Search results for: three lines of defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1591

Search results for: three lines of defense

1021 Choice of Sleeper and Rail Fastening Using Linear Programming Technique

Authors: Luciano Oliveira, Elsa Vásquez-Alvarez

Abstract:

The increase in rail freight transport in Brazil in recent years requires new railway lines and the maintenance of existing ones, which generates high costs for concessionaires. It is in this context that this work is inserted, whose objective is to propose a method that uses Binary Linear Programming for the choice of sleeper and rail fastening, from various options, including the way to apply these materials, with focus to minimize costs. Unit value information, the life cycle each of material type, and service expenses are considered. The model was implemented in commercial software using real data for its validation. The formulated model can be replicated to support decision-making for other railway projects in the choice of sleepers and rail fastening with lowest cost.

Keywords: linear programming, rail fastening, rail sleeper, railway

Procedia PDF Downloads 183
1020 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming

Authors: Meesun Sun, Yongmin Kim

Abstract:

Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.

Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost

Procedia PDF Downloads 120
1019 The Porsche Pavilion in Wolfsburg, Germany

Authors: H. Pasternak, T. Krausche

Abstract:

The Porsche Pavilion is an innovative stainless steel construction using the principle, often used in ship and car design, as an advantage for building a light but stiff structure. The Pavilion is a one of a kind and outstanding construction that you can find. It fits right in the existing parts of the Autostadt within the lagoon landscape and was built in only eight months. With its curving lines and exiting bends the structure is an extraordinary work which was designed by Henn architects, Munich. The monocoque has a good balance between material and support structure. The stiffness is achieved by the upper and lower side sheathing plates and the intermediate formers. Also the roof shell has no joints and a smooth surface. The assembling of the structure requires a large time and effort cost due to many welds which are necessary to connect all section to one large shell.

Keywords: construction welding, exhibition building, light steel construction, monocoque

Procedia PDF Downloads 511
1018 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 165
1017 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy

Authors: Lingaraju Dumpala, Narasa Raju Gosangi

Abstract:

Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.

Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA

Procedia PDF Downloads 113
1016 Automated Java Testing: JUnit versus AspectJ

Authors: Manish Jain, Dinesh Gopalani

Abstract:

Growing dependency of mankind on software technology increases the need for thorough testing of the software applications and automated testing techniques that support testing activities. We have outlined our testing strategy for performing various types of automated testing of Java applications using AspectJ which has become the de-facto standard for Aspect Oriented Programming (AOP). Likewise JUnit, a unit testing framework is the most popular Java testing tool. In this paper, we have evaluated our proposed AOP approach for automated testing and JUnit on various parameters. First we have provided the similarity between the two approaches and then we have done a detailed comparison of the two testing techniques on factors like lines of testing code, learning curve, testing of private members etc. We established that our AOP testing approach using AspectJ has got several advantages and is thus particularly more effective than JUnit.

Keywords: aspect oriented programming, AspectJ, aspects, JU-nit, software testing

Procedia PDF Downloads 305
1015 Optimal Resource Configuration and Allocation Planning Problem for Bottleneck Machines and Auxiliary Tools

Authors: Yin-Yann Chen, Tzu-Ling Chen

Abstract:

This study presents the case of an actual Taiwanese semiconductor assembly and testing manufacturer. Three major bottleneck manufacturing processes, namely, die bond, wire bond, and molding, are analyzed to determine how to use finite resources to achieve the optimal capacity allocation. A medium-term capacity allocation planning model is developed by considering the optimal total profit to satisfy the promised volume demanded by customers and to obtain the best migration decision among production lines for machines and tools. Finally, sensitivity analysis based on the actual case is provided to explore the effect of various parameter levels.

Keywords: capacity planning, capacity allocation, machine migration, resource configuration

Procedia PDF Downloads 437
1014 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law

Authors: Gashaw Sisay Zenebe

Abstract:

Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.

Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL

Procedia PDF Downloads 44
1013 Migration, Assimilation and Well-Being of Interstate Migrant Workers in Kerala: A Critical Assessment

Authors: Arun Perumbilavil Anand

Abstract:

It may no longer be just anecdotal that every twelfth person in Kerala is a migrant worker from outside the state. For the past few years, the state has been witnessing large inflow of migrants from other states of India, which emerged as a result of demographic transition and Gulf emigration. Initially, the migrants were from the neighbouring states but, at a later period, the state started getting migrants from the distant parts of the country. Currently, migrants have turned to be a decisive force in the state and their increasing numbers have already started creating turbulences in the state. Over the past years, the increasing involvement of migrants in unlawful and criminal activities have generated apprehensions on their presence in the state. Moreover, at present, the Kerala society is not just hosting the first generation migrants, but there has been an increase in the second generation migrants making the situations more complex and diverse. In such a paradigm, the study ponders into the issues of migrants concerning their assimilation and well-being in the host society. Also, the study looks into the factors that impede the assimilation process, along with the perceptions of the migrants about the host society and the people. The study also tries to bring out the differences in the levels of assimilation among the migrants along the lines of religion, caste, state of origin, gender, stay duration and education. Methodology: The study is based on the empirical findings obtained out of the primary survey conducted on migrants employed in the Kanjikode industrial area of Kerala. The samples were selected through purposive sampling and the study employed techniques like observation, questionnaire and in-depth interviews. The findings are based on interviews conducted with 100 migrants. Findings and Conclusion: The study was an attempt of its kind in addressing the issues of assimilation and integration of interstate migrants working in the Kerala. As mentioned, the study could bring out differences in the levels of assimilation along the lines of different characteristics. The study could also locate the importance, and the role played by the peer groups and neighborhoods in accelerating the process of assimilation among the migrants. As an extension, the study also looked at the assimilation and educational issues of the migrant children living in Kerala, and it found that the place of birth, age at entry and the peer group plays a pivotal role in the assimilation process. The study through its findings recommends the need for incorporating the concept of inclusive education into the state educational system by giving due emphasis to the needs of the marginalized. The study points out that owing to the existing demographic conditions, the state will inevitably have to depend on migrant labor in future. Moreover, in such a paradigm, the host community and the government should strive to create a conducive environment for the proper assimilation of the migrants and which in turn can be an impetus for the fulfilment of the needs of both the migrants and the state.

Keywords: assimilation, integration, Kerala, migrant workers, well-being

Procedia PDF Downloads 123
1012 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 59
1011 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 368
1010 3D Writing on Photosensitive Glass-Ceramics

Authors: C. Busuioc, S. Jinga, E. Pavel

Abstract:

Optical lithography is a key technique in the development of sub-5 nm patterns for the semiconductor industry. We have already reported that the best results obtained with respect to direct laser writing process on active media, such as glass-ceramics, are achieved only when the energy of the laser radiation is absorbed in discrete quantities. Further, we need to clarify the role of active centers concentration in silver nanocrystals natural generation, as well as in fluorescent rare-earth nanostructures formation. As a consequence, samples with different compositions were prepared. SEM, AFM, TEM and STEM investigations were employed in order to demonstrate that few nm width lines can be written on fluorescent photosensitive glass-ceramics, these being efficient absorbers. Moreover, we believe that the experimental data will lead to the best choice in terms of active centers amount, laser power and glass-ceramic matrix.

Keywords: glass-ceramics, 3D laser writing, optical disks, data storage

Procedia PDF Downloads 275
1009 Optimization of the Administration of Intravenous Medication by Reduction of the Residual Volume, Taking User-Friendliness, Cost Efficiency, and Safety into Account

Authors: A. Poukens, I. Sluyts, A. Krings, J. Swartenbroekx, D. Geeroms, J. Poukens

Abstract:

Introduction and Objectives: It has been known for many years that with the administration of intravenous medication, a rather significant part of the planned to be administered infusion solution, the residual volume ( the volume that remains in the IV line and or infusion bag), does not reach the patient and is wasted. This could possibly result in under dosage and diminished therapeutic effect. Despite the important impact on the patient, the reduction of residual volume lacks attention. An optimized and clearly stated protocol concerning the reduction of residual volume in an IV line is necessary for each hospital. As described in my Master’s thesis, acquiring the degree of Master in Hospital Pharmacy, administration of intravenous medication can be optimized by reduction of the residual volume. Herewith effectiveness, user-friendliness, cost efficiency and safety were taken into account. Material and Methods: By usage of a literature study and an online questionnaire sent out to all Flemish hospitals and hospitals in the Netherlands (province Limburg), current flush methods could be mapped out. In laboratory research, possible flush methods aiming to reduce the residual volume were measured. Furthermore, a self-developed experimental method to reduce the residual volume was added to the study. The current flush methods and the self-developed experimental method were compared to each other based on cost efficiency, user-friendliness and safety. Results: There is a major difference between the Flemish and the hospitals in the Netherlands (Province Limburg) concerning the approach and method of flushing IV lines after administration of intravenous medication. The residual volumes were measured and laboratory research showed that if flushing was done minimally 1-time equivalent to the residual volume, 95 percent of glucose would be flushed through. Based on the comparison, it became clear that flushing by use of a pre-filled syringe would be the most cost-efficient, user-friendly and safest method. According to laboratory research, the self-developed experimental method is feasible and has the advantage that the remaining fraction of the medication can be administered to the patient in unchanged concentration without dilution. Furthermore, this technique can be applied regardless of the level of the residual volume. Conclusion and Recommendations: It is recommendable to revise the current infusion systems and flushing methods in most hospitals. Aside from education of the hospital staff and alignment on a uniform substantiated protocol, an optimized and clear policy on the reduction of residual volume is necessary for each hospital. It is recommended to flush all IV lines with rinsing fluid with at least the equivalent volume of the residual volume. Further laboratory and clinical research for the self-developed experimental method are needed before this method can be implemented clinically in a broader setting.

Keywords: intravenous medication, infusion therapy, IV flushing, residual volume

Procedia PDF Downloads 111
1008 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 171
1007 Effect of Geomagnetic Field on Motion of Conductor

Authors: Bharti Gupta, Alaukik Sharma

Abstract:

The first aim is to determine the effect of the Earth's magnetic field on the motion of a conductor to evaluate the variations of the orbital elements of the conductor due to these effects. The effects of Earth's magnetic field on the motion of conductors have been studied at different heights, longitudes and latitudes. When the conductor cut the geomagnetic line of force, then an electro-motive force (EMF) is induced across to the conductor. Due to this induced EMF, an induced current will flow through the conductor. Resulting, a Lorentz force will be applied on the conductor who opposes the motion of the conductor. So our second aim is to determine the accurate value of Induced EMF and induced Lorentz Force at different heights, longitudes and latitudes.

Keywords: induced EMF, Lorentz force, geomagnetic lines of force, moving conductor

Procedia PDF Downloads 130
1006 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 478
1005 Examining the Change of Power Transmission Line in Urban Regeneration with Geographical Information System

Authors: C. Yagci, F. Iscan

Abstract:

In this study, spatial differences of Power Transmission Line (PTL) and effects of the situation before and after the urban regeneration are studied by using Geographical Information System (GIS). In addition, a questionable and analyzable structure is acquired by developed system. In the study area many parcels on the PTL were analyzed. The amount of the parcels, which are affected by the negativity of PTL is clearly seen with the aid of generated maps. Some kind of changes are exhibited in the system, which are created by GIS, for instance before urban regeneration PTL was very close to people’s private properties and huge parts of PTL were among the buildings, however; after urban regeneration electricity lines were changed their locations to the underground. According to the results, GIS can be used as a device in planning and managing of PTL in urban regeneration projects and can be used for analyses. By the help of GIS technology, necessary investigations should be carried out in urban regeneration applications for creating sustainable cities.

Keywords: GIS, power transmission line, technology, urban regeneration

Procedia PDF Downloads 746
1004 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 189
1003 Lightweight Sheet Molding Compound Composites by Coating Glass Fiber with Cellulose Nanocrystals

Authors: Amir Asadi, Karim Habib, Robert J. Moon, Kyriaki Kalaitzidou

Abstract:

There has been considerable interest in cellulose nanomaterials (CN) as polymer and polymer composites reinforcement due to their high specific modulus and strength, low density and toxicity, and accessible hydroxyl side groups that can be readily chemically modified. The focus of this study is making lightweight composites for better fuel efficiency and lower CO2 emission in auto industries with no compromise on mechanical performance using a scalable technique that can be easily integrated in sheet molding compound (SMC) manufacturing lines. Light weighting will be achieved by replacing part of the heavier components, i.e. glass fibers (GF), with a small amount of cellulose nanocrystals (CNC) in short GF/epoxy composites made using SMC. CNC will be introduced as coating of the GF rovings prior to their use in the SMC line. The employed coating method is similar to the fiber sizing technique commonly used and thus it can be easily scaled and integrated to industrial SMC lines. This will be an alternative route to the most techniques that involve dispersing CN in polymer matrix, in which the nanomaterials agglomeration limits the capability for scaling up in an industrial production. We have demonstrated that incorporating CNC as a coating on GF surface by immersing the GF in CNC aqueous suspensions, a simple and scalable technique, increases the interfacial shear strength (IFSS) by ~69% compared to the composites produced by uncoated GF, suggesting an enhancement of stress transfer across the GF/matrix interface. As a result of IFSS enhancement, incorporation of 0.17 wt% CNC in the composite results in increases of ~10% in both elastic modulus and tensile strength, and 40 % and 43 % in flexural modulus and strength respectively. We have also determined that dispersing 1.4 and 2 wt% CNC in the epoxy matrix of short GF/epoxy SMC composites by sonication allows removing 10 wt% GF with no penalty on tensile and flexural properties leading to 7.5% lighter composites. Although sonication is a scalable technique, it is not quite as simple and inexpensive as coating the GF by passing through an aqueous suspension of CNC. In this study, the above findings are integrated to 1) investigate the effect of CNC content on mechanical properties by passing the GF rovings through CNC aqueous suspension with various concentrations (0-5%) and 2) determine the optimum ratio of the added CNC to the removed GF to achieve the maximum possible weight reduction with no cost on mechanical performance of the SMC composites. The results of this study are of industrial relevance, providing a path toward producing high volume lightweight and mechanically enhanced SMC composites using cellulose nanomaterials.

Keywords: cellulose nanocrystals, light weight polymer-matrix composites, mechanical properties, sheet molding compound (SMC)

Procedia PDF Downloads 207
1002 Analytical Study of the Structural Response to Near-Field Earthquakes

Authors: Isidro Perez, Maryam Nazari

Abstract:

Numerous earthquakes, which have taken place across the world, led to catastrophic damage and collapse of structures (e.g., 1971 San Fernando; 1995 Kobe-Japan; and 2010 Chile earthquakes). Engineers are constantly studying methods to moderate the effect this phenomenon has on structures to further reduce damage, costs, and ultimately to provide life safety to occupants. However, there are regions where structures, cities, or water reservoirs are built near fault lines. When an earthquake occurs near the fault lines, they can be categorized as near-field earthquakes. In contrary, a far-field earthquake occurs when the region is further away from the seismic source. A near-field earthquake generally has a higher initial peak resulting in a larger seismic response, when compared to a far-field earthquake ground motion. These larger responses may result in serious consequences in terms of structural damage which can result in a high risk for the public’s safety. Unfortunately, the response of structures subjected to near-field records are not properly reflected in the current building design specifications. For example, in ASCE 7-10, the design response spectrum is mostly based on the far-field design-level earthquakes. This may result in the catastrophic damage of structures that are not properly designed for near-field earthquakes. This research investigates the knowledge that the effect of near-field earthquakes has on the response of structures. To fully examine this topic, a structure was designed following the current seismic building design specifications, e.g. ASCE 7-10 and ACI 318-14, being analytically modeled, utilizing the SAP2000 software. Next, utilizing the FEMA P695 report, several near-field and far-field earthquakes were selected, and the near-field earthquake records were scaled to represent the design-level ground motions. Upon doing this, the prototype structural model, created using SAP2000, was subjected to the scaled ground motions. A Linear Time History Analysis and Pushover analysis were conducted on SAP2000 for evaluation of the structural seismic responses. On average, the structure experienced an 8% and 1% increase in story drift and absolute acceleration, respectively, when subjected to the near-field earthquake ground motions. The pushover analysis was ran to find and aid in properly defining the hinge formation in the structure when conducting the nonlinear time history analysis. A near-field ground motion is characterized by a high-energy pulse, making it unique to other earthquake ground motions. Therefore, pulse extraction methods were used in this research to estimate the maximum response of structures subjected to near-field motions. The results will be utilized in the generation of a design spectrum for the estimation of design forces for buildings subjected to NF ground motions.

Keywords: near-field, pulse, pushover, time-history

Procedia PDF Downloads 123
1001 Prison Pipeline or College Pathways: Transforming the Urban Classroom

Authors: Marcia J. Watson

Abstract:

The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.

Keywords: college access, higher education, school-to-prison pipeline, urban education reform

Procedia PDF Downloads 519
1000 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications

Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav

Abstract:

Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.

Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)

Procedia PDF Downloads 265
999 Measurement of Acoustic Loss in Nano-Layered Coating Developed for Thermal Noise Reduction

Authors: E. Cesarini, M. Lorenzini, R. Cardarelli, S. Chao, E. Coccia, V. Fafone, Y. Minenkow, I. Nardecchia, I. M. Pinto, A. Rocchi, V. Sequino, C. Taranto

Abstract:

Structural relaxation processes in optical coatings represent a fundamental limit to the sensitivity of gravitational waves detectors, MEMS, optical metrology and entangled state experiments. To face this problem, many research lines are now active, in particular the characterization of new materials and novel solutions to be employed as coatings in future gravitational wave detectors. Nano-layered coating deposition is among the most promising techniques. We report on the measurement of acoustic loss of nm-layered composites (Ti2O/SiO2), performed with the GeNS nodal suspension, compared with sputtered λ/4 thin films nowadays employed.

Keywords: mechanical measurement, nanomaterials, optical coating, thermal noise

Procedia PDF Downloads 410
998 Oncolytic H-1 Parvovirus Entry in Cancer Cells through Clathrin-Mediated Endocytosis

Authors: T. Ferreira, A. Kulkarni, C. Bretscher, K. Richter, M. Ehrlich, A. Marchini

Abstract:

H-1 protoparvovirus (H-1PV) is a virus with inherent oncolytic and oncosuppressive activities while remaining non-pathogenic in humans. H-1PV was the first oncolytic parvovirus to undergo clinical testing. Results from trials in patients with glioblastoma or pancreatic carcinoma showed an excellent safety profile and first signs of efficacy. H-1PV infection is vastly dependent on cellular factors, from cell attachment and entry to viral replication and egress. Hence, we believe that the characterisation of the parvovirus life cycle would ultimately help further improve H-1PV clinical outcome. In the present study, we explored the entry pathway of H-1PV in cervical HeLa and glioma NCH125 cancer cell lines. Electron and confocal microscopy showed viral particles associated with clathrin-coated pits and vesicles, providing the first evidence that H-1PV cell entry occurs through clathrin-mediated endocytosis. Accordingly, we observed that by blocking clathrin-mediated endocytosis with hypertonic sucrose, chlorpromazine, or pitstop 2, H-1PV transduction was markedly decreased. Accordingly, siRNA-mediated knockdown of AP2M1, which retains a crucial role in clathrin-mediated endocytosis, verified the reliance of H-1PV on this route to enter HeLa and NCH125 cancer cells. By contrast, we found no evidence of viral entry through caveolae-mediated endocytosis. Indeed, pre-treatment of cells with nystatin or methyl-β-cyclodextrin, both inhibitors of caveolae-mediated endocytosis, did not affect viral transduction levels. Unexpectedly, siRNA-mediated knockdown of caveolin-1, the main driver of caveolae-mediated endocytosis, increased H-1PV transduction, suggesting caveolin-1 is a negative modulator of H-1PV infection. We also show that H-1PV entry is dependent on dynamin, a protein responsible for mediating the scission of vesicle neck and promoting further internalisation. Furthermore, since dynamin inhibition almost completely abolished H-1PV infection, makes it unlikely that H-1PV uses macropinocytosis as an alternative pathway to enter cells. After viral internalisation, H-1PV passes through early to late endosomes as observed by confocal microscopy. Inside these endocytic compartments, the acidic environment proved to be crucial for a productive infection. Inhibition of acidification of pH dramatically reduced H-1PV transduction. Besides, a fraction of H-1PV particles was observed inside LAMP1-positive lysosomes, most likely following a non-infectious route. To the author's best knowledge, this is the first study to characterise the cell entry pathways of H-1PV. Along these lines, this work will further contribute to understand H-1PV oncolytic properties as well as to improve its clinical potential in cancer virotherapy.

Keywords: clathrin-mediated endocytosis, H-1 parvovirus, oncolytic virus, virus entry

Procedia PDF Downloads 132
997 The Physiological Effect of Cold Atmospheric Pressure Plasma on Cancer Cells, Cancer Stem Cells, and Adult Stem Cells

Authors: Jeongyeon Park, Yeo Jun Yoon, Jiyoung Seo, In Seok Moon, Hae Jun Lee, Kiwon Song

Abstract:

Cold Atmospheric Pressure Plasma (CAPP) is defined as a partially ionized gas with electrically charged particles at room temperature and atmospheric pressure. CAPP generates reactive oxygen species (ROS) and reactive nitrogen species (RNS), and has potential as a new apoptosis-promoting cancer therapy. With an annular type dielectric barrier discharge (DBD) CAPP-generating device combined with a helium (He) gas feeding system, we showed that CAPP selectively induced apoptosis in various cancer cells while it promoted proliferation of the adipose tissue-derived stem cell (ASC). The apoptotic effect of CAPP was highly selective toward p53-mutated cancer cells. The intracellular ROS was mainly responsible for apoptotic cell death in CAPP-treated cancer cells. CAPP induced apoptosis even in doxorubicin-resistant cancer cell lines, demonstrating the feasibility of CAPP as a potent cancer therapy. With the same device and exposure conditions to cancer cells, CAPP stimulated proliferation of the ASC, a kind of mesenchymal stem cell that is capable of self-renewing and differentiating into adipocytes, chondrocytes, osteoblasts and neurons. CAPP-treated ASCs expressed the stem cell markers and differentiated into adipocytes as untreated ASCs. The increase of proliferation by CAPP in ASCs was offset by a NO scavenger but was not affected by ROS scavengers, suggesting that NO generated by CAPP is responsible for the activated proliferation in ASCs. Usually, cancer stem cells are reported to be resistant to known cancer therapies. When we applied CAPP of the same device and exposure conditions to cancer cells to liver cancer stem cells (CSCs) that express CD133 and epithelial cell adhesion molecule (EpCAM) cancer stem cell markers, apoptotic cell death was not examined. Apoptotic cell death of liver CSCs was induced by the CAPP generated from a device with an air-based flatten type DBD. An exposure of liver CSCs to CAPP decreased the viability of liver CSCs to a great extent, suggesting plasma be used as a promising anti-cancer treatment. To validate whether CAPP can be a promising anti-cancer treatment or an adjuvant modality to eliminate remnant tumor in cancer surgery of vestibular schwannoma, we applied CAPP to mouse schwannoma cell line SC4 Nf2 ‑/‑ and human schwannoma cell line HEI-193. A CAPP treatment leads to anti-proliferative effect in both cell lines. We are currently studying the molecular mechanisms of differential physiological effect of CAPP; the proliferation of ASCs and apoptosis of various cancer cells and CSCs.

Keywords: cold atmospheric pressure plasma, apoptosis, proliferation, cancer cells, adult stem cells

Procedia PDF Downloads 263
996 Numerical Investigation on Transient Heat Conduction through Brine-Spongy Ice

Authors: S. R. Dehghani, Y. S. Muzychka, G. F. Naterer

Abstract:

The ice accretion of salt water on cold substrates creates brine-spongy ice. This type of ice is a mixture of pure ice and liquid brine. A real case of creation of this type of ice is superstructure icing which occurs on marine vessels and offshore structures in cold and harsh conditions. Transient heat transfer through this medium causes phase changes between brine pockets and pure ice. Salt rejection during the process of transient heat conduction increases the salinity of brine pockets to reach a local equilibrium state. In this process the only effect of passing heat through the medium is not changing the sensible heat of the ice and brine pockets; latent heat plays an important role and affects the mechanism of heat transfer. In this study, a new analytical model for evaluating heat transfer through brine-spongy ice is suggested. This model considers heat transfer and partial solidification and melting together. Properties of brine-spongy ice are obtained using properties of liquid brine and pure ice. A numerical solution using Method of Lines discretizes the medium to reach a set of ordinary differential equations. Boundary conditions are chosen using one of the applicable cases of this type of ice; one side is considered as a thermally isolated surface, and the other side is assumed to be suddenly affected by a constant temperature boundary. All cases are evaluated in temperatures between -20 C and the freezing point of brine-spongy ice. Solutions are conducted using different salinities from 5 to 60 ppt. Time steps and space intervals are chosen properly to maintain the most stable and fast solution. Variation of temperature, volume fraction of brine and brine salinity versus time are the most important outputs of this study. Results show that transient heat conduction through brine-spongy ice can create a various range of salinity of brine pockets from the initial salinity to that of 180 ppt. The rate of variation of temperature is found to be slower for high salinity cases. The maximum rate of heat transfer occurs at the start of the simulation. This rate decreases as time passes. Brine pockets are smaller at portions closer to the colder side than that of the warmer side. A the start of the solution, the numerical solution tends to increase instabilities. This is because of sharp variation of temperature at the start of the process. Changing the intervals improves the unstable situation. The analytical model using a numerical scheme is capable of predicting thermal behavior of brine spongy ice. This model and numerical solutions are important for modeling the process of freezing of salt water and ice accretion on cold structures.

Keywords: method of lines, brine-spongy ice, heat conduction, salt water

Procedia PDF Downloads 204
995 Impact of the Operation and Infrastructure Parameters to the Railway Track Capacity

Authors: Martin Kendra, Jaroslav Mašek, Juraj Čamaj, Matej Babin

Abstract:

The railway transport is considered as a one of the most environmentally friendly mode of transport. With future prediction of increasing of freight transport there are lines facing problems with demanded capacity. Increase of the track capacity could be achieved by infrastructure constructive adjustments. The contribution shows how the travel time can be minimized and the track capacity increased by changing some of the basic infrastructure and operation parameters, for example, the minimal curve radius of the track, the number of tracks, or the usable track length at stations. Calculation of the necessary parameter changes is based on the fundamental physical laws applied to the train movement, and calculation of the occupation time is dependent on the changes of controlling the traffic between the stations.

Keywords: curve radius, maximum curve speed, track mass capacity, reconstruction

Procedia PDF Downloads 323
994 Stability Bound of Ruin Probability in a Reduced Two-Dimensional Risk Model

Authors: Zina Benouaret, Djamil Aissani

Abstract:

In this work, we introduce the qualitative and quantitative concept of the strong stability method in the risk process modeling two lines of business of the same insurance company or an insurance and re-insurance companies that divide between them both claims and premiums with a certain proportion. The approach proposed is based on the identification of the ruin probability associate to the model considered, with a stationary distribution of a Markov random process called a reversed process. Our objective, after clarifying the condition and the perturbation domain of parameters, is to obtain the stability inequality of the ruin probability which is applied to estimate the approximation error of a model with disturbance parameters by the considered model. In the stability bound obtained, all constants are explicitly written.

Keywords: Markov chain, risk models, ruin probabilities, strong stability analysis

Procedia PDF Downloads 233
993 Transport Infrastructure and Economic Growth in South Africa

Authors: Abigail Mosetsanagape Mooketsi, Itumeleng Pleasure Mongale, Joel Hinaunye Eita

Abstract:

The aim of this study is to analyse the impact of transport infrastructure on economic growth in South Africa through Engle Granger two step approach using the data from 1970 to 2013. GDP is used as a proxy for economic growth whilst rail transport (rail lines, rail goods transported) and air transport(air passengers carried, air freight) are used as proxies for transport infrastructure. The results showed that there is a positive long-run relationship between transport infrastructure and economic growth. The results show that South Africa’s economic growth can be boosted by providing transport infrastructure. The estimated models were simulated and the results that the model is a good fit. The findings of this research will be beneficial to policy makers, academics and it will also enhance the ability of the investors to make informed decisions about investing in South Africa.

Keywords: transport, infrastructure, economic growth, South Africa

Procedia PDF Downloads 453
992 Combination Therapies Targeting Apoptosis Pathways in Pediatric Acute Myeloid Leukemia (AML)

Authors: Ahlam Ali, Katrina Lappin, Jaine Blayney, Ken Mills

Abstract:

Leukaemia is the most frequently (30%) occurring type of paediatric cancer. Of these, approximately 80% are acute lymphoblastic leukaemia (ALL) with acute myeloid leukaemia (AML) cases making up the remaining 20% alongside other leukaemias. Unfortunately, children with AML do not have promising prognosis with only 60% surviving 5 years or longer. It has been highlighted recently the need for age-specific therapies for AML patients, with paediatric AML cases having a different mutational landscape compared with AML diagnosed in adult patients. Drug Repurposing is a recognized strategy in drug discovery and development where an already approved drug is used for diseases other than originally indicated. We aim to identify novel combination therapies with the promise of providing alternative more effective and less toxic induction therapy options. Our in-silico analysis highlighted ‘cell death and survival’ as an aberrant, potentially targetable pathway in paediatric AML patients. On this basis, 83 apoptotic inducing compounds were screened. A preliminary single agent screen was also performed to eliminate potentially toxic chemicals, then drugs were constructed into a pooled library with 10 drugs per well over 160 wells, with 45 possible pairs and 120 triples in each well. Seven cell lines were used during this study to represent the clonality of AML in paediatric patients (Kasumi-1, CMK, CMS, MV11-14, PL21, THP1, MOLM-13). Cytotoxicity was assessed up to 72 hours using CellTox™ Green reagent. Fluorescence readings were normalized to a DMSO control. Z-Score was assigned to each well based on the mean and standard deviation of all the data. Combinations with a Z-Score <2 were eliminated and the remaining wells were taken forward for further analysis. A well was considered ‘successful’ if each drug individually demonstrated a Z-Score <2, while the combination exhibited a Z-Score >2. Each of the ten compounds in one well (155) had minimal or no effect as single agents on cell viability however, a combination of two or more of the compounds resulted in a substantial increase in cell death, therefore the ten compounds were de-convoluted to identify a possible synergistic pair/triple combinations. The screen identified two possible ‘novel’ drug pairing, with BCL2 inhibitor ABT-737, combined with either a CDK inhibitor Purvalanol A, or AKT/ PI3K inhibitor LY294002. (ABT-737- 100 nM+ Purvalanol A- 1 µM) (ABT-737- 100 nM+ LY294002- 2 µM). Three possible triple combinations were identified (LY2409881+Akti-1/2+Purvalanol A, SU9516+Akti-1/2+Purvalanol A, and ABT-737+LY2409881+Purvalanol A), which will be taken forward for examining their efficacy at varying concentrations and dosing schedules, across multiple paediatric AML cell lines for optimisation of maximum synergy. We believe that our combination screening approach has potential for future use with a larger cohort of drugs including FDA approved compounds and patient material.

Keywords: AML, drug repurposing, ABT-737, apoptosis

Procedia PDF Downloads 178