Search results for: internal attack
2442 Assessment of Cattle Welfare Traveling Long Distance from Jessore (Indian Border) to Chittagong, Bangladesh
Authors: Mahabub Alam, Mohammad Mahmudul Hassan, M. Hasanuzzaman, M. Ahasanul Hoque
Abstract:
Animals are transported from one place to another for different purposes in Bangladesh. However, the potential effect of long-distance transport on cattle health has not frequently been studied. Therefore, this study was conducted to assess health conditions of cattle transported from a long distance to Chittagong in Bangladesh. A total of 100 adult cattle, regardless of breed and sex, were selected at Benapole live cattle market in Jessore between August and September 2015 for the study. Blood samples were taken from 50 randomly selected cattle at 0 hours before transportation, just after transportation, at 12-16 hours post-conclusion of transportation, and 24 hours after transportation. The external health conditions and injuries of the cattle were assessed by close inspection, and the trader was interviewed using the structured questionnaire. Images of cattle injuries were taken with a camera. The basic internal health of the cattle was evaluated using standard hemato-biochemical tests. Animals were fasted and remained standing within a small space allocation (8-10 sq feet/animal) in the vehicle during transportation. Animals were provided only with paddy straw and water prior to selling at the destination market. The overall frequency of cattle injuries varied significantly (26% before vs. 47% after transportation; p < 0.001). The frequency of different cattle injuries also significantly varied by types such as abrasion (11% vs. 21%; p < 0.05) and barbed wire injury (9% vs. 18%; p < 0.05). Single cattle injury differed significantly (21% vs. 36%; p < 0.001). Cattle health conditions varied significantly (nasal discharge: 15% vs. 28%; p < 0.05; diarrhea: 15% vs. 23%; p < 0.05 and severe dehydration: 8% vs. 20%; p < 0.001). The values of hemoglobin (Hb), total erythrocyte count (TEC), total leukocyte count (TLC), lymphocyte (L), neutrophil (N) and eosinophil (E) varied significantly (p ≤ 0.01) (Hb: 11.1mg/dl vs. 12.3mg/dl; TEC: 4.7 million/ml vs. 5.7million/ml; TLC: 6.2 thousand/ml vs. 7.3 thousand/ml; L: 61.7% vs. 58.1%; N: 29.7% vs. 32.8%; E: 3.8% vs. 4.7%). The values of serum total protein (TP), creatine kinase (CK), triglyceride (TG), calcium (Ca), phosphorus (P) and alkaline phosphatase (ALP) significantly differed (p ≤ 0.05) (TP: 6.8g/dl vs. 8.2g/dl; CK:574.9u/l vs. 1288u/l; TG: 104.7mg/dl vs. 127.7mg/dl; Ca: 11.3mg/dl vs. 13mg/dl; P: 7.3mg/dl vs. 7.6mg/dl; ALP: 303u/l vs. 363u/l). The identified status of external and internal health conditions of the cattle for trading purpose due to long-distance transportation in the present study indicates a high degree of transport stress and poor animal welfare.Keywords: animal welfare, cattle, external and internal health conditions, transportation
Procedia PDF Downloads 1812441 Evaluating Viability of Solar Tubewell Irrigation Technology
Authors: Junaid N. Chauhdary, Bernard A. Engel, Allah Bakhsh
Abstract:
Solar powered tubewells can be a reliable and affordable source of supplying irrigation water compared with electric or diesel operated tubewells due to frequent load shedding and soaring energy prices. A study was conducted on a solar tubewell installed at the Water Management Research Center (WMRC), University of Agriculture, Faisalabad to investigate the viability of a solar powered tubewell in terms of discharge and benefit cost ratio. The tubewell discharge was 50 m3hr-1 with a total dynamic head of 30 m. The depth of bore was 31 m (14 m blind + 17 m screen) with a casing diameter of 15.2 cm (6 inches). A 3-stage submersible pump of 10.2 cm (4 inch) diameter was lowered in the casing to a depth of 22 m. The pump was powered from 21 solar panels of 200 W capacity each. The tubewell peak discharge was observed as 6 and 7 hr day-1 in winter and summer, respectively. The breakeven analysis of the solar tubewell showed that the payback period of the solar tubewell was 1.5 years of its 10 year usable life with an IRR (internal rate of return) of 69 %. The BCR (benefit cost ratio) of the solar tubewell at 2, 4, 6, and 8 percent discount rate were 3.75, 3.45, 3.19 and 2.96, respectively. The NPV (net present value) of the solar tubewell at 2, 4, 6, and 8 % discount rates were 1.89, 1.65, 1.45 and 1.27 million rupees, respectively. These results indicated that the solar powered tubewells are a viable option as well as environmentally friendly and can be adopted by the farmers due to their affordable payback period.Keywords: benefit cost ratio, internal rate of return (IRR), net present value (NPV), solar tubewell
Procedia PDF Downloads 2082440 Using Scanning Electron Microscope and Computed Tomography for Concrete Diagnostics of Airfield Pavements
Authors: M. Linek
Abstract:
This article presents the comparison of selected evaluation methods regarding microstructure modification of hardened cement concrete intended for airfield pavements. Basic test results were presented for two pavement quality concrete lots. Analysis included standard concrete used for airfield pavements and modern material solutions based on concrete composite modification. In case of basic grain size distribution of concrete cement CEM I 42,5HSR NA, fine aggregate and coarse aggregate fractions in the form of granite chippings, water and admixtures were considered. In case of grain size distribution of modified concrete, the use of modern modifier as substitute of fine aggregate was suggested. Modification influence on internal concrete structure parameters using scanning electron microscope was defined. Obtained images were compared to the results obtained using computed tomography. Opportunity to use this type of equipment for internal concrete structure diagnostics and an attempt of its parameters evaluation was presented. Obtained test results enabled to reach a conclusion that both methods can be applied for pavement quality concrete diagnostics, with particular purpose of airfield pavements.Keywords: scanning electron microscope, computed tomography, cement concrete, airfield pavements
Procedia PDF Downloads 3392439 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2682438 Impact of Financial Factors on Total Factor Productivity: Evidence from Indian Manufacturing Sector
Authors: Lopamudra D. Satpathy, Bani Chatterjee, Jitendra Mahakud
Abstract:
The rapid economic growth in terms of output and investment necessitates a substantial growth of Total Factor Productivity (TFP) of firms which is an indicator of an economy’s technological change. The strong empirical relationship between financial sector development and economic growth clearly indicates that firms financing decisions do affect their levels of output via their investment decisions. Hence it establishes a linkage between the financial factors and productivity growth of the firms. To achieve the smooth and continuous economic growth over time, it is imperative to understand the financial channel that serves as one of the vital channels. The theoretical or logical argument behind this linkage is that when the internal financial capital is not sufficient enough for the investment, the firms always rely upon the external sources of finance. But due to the frictions and existence of information asymmetric behavior, it is always costlier for the firms to raise the external capital from the market, which in turn affect their investment sentiment and productivity. This kind of financial position of the firms puts heavy pressure on their productive activities. Keeping in view this theoretical background, the present study has tried to analyze the role of both external and internal financial factors (leverage, cash flow and liquidity) on the determination of total factor productivity of the firms of manufacturing industry and its sub-industries, maintaining a set of firm specific variables as control variables (size, age and disembodied technological intensity). An estimate of total factor productivity of the Indian manufacturing industry and sub-industries is computed using a semi-parametric approach, i.e., Levinsohn- Petrin method. It establishes the relationship between financial factors and productivity growth of 652 firms using a dynamic panel GMM method covering the time period between 1997-98 and 2012-13. From the econometric analyses, it has been found that the internal cash flow has a positive and significant impact on the productivity of overall manufacturing sector. The other financial factors like leverage and liquidity also play the significant role in the determination of total factor productivity of the Indian manufacturing sector. The significant role of internal cash flow on determination of firm-level productivity suggests that access to external finance is not available to Indian companies easily. Further, the negative impact of leverage on productivity could be due to the less developed bond market in India. These findings have certain implications for the policy makers to take various policy reforms to develop the external bond market and easily workout through which the financially constrained companies will be able to raise the financial capital in a cost-effective manner and would be able to influence their investments in the highly productive activities, which would help for the acceleration of economic growth.Keywords: dynamic panel, financial factors, manufacturing sector, total factor productivity
Procedia PDF Downloads 3322437 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications
Authors: Laila Algalal, Chen Xi
Abstract:
The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.
Procedia PDF Downloads 922436 Investigation of Fire Damaged Concrete Using Nonlinear Resonance Vibration Method
Authors: Kang-Gyu Park, Sun-Jong Park, Hong Jae Yim, Hyo-Gyung Kwak
Abstract:
This paper attempts to evaluate the effect of fire damage on concrete by using nonlinear resonance vibration method, one of the nonlinear nondestructive method. Concrete exhibits not only nonlinear stress-strain relation but also hysteresis and discrete memory effect which are contained in consolidated materials. Hysteretic materials typically show the linear resonance frequency shift. Also, the shift of resonance frequency is changed according to the degree of micro damage. The degree of the shift can be obtained through nonlinear resonance vibration method. Five exposure scenarios were considered in order to make different internal micro damage. Also, the effect of post-fire-curing on fire-damaged concrete was taken into account to conform the change in internal damage. Hysteretic non linearity parameter was obtained by amplitude-dependent resonance frequency shift after specific curing periods. In addition, splitting tensile strength was measured on each sample to characterize the variation of residual strength. Then, a correlation between the hysteretic non linearity parameter and residual strength was proposed from each test result.Keywords: nonlinear resonance vibration method, non linearity parameter, splitting tensile strength, micro damage, post-fire-curing, fire damaged concrete
Procedia PDF Downloads 2692435 Pioneer Synthesis and Characterization of Boron Containing Hard Materials
Authors: Gülşah Çelik Gül, Figen Kurtuluş
Abstract:
The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction
Procedia PDF Downloads 5932434 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 3842433 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 622432 Sailing/Anchoring: Home-making and Aspirations of Non-Majority Female Migrants in Shenzhen, China
Authors: Meiyun Meng
Abstract:
Urban China is now undergoing social transformation based on its rapid economic growth, developing its individualism and feminism. This paper approaches emergent relationships between female individuals’ everyday lives and urban China through internal migration, home-making practices and life-course perspectives. Focusing on Shenzhen, it explores how ten highly educated female migrants pursue aspirations of accommodating ‘non-majority’ identities, such as lesbians, divorced, or childless women, in urban China. Based on life stories and home video tours, this paper finds how these women develop non-majority lifestyles to negotiate their aspirations. On the one hand, they ‘sail’ away from past/present situations where collectivist and hetero-patriarchal norms marginalised their non-majority identities. On the other hand, they ‘anchor’ in places where ‘new’ socio-cultural contexts allow female individuals to pursue alternative opportunities and preferential lifestyles. This paper provides fresh insights to interpret the social transformation in urban China, under the collectivist culture and hetero-patriarchal norms, through the lens of individual everyday home-making practices.Keywords: home-making practices, internal migration, highly educated women, shenzhen, transforming urban China
Procedia PDF Downloads 902431 Effect of Tensile Strain on Microstructure of Irradiated Core Internal Material
Authors: Hygreeva Kiran Namburi, Anna Hojna, Edita Lecianova, Fencl Zdenek
Abstract:
Irradiation Assisted Stress Corrosion Cracking [IASCC] is one of the most significant environmental degradation in the internal components made from Austenitic stainless steel. This mechanism is still not fully understood and there are no suitable criteria for prediction of the damage during operation. In this work, core basket material 08Ch18N10T austenitic stainless steel acquired from decommissioned NPP Nord / Greifswald Unit 1, VVER 440-230 type, operated for 15 years and irradiated at 5.2 dpa is studied. This material was tensile tested at two different test temperatures and strain rates in air and at the elevated temperature under the water environment. SEM observations of the fracture surface documented ductile fracture of the samples tested in air, but areas of IASCC tested in water. This paper emphasizes on the microscopic examination results from the mechanically tested samples to determine the underlying IASCC physical damage process. TEM observations of thin foils made from the gauge sections that are closer to the fractured surface of the specimen aimed to find variances in interaction of dislocations and grain boundaries owing to different test conditions.Keywords: irradiation assisted stress corrosion cracking, core basket material, SEM observations of the fracture surface, microscopic examination results
Procedia PDF Downloads 3492430 Flexible Current Collectors for Printed Primary Batteries
Authors: Vikas Kumar
Abstract:
Portable batteries are reliable source of mobile energy to power smart wearable electronics, medical devices, communications, and others internet of thing (IoT) devices. There is a continuous increase in demand for thinner, more flexible battery with high energy density and reliability to meet the requirement. For a flexible battery, factors that affect these properties are the stability of current collectors, electrode materials and their interfaces with the corrosive electrolytes. State-of-the-art conventional and flexible batteries utilise carbon as an electrode and current collectors which cause high internal resistance (~100 ohms) and limit the peak current to ~1mA. This makes them unsuitable for a wide range of applications. Replacing the carbon parts with metallic components would reduce the internal resistance (and hence reduce parasitic loss), but significantly increases the risk of corrosion due to galvanic interactions within the battery. To overcome these challenges, low cost electroplated nickel (Ni) on copper (Cu) was studied as a potential anode current collector for a zinc-manganese oxide primary battery with different concentration of NH4Cl/ZnCl2 electrolyte. Using electrical impedance spectroscopy (EIS), we monitored the open circuit potential (OCP) of electroplated nickel (different thicknesses) in different concentration of electrolytes to optimise the thickness of Ni coating. Our results show that electroless Ni coating suffer excessive corrosion in these electrolytes. Corrosion rates of Ni coatings for different concentrations of electrolytes have been calculated with Tafel analysis. These results suggest that for electroplated Ni, channelling and/or open porosity is a major issue, which was confirmed by morphological analysis. These channels are an easy pathway for electrolyte to penetrate thorough Ni to corrode the Ni/Cu interface completely. We further investigated the incorporation of a special printed graphene layer on Ni to provide corrosion protection in this corrosive electrolyte medium. We find that the incorporation of printed graphene layer provides the corrosion protection to the Ni and enhances the chemical bonding between the active materials and current collector and also decreases the overall internal resistance of the battery system.Keywords: corrosion, electrical impedance spectroscopy, flexible battery, graphene, metal current collector
Procedia PDF Downloads 1292429 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2282428 The Attentional Focus Impact on the Decision Making in Three-Game Situations in Tennis
Authors: Marina Tsetseli, Eleni Zetou, Maria Michalopoulou, Nikos Vernadakis
Abstract:
Game performance, besides the accuracy and the quality skills execution, depends heavily on where the athletes will focus their attention while performing a skill. The purpose of the present study was to examine and compare the effect of internal and external focus of attention instructions on the decision making in tennis at players 8-9 years old (M=8.4, SD=0.49). The participants (N=40) were divided into two groups and followed an intervention training program that lasted 4 weeks; first group (N=20) under internal focus of attention instructions and the second group (N=20) under external focus of attention instructions. Three measurements took place (pre-test, post-test, and retention test) in which the participants were video recorded while playing matches in real scoring conditions. GPAI (Game Performance Assessment Instrument) was used to evaluate decision making in three game situations; service, return of the service, baseline game. ANOVA repeated measures (2 groups x 3 measurements) revealed a significant interaction between groups and measurements. Specifically, the data analysis showed superiority of the group that was instructed to focus externally. The high scores of the external attention group were maintained at the same level at the third measurement as well, which indicates that the impact was concerning not only performance but also learning. Thus, cues that lead to an external focus of attention enhance the decision-making skill and therefore the game performance of the young tennis players.Keywords: decision making, evaluation, focus of attention, game performance, tennis
Procedia PDF Downloads 3502427 Internal Cycles from Hydrometric Data and Variability Detected Through Hydrological Modelling Results, on the Niger River, over 1901-2020
Authors: Salif Koné
Abstract:
We analyze hydrometric data at the Koulikoro station on the Niger River; this basin drains 120600 km2 and covers three countries in West Africa, Guinea, Mali, and Ivory Coast. Two subsequent decadal cycles are highlighted (1925-1936 and 1929-1939) instead of the presumed single decadal one from literature. Moreover, the observed hydrometric data shows a multidecadal 40-year period that is confirmed when graphing a spatial coefficient of variation of runoff over decades (starting at 1901-1910). Spatial runoff data are produced on 48 grids (0.5 degree by 0.5 degree) and through semi-distributed versions of both SimulHyd model and GR2M model - variants of a French Hydrologic model – standing for Genie Rural of 2 parameters at monthly time step. Both extremal decades in terms of runoff coefficient of variation are confronted: 1951-1960 has minimal coefficient of variation, and 1981-1990 shows the maximal value of it during the three months of high-water level (August, September, and October). The mapping of the relative variation of these two decadal situations allows hypothesizing as following: the scale of variation between both extremal situations could serve to fix boundary conditions for further simulations using data from climate scenario.Keywords: internal cycles, hydrometric data, niger river, gr2m and simulhyd framework, runoff coefficient of variation
Procedia PDF Downloads 942426 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review
Authors: M. Cortés, E. Vera, M. Avella
Abstract:
Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites
Procedia PDF Downloads 4442425 Influence of Annealing on the Mechanical Properties of Polyester-Cotton Friction Spun Yarn
Authors: Sujit Kumar Sinha, R. Chattopadhyay
Abstract:
In the course of processing phases and use, fibres, yarns, or fabrics are subjected to a variety of stresses and strains, which cause the development of internal stresses. Given an opportunity, these inherent stresses try to bring back the structure to the original state. As an example, a twisted yarn always shows a tendency to untwist whenever its one end is made free. If the yarn is not held under tension, it may form snarls due to the presence of excessive torque. The running performance of such yarn or thread may, therefore, get negatively affected by it, as a snarl may not pass through the knitting or sewing needle smoothly, leading to an end break. A fabric shows a tendency to form wrinkles whenever squeezed. It may also shrink when brought to a relaxed state. In order to improve performance (i.e., dimensional stability or appearance), stabilization of the structure is needed. The stabilization can be attained through the release of internal stresses, which can be brought about by the process of annealing and/or other finishing treatments. When a fabric is subjected to heat, a change in the properties of the fibers, yarns, and fabric is expected. The degree to which the properties are affected would depend upon the condition of heat treatment and on the properties & structure of fibres, yarns, and fabric. In the present study, an attempt has been made to investigate the effect of annealing treatment on the properties of polyester cotton yarns with varying sheath structures.Keywords: friction spun yarn, annealing, tenacity, structural integrity, decay
Procedia PDF Downloads 642424 USA Commercial Pilots’ Views of Crew Resource Management, Social Desirability, and Safety Locus of Control
Authors: Stephen Vera, Tabitha Black, Charalambos Cleanthous, Ryan Sain
Abstract:
A gender comparison of USA commercial pilots’ demographics and views of CRM, social desirability and locus of control were surveyed. The Aviation safety locus of control (ASLOC) was used to measure external (ASLOC-E) or internal (ASLOC-I) aviation safety locus of control. The gender differences were explored using the ASLOC scores as a categorical variable. A differential comparison of crew resource management (CRM), based on the Federal Aviation Administration’s (FAA) guidelines was conducted. The results indicated that the proportion of female to male respondents matches the current ratio of USA commercial pilots. Moreover, there were no significant differences regarding overall education and the total number of communication classes one took. Regarding CRM issues, there were no significant differences on their views regarding the roles of the PIC, stress, time management, and managing a flight team. The females scored significantly lower on aeronautical decision making (ADM) and communications. There were no significant differences on either the Balanced Inventory of Desirable Responding (BIDR) impression management (IM) or self-deceptive enhancement (SDE). Although there were no overall significant differences on the ASLOC, the females did score higher on the internal subscale than did the males. An additional comparison of socially desirable responding indicates that all scores may be invalid, especially from the female respondents.Keywords: social desirability, safety locus of control, crew resource management, commercial pilots
Procedia PDF Downloads 2552423 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4322422 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 3942421 Protecting Migrants at Risk as Internally Displaced Persons: State Responses to Foreign Immigrants Displaced by Natural Disasters in Thailand, The United States, and Japan
Authors: Toake Endoh
Abstract:
Cross-border migration of people is a critical driver for sustainable economic development in the Asia-Pacific region. Meanwhile, the region is susceptible to mega-scale natural disasters, such as tsunami, earthquakes, and typhoons. When migrants are stranded in a foreign country by a disaster, who should be responsible for their safety and security? What legal or moral foundation is there to advocate for the protection and assistance of “migrants at risk (M@R)”? How can the states practice “good governance” in their response to displacement of the foreign migrants? This paper inquires how to protect foreign migrants displaced by a natural disaster under international law and proposes protective actions to be taken by of migrant-receiver governments. First, the paper discusses the theoretical foundation for protection of M@R and argues that the nation-states are charged of responsibility to protect at-risk foreigners as “internally displaced persons” in the light of the United Nations’ Guiding Principles of Internal Displacement (1998). Second, through the case study of the Kobe Earthquake in Japan (1995), the Tsunami in Thailand (2004), and the Hurricane Katrina in the U.S. (2005), the paper evaluates how effectively (or poorly) institutions and state actors addressed the specific vulnerability felt by M@R in these crises.Keywords: internal displaced persons, natural disaster, international migration, responsibility to protect
Procedia PDF Downloads 3182420 Uncertainty in Near-Term Global Surface Warming Linked to Pacific Trade Wind Variability
Authors: M. Hadi Bordbar, Matthew England, Alex Sen Gupta, Agus Santoso, Andrea Taschetto, Thomas Martin, Wonsun Park, Mojib Latif
Abstract:
Climate models generally simulate long-term reductions in the Pacific Walker Circulation with increasing atmospheric greenhouse gases. However, over two recent decades (1992-2011) there was a strong intensification of the Pacific Trade Winds that is linked with a slowdown in global surface warming. Using large ensembles of multiple climate models forced by increasing atmospheric greenhouse gas concentrations and starting from different ocean and/or atmospheric initial conditions, we reveal very diverse 20-year trends in the tropical Pacific climate associated with a considerable uncertainty in the globally averaged surface air temperature (SAT) in each model ensemble. This result suggests low confidence in our ability to accurately predict SAT trends over 20-year timescale only from external forcing. We show, however, that the uncertainty can be reduced when the initial oceanic state is adequately known and well represented in the model. Our analyses suggest that internal variability in the Pacific trade winds can mask the anthropogenic signal over a 20-year time frame, and drive transitions between periods of accelerated global warming and temporary slowdown periods.Keywords: trade winds, walker circulation, hiatus in the global surface warming, internal climate variability
Procedia PDF Downloads 2682419 Killing for the Great Peace: An Internal Perspective on the Anti-Manchu Theme in the Taiping Movement
Authors: Zihao He
Abstract:
The majority of existing studies on the Taiping Movement (1851-1864) viewed their anti-Manchu attitudes as nationalist agendas: Taiping was aimed at revolting against the Manchu government and establishing a new political regime. To explain these aggressive and violent attitudes towards Manchu, these studies mainly found socio-economic factors and stressed the status of “being deprived”. Even the ‘demon-slaying’ narrative of the Taiping to dehumanize the Manchu tends to be viewed as a “religious tool” to achieve their political, nationalist aim. This paper argues that these studies on Taiping’s anti-Manchu attitudes and behaviors are analyzed from an external angle and have two major problems. Firstly, they distinguished “religion” from “nationalist” or “political”, focusing on the “political” nature of the movement. “Religion” and the religious experience within Taiping were largely ignored. This paper argues that there was no separable and independent “religion” in the Taiping Movement, as opposed to secular, nationalist politics. Secondly, these analyses held an external perspective on Taiping’s anti-Manchu agenda. Demonizing and killing Manchu were viewed as purely political actions. On the contrary, this paper focuses on the internal perspective of anti-Manchu narratives in the Taiping Movement. The method of this paper is mainly textual analysis, focusing on the official documents, edicts, and proclamations of the Taiping movement. It views the writing of the Taiping as a coherent narrative and rhetoric, which was attractive and convincing for its followers. In terms of the main findings, firstly, internal and external perspectives on anti-Manchu violence are different. Externally, violence was viewed as a tool and necessary process to achieve the political goal. However, internally speaking, in Taiping’s writing, violence was a result of Godlessness, which would be solved as far as the faith in God is restored in China. Having a framework of universal love among human beings as sons and daughters of the Heavenly Father and killing was forbidden, the Taiping excluded Manchus from the family of human beings and demonized them. “Demon-slaying” was not violence. It was constructed as a necessary process to achieve the Great Peace. Moreover, Taiping’s anti-Manchu violence was not merely “political.” Rather, the category “religion” and its binary opposition, “secular,” is not suitable for Taiping. A key point related to this argument is the revolutionary violence against the Manchu government, which inherited the traditional “Heavenly Mandate” model. From an internal, theological perspective, anti-Manchu was ordained and commanded by the Heavenly Father. Manchu, as a regime, was standing as a hindrance in the path toward God. Besides, Manchu was not only viewed as a regime, but they were also “demons.” Therefore, the paper examines how Manchus were dehumanized in Taiping’s writings and were situated outside of the consideration of nonviolent and love. Manchu as a regime and Manchu as demons are in a dynamic relationship. As a regime, the Manchu government was preventing Chinese people from worshipping the Heavenly Father, so they were demonized. As they were demons, killing Manchus during the revolt was justified and not viewed as being contradicted the universal love among human beings.Keywords: anti-manchu, demon-slaying, heavenly mandate, religion and violence, the taiping movement.
Procedia PDF Downloads 712418 Managerial Leadership Styles of Deans in Indonesian Universities
Authors: Jenny Ngo, Harry De Boer, Jurgen Enders
Abstract:
Indonesian higher education has experienced significant changes over the last decade. In 1999, the government published an overall strategy for decentralization and enhancement of local autonomy in many sectors, including (higher) education. Indonesian higher education reforms have forced universities to restructure their internal university governance to become more entrepreneurial. These new types of internal university governance are likely to affect the institutions’ leadership and management. This paper discusses the approach and findings of a study on the managerial leadership styles of deans in Indonesian universities. The study aims to get a better understanding of styles exhibited by deans manifested in their behaviors. Using the theories of reasoned action and planned behavior, in combination with the competing values framework, a large-scale survey was conducted to gather information on the deans’ behaviors, attitudes, subjective norms, and perceived behavioral control. Based on the responses of a sample of 218 deans, the study identifies a number of leadership styles: the Master, the Competitive Consultant, the Consensual Goal-Setter, the Focused Team Captain, and the Informed Trust-Builder style. The study demonstrates that attitudes are the primary determinant of the styles that were found. Perceived behavioral control is a factor that explains some managerial leadership styles. By understanding the attitudes of deans in Indonesian universities, and their leadership styles, universities can strengthen their management and governance, and thus improve their effectiveness.Keywords: deans, Indonesian higher education, leadership and management styles, decentralization
Procedia PDF Downloads 3482417 Boundary Layer Flow of a Casson Nanofluid Past a Vertical Exponentially Stretching Cylinder in the Presence of a Transverse Magnetic Field with Internal Heat Generation/Absorption
Authors: G. Sarojamma, K. Vendabai
Abstract:
An analysis is carried out to investigate the effect of magnetic field and heat source on the steady boundary layer flow and heat transfer of a Casson nanofluid over a vertical cylinder stretching exponentially along its radial direction. Using a similarity transformation, the governing mathematical equations, with the boundary conditions are reduced to a system of coupled, non –linear ordinary differential equations. The resulting system is solved numerically by the fourth order Runge – Kutta scheme with shooting technique. The influence of various physical parameters such as Reynolds number, Prandtl number, magnetic field, Brownian motion parameter, thermophoresis parameter, Lewis number and the natural convection parameter are presented graphically and discussed for non – dimensional velocity, temperature and nanoparticle volume fraction. Numerical data for the skin – friction coefficient, local Nusselt number and the local Sherwood number have been tabulated for various parametric conditions. It is found that the local Nusselt number is a decreasing function of Brownian motion parameter Nb and the thermophoresis parameter Nt.Keywords: casson nanofluid, boundary layer flow, internal heat generation/absorption, exponentially stretching cylinder, heat transfer, brownian motion, thermophoresis
Procedia PDF Downloads 3892416 An Equivalent Circuit Model Approach for Battery Pack Simulation in a Hybrid Electric Vehicle System Powertrain
Authors: Suchitra Sivakumar, Hajime Shingyouchi, Toshinori Okajima, Kyohei Yamaguchi, Jin Kusaka
Abstract:
The progressing need for powertrain electrification calls for more accurate and reliable simulation models. A battery pack serves as the most vital component for energy storage in an electrified powertrain. Hybrid electric vehicles (HEV) do not behave the same way as they age, and there are several environmental factors that account for the degradation of the battery on a system level. Therefore, in this work, a battery model was proposed to study the state of charge (SOC) variation and the internal dynamic changes that contribute to aging and performance degradation in HEV batteries. An equivalent circuit battery model (ECM) is built using MATLAB Simulink to investigate the output characteristics of the lithium-ion battery. The ECM comprises of circuit elements like a voltage source, a series resistor and a parallel RC network connected in series. A parameter estimation study is conducted on the ECM to study the dependencies of the circuit elements with the state of charge (SOC) and the terminal voltage of the battery. The battery model is extended to simulate the temperature dependence of the individual battery cell and the battery pack with the environment. The temperature dependence model accounts for the heat loss due to internal resistance build up in the battery pack during charging, discharging, and due to atmospheric temperature. The model was validated for a lithium-ion battery pack with an independent drive cycle showing a voltage accuracy of 4% and SOC accuracy of about 2%.Keywords: battery model, hybrid electric vehicle, lithium-ion battery, thermal model
Procedia PDF Downloads 2982415 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1242414 Hygrothermal Assessment of Internally Insulated Prefabricated Concrete Wall in Polish Climatic Condition
Authors: D. Kaczorek
Abstract:
Internal insulation of external walls is often problematic due to increased moisture content in the wall and interstitial or surface condensation risk. In this paper, the hygrothermal performance of prefabricated, concrete, large panel, external wall typical for WK70 system, commonly used in Poland in the 70’s, with inside, additional insulation was investigated. Thermal insulation board made out of hygroscopic, natural materials with moisture buffer capacity and extruded polystyrene (EPS) board was used as interior insulation. Experience with this natural insulation is rare in Poland. The analysis was performed using WUFI software. First of all, the impact of various standard boundary conditions on the behavior of the different wall assemblies was tested. The comparison of results showed that the moisture class according to the EN ISO 13788 leads to too high values of total moisture content in the wall since the boundary condition according to the EN 15026 should be usually applied. Then, hygrothermal 1D-simulations were conducted by WUFI Pro for analysis of internally added insulation, and the weak point like the joint of the wall with the concrete ceiling was verified using 2D simulations. Results showed that, in the Warsaw climate and the indoor conditions adopted in accordance with EN 15026, in the tested wall assemblies, regardless of the type of interior insulation, there would not be any problems with moisture - inside the structure and on the interior surface.Keywords: concrete large panel wall, hygrothermal simulation, internal insulation, moisture related issues
Procedia PDF Downloads 1652413 Trend Analysis of Africa’s Entrepreneurial Framework Conditions
Authors: Sheng-Hung Chen, Grace Mmametena Mahlangu, Hui-Cheng Wang
Abstract:
This study aims to explore the trends of the Entrepreneurial Framework Conditions (EFCs) in the five African regions. The Global Entrepreneur Monitor (GEM) is the primary source of data. The data drawn were organized into a panel (2000-2021) and obtained from the National Expert Survey (NES) databases as harmonized by the (GEM). The Methodology used is descriptive and uses mainly charts and tables; this is in line with the approach used by the GEM. The GEM draws its data from the National Expert Survey (NES). The survey by the NES is administered to experts in each country. The GEM collects entrepreneurship data specific to each country. It provides information about entrepreneurial ecosystems and their impact on entrepreneurship. The secondary source is from the literature review. This study focuses on the following GEM indicators: Financing for Entrepreneurs, Government support and Policies, Taxes and Bureaucracy, Government programs, Basic School Entrepreneurial Education and Training, Post school Entrepreneurial Education and Training, R&D Transfer, Commercial And Professional Infrastructure, Internal Market Dynamics, Internal Market Openness, Physical and Service Infrastructure, and Cultural And Social Norms, based on GEM Report 2020/21. The limitation of the study is the lack of updated data from some countries. Countries have to fund their own regional studies; African countries do not regularly participate due to a lack of resources.Keywords: trend analysis, entrepreneurial framework conditions (EFCs), African region, government programs
Procedia PDF Downloads 71