it is independent of factors that influence absolute HR, namely fitness, smoking and beta-blockade.Keywords: energy expenditure, heart rate histograms, heart rate index, occupational activity
Procedia PDF Downloads 296299 Effects of High Intensity Interval vs. Low Intensity Continuous Training on LXRβ, ABCG5 and ABCG8 Genes Expression in Male Wistar Rats
Authors: Sdiqeh Jalali, M. R. Khazdair
Abstract:
Liver X receptors (LXR) have an essential role in the regulation of cholesterol metabolism, and their activation increase ABCG5 and ABCG8 genes expression for the improvement of cholesterol excretion from the body during reverse cholesterol transport (RCT). The aim of this study was to investigate the effects of high-intensity interval (HIT) and low intensity continuous (LIT) trainings on gene expression of these substances after a high-fat diet in Wistar rats. Materials and Methods: Fifteen male Wistar rats were divided into 3 groups: control group (n = 5), HIT exercise group (n = 5) and LIT exercise group (n = 5). All groups used a high-fat diet for 13 weeks, and the HIT and LIT groups performed the specific training program. The expression of LXRβ, ABCG5, and ABCG8 genes was measured after the training period. Findings: Data analysis showed significantly higher levels of LXRβ, ABCG5, and ABCG8 gene expression in HIT and LIT groups compared to the control group (P ≤ 0.05). Conclusion: HIT and LIT trainings after a high-fat diet have beneficial effects on RCT that prevent heart attack. Also, HIT training may have a greater effect on cholesterol excretion during the reverse cholesterol transport mechanism than LIT.Keywords: liver X receptor, atherosclerosis, interval training, endurance training
Procedia PDF Downloads 117298 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 134297 Modernization from Above: The (re-)Creation of National Identity through Westernization in Mubarak-era Cairo
Authors: Mariam Aref Mahmoud
Abstract:
A myth surrounding the development of Cairo bases itself in the Fatimid era when the city, as we know it today, was built. Surrounding the city was a wall meant to protect the main center from any possible attack. The effects of global hierarchies of power extend further than labor regulations and trade statistics. Beyond that, they form dialectical oppositions between local and global identities within urban space. As such, those in power often aim to claim national identity as what they perceive to be the most nationally beneficial strategy. These claims over perceptions of national identity take over the streets, the advertisements, and the parks and eventually make their way into the different forms of media. Often, these claims take over the main planning goals of the city. Whether it is through the control over which sounds are allowed to be produced in public space, what type of people are encouraged to enter which spaces, or other forms of performing local and national identity, public space, property, and land have often been used as a method to present to both the public and the global population what people in power wish for these spaces to represent. In Egypt, these developments have been changing since the end of colonial rule. In particular, this paper will analyze how Hosni Mubarak, and to a certain extent Anwar el-Sadat, enacted neoliberal designs dedicated towards modernization in order to present an image of a Cairo that is not uniquely Egyptian but essentially Western cosmopolitan - a Cairo that belongs to a globalized world.Keywords: Egypt, imperialism, westernization, housing
Procedia PDF Downloads 70296 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun
Authors: Ndje Ndje Mireille
Abstract:
The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun
Procedia PDF Downloads 160295 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 153294 Preparing Curved Canals Using Mtwo and RaCe Rotary Instruments: A Comparison Study
Authors: Mimoza Canga, Vito Malagnino, Giulia Malagnino, Irene Malagnino
Abstract:
Objective: The objective of this study was to compare the effectiveness of Mtwo and RaCe rotary instruments, in cleaning and shaping root canals curvature. Material and Method: The present study was conducted on 160 simulated canals in resin blocks, with an angle curvature 15°-30°. These 160 simulated canals were divided into two groups, where each group consisted of 80 blocks. Each group was divided into two subgroups (n=40 canals each). The simulated canals subgroups were prepared with Mtwo and RaCe rotary nickel-titanium instruments. The root canals were measured at four different points of reference, starting at 13 mm from the orifice. In the first group, the canals were prepared using Mtwo rotary system (VDW, Munich, Germany). The Mtwo files used were: 10/0.04, 15/0.05, 20/0.06, and 25/0.06. These instruments entered in the full length of the canal. Each file was rotated in the canal until it reached the apical point. In the second group, the canals were prepared using RaCe instruments (La Chaux-De-Fonds, Switzerland), performing the crown down technique, using the torque electric control motor (VDWCO, Munich, Germany), with 600 RPM and 2n/cm as follow: ≠40/0.10, ≠35/0.08, ≠30/0.06, ≠25/0.04, ≠25/0.02. The data were recorded using SPSS version 23 software (Microsoft, IL, USA). Data analysis was done using ANOVA test. Results: The results obtained by using the Mtwo rotary instruments, showed that these instruments were able to clean and shape in the right-to-left motion curved canals, at different levels, without any deviation, and in perfect symmetry, with a P-value=0.000. The data showed that the greater the depth of the root canal, the greater the deviations of the RaCe rotary instruments. These deviations occurred in three levels, which are: S2(P=0.004), S3( P=0.007), S4(P=0.009). The Mtwo files can go deeper and create a greater angle in S4 level (21°-28°), compared to RaCe instruments with an angle equal to 19°-24°. Conclusion: The present study noted a clinically significant difference between Mtwo rotary instruments and RaCe rotary files used for the canal preparation and indicated that Mtwo instruments are a better choice for the curved canals.Keywords: canal curvature, canal preparation, Mtwo, RaCe, resin blocks
Procedia PDF Downloads 122293 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 106292 Half Model Testing for Canard of a Hybrid Buoyant Aircraft
Authors: Anwar U. Haque, Waqar Asrar, Ashraf Ali Omar, Erwin Sulaeman, Jaffer Sayed Mohamed Ali
Abstract:
Due to the interference effects, the intrinsic aerodynamic parameters obtained from the individual component testing are always fundamentally different than those obtained for complete model testing. Consideration and limitation for such testing need to be taken into account in any design work related to the component buildup method. In this paper, the scaled model of a straight rectangular canard of a hybrid buoyant aircraft is tested at 50 m/s in IIUM-LSWT (Low-Speed Wind Tunnel). Model and its attachment with the balance are kept rigid to have results free from the aeroelastic distortion. Based on the velocity profile of the test section’s floor; the height of the model is kept equal to the corresponding boundary layer displacement. Balance measurements provide valuable but limited information of the overall aerodynamic behavior of the model. Zero lift coefficient is obtained at -2.2o and the corresponding drag coefficient was found to be less than that at zero angles of attack. As a part of the validation of low fidelity tool, the plot of lift coefficient plot was verified by the experimental data and except the value of zero lift coefficient, the overall trend has under-predicted the lift coefficient. Based on this comparative study, a correction factor of 1.36 is proposed for lift curve slope obtained from the panel method.Keywords: wind tunnel testing, boundary layer displacement, lift curve slope, canard, aerodynamics
Procedia PDF Downloads 471291 Variation of Airfoil Pressure Profile Due to Confined Air Streams: Application in Gas-Oil Separators
Authors: Amir Hossein Haji, Nabeel Al-Rawahi, Gholamreza Vakili-Nezhaad
Abstract:
An innovative design has been examined for a gas-oil separator based on pressure reduction over an airfoil surface. The primary motivations are to shorten the release trajectory of the bubbles by minimizing the thickness of the oil layer as well as improving uniform pressure reduction zones. Restricted airflow over an airfoil is investigated for its effect on the pressure drop enhancement and the maximum attainable attack angle prior to the stall condition. Aerodynamic separation is delayed based on numerical simulation of Wortmann FX 63137 Airfoil in a confined domain using FLUENT 6.3.26. The proposed set up results in higher pressure drop compared with the free stream case. With the aim of optimum power consumption we have pursued further restriction to an air jet case over the airfoil. Then, a curved strip model is suggested for the air jet which can be applied as an analysis/design tool for the best performance conditions. Pressure reduction is shown to be inversely proportional to the curvature of the upper airfoil profile. This reduction occurs within the tracking zones where the air jet is effectively attached to the airfoil surface. The zero slope condition is suggested to estimate the onset of these zones after which the minimum curvature should be searched. The corresponding zero slope curvature is applied for estimation of the maximum pressure drop which shows satisfactory agreement with the simulation results.Keywords: airfoil, air jet, curved fluid flow, gas-oil separator
Procedia PDF Downloads 474290 Coarse Grid Computational Fluid Dynamics Fire Simulations
Authors: Wolfram Jahn, Jose Manuel Munita
Abstract:
While computational fluid dynamics (CFD) simulations of fire scenarios are commonly used in the design of buildings, less attention has been given to the use of CFD simulations as an operational tool for the fire services. The reason of this lack of attention lies mainly in the fact that CFD simulations typically take large periods of time to complete, and their results would thus not be available in time to be of use during an emergency. Firefighters often face uncertain conditions when entering a building to attack a fire. They would greatly benefit from a technology based on predictive fire simulations, able to assist their decision-making process. The principal constraint to faster CFD simulations is the fine grid necessary to solve accurately the physical processes that govern a fire. This paper explores the possibility of overcoming this constraint and using coarse grid CFD simulations for fire scenarios, and proposes a methodology to use the simulation results in a meaningful way that can be used by the fire fighters during an emergency. Data from real scale compartment fire tests were used to compare CFD fire models with different grid arrangements, and empirical correlations were obtained to interpolate data points into the grids. The results show that the strongly predominant effect of the heat release rate of the fire on the fluid dynamics allows for the use of coarse grids with relatively low overall impact of simulation results. Simulations with an acceptable level of accuracy could be run in real time, thus making them useful as a forecasting tool for emergency response purposes.Keywords: CFD, fire simulations, emergency response, forecast
Procedia PDF Downloads 320289 Capacity Building on Small Automatic Tracking Antenna Development for Thailand Space Sustainability
Authors: Warinthorn Kiadtikornthaweeyot Evans, Nawattakorn Kaikaew
Abstract:
The communication system between the ground station and the satellite is very important to guarantee contact between both sides. Thailand, led by Geo-Informatics and Space Technology Development Agency (GISTDA), has received satellite images from other nation's satellites for a number of years. In 2008, Thailand Earth Observation Satellite (THEOS) was the first Earth observation satellite owned by Thailand. The mission was monitoring our country with affordable access to space-based Earth imagery. At this time, the control ground station was initially used to control the THEOS satellite by our Thai engineers. The Tele-commands were sent to the satellite according to requests from government and private sectors. Since then, GISTDA's engineers have gained their skill and experience to operate the satellite. Recently the desire to use satellite data is increasing rapidly due to space technology moving fast and giving us more benefits. It is essential to ensure that Thailand remains competitive in space technology. Thai Engineers have started to improve the performance of the control ground station in many different sections, also developing skills and knowledge in areas of satellite communication. Human resource skills are being enforced with development projects through capacity building. This paper focuses on the hands-on capacity building of GISTDA's engineers to develop a small automatic tracking antenna. The final achievement of the project is the first phase prototype of a small automatic tracking antenna to support the new technology of the satellites. There are two main subsystems that have been developed and tested; the tracking system and the monitoring and control software. The prototype first phase functions testing has been performed with Two Line Element (TLE) and the mission planning plan (MPP) file calculated from THEOS satellite by GISTDA.Keywords: capacity building, small tracking antenna, automatic tracking system, project development procedure
Procedia PDF Downloads 76288 Using E-learning in a Tertiary Institution during Community Outbreak of COVID-19 in Hong Kong
Authors: Susan Ka Yee Chow
Abstract:
The Coronavirus disease (COVID-19) reached Hong Kong in 2019 resulting in epidemic in late January 2020. Considering the epidemic development, tertiary institutions made announcements that all on-campus classes were suspended since 01/29/2020. In Tung Wah College, e-learning was adopted in all courses for all programmes. For the undergraduate nursing students, the contact hours and curriculum are bounded by the Nursing Council of Hong Kong to ensure core competence after graduation. Unlike the usual e-learning where students are allowed having flexibility of time and place in their learning, real time learning mode using Blackboard was used to mimic the actual classroom learning environment. Students were required to attend classes according to the timetable using online platform. For lectures, voice over PowerPoint file was the initial step for mass lecturing. Real time lecture was then adopted to improve interactions between teacher and students. Post-lecture quizzes were developed to monitor the effectiveness of lecture delivery. The seminars and tutorials were conducted using real time mode where students were separated into small groups with interactive discussions with teacher within the group. Live time demonstrations were conducted during laboratory sessions. All teaching sessions were audio/video recorded for students’ referral. The assessments including seminar presentation and debate were retained. The learning mode creates an atmosphere for students to display the visual, audio and written works in a non-threatening atmosphere. Other students could comment using text or direct voice as they desired. Real time online learning is the pedagogy to replace classroom contacts in the emergent and unforeseeable circumstances. The learning pace and interaction between students and students with teacher are maintained. The learning mode has the advantage of creating an effective and beneficial learning experience.Keywords: e-learning, nursing curriculum, real time mode, teaching and learning
Procedia PDF Downloads 116287 A Computational Study on Flow Separation Control of Humpback Whale Inspired Sinusoidal Hydrofoils
Authors: J. Joy, T. H. New, I. H. Ibrahim
Abstract:
A computational study on bio-inspired NACA634-021 hydrofoils with leading-edge protuberances has been carried out to investigate their hydrodynamic flow control characteristics at a Reynolds number of 14,000 and different angles-of-attack. The numerical simulations were performed using ANSYS FLUENT and based on Reynolds-Averaged Navier-Stokes (RANS) solver mode incorporated with k-ω Shear Stress Transport (SST) turbulence model. The results obtained indicate varying flow phenomenon along the peaks and troughs over the span of the hydrofoils. Compared to the baseline hydrofoil with no leading-edge protuberances, the leading-edge modified hydrofoils tend to reduce flow separation extents along the peak regions. In contrast, there are increased flow separations in the trough regions of the hydrofoil with leading-edge protuberances. Interestingly, it was observed that dissimilar flow separation behaviour is produced along different peak- or trough-planes along the hydrofoil span, even though the troughs or peaks are physically similar at each interval for a particular hydrofoil. Significant interactions between adjacent flow structures produced by the leading-edge protuberances have also been observed. These flow interactions are believed to be responsible for the dissimilar flow separation behaviour along physically similar peak- or trough-planes.Keywords: computational fluid dynamics, flow separation control, hydrofoils, leading-edge protuberances
Procedia PDF Downloads 328286 Prevalence of Sexually Transmitted Infections in Pregnancy, Preterm Birth, Low Birthweight, and the Importance of Prenatal Care: Data from the 2020 United States Birth Certificate
Authors: Anthony J. Kondracki, Bonzo Reddick, Jennifer L. Barkin
Abstract:
Background: Many pregnancies in the United States are affected each year with the most common sexually transmitted infections (STIs), including Chlamydia trachomatis (CT), Neisseria gonorrhoeae (NG), and Treponema pallidum (TP, syphilis), and the rate of congenital syphilis has reached a 20-year high. We sought to estimate the prevalence of CT, NG, and TP in pregnancy and the risk of preterm birth (PTB) (<37 weeks gestation) and low birthweight (LBW) (<2500g) deliveries according to utilization of prenatal care (PNC) during the COVID-19 pandemic. Methods: This study was based on the 2020 National Center for Health Statistics (NCHS) Natality File restricted to singleton births (N=3,512,858). We estimated the prevalence of CT, NG, TP, PTBand LBW across timing and the number of prenatal care (PNC) visits attended. In multivariable logistic regression models, adjusted odds ratios of PTB and LBW were assessed according to STIs and PNC status. E-values, based on effect size estimates and the lower bound of the 95% confidence intervals (CIs) of the association, examined the potential impact of unmeasured confounding. Results: CT (1.8%) was most prevalent in pregnancy, followed by NG (0.3%) and TP (0.1%). The strongest predictors of PTB and LBW were maternal NG (12.2% and 12.1%, respectively), late initiation/no PNC (8.5% and 7.6%, respectively), and ≤10 prenatal visits (13.1% and 10.3%, respectively). The odds of PTB and LBW were 2.5- to 3-fold greater for each STI in women who received ≤10 compared to >10 prenatal visits. E-values demonstrated the minimum strength of potential unmeasured confounding necessary to explain away observed associations. Conclusions: Timely initiation and receipt of recommended number of prenatal visits benefits screening and treatment of all women for STIs, including NG to substantially reduce infant morbidity and mortality related to PTB and LBW among infants born during the COVID-19 pandemic.Keywords: COVID-19 pandemic, sexually transmitted infections, preterm birth, low birthweight, prenatal care
Procedia PDF Downloads 153285 Resistance to Sulfuric Acid Attacks of Self-Consolidating Concrete: Effect Metakaolin and Various Cements Types
Authors: Kianoosh Samimi, Farhad Estakhr, Mahdi Mahdikhani, Faramaz Moodi
Abstract:
Due to their fluidity and simplicity of use, self-compacting concretes (SCCs) have undeniable advantages. In recent years, the role of metakaolin as a one of pozzolanic materials in concrete has been considered by researchers. It can modify various properties of concrete, due to high pozzolanic reactions and also makes a denser microstructure. The objective of this paper is to examine the influence of three type of Portland cement and metakaolin on fresh state, compressive strength and sulfuric acid attacks in self- consolidating concrete at early age up to 90 days of curing in lime water. Six concrete mixtures were prepared with three types of different cement as Portland cement type II, Portland Slag Cement (PSC), Pozzolanic Portland Cement (PPC) and 15% substitution of metakaolin by every cement. The results show that the metakaolin admixture increases the viscosity and the demand amount of superplasticizer. According to the compressive strength results, the highest value of compressive strength was achieved for PSC and without any metakaolin at age of 90 days. Conversely, the lowest level of compressive strength at all ages of conservation was obtained for PPC and containing 15% metakaolin. According to this study, the total substitution of PSC and PPC by Portland cement type II is beneficial to the increasing in the chemical resistance of the SCC with respect to the sulfuric acid attack. On the other hand, this increase is more noticeable by the use of 15% of metakaolin. Therefore, it can be concluded that metakaolin has a positive effect on the chemical resistance of SCC containing of Portland cement type II, PSC, and PPC.Keywords: SCC, metakaolin, cement type, durability, compressive strength, sulfuric acid attacks
Procedia PDF Downloads 186284 Ground Effect on Marine Midge Water Surface Locomotion
Authors: Chih-Hua Wu, Bang-Fuh Chen, Keryea Soong
Abstract:
Midges can move on the surface of the water at speeds of approximately 340 body-lengths/s and can move continuously for >90 min. Their wings periodically scull the sea surface to push water backward and thus generate thrust; their other body parts, including their three pairs of legs, touch the water only occasionally. The aim of this study was to investigate the locomotion mechanism of marine midges with a size of 2 mm and living in shallow reefs in Wanliton, southern Taiwan. We assumed that midges generate lift through two mechanisms: by sculling the surface of seawater to leverage the generated tension for thrust and by retracting their wings to generate aerodynamic lift at a suitable angle of attack. We performed computational fluid dynamic simulations to determine the mechanism of midge locomotion above the surface of the water. The simulations indicated that ground effects are essential and that both the midge trunk and wing tips must be very close to the water surface to produce sufficient lift to keep the midge airborne. Furthermore, a high wing-beat frequency is crucial for the midge to produce sufficient lift during wing retraction. Accordingly, ground effects, forward speed, and high wing-beat frequency are major factors influencing the ability of midges to generate sufficient lift and remain airborne above the water surface.Keywords: ground effect, water locomotion, CFD, aerodynamic lift
Procedia PDF Downloads 83