Search results for: cache timing attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 943

Search results for: cache timing attack

253 Chaupadi Practice: A Cruel Discrimination against Women a Case Study of Achham District of Nepal

Authors: Santosh Thapa, Sankar Gurung

Abstract:

Chaupadi is a tradition widely practiced in the far and mid-western region of Nepal. It is a practice where girls and women are not allowed to inter the house and touch the food, water and milk during their menstruation period of 4-7 days. They have to spend all the nights during the period in a specific hut (Chhaupadi Goth) which is a bit far from their residence where they faces various kinds of risk and violence like bullying, snakes and insect bite, wild animal attack etc. Sometimes the girls even do not go to school during their menstruation periods. After childbirth, the woman must stay in a cow shed for 11 days in such Chhaupadi practiced areas. This study limits the Achham district of the far western region which is the most vulnerable Chhaupadi practicing district. Several governmental and non-governmental organizations have been involving and spending huge amount of money for capacity building and awareness raising campaign for last 2 decades but still 9 out of 75 Village Development Committees (VDCs) have been partially practicing Chaupadi in the district. This study shows that the school attendance rate of the girls during the period have visibly increased which helps to increase the number of the girl graduation as well. Similarly, the practice of Chhaupadi is one of the reasons for increasing the number of cases of uterus prolapsus and poor reproductive health of women and girls. Triggering tools are the one of the best ways to accelerate the awareness campaign in the VDCs. This study recommends that the local bodies should coordinate and lead the overall awareness campaign program to sustain the Chaupadi free VDCs.

Keywords: awareness campaign, chaupadi practice, gender discrimination, violence

Procedia PDF Downloads 310
252 Synthesis of Montmorillonite/CuxCd1-xS Nanocomposites and Their Application to the Photodegradation of Methylene Blue

Authors: H. Boukhatem, L. Djouadi, H. Khalaf, R. M. Navarro, F. V. Ganzalez

Abstract:

Synthetic organic dyes are used in various industries, such as textile industry, leather tanning industry, paper production, hair dye production, etc. Wastewaters containing these dyes may be harmful to the environment and living organisms. Therefore, it is very important to remove or degrade these dyes before discharging them into the environment. In addition to standard technologies for the degradation and/or removal of dyes, several new specific technologies, the so-called advanced oxidation processes (AOPs), have been developed to eliminate dangerous compounds from polluted waters. AOPs are all characterized by the same chemical feature: production of radicals (•OH) through a multistep process, although different reaction systems are used. These radicals show little selectivity of attack and are able to oxidize various organic pollutants due to their high oxidative capacity (reduction potential of HO• Eo = 2.8 V). Heterogeneous photocatalysis, as one of the AOPs, could be effective in the oxidation/degradation of organic dyes. A major advantage of using heterogeneous photocatalysis for this purpose is the total mineralization of organic dyes, which results in CO2, H2O and corresponding mineral acids. In this study, nanomaterials based on montmorillonite and CuxCd1-xS with different Cu concentration (0.3 < x < 0.7) were utilized for the degradation of the commercial cationic textile dye Methylene blue (MB), used as a model pollutant. The synthesized nanomaterials were characterized by fourier transform infrared (FTIR) and thermogravimetric-differential thermal analysis (TG–DTA). Test results of photocatalysis of methylene blue under UV-Visible irradiation show that the photoactivity of nanomaterials montmorillonite/ CuxCd1-xS increases with the increasing of Cu concentration. The kinetics of the degradation of the MB dye was described with the Langmuir–Hinshelwood (L–H) kinetic model.

Keywords: heterogeneous photocatalysis, methylene blue, montmorillonite, nanomaterial

Procedia PDF Downloads 373
251 Opinion Mining to Extract Community Emotions on Covid-19 Immunization Possible Side Effects

Authors: Yahya Almurtadha, Mukhtar Ghaleb, Ahmed M. Shamsan Saleh

Abstract:

The world witnessed a fierce attack from the Covid-19 virus, which affected public life socially, economically, healthily and psychologically. The world's governments tried to confront the pandemic by imposing a number of precautionary measures such as general closure, curfews and social distancing. Scientists have also made strenuous efforts to develop an effective vaccine to train the immune system to develop antibodies to combat the virus, thus reducing its symptoms and limiting its spread. Artificial intelligence, along with researchers and medical authorities, has accelerated the vaccine development process through big data processing and simulation. On the other hand, one of the most important negatives of the impact of Covid 19 was the state of anxiety and fear due to the blowout of rumors through social media, which prompted governments to try to reassure the public with the available means. This study aims to proposed using Sentiment Analysis (AKA Opinion Mining) and deep learning as efficient artificial intelligence techniques to work on retrieving the tweets of the public from Twitter and then analyze it automatically to extract their opinions, expression and feelings, negatively or positively, about the symptoms they may feel after vaccination. Sentiment analysis is characterized by its ability to access what the public post in social media within a record time and at a lower cost than traditional means such as questionnaires and interviews, not to mention the accuracy of the information as it comes from what the public expresses voluntarily.

Keywords: deep learning, opinion mining, natural language processing, sentiment analysis

Procedia PDF Downloads 171
250 The Role of Physical Education and Fitness for Active Ageing

Authors: A. Lakshya

Abstract:

The main aim of this paper is to interpret physical education for children from 5 to 18 years. Schools have the ability to promote positive mental health by developing physical education, which helps to build individual growth, goal setting, decision making, helps in muscular development, self-discipline, stresses relief, leadership qualities that can arise with new skills, prosocial behavior and problem-solving skills. But mostly the children at these early ages ought to hold the disorders as heart attack, diabetes and obesity disorders may increase in large number. The data of P.E has got a very least place, where children are with feeble minds and they acquired a state of inactiveness. Globally, 81% of adolescents aged 11-18 years were insufficiently physically active in the year 2016. Adolescent girls were less active than boys, with the percentage of 85% vs. 78% as well. A recent study of California schools found that students are sedentary most of the time during PE classes, with just four minutes of every half-hour spent in vigorous physical activity. Additionally, active PE time decreases with larger class sizes. Students in classes with more than forty-five students are half as active as students in smaller class sizes. The children in adolescence age they acquire more creative ideas hence they create new hairstyles, cooking styles and dressing styles. Instead, all the children are engaging themselves to TV (television) and video games. The development of physical quality not only improves students ’ physical fitness but is also conducive to the psychological development of the students. Physical education teaching should pay more attention to the training of physical quality in the future.

Keywords: physical education, prosocial behavior, leadership, goal setting

Procedia PDF Downloads 137
249 The Implementation of Sexual and Reproductive Health Education Policy in Schools in Asia and Africa: A Scoping Review

Authors: Rhea Khosla, Victoria Tzortziou-Brown

Abstract:

Introduction: Adolescent SRH has been neglected since the start of the millennium. Adolescents comprise 16% of the global population, with the largest proportion living in Asia (650 million). By late adolescence, individuals in these regions are likely to become sexually active, and thus they must understand their SRH rights. Many lack knowledge of SRH, using unreliable sources for such information. Sex education is necessary to standardize and inform sexual knowledge, which empowers adolescents to make informed SRH decisions. School is an appropriate environment for this, however, SRH education requires effective policy to enforce. Nonetheless, this issue remains of low political priority in Asia and Africa. Current literature on sex education policy in schools in these regions is scarce and tends to have broad aims. Thus, a scoping review was necessary. Methods: Literature searches were conducted in February 2023 using six databases, including grey literature databases (PubMed, Scopus, Embase, Web of Science, Google Scholar, Global Index Medicus), returning a total of 1537 unique articles. After screening titles, abstracts and full text, 17 articles remained. References of included articles were additionally searched, producing a further 7 articles, which then underwent thematic analysis Results: Most countries in Africa and Asia did not have studies on this topic. Studies derived data from interviews with key stakeholders and quantitative methods quantified questionnaire responses. Barriers were: policy/curriculum issues, societal opinions, teaching discomfort, and lack of educator training. Limitations were insufficient timing, inconsistent implementation, insufficient hours dedicated to teaching, education received late into schooling, and discrepancies between teachers, schools, and students about whether policies were being implemented. Discussion: Based on the existing limited evidence, a cultural shift to reduce stigma seems necessary, alongside teacher and student involvement in policy formulation with effective implementation monitoring and educator training.

Keywords: adolescent, Africa, Asia, education, sexual and reproductive health, policy

Procedia PDF Downloads 45
248 Mob Justice in Ghana: Implication for Peace

Authors: Ishaq Alhassan Meriga

Abstract:

This study examined the phenomenon of mob violence and its implication for peace in Ghana. The study used the archival study of media reports and content analysis of other secondary data as well as eyewitness accounts. The study examined trends and patterns of vigilante violence within the Ghanaian context. Results showed a considerable increase in the occurrence of mob violence within the last 10 years. Theft and robbery emerged as the most frequently suspected crimes for which victims were attacked, while the LGBT community is not left out. Cases of mob violence were most frequently reported in urban areas. This study has shown that the patterns, scope, nature, and implication of mob justice in Ghana are fairly and comparatively similar to those found in other parts of Africa and the globe. Mob violence is identified as undermining the rule of law and thereby infringing on the fundamental human rights of the victims. It is confirmed to have a cycle of effects that is an impediment to the peace of the country. The study underscores the implications of mob violence in terms of disdaining human life and dignity, revisiting our justice systems and punishment procedures, resourcing, and empowering law enforcers to fight the menace of vigilantism. First, the archival study had a limitation regarding missing data. The majority of the cases used for the study lack information mostly on perpetrators and the steps taken by public authorities and security agencies after reports of a mob attack have been lodged with them. The study recommends for further research to be undertaken on the perpetrators and survivors of mob actions in order to get a holistic understanding of the phenomenon. This will give a more comprehensive view of the issue of mob violence in Ghana. From the findings, it can be concluded that mob justice is a social canker in Ghanaian communities, which has a great impact on the peace of the country.

Keywords: LGBT, mob justice, peace, vigilantism

Procedia PDF Downloads 86
247 The Effect of Geographical Differentials of Epidemiological Transition on Health-Seeking Behavior in India

Authors: Sumit Kumar Das, Laishram Ladusingh

Abstract:

Aim: The aim of the study is to examine the differential of epidemiological transition across fifteen agro-climatic zones of India and its effect on health-seeking behavior. Data and Methods: Unit level data on consumption expenditure on health of India from three decadal rounds conducted by National Sample Survey Organization are used for the analysis. These three rounds are 52nd (1995-96), 60th (2004-05) and 71st (2014-15). The age-adjusted prevalence rate for communicable diseases and non-communicable diseases are estimated for fifteen agro-climatic zones of India for three time periods. Bivariate analysis is used to find out determinants of health-seeking behavior. Multilevel logistic regression is used to examine factors effecting on household health-seeking behavior. Result: The prevalence of communicable diseases is increasing in most of the zones of India. Every South Indian zones, Gujarat plains, and lower Gangetic plain are facing the severe attack of dual burden of diseases. Demand for medical advice has increased in southern zones, and east zones, reliance on private healthcare facilities are increasing in most of the zone. Demographic characteristics of the household head have a significant impact on health-seeking behavior. Conclusion: Proper program implementation is required considering the disease prevalence and differential in the pattern of health seeking behavior. Along with initiation and strengthening of programs for non-communicable, existing programs for communicable diseases need to monitor and supervised strictly.

Keywords: agro-climatic zone, epidemiological transition, health-seeking behavior, multilevel regression

Procedia PDF Downloads 183
246 Nurse-Led Codes: Practical Application in the Emergency Department during a Global Pandemic

Authors: F. DelGaudio, H. Gill

Abstract:

Resuscitation during cardiopulmonary (CPA) arrest is dynamic, high stress, high acuity situation, which can easily lead to communication breakdown, and errors. The care of these high acuity patients has also been shown to increase physiologic stress and task saturation of providers, which can negatively impact the care being provided. These difficulties are further complicated during a global pandemic and pose a significant safety risk to bedside providers. Nurse-led codes are a relatively new concept that may be a potential solution for alleviating some of these difficulties. An experienced nurse who has completed advanced cardiac life support (ACLS), and additional training, assumed the responsibility of directing the mechanics of the appropriate ACLS algorithm. This was done in conjunction with a physician who also acted as a physician leader. The additional nurse-led code training included a multi-disciplinary in situ simulation of a CPA on a suspected COVID-19 patient. During the CPA, the nurse leader’s responsibilities include: ensuring adequate compression depth and rate, minimizing interruptions in chest compressions, the timing of rhythm/pulse checks, and appropriate medication administration. In addition, the nurse leader also functions as a last line safety check for appropriate personal protective equipment and limiting exposure of staff. The use of nurse-led codes for CPA has shown to decrease the cognitive overload and task saturation for the physician, as well as limiting the number of staff being exposed to a potentially infectious patient. The real-world application has allowed physicians to perform and oversee high-risk procedures such as intubation, line placement, and point of care ultrasound, without sacrificing the integrity of the resuscitation. Nurse-led codes have also given the physician the bandwidth to review pertinent medical history, advanced directives, determine reversible causes, and have the end of life conversations with family. While there is a paucity of research on the effectiveness of nurse-led codes, there are many potentially significant benefits. In addition to its value during a pandemic, it may also be beneficial during complex circumstances such as extracorporeal cardiopulmonary resuscitation.

Keywords: cardiopulmonary arrest, COVID-19, nurse-led code, task saturation

Procedia PDF Downloads 155
245 Analysis of Power Demand for the Common Rail Pump Drive in an Aircraft Engine

Authors: Rafal Sochaczewski, Marcin Szlachetka, Miroslaw Wendeker

Abstract:

Increasing requirements to reduce exhaust emissions and fuel consumption while increasing the power factor is increasingly becoming applicable to internal combustion engines intended for aircraft applications. As a result, intensive research work is underway to develop a diesel-powered unit for aircraft propulsion. Due to a number of advantages, such as lack of the head (lower heat loss) and timing system, opposite movement of pistons conducive to balancing the engine, the two-stroke compression-ignition engine with the opposite pistons has been developed and upgraded. Of course, such construction also has drawbacks. The main one is the necessity of using a gear connecting two crankshafts or a complicated crank system with one shaft. The peculiarity of the arrangement of pistons with sleeves, as well as the fulfillment of rigorous requirements, makes it necessary to apply the most modern technologies and constructional solutions. In the case of the fuel supply system, it was decided to use common rail system elements. The paper presents an analysis of the possibility of using a common rail pump to supply an aircraft compression-ignition engine. It is an engine with a two-stroke cycle, three cylinders, opposing pistons, and 100 kW power. Each combustion chamber is powered by two injectors controlled by electromagnetic valves. In order to assess the possibility of using a common rail pump, four high-pressure pumps were tested on a bench. They are piston pumps differing in the number and geometry of the pumping sections. The analysis included the torque on the pump drive shaft and the power needed to drive the pump depending on the rotational speed, pumping pressure and fuel dispenser settings. The research allowed to optimize the engine power supply system depending on the fuel demand and the way the pump is mounted on the engine. Acknowledgment: This work has been realized in the cooperation with The Construction Office of WSK ‘PZL-KALISZ’ S.A.’ and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish Nation-al Centre for Research and Development.

Keywords: diesel engine, fuel pump, opposing pistons, two-stroke

Procedia PDF Downloads 141
244 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 280
243 Maternal and Neonatal Outcome Analysis in Preterm Abdominal Delivery Underwent Umbilical Cord Milking Compared to Early Cord Clamping

Authors: Herlangga Pramaditya, Agus Sulistyono, Risa Etika, Budiono Budiono, Alvin Saputra

Abstract:

Preterm birth and anemia of prematurity are the most common cause of morbidity and mortality in neonates, and anemia of the preterm neonates has become a major issue. The timing of umbilical cord clamping after a baby is born determines the amount of blood transferred from the placenta to fetus, Delayed Cord Clamping (DCC) has proven to prevent anemia in the neonates but it is constrained concern regarding the delayed in neonatal resuscitation. Umbilical Cord Milking (UCM) could be an alternative method for clamping the umbilical cord due to the active blood transfer from the placenta to the fetus. The aim of this study was to analyze the difference between maternal and neonatal outcome in preterm abdominal delivery who underwent UCM compared to ECC. This was an experimental study with randomized post-test only control design. Analyzed maternal and neonatal outcomes, significant P values (P <0.05). Statistical comparison was carried out using Paired Samples t-test (α two tailed 0,05). The result was the mean of preoperative mother’s hemoglobin in UCM group compared to ECC (10,9 + 0,9 g/dL vs 10,4 + 0,9 g/dL) and postoperative (11,1 + 1,1 g/dL vs 10,5 + 0,7 g/dL), the delta was (0,2 + 0,7 vs 0,1 + 0,6.). It showed no significant difference (P=0,395 vs 0,627). The mean of 3rd phase labor duration in UCM group vs ECC was (20,5 + 3,5 second vs 21,1 + 3,3 second), showed insignificant difference (P=0,634). The amount of bleeding after delivery in UCM group compared to ECC has the median of 190 cc (100-280cc) vs 210 cc (150-330 cc) showed insignificant difference (P=0,083) so the incidence of post-partum bleeding was not found. The mean of the neonates hemoglobin, hematocrit and erythrocytes of UCM group compared to ECC was (19,3 + 0,7 vs 15,9 + 0,8 g/dl), (57,1 + 3,6 % vs 47,2 + 2,8 %), and (5,4 + 0,4 g/dl vs 4,5 + 0,3 g/dl) showed significant difference (P<0,0001). There was no baby in UCM group received blood transfusion and one baby in the control ECC group received blood transfusion was found. Umbilical Cord Milking has shown to increase the baby’s blood component such as hemoglobin, hematocrit, and erythrocytes 6 hours after birth as well as lowering the incidence of blood transfusions. Maternal and neonatal morbidity were not found. Umbilical Cord Milking was the act of clamping the umbilical cord that was more beneficial to the baby and no adverse or negative effects on the mother.

Keywords: umbilical cord milking, early cord clamping, maternal and neonatal outcome, preterm, abdominal delivery

Procedia PDF Downloads 241
242 A Biophysical Model of CRISPR/Cas9 on- and off-Target Binding for Rational Design of Guide RNAs

Authors: Iman Farasat, Howard M. Salis

Abstract:

The CRISPR/Cas9 system has revolutionized genome engineering by enabling site-directed and high-throughput genome editing, genome insertion, and gene knockdowns in several species, including bacteria, yeast, flies, worms, and human cell lines. This technology has the potential to enable human gene therapy to treat genetic diseases and cancer at the molecular level; however, the current CRISPR/Cas9 system suffers from seemingly sporadic off-target genome mutagenesis that prevents its use in gene therapy. A comprehensive mechanistic model that explains how the CRISPR/Cas9 functions would enable the rational design of the guide-RNAs responsible for target site selection while minimizing unexpected genome mutagenesis. Here, we present the first quantitative model of the CRISPR/Cas9 genome mutagenesis system that predicts how guide-RNA sequences (crRNAs) control target site selection and cleavage activity. We used statistical thermodynamics and law of mass action to develop a five-step biophysical model of cas9 cleavage, and examined it in vivo and in vitro. To predict a crRNA's binding specificities and cleavage rates, we then compiled a nearest neighbor (NN) energy model that accounts for all possible base pairings and mismatches between the crRNA and the possible genomic DNA sites. These calculations correctly predicted crRNA specificity across 5518 sites. Our analysis reveals that cas9 activity and specificity are anti-correlated, and, the trade-off between them is the determining factor in performing an RNA-mediated cleavage with minimal off-targets. To find an optimal solution, we first created a scheme of safe-design criteria for Cas9 target selection by systematic analysis of available high throughput measurements. We then used our biophysical model to determine the optimal Cas9 expression levels and timing that maximizes on-target cleavage and minimizes off-target activity. We successfully applied this approach in bacterial and mammalian cell lines to reduce off-target activity to near background mutagenesis level while maintaining high on-target cleavage rate.

Keywords: biophysical model, CRISPR, Cas9, genome editing

Procedia PDF Downloads 406
241 Exploring the Relationship Between Life Experiences and Early Relapse Among Imprisoned Users of Illegal Drugs in Oman: A Focused Ethnography

Authors: Hamida Hamed Said Al Harthi

Abstract:

Background: Illegal drug use is a rising problem that affects Omani youth. This research aimed to study a group of young Omani men who were imprisoned more than once for illegal drug use, focusing on exploring their lifestyle experiences inside and outside the prison and whether these contributed to their early relapse and re-imprisonment. This is the first study of its kind from Oman conducted in a prison setting. Methods: 19 Omani males aged 18–35 years imprisoned in Oman Central Prison were recruited using purposive sampling. Focused ethnography was conducted over 8 months to explore the drug-related experiences outside the prison and during imprisonment. Face-to-face semi-structured interviews with the participants yielded detailed transcripts and field notes. These were thematically analyzed, and the results were compared with the existing literature. Results: The participants’ voices yielded new insights into the lives of young Omani men imprisoned for illegal drug use, including their sufferings and challenges in prison. These included: entry shock, timing and boredom, drug trafficking in prison, as well as physical and psychological health issues. Overall, imprisonment was reported to have negatively impacted the participants’ health, personality, self-concept, emotions, attitudes, behavior and life expectations. The participants reported how their efforts to reintegrate into the Omani community after release from prison were rebuffed due to stigmatization and rejection from society and family. They also experienced frequent unemployment, police surveillance, accommodation problems and a lack of rehabilitation facilities. The immensity of the accumulated psychophysiological trauma contributed to their early relapse and re-imprisonment. Conclusion: This thesis concludes that imprisonment is largely ineffective in controlling drug use in Oman. Urgent action is required across multiple sectors to improve the lives and prospects of users of illegal drugs within and outside the prison to minimize factors contributing to early relapse. Key Words: illegal drugs, drug users, Oman, addiction, Omani culture, prisoners, relapse, re-imprisonment, qualitative research, ethnography.

Keywords: illigal drugs, Prison, Omani culture lifestyle, post prison life

Procedia PDF Downloads 80
240 Expounding the Evolution of the Proto-Femme Fatale and Its Correlation with the New Woman: A Close Study of David Mamet's Oleanna

Authors: Silvia Elias

Abstract:

The 'Femme Fatale' figure has become synonymous with a mysterious and seductive woman whose charms captivate her lovers into bonds of irresistible desire, often leading them to compromise or downfall. Originally, a Femme Fatale typically uses her beauty to lead men to their destruction but in modern literature, she represents a direct attack on traditional womanhood and the nuclear family as she refuses to abide by the pillars of mainstream society creating an image of a strong independent woman who defies the control of men and rejects the institution of the family. This research aims at discussing the differences and similarities between the femme fatale and the New Woman and how they are perceived by the audience. There is often confusion between the characteristics that define a New Woman and a Femme Fatale since both women desire independence, challenge typical gender role casting, push against the limits of the patriarchal society and take control of their sexuality. The study of the femme fatale remains appealing in modern times because the fear of gender equality gives life to modern femme fatale versions and post-modern literary works introduce their readers to new versions of the deadly seductress. One that does not fully depend on her looks to destroy men. The idea behind writing this paper was born from reading David Mamet's two-character play Oleanna (1992) and tracing the main female protagonist/antagonist's transformation from a helpless inarticulate girl into a powerful controlling negotiator who knows how to lead a bargain and maintain the upper hand.

Keywords: Circe, David, Eve, evolution, feminist, femme fatale, gender, Mamet, new, Odysseus, Oleanna, power, Salome, schema, seduction, temptress, woman

Procedia PDF Downloads 456
239 Assessment of Seeding and Weeding Field Robot Performance

Authors: Victor Bloch, Eerikki Kaila, Reetta Palva

Abstract:

Field robots are an important tool for enhancing efficiency and decreasing the climatic impact of food production. There exists a number of commercial field robots; however, since this technology is still new, the robot advantages and limitations, as well as methods for optimal using of robots, are still unclear. In this study, the performance of a commercial field robot for seeding and weeding was assessed. A research 2-ha sugar beet field with 0.5m row width was used for testing, which included robotic sowing of sugar beet and weeding five times during the first two months of the growing. About three and five percent of the field were used as untreated and chemically weeded control areas, respectively. The plant detection was based on the exact plant location without image processing. The robot was equipped with six seeding and weeding tools, including passive between-rows harrow hoes and active hoes cutting inside rows between the plants, and it moved with a maximal speed of 0.9 km/h. The robot's performance was assessed by image processing. The field images were collected by an action camera with a height of 2 m and a resolution 27M pixels installed on the robot and by a drone with a 16M pixel camera flying at 4 m height. To detect plants and weeds, the YOLO model was trained with transfer learning from two available datasets. A preliminary analysis of the entire field showed that in the areas treated by the robot, the weed average density varied across the field from 6.8 to 9.1 weeds/m² (compared with 0.8 in the chemically treated area and 24.3 in the untreated area), the weed average density inside rows was 2.0-2.9 weeds / m (compared with 0 on the chemically treated area), and the emergence rate was 90-95%. The information about the robot's performance has high importance for the application of robotics for field tasks. With the help of the developed method, the performance can be assessed several times during the growth according to the robotic weeding frequency. When it’s used by farmers, they can know the field condition and efficiency of the robotic treatment all over the field. Farmers and researchers could develop optimal strategies for using the robot, such as seeding and weeding timing, robot settings, and plant and field parameters and geometry. The robot producers can have quantitative information from an actual working environment and improve the robots accordingly.

Keywords: agricultural robot, field robot, plant detection, robot performance

Procedia PDF Downloads 87
238 The Structural Analysis of Out-of-Sequence Thrust: Insights from Chaura Thrust of Higher Himalaya in Himachal Pradesh, India

Authors: Rajkumar Ghosh

Abstract:

This paper focuses on the structural analysis of Chaura Thrust in Himachal Pradesh, India. It investigates mylonitised zones under microscopic observation, characterizes the box fold and its signature in the regional geology of Himachal Himalaya, and documents the Higher Himalayan Out-of-Sequence Thrust (OOST) in the region. The study aims to provide field evidence and documentation for Chaura Thrust (CT), which was previously considered a blind thrust. The research methodology involves geological field observation, microscopic studies, and strain analysis of oriented samples collected along the Jhakri-Chaura transect. The study presents findings such as the activation ages of MCT and STDS, the identification of mylonitised zones and various types of crenulated schistosity, and the manifestation of box folds and OOST. The presence of meso- and micro-scale box folds around Chaura suggests structural upliftment, while kink folds and shear sense indicators were identified. The research highlights the importance of microscopic studies and contributes to the understanding of the structural analysis of CT and its implications in the regional geology of the Himachal Himalaya. Mylonitised zones with S-C fabric were observed under the microscope, along with dynamic and bulging recrystallization and sub-grain formation. Various types of crenulated schistosity were documented, including a rare case of crenulation cleavage and sigmoid Muscovite occurring together. The conclusions emphasize the non-blind nature of Chaura Thrust, the characterization of box folds, the activation timing of different thrusts, and the significance of microscopic observations. Jhakri/Chaura/Sarahan thrusts are the zone of tectonic imbrication that transport Higher Himalayan gneissic rock on Rampur Quartzite. The evidence of frequent earthquakes and landslides in the Jhakri region confirm the study of morphometric conclusion that there is considerable neo-tectonic activity along an active fault in the Sutlej river basin. The study also documents the presence of OOST in Himachal Pradesh and its potential impact on strain accumulation.

Keywords: Main Central Thrust, Jhakri Thrust, Chaura Thrust, Higher Himalaya, Out-of-Sequence Thrust, Sarahan Thrust

Procedia PDF Downloads 87
237 Reliability of Dry Tissues Sampled from Exhumed Bodies in DNA Analysis

Authors: V. Agostini, S. Gino, S. Inturri, A. Piccinini

Abstract:

In cases of corpse identification or parental testing performed on exhumed alleged dead father, usually, we seek and acquire organic samples as bones and/or bone fragments, teeth, nails and muscle’s fragments. The DNA analysis of these cadaveric matrices usually leads to identifying success, but it often happens that the results of the typing are not satisfactory with highly degraded, partial or even non-interpretable genetic profiles. To aggravate the interpretative panorama deriving from the analysis of such 'classical' organic matrices, we must add a long and laborious treatment of the sample that starts from the mechanical fragmentation up to the protracted decalcification phase. These steps greatly increase the chance of sample contamination. In the present work, instead, we want to report the use of 'unusual' cadaveric matrices, demonstrating that their forensic genetics analysis can lead to better results in less time and with lower costs of reagents. We report six case reports, result of on-field experience, in which eyeswabs and cartilage were sampled and analyzed, allowing to obtain clear single genetic profiles, useful for identification purposes. In all cases we used the standard DNA tissue extraction protocols (as reported on the user manuals of the manufacturers such as QIAGEN or Invitrogen- Thermo Fisher Scientific), thus bypassing the long and difficult phases of mechanical fragmentation and decalcification of bones' samples. PCR was carried out using PowerPlex® Fusion System kit (Promega), and capillary electrophoresis was carried out on an ABI PRISM® 310 Genetic Analyzer (Applied Biosystems®), with GeneMapper ID v3.2.1 (Applied Biosystems®) software. The software Familias (version 3.1.3) was employed for kinship analysis. The genetic results achieved have proved to be much better than the analysis of bones or nails, both from the qualitative and quantitative point of view and from the point of view of costs and timing. This way, by using the standard procedure of DNA extraction from tissue, it is possible to obtain, in a shorter time and with maximum efficiency, an excellent genetic profile, which proves to be useful and can be easily decoded for later paternity tests and/or identification of human remains.

Keywords: DNA, eye swabs and cartilage, identification human remains, paternity testing

Procedia PDF Downloads 109
236 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis

Authors: Sherehan Hamdalla

Abstract:

Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.

Keywords: love crimes, victim, criminal, social media

Procedia PDF Downloads 76
235 The Effect of Transparent Oil Wood Stain on the Colour Stability of Spruce Wood during Weathering

Authors: Eliska Oberhofnerova, Milos Panek, Stepan Hysek, Martin Lexa

Abstract:

Nowadays the use of wood, both indoors and outdoors, is constantly increasing. However wood is a natural organic material and in the exterior is subjected to a degradation process caused by abiotic factors (solar radiation, rain, moisture, wind, dust etc.). This process affects only surface layers of wood but neglecting some of the basic rules of wood protection leads to increased possibility of biological agents attack and thereby influences a function of the wood element. The process of wood degradation can be decreased by proper surface treatment, especially in the case of less naturally durable wood species, as spruce. Modern coating systems are subjected to many requirements such as colour stability, hydrophobicity, low volatile organic compound (VOC) content, long service life or easy maintenance. The aim of this study is to evaluate the colour stability of spruce wood (Picea abies), as the basic parameter indicating the coating durability, treated with two layers of transparent natural oil wood stain and exposed to outdoor conditions. The test specimens were exposed for 2 years to natural weathering and 2000 hours to artificial weathering in UV-chamber. The colour parameters were measured before and during exposure to weathering by the spectrophotometer according to CIELab colour space. The comparison between untreated and treated wood and both testing procedures was carried out. The results showed a significant effect of coating on the colour stability of wood, as expected. Nevertheless, increasing colour changes of wood observed during the exposure to weathering differed according to applied testing procedure - natural and artificial.

Keywords: colour stability, natural and artificial weathering, spruce wood, transparent coating

Procedia PDF Downloads 220
234 University Under Terror: Explaining the Deviant Activities in the Tribhuvan University

Authors: Tek Nath Subedi

Abstract:

Violent activities used previously to erupt in specific societies owing to unequal, oppressive and unjust social practices have crossed out of their usual place of occurrence and entered the peace-zones such as schools and universities. The recent history of Universities in Nepal is marked with violent activities of students targeting to professors and other university officials. A student in a university is supposed to involve in scholarly activities and cooperate the teacher so as to achieve the academic degree and to enhance knowledge. Besides, the relationship between a teacher and a student is supposed to be the most sacred, which, in other words, is explained as the relationship between deity and devotee in a spiritual ground, carer and the kid in a moral ground, and mutually dependent in a functionalist view. Above all, the interdependence between teacher and student is illustrated as the two sides of the same coin. But the targeted attack on teachers and the degrading relationship between university and students raises serious questions on what makes a student violent and why the academia is terrorized. Therefore, this research aims to find the nexus of deviant activities of students to other social, political, economic and cultural areas of their life. To find possible answer of a few analytical questions, this paper takes an in-depth interview into consideration based on a snowball sampling and inquires some professors and officials how and why they are terrorized. It also reaches to some students who have witnessed or been part of any terror, following the same research method and ask them why violence has become recurring in the university and how university can be converted into a peace-zone. This research has simply hypothesized that the terror-inspired activities carried out by students in the university are the extended version of their deviant activities out of the university premises. But, it was found that the deviant activities of students were connected in particular to their culture and political identity.

Keywords: deviance, relationship, student, teacher, terror, university

Procedia PDF Downloads 65
233 Polymerization of Epsilon-Caprolactone Using Lipase Enzyme for Medical Applications

Authors: Sukanya Devi Ramachandran, Vaishnavi Muralidharan, Kavya Chandrasekaran

Abstract:

Polycaprolactone is polymer belonging to the polyester family that has noticeable characteristics of biodegradability and biocompatibility which is essential for medical applications. Polycaprolactone is produced by the ring opening polymerization of the monomer epsilon-Caprolactone (ε-CL) which is a closed ester, comprising of seven-membered ring. This process is normally catalysed by metallic components such as stannous octoate. It is difficult to remove the catalysts after the reaction, and they are also toxic to the human body. An alternate route of using enzymes as catalysts is being employed to reduce the toxicity. Lipase enzyme is a subclass of esterase that can easily attack the ester bonds of ε-CL. This research paper throws light on the extraction of lipase from germinating sunflower seeds and the activity of the biocatalyst in the polymerization of ε-CL. Germinating Sunflower seeds were crushed with fine sand in phosphate buffer of pH 6.5 into a fine paste which was centrifuged at 5000rpm for 10 minutes. The clear solution of the enzyme was tested for activity at various pH ranging from 5 to 7 and temperature ranging from 40oC to 70oC. The enzyme was active at pH6.0 and at 600C temperature. Polymerization of ε-CL was done using toluene as solvent with the catalysis of lipase enzyme, after which chloroform was added to terminate the reaction and was washed in cold methanol to obtain the polymer. The polymerization was done by varying the time from 72 hours to 6 days and tested for the molecular weight and the conversion of the monomer. The molecular weight obtained at 6 days is comparably higher. This method will be very effective, economical and eco-friendly to produce as the enzyme used can be regenerated as such at the end of the reaction and can be reused. The obtained polymers can be used for drug delivery and other medical applications.

Keywords: lipase, monomer, polycaprolactone, polymerization

Procedia PDF Downloads 296
232 Investigation for Pixel-Based Accelerated Aging of Large Area Picosecond Photo-Detectors

Authors: I. Tzoka, V. A. Chirayath, A. Brandt, J. Asaadi, Melvin J. Aviles, Stephen Clarke, Stefan Cwik, Michael R. Foley, Cole J. Hamel, Alexey Lyashenko, Michael J. Minot, Mark A. Popecki, Michael E. Stochaj, S. Shin

Abstract:

Micro-channel plate photo-multiplier tubes (MCP-PMTs) have become ubiquitous and are widely considered potential candidates for next generation High Energy Physics experiments due to their picosecond timing resolution, ability to operate in strong magnetic fields, and low noise rates. A key factor that determines the applicability of MCP-PMTs in their lifetime, especially when they are used in high event rate experiments. We have developed a novel method for the investigation of the aging behavior of an MCP-PMT on an accelerated basis. The method involves exposing a localized region of the MCP-PMT to photons at a high repetition rate. This pixel-based method was inspired by earlier results showing that damage to the photocathode of the MCP-PMT occurs primarily at the site of light exposure and that the surrounding region undergoes minimal damage. One advantage of the pixel-based method is that it allows the dynamics of photo-cathode damage to be studied at multiple locations within the same MCP-PMT under different operating conditions. In this work, we use the pixel-based accelerated lifetime test to investigate the aging behavior of a 20 cm x 20 cm Large Area Picosecond Photo Detector (LAPPD) manufactured by INCOM Inc. at multiple locations within the same device under different operating conditions. We compare the aging behavior of the MCP-PMT obtained from the first lifetime test conducted under high gain conditions to the lifetime obtained at a different gain. Through this work, we aim to correlate the lifetime of the MCP-PMT and the rate of ion feedback, which is a function of the gain of each MCP, and which can also vary from point to point across a large area (400 $cm^2$) MCP. The tests were made possible by the uniqueness of the LAPPD design, which allows independent control of the gain of the chevron stacked MCPs. We will further discuss the implications of our results for optimizing the operating conditions of the detector when used in high event rate experiments.

Keywords: electron multipliers (vacuum), LAPPD, lifetime, micro-channel plate photo-multipliers tubes, photoemission, time-of-flight

Procedia PDF Downloads 178
231 Arterial Line Use for Acute Type 2 Respiratory Failure

Authors: C. Scurr, J. Jeans, S. Srivastava

Abstract:

Introduction: Acute type two respiratory failure (T2RF) has become a common presentation over the last two decades primarily due to an increase in the prevalence of chronic lung disease. Acute exacerbations can be managed either medically or in combination with non-invasive ventilation (NIV) which should be monitored with regular arterial blood gas samples (ABG). Arterial lines allow more frequent arterial blood sampling with less patient discomfort. We present the experience from a teaching hospital emergency department (ED) and level 2 medical high-dependency unit (HDU) that together form the pathway for management of acute type 2 respiratory failure. Methods: Patients acutely presenting to Charing Cross Hospital, London, with T2RF requiring non-invasive ventilation (NIV) over 14 months (2011 to 2012) were identified from clinical coding. Retrospective data collection included: demographics, co-morbidities, blood gas numbers and timing, if arterial lines were used and who performed this. Analysis was undertaken using Microsoft Excel. Results: Coding identified 107 possible patients. 69 notes were available, of which 41 required NIV for type 2 respiratory failure. 53.6% of patients had an arterial line inserted. Patients with arterial lines had 22.4 ABG in total on average compared to 8.2 for those without. These patients had a similar average time to normalizing pH of (23.7 with arterial line vs 25.6 hours without), and no statistically significant difference in mortality. Arterial lines were inserted by Foundation year doctors, Core trainees, Medical registrars as well as the ICU registrar. 63% of these were performed by the medical registrar rather than ICU, ED or a junior doctor. This is reflected in that the average time until an arterial line was inserted was 462 minutes. The average number of ABGs taken before an arterial line was 2 with a range of 0 – 6. The average number of gases taken if no arterial line was ever used was 7.79 (range of 2-34) – on average 4 times as many arterial punctures for each patient. Discussion: Arterial line use was associated with more frequent arterial blood sampling during each inpatient admission. Additionally, patients with an arterial line have less individual arterial punctures in total and this is likely more comfortable for the patient. Arterial lines are normally sited by medical registrars, however this is normally after some delay. ED clinicians could improve patient comfort and monitoring thus allowing faster titration of NIV if arteral lines were regularly inserted in the ED. We recommend that ED doctors insert arterial lines when indicated in order improve the patient experience and facilitate medical management.

Keywords: non invasive ventilation, arterial blood gas, acute type, arterial line

Procedia PDF Downloads 428
230 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 114
229 Simulation of Optimum Sculling Angle for Adaptive Rowing

Authors: Pornthep Rachnavy

Abstract:

The purpose of this paper is twofold. First, we believe that there are a significant relationship between sculling angle and sculling style among adaptive rowing. Second, we introduce a methodology used for adaptive rowing, namely simulation, to identify effectiveness of adaptive rowing. For our study we simulate the arms only single scull of adaptive rowing. The method for rowing fastest under the 1000 meter was investigated by study sculling angle using the simulation modeling. A simulation model of a rowing system was developed using the Matlab software package base on equations of motion consist of many variation for moving the boat such as oars length, blade velocity and sculling style. The boat speed, power and energy consumption on the system were compute. This simulation modeling can predict the force acting on the boat. The optimum sculling angle was performing by computer simulation for compute the solution. Input to the model are sculling style of each rower and sculling angle. Outputs of the model are boat velocity at 1000 meter. The present study suggests that the optimum sculling angle exist depends on sculling styles. The optimum angle for blade entry and release with respect to the perpendicular through the pin of the first style is -57.00 and 22.0 degree. The optimum angle for blade entry and release with respect to the perpendicular through the pin of the second style is -57.00 and 22.0 degree. The optimum angle for blade entry and release with respect to the perpendicular through the pin of the third style is -51.57 and 28.65 degree. The optimum angle for blade entry and release with respect to the perpendicular through the pin of the fourth style is -45.84 and 34.38 degree. A theoretical simulation for rowing has been developed and presented. The results suggest that it may be advantageous for the rowers to select the sculling angles proper to sculling styles. The optimum sculling angles of the rower depends on the sculling styles made by each rower. The investigated of this paper can be concludes in three directions: 1;. There is the optimum sculling angle in arms only single scull of adaptive rowing. 2. The optimum sculling angles depend on the sculling styles. 3. Computer simulation of rowing can identify opportunities for improving rowing performance by utilizing the kinematic description of rowing. The freedom to explore alternatives in speed, thrust and timing with the computer simulation will provide the coach with a tool for systematic assessments of rowing technique In addition, the ability to use the computer to examine the very complex movements during rowing will help both the rower and the coach to conceptualize the components of movements that may have been previously unclear or even undefined.

Keywords: simulation, sculling, adaptive, rowing

Procedia PDF Downloads 465
228 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 314
227 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 153
226 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 168
225 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases

Authors: Xavier Bertrand, Alexandre Cayrel

Abstract:

The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.

Keywords: aerodynamics, lifting line, surrogate model, CFD

Procedia PDF Downloads 359
224 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 98