Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2219

Search results for: man in middle attack

1559 Back to Basics: Where is Allah? A Survey of Generation Z Youth at the Canadian University of Dubai

Authors: Said Baadel

Abstract:

The belief of a heavenly God is enshrined to all Abrahamic religions which form the three major religions of the world today. Muslims believe in Allah who is above the seven heavens. The youth in the United Arab Emirates (UAE) study Islamic courses as part of their high school curriculum and are required to take at least one Islamic course at the university level to gain credit hours towards their general education (GENED). This paper provides an insight of what the youth studying in the UAE think of where Allah was. Our analysis reveals that a big number of Muslim youth were not sure, especially those from the Middle Eastern and Arab countries bringing to the conclusion that this subject needs to be revisited again in the course work.

Keywords: Allah, Islam, Tawheed, religion

Procedia PDF Downloads 236
1558 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 126
1557 The Effects of Circadian Rhythms Change in High Latitudes

Authors: Ekaterina Zvorykina

Abstract:

Nowadays, Arctic and Antarctic regions are distinguished to be one of the most important strategic resources for global development. Nonetheless, living conditions in Arctic regions still demand certain improvements. As soon as the region is rarely populated, one of the main points of interest is health accommodation of the people, who migrate to Arctic region for permanent and shift work. At Arctic and Antarctic latitudes, personnel face polar day and polar night conditions during the time of the year. It means that they are deprived of natural sunlight in winter season and have continuous daylight in summer. Firstly, the change in light intensity during 24-hours period due to migration affects circadian rhythms. Moreover, the controlled artificial light in winter is also an issue. The results of the recent studies on night shift medical professionals, who were exposed to permanent artificial light, have already demonstrated higher risks in cancer, depression, Alzheimer disease. Moreover, people exposed to frequent time zones change are also subjected to higher risks of heart attack and cancer. Thus, our main goals are to understand how high latitude work and living conditions can affect human health and how it can be prevented. In our study, we analyze molecular and cellular factors, which play important role in circadian rhythm change and distinguish main risk groups in people, migrating to high latitudes. The main well-studied index of circadian timing is melatonin or its metabolite 6-sulfatoxymelatonin. In low light intensity melatonin synthesis is disturbed and as a result human organism requires more time for sleep, which is still disregarded when it comes to working time organization. Lack of melatonin also causes shortage in serotonin production, which leads to higher depression risk. Melatonin is also known to inhibit oncogenes and increase apoptosis level in cells, the main factors for tumor growth, as well as circadian clock genes (for example Per2). Thus, people who work in high latitudes can be distinguished as a risk group for cancer diseases and demand more attention. Clock/Clock genes, known to be one of the main circadian clock regulators, decrease sensitivity of hypothalamus to estrogen and decrease glucose sensibility, which leads to premature aging and oestrous cycle disruption. Permanent light exposure also leads to accumulation superoxide dismutase and oxidative stress, which is one of the main factors for early dementia and Alzheimer disease. We propose a new screening system adjusted for people, migrating from middle to high latitudes and accommodation therapy. Screening is focused on melatonin and estrogen levels, sleep deprivation and neural disorders, depression level, cancer risks and heart and vascular disorders. Accommodation therapy includes different types artificial light exposure, additional melatonin and neuroprotectors. Preventive procedures can lead to increase of migration intensity to high latitudes and, as a result, the prosperity of Arctic region.

Keywords: circadian rhythm, high latitudes, melatonin, neuroprotectors

Procedia PDF Downloads 156
1556 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation

Authors: Seung Ki Lee, Richard Kyung

Abstract:

In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.

Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine

Procedia PDF Downloads 226
1555 The Canaanite Trade Network between the Shores of the Mediterranean Sea

Authors: Doaa El-Shereef

Abstract:

The Canaanite civilization was one of the early great civilizations of the Near East, they influenced and been influenced from the civilizations of the ancient world especially the Egyptian and Mesopotamia civilizations. The development of the Canaanite trade started from the Chalcolithic Age to the Iron Age through the oldest trade route in the Middle East. This paper will focus on defining the Canaanites and from where did they come from and the meaning of the term Canaan and how the Ancient Manuscripts define the borders of the land of Canaan and this essay will describe the Canaanite trade route and their exported goods such as cedar wood, and pottery.

Keywords: archaeology, bronze age, Canaanite, colonies, Massilia, pottery, shipwreck, vineyards

Procedia PDF Downloads 201
1554 The Development of the Geological Structure of the Bengkulu Fore Arc Basin, Western Edge of Sundaland, Sumatra, and Its Relationship to Hydrocarbon Trapping Mechanism

Authors: Lauti Dwita Santy, Hermes Panggabean, Syahrir Andi Mangga

Abstract:

The Bengkulu Basin is part of the Sunda Arc system, which is a classic convergent type margin that occur around the southern rim of the Eurasian continental (Sundaland) plate. The basin is located between deep sea trench (Mentawai Outer Arc high) and the volvanic/ magmatic Arc of the Barisan Mountains Range. To the northwest it is bounded by Padang High, to the northest by Barisan Mountains (Sumatra Fault Zone) to the southwest by Mentawai Fault Zone and to the southeast by Semangko High/ Sunda Strait. The stratigraphic succession and tectonic development can be broadly divided into four stage/ periods, i.e Late Jurassic- Early Cretaceous, Late Eocene-Early Oligocene, Late Oligocene-Early Miocene, Middle Miocene-Late Miocene and Pliocene-Plistocene, which are mainly controlled by the development of subduction activities. The Pre Tertiary Basement consist of sedimentary and shallow water limestone, calcareous mudstone, cherts and tholeiitic volcanic rocks, with Late Jurassic to Early Cretaceous in age. The sedimentation in this basin is depend on the relief of the Pre Tertiary Basement (Woyla Terrane) and occured into two stages, i.e. transgressive stage during the Latest Oligocene-Early Middle Miocene Seblat Formation, and the regressive stage during the Latest Middle Miocene-Pleistocene (Lemau, Simpangaur and Bintunan Formations). The Pre-Tertiary Faults were more intensive than the overlying cover, The Tertiary Rocks. There are two main fault trends can be distinguished, Northwest–Southwest Faults and Northeast-Southwest Faults. The NW-SE fault (Ketaun) are commonly laterally persistent, are interpreted to the part of Sumatran Fault Systems. They commonly form the boundaries to the Pre Tertiary basement highs and therefore are one of the faults elements controlling the geometry and development of the Tertiary sedimentary basins.The Northeast-Southwest faults was formed a conjugate set to the Northwest–Southeast Faults. In the earliest Tertiary and reactivated during the Plio-Pleistocene in a compressive mode with subsequent dextral displacement. The Block Faulting accross these two sets of faults related to approximate North–South compression in Paleogene time and produced a series of elongate basins separated by basement highs in the backarc and forearc region. The Bengkulu basin is interpreted having evolved from pull apart feature in the area southwest of the main Sumatra Fault System related to NW-SE trending in dextral shear.Based on Pyrolysis Yield (PY) vs Total Organic Carbon (TOC) diagram show that Seblat and Lemau Formation belongs to oil and Gas Prone with the quality of the source rocks includes into excellent and good (Lemau Formation), Fair and Poor (Seblat Formation). The fine-grained carbonaceous sediment of the Seblat dan Lemau Formations as source rocks, the coarse grained and carbonate sediments of the Seblat and Lemau Formations as reservoir rocks, claystone bed in Seblat and Lemau Formation as caprock. The source rocks maturation are late immature to early mature, with kerogen type II and III (Seblat Formation), and late immature to post mature with kerogen type I and III (Lemau Formation). The burial history show to 2500 m in depthh with paleo temperature reached 80oC. Trapping mechanism occur during Oligo–Miocene and Middle Miocene, mainly in block faulting system.

Keywords: fore arc, bengkulu, sumatra, sundaland, hydrocarbon, trapping mechanism

Procedia PDF Downloads 558
1553 Macroeconomic Policies Followed in Turkey after the Crisis 2001 and the Effect of These Policies on Foreign Trade: Sample of the Province Konya

Authors: Bilge Afşar, Zeynep Karaçor, Burcu Guvenek

Abstract:

The aim of this study is to examine and analyze the effect of macroeconomic policies on foreign trade. In the study, the effect of the macroeconomic policies applied in Turkey after 2001 on foreign trade was scrutinized carrying out a survey study in the sample of the province Konya. In the survey study, the survey was administered to a total of 209 exporter firms, which are the members of Konya Chamber of Commerce. While 51 of the firms, to which the survey was administered, exported below $ 100,000, 158 of them are the firms exporting above $ 100,000. Survey was realized in the way of face to face interview with the firms in the rate of 79%. 47% of the institutions forming the mass were reached. In forming survey questionnaire, in general, 5-point Likert scale was used. In order to assess the study results, SPSS 15 package program was utilized. In the survey, foreign trade activities of the firms in Konya were analyzed; and the problems they face, while performing foreign trade, and those needing to be carried out for increasing foreign trade volume of Konya were revealed by determining how and at what degree they were affected from the macroeconomic policies applied. Thus, foreign trade structure and state of the province Konya were attempted to be analyzed. In the survey study, it emerges that although the problems Konya faces in foreign trade overlap with the problems across Turkey, the province Konya seems to be affected relatively less from the last crisis with its equity capital in either trade or other areas. Until the year 2008, while Konya is in a position of the province continuously increasing its export, also with the effect of global crisis, in 2009, a fall was seen in the amount of export. The results emerging in the survey study also confirm this case. In parallel with demand inadequacy and recession all over the world, firms experience trouble. However, again according to our survey result, foreign market weight of firms shifted from EU countries to Russia, East Bloc, and Middle East countries. This prevented Konya from negative affecting from EU crisis at maximum level. That is, Russian and Middle East market express significance for Konya. That market is diversified, and being relatively rid of dependence to EU is extremely important in terms of Konya export.

Keywords: economy, foreign trade, economic crise, macro economic politicies

Procedia PDF Downloads 300
1552 Age Estimation and Sex Determination by CT-Scan Analysis of the Hyoid Bone: Application on a Tunisian Population

Authors: N. Haj Salem, M. Belhadj, S. Ben Jomâa, R. Dhouieb, S. Saadi, M. A. Mesrati, A. Chadly

Abstract:

Introduction: The hyoid bone is considered as one of many bones used to identify a missed person. There is a specificity of each population group in human identifications. Objective: To analyze the relationship between age, sex and metric parameters of hyoid bone in Tunisian population sample, using CT-scan. Materials and Methods: A prospective study was conducted in the Department of Forensic Medicine of FattoumaBourguiba Hospital of Monastir-Tunisia during 4 years. A total of 240 samples of hyoid bone were studied. The age of cases ranged from 18 days to 81 years. The specimens were collected only from the deceased of known age. Once dried, each hyoid bone was scanned using CT scan. For each specimen, 10 measurements were taken using a computer program. The measurements consisted of 6 lengths and 4 widths. A regression analysis was used to estimate the relationship between age, sex, and different measurements. For age estimation, a multiple logistic regression was carried out for samples ≤ 35 years. For sex determination, ROC curve was performed. Discriminant value finally retained was based on the best specificity with the best sensitivity. Results: The correlation between real age and estimated age was good (r²=0.72) for samples aged 35 years or less. The unstandardised canonical function equation was estimated using three variables: maximum length of the right greater cornua, length from the middle of the left joint space to the middle of the right joint space and perpendicular length from the centre point of a line between the distal ends of the right and left greater cornua to the centre point of the anterior view of the body of the hyoid bone. For sex determination, the ROC curve analysis reveals that the area under curve was at 81.8%. Discriminant value was 0.451 with a specificity of 73% and sensibility of 79%. The equation function was estimated based on two variables: maximum length of the greater cornua and maximum length of the hyoid bone. Conclusion: The findings of the current study suggest that metric analysis of the hyoid bone may predict the age ≤ 35 years. Sex estimation seems to be more reliable. Further studies dealing with the fusion of the hyoid bone and the current study could help to achieve more accurate age estimation rates.

Keywords: anthropology, age estimation, CT scan, sex determination, Tunisia

Procedia PDF Downloads 172
1551 A Retrospective Cohort Study on an Outbreak of Gastroenteritis Linked to a Buffet Lunch Served during a Conference in Accra

Authors: Benjamin Osei Tutu, Sharon Annison

Abstract:

On 21st November, 2016, an outbreak of foodborne illness occurred after a buffet lunch served during a stakeholders’ consultation meeting held in Accra. An investigation was conducted to characterise the affected people, determine the etiologic food, the source of contamination and the etiologic agent and to implement appropriate public health measures to prevent future occurrences. A retrospective cohort study was conducted via telephone interviews, using a structured questionnaire developed from the buffet menu. A case was defined as any person suffering from symptoms of foodborne illness e.g. diarrhoea and/or abdominal cramps after eating food served during the stakeholder consultation meeting in Accra on 21st November, 2016. The exposure status of all the members of the cohort was assessed by taking the food history of each respondent during the telephone interview. The data obtained was analysed using Epi Info 7. An environmental risk assessment was conducted to ascertain the source of the food contamination. Risks of foodborne infection from the foods eaten were determined using attack rates and odds ratios. Data was obtained from 54 people who consumed food served during the stakeholders’ meeting. Out of this population, 44 people reported with symptoms of food poisoning representing 81.45% (overall attack rate). The peak incubation period was seven hours with a minimum and maximum incubation periods of four and 17 hours, respectively. The commonly reported symptoms were diarrhoea (97.73%, 43/44), vomiting (84.09%, 37/44) and abdominal cramps (75.00%, 33/44). From the incubation period, duration of illness and the symptoms, toxin-mediated food poisoning was suspected. The environmental risk assessment of the implicated catering facility indicated a lack of time/temperature control, inadequate knowledge on food safety among workers and sanitation issues. Limited number of food samples was received for microbiological analysis. Multivariate analysis indicated that illness was significantly associated with the consumption of the snacks served (OR 14.78, P < 0.001). No stool and blood or samples of etiologic food were available for organism isolation; however, the suspected etiologic agent was Staphylococcus aureus or Clostridium perfringens. The outbreak could probably be due to the consumption of unwholesome snack (tuna sandwich or chicken. The contamination and/or growth of the etiologic agent in the snack may be due to the breakdown in cleanliness, time/temperature control and good food handling practices. Training of food handlers in basic food hygiene and safety is recommended.

Keywords: Accra, buffet, conference, C. perfringens, cohort study, food poisoning, gastroenteritis, office workers, Staphylococcus aureus

Procedia PDF Downloads 230
1550 Two-Dimensional Dynamics Motion Simulations of F1 Rare Wing-Flap

Authors: Chaitanya H. Acharya, Pavan Kumar P., Gopalakrishna Narayana

Abstract:

In the realm of aerodynamics, numerous vehicles incorporate moving components to enhance their performance. For instance, airliners deploy hydraulically operated flaps and ailerons during take-off and landing, while Formula 1 racing cars utilize hydraulic tubes and actuators for various components, including the Drag Reduction System (DRS). The DRS, consisting of a rear wing and adjustable flaps, plays a crucial role in overtaking manoeuvres. The DRS has two positions: the default position with the flaps down, providing high downforce, and the lifted position, which reduces drag, allowing for increased speed and aiding in overtaking. Swift deployment of the DRS during races is essential for overtaking competitors. The fluid flow over the rear wing flap becomes intricate during deployment, involving flow reversal and operational changes, leading to unsteady flow physics that significantly influence aerodynamic characteristics. Understanding the drag and downforce during DRS deployment is crucial for determining race outcomes. While experiments can yield accurate aerodynamic data, they can be expensive and challenging to conduct across varying speeds. Computational Fluid Dynamics (CFD) emerges as a cost-effective solution to predict drag and downforce across a range of speeds, especially with the rapid deployment of the DRS. This study employs the finite volume-based solver Ansys Fluent, incorporating dynamic mesh motions and a turbulent model to capture the complex flow phenomena associated with the moving rear wing flap. A dedicated section for the rare wing-flap is considered in the present simulations, and the aerodynamics of these sections closely resemble S1223 aerofoils. Before delving into the simulations of the rare wing-flap aerofoil, numerical results undergo validation using experimental data from an NLR flap aerofoil case, encompassing different flap angles at two distinct angles of attack was carried out. The increase in flap angle as increase in lift and drag is observed for a given angle of attack. The simulation methodology for the rare-wing-flap aerofoil case involves specific time durations before lifting the flap. During this period, drag and downforce values are determined as 330 N and 1800N, respectively. Following the flap lift, a noteworthy reduction in drag to 55 % and a decrease in downforce to 17 % are observed. This understanding is critical for making instantaneous decisions regarding the deployment of the Drag Reduction System (DRS) at specific speeds, thereby influencing the overall performance of the Formula 1 racing car. Hence, this work emphasizes the utilization of dynamic mesh motion methodology to predict the aerodynamic characteristics during the deployment of the DRS in a Formula 1 racing car.

Keywords: DRS, CFD, drag, downforce, dynamics mesh motion

Procedia PDF Downloads 94
1549 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 221
1548 Airborne Particulate Matter Passive Samplers for Indoor and Outdoor Exposure Monitoring: Development and Evaluation

Authors: Kholoud Abdulaziz, Kholoud Al-Najdi, Abdullah Kadri, Konstantinos E. Kakosimos

Abstract:

The Middle East area is highly affected by air pollution induced by anthropogenic and natural phenomena. There is evidence that air pollution, especially particulates, greatly affects the population health. Many studies have raised a warning of the high concentration of particulates and their affect not just around industrial and construction areas but also in the immediate working and living environment. One of the methods to study air quality is continuous and periodic monitoring using active or passive samplers. Active monitoring and sampling are the default procedures per the European and US standards. However, in many cases they have been inefficient to accurately capture the spatial variability of air pollution due to the small number of installations; which eventually is attributed to the high cost of the equipment and the limited availability of users with expertise and scientific background. Another alternative has been found to account for the limitations of the active methods that is the passive sampling. It is inexpensive, requires no continuous power supply, and easy to assemble which makes it a more flexible option, though less accurate. This study aims to investigate and evaluate the use of passive sampling for particulate matter pollution monitoring in dry tropical climates, like in the Middle East. More specifically, a number of field measurements have be conducted, both indoors and outdoors, at Qatar and the results have been compared with active sampling equipment and the reference methods. The samples have been analyzed, that is to obtain particle size distribution, by applying existing laboratory techniques (optical microscopy) and by exploring new approaches like the white light interferometry to. Then the new parameters of the well-established model have been calculated in order to estimate the atmospheric concentration of particulates. Additionally, an extended literature review will investigate for new and better models. The outcome of this project is expected to have an impact on the public, as well, as it will raise awareness among people about the quality of life and about the importance of implementing research culture in the community.

Keywords: air pollution, passive samplers, interferometry, indoor, outdoor

Procedia PDF Downloads 398
1547 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 48
1546 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 454
1545 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 38
1544 Migration as a Trigger Causing Change to the Levant Literary Modernism

Authors: Aathira Peedikaparambil Somasundaran

Abstract:

The beginning of the 20th century marked the perios when a new generation of Lebanese radicals sowed the seeds for the second phase of Levant literary modernism, situated in the Levant. Beirut, during this era popularly fit every radical writer’s criterion owing to its weakened censorship and political control, despite the absence of a protective womb for the development of literary modernism, caused by the natively prevalent political unsettlement. The third stage of literary modernization, in which scholars used Western-inspired critical techniques to better understand their own cultures, coincides with the time period examined in this paper, which involved the international-inspired critical analysis of native cultural stimulants, which raised questions among Arab freethinking intellectuals. Locals who ventured outside recognised the difference between the West's progress and their own nations' stagnation. The awareness of such ‘gap of success’ aroused an ambition from journalists, authors, and proletarian revolutionaries who had studied in Europe, and finally developed enlightened ideas. Some Middle Eastern authors and artists only adopted current social and political frameworks after discovering western modernity. After learning about the upheavals that were happening in the West, these thinkers aspired to bring about equally broad drastic developments in their own country's social, political, and cultural milieu. These occurrences illustrate the increased power of migration to alter the cultural and literary scene in the Levant. The paper intends to discuss the different effects of migration that contributed to Levant literary modernism. The exploration of these factors as causes begins with addressing the politically influenced activism, that has always been a relevant part of Beirut, and then diving into the psychological effects of migration in the individuals of the society, which might have induced an accommodability to alien thoughts and ideas over time, as a coping mechanism. Nature or environmental stimuli, a common trigger for any creative output, often having the highest influence during travel will be identified and analysed to inspect the extent of its impact on the exchange of ideas that resulted in Levant modernism. The efficiency of both the stimulating component of travel and the diaspora of the indigenous, a by-product of travel in catalysing modernism in the Levant has to be proven in order to understand how migration indirectly affected the transmission and adoption of ideas in Levant literature. The paper will revisit the events revolving around these key players and platforms like Shir, to understand how the Lebanese literature, tied down in poetry drastically mutated under the leadership of Adonis, Yusuf et Khal, and other pioneers of Levant literary modernism. The conclision will identify the triggers that helped authors overcome personal and geographical barriers to unite the West and the Levant, and investigate the extent to which the bi-directional migration prompted a transformation in the local poetry. Consequently, the paper aims to shed light into the unique factor that provoked the shift in the literary scene of Twentieth century in the Middle East.

Keywords: literature, modernism, Middle East, levant, Beirut

Procedia PDF Downloads 81
1543 Economic Analysis of Post-Harvest Losses in Plantain (and Banana): A Case Study of South Western Nigeria

Authors: O. R. Adeniyi, A. Ayandiji

Abstract:

Losses are common in most vegetables because the fruit ripens rapidly and most plantain products can only be stored for a few days thereby limiting their utilization. Plantain (and banana) is highly perishable at the ambient temperature prevalent in the tropics. The specific objective of this study is to identify the socioeconomic characteristics of banana/plantain dealers and determine the perceived effect of the losses incurred in the process of marketing banana/plantain. The study was carried out in Ondo and Lagos states of south-western Nigeria. Purposive sampling technique was used to collect information from “Kolawole plantain depot”, the point of purchase in Ondo State and “Alamutu plantain market” in Mushin the point of sales in Lagos state. Preliminary study was conducted with the use of primary data collected through well-structured questionnaires administered on 60 respondents and 55 fully completed ones analysed. Budgeting, gross margin and multiple linear regression were used for analyses. Most merchants were found to be in the middle age class (30-50 years), majority of whom were female and completed their secondary school education, with eighty percent having more than 5 years’ experience of in banana/plantain marketing. The highest losses were incurred during transportation and these losses constitute about 5.62 percent of the potential total revenue. On the average, loss in gross margin is about ₦6,000.00 per merchant. The impacts of these losses are reflected in the continuously reducing level of their income. Age of the respondents played a major role in determining the level of care in the handling of the fruits. The middle age class tends to be more favoured. In conclusion, the merchants need adequate and sustainable transportation and storage facilities as a matter of utmost urgency. There is the need for government to encourage producers of the product (farmers) by giving them motivating incentives and ensuring that the environment is made conducive also for dealers by providing adequate storage facilities and ready markets locally and possibly for export.

Keywords: post-harvest, losses, plantain, banana, simple regression

Procedia PDF Downloads 319
1542 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.

Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss

Procedia PDF Downloads 199
1541 Numerical Simulation of the Flow around Wing-In-Ground Effect (WIG) Craft

Authors: A. Elbatran, Y. Ahmed, A. Radwan, M. Ishak

Abstract:

The use of WIG craft is representing an ambitious technology that will support in reducing time, effort, and money of the conventional marine transportation in the future. This paper investigates the aerodynamic characteristic of compound wing-in-ground effect (WIG) craft model. Drag coefficient, lift coefficient and Lift and drag ratio were studied numerically with respect to the ground clearance and the wing angle of attack. The modifications of the wing has been done in order to investigate the most suitable wing configuration that can increase the wing lift-to-drag ratio at low ground clearance. A numerical investigation was carried out in this research work using finite volume Reynolds-Averaged Navier-Stokes Equations (RANSE) code ANSYS CFX, Validation was carried out by using experiments. The experimental and the numerical results concluded that the lift to drag ratio decreased with the increasing of the ground clearance.

Keywords: drag Coefficient, ground clearance, navier-stokes, WIG

Procedia PDF Downloads 380
1540 Scouring Rate Pattern/Monitoring at Coastal and Offshore Structures

Authors: Ahmad Saifullah Mazlan, Hossein Basser, Shatirah Akib

Abstract:

Scouring pattern evaluation and measuring its depth around coastal and offshore structures is very essential issue to assure the safety of the structures as well as providing needed design parameters. Scouring is known as one of the important phenomena which threatens the safety of infrastructures. Several countermeasures have been developed to control scouring by protecting the structures against water flow attack directly or indirectly by changing the water flow pattern. Recently, monitoring methods for estimating water flow pattern and scour depth are studied to track the safety of structures. Since most of studies regarding scouring is related to monitoring scouring around piers in rivers therefore it is necessary to develop researches investigating scouring around piers in coastal and offshore areas. This paper describes a review of monitoring methods may be used for detecting scour depth around piers in coastal and offshore structures.

Keywords: scour, monitoring, pier, coastal, offshore

Procedia PDF Downloads 644
1539 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 144
1538 Saliency Detection Using a Background Probability Model

Authors: Junling Li, Fang Meng, Yichun Zhang

Abstract:

Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection.

Keywords: visual saliency, background probability, boundary knowledge, background priors

Procedia PDF Downloads 429
1537 Application of Nonlinear Model to Optimize the Coagulant Dose in Drinking Water Treatment

Authors: M. Derraz, M.Farhaoui

Abstract:

In the water treatment processes, the determination of the optimal dose of the coagulant is an issue of particular concern. Coagulant dosing is correlated to raw water quality which depends on some parameters (turbidity, ph, temperature, conductivity…). The objective of this study is to provide water treatment operators with a tool that enables to predict and replace, sometimes, the manual method (jar testing) used in this plant to predict the optimum coagulant dose. The model is constructed using actual process data for a water treatment plant located in the middle of Morocco (Meknes).

Keywords: coagulation process, aluminum sulfate, model, coagulant dose

Procedia PDF Downloads 279
1536 Effect of Strength Class of Concrete and Curing Conditions on Capillary Absorption of Self-Compacting and Conventional Concrete

Authors: Emine Ebru Demirci, Remzi Şahin

Abstract:

The purpose of this study is to compare Self Compacting Concrete (SCC) and Conventional Concrete (CC), which are used in beams with dense reinforcement, in terms of their capillary absorption. During the comparison of SCC and CC, the effects of two different factors were also investigated: concrete strength class and curing condition. In the study, both SCC and CC were produced in three different concrete classes (C25, C50 and C70) and the other parameter (i.e curing condition) was determined as two levels: moisture and air curing. Beam dimensions were determined to be 200 x 250 x 3000 mm. Reinforcements of the beams were calculated and placed as 2ø12 for the top and 3ø12 for the bottom. Stirrups with dimension 8 mm were used as lateral rebar and stirrup distances were chosen as 10 cm in the confinement zone and 15 cm at the central zone. In this manner, densification of rebars in lateral cross-sections of beams and handling of SCC in real conditions were aimed. Concrete covers of the rebars were chosen to be equal in all directions as 25 mm. The capillary absorption measurements were performed on core samples taken from the beams. Core samples of ø8x16 cm were taken from the beginning (0-100 cm), middle (100-200 cm) and end (200-300 cm) region of the beams according to the casting direction of SCC. However core samples were taken from lateral surface of the beams. In the study, capillary absorption experiments were performed according to Turkish Standard TS EN 13057. It was observed that, for both curing environments and all strength classes of concrete, SCC’s had lower capillary absorption values than that of CC’s. The capillary absorption values of C25 class of SCC are 11% and 16% lower than that of C25 class of CC for air and moisture conditions, respectively. For C50 class, these decreases were 6% and 18%, while for C70 class, they were 16% and 9%, respectively. It was also detected that, for both SCC and CC, capillary absorption values of samples kept in moisture curing are significantly lower than that of samples stored in air curing. For CC’s; C25, C50 and C70 class moisture-cured samples were found to have 26%, 12% and 31% lower capillary absorption values, respectively, when compared to the air-cured ones. For SCC’s; these values were 30%, 23% and 24%, respectively. Apart from that, it was determined that capillary absorption values for both SCC and CC decrease with increasing strength class of concrete for both curing environments. It was found that, for air cured CC, C50 and C70 class of concretes had 39% and 63% lower capillary absorption values compared to the C25 class of concrete. For the same type of concrete samples cured in the moisture environment, these values were found to be 27% and 66%. It was found that for SCC samples, capillary absorption value of C50 and C70 concretes, which were kept in air curing, were 35% and 65% lower than that of C25, while for moisture-cured samples these values were 29% and 63%, respectively. When standard deviations of the capillary absorption values are compared for core samples obtained from the beginning, middle and end of the CC and SCC beams, it was found that, in all three strength classes of concrete, the variation is much smaller for SCC than CC. This demonstrated that SCC’s had more uniform character than CC’s.

Keywords: self compacting concrete, reinforced concrete beam, capillary absorption, strength class, curing condition

Procedia PDF Downloads 370
1535 Effect of Runup over a Vertical Pile Supported Caisson Breakwater and Quarter Circle Pile Supported Caisson Breakwater

Authors: T. J. Jemi Jeya, V. Sriram

Abstract:

Pile Supported Caisson breakwater is an ecofriendly breakwater very useful in coastal zone protection. The model is developed by considering the advantages of both caisson breakwater and pile supported breakwater, where the top portion is a vertical or quarter circle caisson and the bottom portion consists of a pile supported breakwater defined as Vertical Pile Supported Breakwater (VPSCB) and Quarter-circle Pile Supported Breakwater (QPSCB). The study mainly focuses on comparison of run up over VPSCB and QPSCB under oblique waves. The experiments are carried out in a shallow wave basin under different water depths (d = 0.5 m & 0.55 m) and under different oblique regular waves (00, 150, 300). The run up over the surface is measured by placing two run up probes over the surface at 0.3 m on both sides from the centre of the model. The results show that the non-dimensional shoreward run up shows slight decrease with respect to increase in angle of wave attack.

Keywords: Caisson breakwater, pile supported breakwater, quarter circle breakwater, vertical breakwater

Procedia PDF Downloads 153
1534 Effect of Design Parameters on a Two Stage Launch Vehicle Performance

Authors: Assem Sallam, Aly Elzahaby, Ahmed Makled, Mohamed Khalil

Abstract:

Change in design parameters of launch vehicle affects its overall flight path trajectory. In this paper, several design parameters are introduced to study their effect. Selected parameters are the launch vehicle mass, which is presented in the form of payload mass, the maximum allowable angle of attack the launch vehicle can withstand, the flight path angle that is predefined for the launch vehicle second stage, the required inclination and its effect on the launch azimuth and finally by changing the launch pad coordinate. Selected design parameters are studied for their effect on the variation of altitude, ground range, absolute velocity and the flight path angle. The study gives a general mean of adjusting the design parameters to reach the required launch vehicle performance.

Keywords: launch vehicle azimuth, launch vehicle trajectory, launch vehicle payload, launch pad location

Procedia PDF Downloads 312
1533 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 237
1532 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 335
1531 A Regulatory Analysis on Legal Problems of BitCoin

Authors: Fady Tawakol

Abstract:

BitCoin is a decentralized cryptocurrency that can be used without the need of traditional central banks to accomplish any e-commerce trade. The use of such currency could facilitate new economic interactions and linkages. However, without effective and efficient regulations, cryptocurrency transactions are mostly used by criminals to commit crimes such as money laundering, theft, and blackmailing. And because law is one step behind technological developments, this paper discusses the importance of regulations and supervision for the BitCoin-system, to provide unified regulatory solutions for our digital future in the Middle East. It will provide a detailed analysis of the legal nature of BitCoin along with, its regulation with respect to criminal and civil law.

Keywords: BitCoin, financial protection, crypto currency, money laundering

Procedia PDF Downloads 209
1530 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 543