Search results for: internal attack
2263 Using Crude Actinidin Protease Extract of Kiwifruit to Improve Some Quality Attributes of Awassi Rams Meats
Authors: Hatem H.Saleh
Abstract:
The aim of the study was to examine the effect of different concentrations of crude actinidin enzyme extract from kiwifruit juice and distilled water on some quality attributes of Awassi rams meats. Twelve Awassi rams were divided into four groups, After exsanguinations of rams carcasses they were infused (10% body weight) with crude of actinidin enzyme extract of kiwifruit juice with 10 and 15% of extract, and other group was infused with distilled water and were compared with other groups a non infusion treatment which were acted as a control. Thereafter samples from two main muscles, namely longissimus dorsi (LD) and Semimembranosus (SM) of the carcasses was chilled then stored in freezing, until testing time . The results showed a decrease in the rate pH decline on LD and SM muscle which was measured at time (0, 3, 6, 9, 12, 24 hours) postmortem among different treatments, It also reported lower values of the rate pH on the LD and SM muscle during the first of 12 hrs postmortem. No significant differences of the rate internal meat temperature in LD and SM muscle were observed among treatments postmortem except decreased of internal meat temperature during 3 hours postmortem when treated with enzyme extract. The results recorded higher values of glycolysis rate (R-value) in LD and SM muscle when treated with enzyme extract. Treated LD and LM muscle samples with 10 and 15% of crude actinidin enzyme extract of kiwifruit juice led to improve water holding capacity and higher significant differences in total tyrosine/ tryptophan index (T.T/T) in LD and SM muscles comparison with treatment control. It could be concluded that extract of kiwifruit juice infusion is could be used to improve of meat tenderization.Keywords: extract of kiwifruit, decline of pH and Temperature , R-value, tyrosine / tryptophan index, sheep meat
Procedia PDF Downloads 5432262 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3352261 The Implantable MEMS Blood Pressure Sensor Model With Wireless Powering And Data Transmission
Authors: Vitaliy Petrov, Natalia Shusharina, Vitaliy Kasymov, Maksim Patrushev, Evgeny Bogdanov
Abstract:
The leading worldwide death reasons are ischemic heart disease and other cardiovascular illnesses. Generally, the common symptom is high blood pressure. Long-time blood pressure control is very important for the prophylaxis, correct diagnosis and timely therapy. Non-invasive methods which are based on Korotkoff sounds are impossible to apply often and for a long time. Implantable devices can combine longtime monitoring with high accuracy of measurements. The main purpose of this work is to create a real-time monitoring system for decreasing the death rate from cardiovascular diseases. These days implantable electronic devices began to play an important role in medicine. Usually implantable devices consist of a transmitter, powering which could be wireless with a special made battery and measurement circuit. Common problems in making implantable devices are short lifetime of the battery, big size and biocompatibility. In these work, blood pressure measure will be the focus because it’s one of the main symptoms of cardiovascular diseases. Our device will consist of three parts: the implantable pressure sensor, external transmitter and automated workstation in a hospital. The Implantable part of pressure sensors could be based on piezoresistive or capacitive technologies. Both sensors have some advantages and some limitations. The Developed circuit is based on a small capacitive sensor which is made of the technology of microelectromechanical systems (MEMS). The Capacitive sensor can provide high sensitivity, low power consumption and minimum hysteresis compared to the piezoresistive sensor. For this device, it was selected the oscillator-based circuit where frequency depends from the capacitance of sensor hence from capacitance one can calculate pressure. The external device (transmitter) used for wireless charging and signal transmission. Some implant devices for these applications are passive, the external device sends radio wave signal on internal LC circuit device. The external device gets reflected the signal from the implant and from a change of frequency is possible to calculate changing of capacitance and then blood pressure. However, this method has some disadvantages, such as the patient position dependence and static using. Developed implantable device doesn’t have these disadvantages and sends blood pressure data to the external part in real-time. The external device continuously sends information about blood pressure to hospital cloud service for analysis by a physician. Doctor’s automated workstation at the hospital also acts as a dashboard, which displays actual medical data of patients (which require attention) and stores it in cloud service. Usually, critical heart conditions occur few hours before heart attack but the device is able to send an alarm signal to the hospital for an early action of medical service. The system was tested with wireless charging and data transmission. These results can be used for ASIC design for MEMS pressure sensor.Keywords: MEMS sensor, RF power, wireless data, oscillator-based circuit
Procedia PDF Downloads 5892260 Wireless Sensor Anomaly Detection Using Soft Computing
Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh
Abstract:
We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.Keywords: IDS, Machine learning, WSN, ZigBee technology
Procedia PDF Downloads 5432259 Level of Grief, Emotional Impact and Coping Strategies of Internal Medicine Residents in Response to a Patient’s Death
Authors: Florge Francis A. Sy
Abstract:
Physicians develop emotional and psychological distress after facing a patient’s death. This can result in stress or burnout. Coping mechanisms in dealing with these deaths may be maladaptive. Determining grief, emotional impact, and coping strategies in physicians is necessary to identify those needing intervention. This can be done by employing validated assessment tools such as the Texas Revised Inventory of Grief (TRIG) scale, Impact of Events Scale (IES), and BriefCOPE tool, respectively. This prospective, observational study was done in a private hospital in Cebu City. Fifty-five internal medicine residents were included and tasked to answer a survey based on their most memorable patient death encounter. The TRIG, IES, and BriefCOPE scores were determined. Participants were divided into severe grief and non-severe grief based on TRIG scores, low-impact, moderate-impact, and high-impact based on IES, and low-use, moderate-use, and high-use based on the BriefCOPE. The differences in the groups’ characteristics were statistically determined, and a p-value of < 0.05 was significant. The participants’ average age was 28.45 years. Most were female and single. Most belonged to the non-severe group based on TRIG, a moderate-impact group based on the IES, and high-use group based on the BriefCOPE. However, 21.8% reported severe grief, 27.3% reported high-impact, and 10.9% had low use of coping strategies. The proportion of residents who encountered CPR prior to the patient’s death was greater in the severe group. Proportions of both high-impact and non-high impact groups were comparable. The proportion of female residents was higher in the high-use group. There were a number of residents who reported severe grief, high emotional impact, and low coping strategies. This highlights the need for interventions such as debriefing after CPR or formal training in residency programs in dealing with emotional burden to counteract maladaptive coping behaviors and prevent negative outcomes.Keywords: residents, grief, emotional impact, coping, patient death
Procedia PDF Downloads 1112258 The Impact of a Leadership Change on Individuals' Behaviour and Incentives: Evidence from the Top Tier Italian Football League
Authors: Kaori Narita, Juan de Dios Tena Horrillo, Claudio Detotto
Abstract:
Decisions on replacement of leaders are of significance and high prevalence in any organization, and concerns many of its stakeholders, whether it is a leader in a political party or a CEO of a firm, as indicated by high media coverage of such events. This merits an investigation into the consequences and implications of a leadership change on the performances and behavior of organizations and their workers. Sport economics provides a fruitful field to explore these issues due to the high frequencies of managerial changes in professional sports clubs and the transparency and regularity of observations of team performance and players’ abilities. Much of the existing research on managerial change focuses on how this affects the performance of an organization. However, there is scarcely attention paid to the consequences of such events on the behavior of individuals within the organization. Changes in behavior and attitudes of a group of workers due to a managerial change could be of great interest in management science, psychology, and operational research. On the other hand, these changes cannot be observed in the final outcome of the organization, as this is affected by many other unobserved shocks, for example, the stress level of workers with the need to deal with a difficult situation. To fill this gap, this study shows the first attempt to evaluate the impact of managerial change on players’ behaviors such as attack intensity, aggressiveness, and efforts. The data used in this study is from the top tier Italian football league (“Serie A”), where an average of 13 within season replacements of head coaches were observed over the period of seasons from 2000/2001 to 2017/18. The preliminary estimation employs Pooled Ordinary Least Square (POLS) and club-season Fixed Effect (FE) in order to assess the marginal effect of having a new manager on the number of shots, corners and red/yellow cards after controlling for a home-field advantage, ex ante abilities and current positions in the league of a team and their opponent. The results from this preliminary estimation suggest that the teams do not show a significant difference in their behaviors before and after the managerial change. To build on these preliminary results, other methods, including propensity score matching and non-linear model estimates, will be used. Moreover, the study will further investigate these issues by considering other measurements of attack intensity, aggressiveness, and efforts, such as possessions, a number of fouls and the athletic performance of players, respectively. Finally, the study is going to investigate whether these results vary over the characteristics of a new head coach, for example, their age and experience as a manager and a player. Thus far, this study suggests that certain behaviours of individuals in an organisation are not immediately affected by a change in leadership. To confirm this preliminary finding and lead to a more solid conclusion, further investigation will be conducted in the aforementioned manner, and the results will be elaborated in the conference.Keywords: behaviour, effort, manager characteristics, managerial change, sport economics
Procedia PDF Downloads 1342257 Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel
Authors: Altoumi Alndalusi
Abstract:
The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance.Keywords: cast, corrosion, duplex stainless, heat treatment, material, steel
Procedia PDF Downloads 1752256 In-Cylinder Exhaust Heat Recovery of an I. C. Engine Using Water Injection
Authors: Jayakrishnan U.
Abstract:
A concept of adding two strokes to a four stroke Otto or Diesel engine cycle presented here for the waste heat recovery in a four stroke internal combustion engine. Four stroke Diesel cycle and Otto cycle engines have very low thermal efficiency due to high amount of energy loss in exhaust and also on the cooling of the engine. It is estimated about 35 percent of fuel energy is lost in exhaust of engine and 30 percent in cooling of engine. So by modifying a four-stroke Otto or Diesel engine by adding two-stroke heat recovery steam cycle is presented here. Water injection is used to get an additional power stroke by partial compression of the exhaust gases at the end of third stroke in a four stroke I.C.Engine. It is the conversion of a four-stroke cycle to a six-stroke cycle. By taking a four stroke petrol engine of known dimensions, an ideal thermodynamic model is used to analyse and calculate the events of exhaust gas compression and following two strokes of water injection. By changing the exhaust valve closing timing during exhaust stroke and analysing it on various points, an optimum amount of exhaust gas re-compression and amount of water injection can be found for maximizing efficiency and fuel economy. It is achieved by changing the exhaust valve timing and finding an optimum amount of exhaust re-compression, maximizing the net mean effective pressure of the steam expansion stroke (MEPsteam). Specific fuel consumption of the engine also decreases increasing the fuel economy. The valve closing timings for maximum MEPsteam is limited by either 1 bar or dew point temperature of expansion gas or moisture mixture to avoid moisture formation. By modifying the four-stroke Otto or Diesel cycle by adding two water injection stroke has the potential to significantly increase the engine efficiency and fuel economy.Keywords: internal combustion engine, engine efficiency, six-stroke cycle, water injection, specific fuel consumption
Procedia PDF Downloads 3042255 Deradicalization for Former Terrorists through Entrepreneurship Program
Authors: Jamal Wiwoho, Pujiyono, Triyanto
Abstract:
Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.Keywords: deradicalization, terrorism, terrorists, entrepreneurship
Procedia PDF Downloads 2712254 Constitution and Self-Consciousness in Hegel's Philosophy
Authors: Akbar Jamali
Abstract:
According to Hegel’s philosophy, constitution of any given nation is the best expression of its national Self-Consciousness. Since constitution is the place in which freedom and Universal Rights is expressed, and since the essence of Self-consciousness is freedom, the development of self-consciousness and consequently freedom, is the direct cause of the development of constitution. Self-consciousness develops in the human history according to its own internal and external dialectic; therefore, it is essentially a dynamic phenomenon. However, constitution is supposed to be a stable foundation for the legal system of state and society. Therefore, the dilemma is: how the dynamic and contradictory nature of Self-Consciousness is the foundation of constitution that supposed to be the stable base of legal system of state and society. According to Hegel’s philosophy, the contradiction between the dynamic self- consciousness and the static constitution and state has an essential role in the formation of social movements within any given state. Self-consciousness is the phenomenology of Spirit in the human history. Subjective Spirit expresses itself in the different shapes of Self-consciousness in human spirit. These different shapes of self-consciousness must be identical with its contradiction; Objective Spirit. State is the highest form of the objective Spirit. Therefore, state and its foundation namely ‘constitution’ must be identical with Self-consciousness. "Spirit cannot remain forever alienated from its expression." Hegel states. Self-consciousness is the Subjective Spirit, it freely develops according to its internal and external contradictions, but since it must be always identical with its expression namely constitution, its development results to alienation. They way by which self-consciousness became again identical with the constitution determines the nature of legal and political development of any given society and state. In the democratic states, self-consciousness shows itself partially in the public opinion. In the process of election, this public opinion changes the ruling parties that construct the government. In democracies, self-consciousness or subjective spirit is in a dialectical relationship with state or the Objective Spirit. Therefore, it cannot remain alienated with its expression that is political system and its constitution. But, in the autocracies Self-consciousness cannot easily express itself in the government and its constitution. More Self-consciousness develops more it becomes alienated with its expression that is the state and its constitution. Rebel and revolution are the symptom of alienation of Spirit (self-consciousness) with its expression (state and its constitution).Keywords: alienation, constitution, self-consciousness, spirit
Procedia PDF Downloads 3622253 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3682252 Impact of Quality Assurance Mechanisms on the Work Efficiency of Staff in the Educational Space of Georgia
Authors: B. Gechbaia, K. Goletiani, G. Gabedava, N. Mikeltadze
Abstract:
At this stage, Georgia is a country which is actively involved in the European integration process, for which the primary priority is effective integration in the European education system. The modern Georgian higher education system is the process of establishing a new sociocultural reality, whose main priorities are determined by the Quality System as a continuous cycle of planning, implementation, checking and acting. Obviously, in this situation, the issue of management of education institutions comes out in the foreground, since the proper planning and implementation of personnel management processes is one of the main determinants of the company's performance. At the same time, one of the most important factors is the psychological comfort of the personnel, ensuring their protection and efficiency of stress management policy. The purpose of this research is to determine how intensely the relationship is between the psychological comfort of the personnel and the efficiency of the quality system in the institution as the quality assurance mechanisms of educational institutions affect the stability of personnel, prevention and management of the stressful situation. The research was carried out within the framework of the Internal Grant Project «The Role of Organizational Culture in the Process of Settlement of Management of Stress and Conflict, Georgian Reality and European Experience » of the Batumi Navigation Teaching University, based on the analysis of the survey results of target groups. The small-scale research conducted by us has revealed that the introduction of quality assurance system and its active implementation increased the quality of management of Georgian educational institutions, increased the level of universal engagement in internal and external processes and as a result, it has improved the quality of education as well as social and psychological comfort indicators of the society.Keywords: quality assurance, effective management, stability of personnel, psychological comfort, stress management
Procedia PDF Downloads 1552251 Developing Research Involving Different Species: Opportunities and Empirical Foundations
Authors: A. V. Varfolomeeva, N. S. Tkachenko, A. G. Tishchenko
Abstract:
The problem of violation of internal validity in studies of psychological structures is considered. The role of epistemological attitudes of researchers in the planning of research within the methodology of the system-evolutionary approach is assessed. Alternative programs of psychological research involving representatives of different biological species are presented. On the example of the results of two research series the variants of solving the problem are discussed.Keywords: epistemological attitudes, experimental design, validity, psychological structure, learning
Procedia PDF Downloads 1152250 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 962249 Resolving Increased Water-Cut in South and East Kuwait Areas through Water Knock-Out Facility Project
Authors: Sunaitan Al Mutairi, Kumar Vallatharasu, Batool Ismaeel
Abstract:
The Water Knock-Out (WKO) facility project is to handle the undesirable impact of the increasing water production rate in South and East Kuwait (S&EK) areas and break the emulsions and ensure sufficient separation of water at the new upstream facility, to reduce the load on the existing separation equipment in the Gathering Centers (GC). As the existing separation equipment in the Gathering Centers are not efficient to separate the emulsions, the Compact Electrostatic Coalescer (CEC) and Vessel Internal Electrostatic Coalescer (VIEC) technologies have been selected for enhancing the liquid-liquid separation by using the alternating voltage/frequency on electrical fields, to handle the increasing water-cut in S&EK. In the Compact Electrostatic Coalescer (CEC) technology method, the CEC equipment is installed downstream of the inlet separator externally, whereas in the Vessel Internal Electrostatic Coalescer (VIEC) technology method, the VIEC is built inside the treater vessel, downstream of the inlet separator with advanced internals for implementing electrocoalescence of water particles and hence enhancing liquids separation. The CEC and VIEC technologies used in the Water Knockout Facility project has the ability to resolve the increasing water cut in the S&EK area and able to enhance the liquid-liquid separation in the WKO facility separation equipment. In addition, the WKO facility is minimizing the load on the existing Gathering Center’s separation equipment, by tackling the high water-cut wells, upstream of each GC. The required performances at the outlet of the WKO facility are Oil in Water 100ppmv, Water in Oil 15% volume, liquid carryover in gas 0.1 US gal/MMSCFD, for the water cut ranging from 37.5 to 75% volume. The WKO facility project is used to sustain, support and maintain Greater Burgan production at 1.7 Million Barrels of Oil Per Day (MMBOPD), by handling the increasing water production rate.Keywords: emulsion, increasing water-cut, production, separation equipment
Procedia PDF Downloads 2452248 Comparison between the Performances of Different Boring Bars in the Internal Turning of Long Overhangs
Authors: Wallyson Thomas, Zsombor Fulop, Attila Szilagyi
Abstract:
Impact dampers are mainly used in the metal-mechanical industry in operations that generate too much vibration in the machining system. Internal turning processes become unstable during the machining of deep holes, in which the tool holder is used with long overhangs (high length-to-diameter ratios). The devices coupled with active dampers, are expensive and require the use of advanced electronics. On the other hand, passive impact dampers (PID – Particle Impact Dampers) are cheaper alternatives that are easier to adapt to the machine’s fixation system, once that, in this last case, a cavity filled with particles is simply added to the structure of the tool holder. The cavity dimensions and the diameter of the spheres are pre-determined. Thus, when passive dampers are employed during the machining process, the vibration is transferred from the tip of the tool to the structure of the boring bar, where it is absorbed by the fixation system. This work proposes to compare the behaviors of a conventional solid boring bar and a boring bar with a passive impact damper in turning while using the highest possible L/D (length-to-diameter ratio) of the tool and an Easy Fix fixation system (also called: Split Bushing Holding System). It is also intended to optimize the impact absorption parameters, as the filling percentage of the cavity and the diameter of the spheres. The test specimens were made of hardened material and machined in a Computer Numerical Control (CNC) lathe. The laboratory tests showed that when the cavity of the boring bar is totally filled with minimally spaced spheres of the largest diameter, the gain in absorption allowed of obtaining, with an L/D equal to 6, the same surface roughness obtained when using the solid boring bar with an L/D equal to 3.4. The use of the passive particle impact damper resulted in, therefore, increased static stiffness and reduced deflexion of the tool.Keywords: active damper, fixation system, hardened material, passive damper
Procedia PDF Downloads 2202247 Plasma Actuator Application to Control Surfaces of a Model Aircraft
Authors: Yuta Moriyama, Etsuo Morishita
Abstract:
Plasma actuator is very effective to recover stall flows over an upper airfoil surface. We first manufacture the actuator, test the stability of the device by trial and error basis and find the conditions for steady operations. We visualize the flow around an airfoil in the smoke tunnel and observe the stall recovery. The plasma actuator is stationary device and has no moving parts, and it might be an ideal device to control a model aircraft. We can use the actuator not only as a stall recovery device but also as a spoiler. We put the actuator near the leading edge of an elevator of a model aircraft as a spoiler, and measure the aerodynamic forces by a three-component balance. We observe the effect of the plasma actuator on the aerodynamic forces and the device effectiveness changes depending on the angle of attack whether it is positive or negative. We also visualize the flow caused by the plasma actuator by a desk-top Schlieren photography which is otherwise very difficult in a low-speed wind tunnel experiment.Keywords: aerodynamics, plasma actuator, model aircraft, wind tunnel
Procedia PDF Downloads 3732246 Agent-Based Modeling Investigating Self-Organization in Open, Non-equilibrium Thermodynamic Systems
Authors: Georgi Y. Georgiev, Matthew Brouillet
Abstract:
This research applies the power of agent-based modeling to a pivotal question at the intersection of biology, computer science, physics, and complex systems theory about the self-organization processes in open, complex, non-equilibrium thermodynamic systems. Central to this investigation is the principle of Maximum Entropy Production (MEP). This principle suggests that such systems evolve toward states that optimize entropy production, leading to the formation of structured environments. It is hypothesized that guided by the least action principle, open thermodynamic systems identify and follow the shortest paths to transmit energy and matter, resulting in maximal entropy production, internal structure formation, and a decrease in internal entropy. Concurrently, it is predicted that there will be an increase in system information as more information is required to describe the developing structure. To test this, an agent-based model is developed simulating an ant colony's formation of a path between a food source and its nest. Utilizing the Netlogo software for modeling and Python for data analysis and visualization, self-organization is quantified by calculating the decrease in system entropy based on the potential states and distribution of the ants within the simulated environment. External entropy production is also evaluated for information increase and efficiency improvements in the system's action. Simulations demonstrated that the system begins at maximal entropy, which decreases as the ants form paths over time. A range of system behaviors contingent upon the number of ants are observed. Notably, no path formation occurred with fewer than five ants, whereas clear paths were established by 200 ants, and saturation of path formation and entropy state was reached at populations exceeding 1000 ants. This analytical approach identified the inflection point marking the transition from disorder to order and computed the slope at this point. Combined with extrapolation to the final path entropy, these parameters yield important insights into the eventual entropy state of the system and the timeframe for its establishment, enabling the estimation of the self-organization rate. This study provides a novel perspective on the exploration of self-organization in thermodynamic systems, establishing a correlation between internal entropy decrease rate and external entropy production rate. Moreover, it presents a flexible framework for assessing the impact of external factors like changes in world size, path obstacles, and friction. Overall, this research offers a robust, replicable model for studying self-organization processes in any open thermodynamic system. As such, it provides a foundation for further in-depth exploration of the complex behaviors of these systems and contributes to the development of more efficient self-organizing systems across various scientific fields.Keywords: complexity, self-organization, agent based modelling, efficiency
Procedia PDF Downloads 682245 The Impact of Board Characteristics on Firm Performance: Evidence from Banking Industry in India
Authors: Manmeet Kaur, Madhu Vij
Abstract:
The Board of Directors in a firm performs the primary role of an internal control mechanism. This Study seeks to understand the relationship between internal governance and performance of banks in India. The research paper investigates the effect of board structure (proportion of nonexecutive directors, gender diversity, board size and meetings per year) on the firm performance. This paper evaluates the impact of corporate governance mechanisms on bank’s financial performance using panel data for 28 listed banks in National Stock Exchange of India for the period of 2008-2014. Returns on Asset, Return on Equity, Tobin’s Q and Net Interest Margin were used as the financial performance indicators. To estimate the relationship among governance and bank performance initially the Study uses Pooled Ordinary Least Square (OLS) Estimation and Generalized Least Square (GLS) Estimation. Then a well-developed panel Generalized Method of Moments (GMM) Estimator is developed to investigate the dynamic nature of performance and governance relationship. The Study empirically confirms that two-step system GMM approach controls the problem of unobserved heterogeneity and endogeneity as compared to the OLS and GLS approach. The result suggests that banks with small board, boards with female members, and boards that meet more frequently tend to be more efficient and subsequently have a positive impact on performance of banks. The study offers insights to policy makers interested in enhancing the quality of governance of banks in India. Also, the findings suggest that board structure plays a vital role in the improvement of corporate governance mechanism for financial institutions. There is a need to have efficient boards in banks to improve the overall health of the financial institutions and the economic development of the country.Keywords: board of directors, corporate governance, GMM estimation, Indian banking
Procedia PDF Downloads 2602244 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 872243 Investigating the Molecular Behavior of H₂O in Caso 4 -2h₂o Two-Dimensional Nanoscale System
Authors: Manal Alhazmi, Artem Mishchenko
Abstract:
A molecular fluids' behavior and interaction with other materials at the nanoscale is a complex process. Nanoscale fluids behave so differently than macroscale fluids and interact with other materials in unique ways. It is, therefore, feasible to understand the molecular behavior of H₂O in such two-dimensional nanoscale systems by studying (CaSO4-2H2O), commonly known as gypsum. In the present study, spectroscopic measurements on a 2D structure of exfoliated gypsum crystals are carried out by Raman and IR spectroscopy. An array of gypsum flakes with thicknesses ranging from 8nm to 100nm were observed and analyzed for their Raman and IR spectrum. Water molecules stretching modes spectra lines were also measured and observed in nanoscale gypsum flakes and compared with those of bulk crystals. CaSO4-2H2O crystals have Raman and infrared bands at 3341 cm-1 resulting from the weak hydrogen bonds between the water molecules. This internal vibration of water molecules, together with external vibrations with other atoms, are responsible for these bands. There is a shift of about 70 cm-1 In the peak position of thin flakes with respect to the bulk crystal, which is a result of the different atomic arrangement from bulk to thin flake on the nano scale. An additional peak was observed in Raman spectra around 2910-3137 cm⁻¹ in thin flakes but is missing in bulk crystal. This additional peak is attributed to a combined mode of water internal (stretching mode at 3394cm⁻¹) and external vibrations. In addition to Raman and infra- red analysis of gypsum 2D structure, electrical measurements were conducted to reveal the water molecules transport behavior in such systems. Electrical capacitance of the fabricated device is measured and found to be (0.0686 *10-12) F, and the calculated dielectric constant (ε) is (12.26).Keywords: gypsum, infra-red spectroscopy, raman spectroscopy, H₂O behavior
Procedia PDF Downloads 1032242 Psychometric Properties of the Social Skills Rating System: Teacher Version
Authors: Amani Kappi, Ana Maria Linares, Gia Mudd-Martin
Abstract:
Children with Attention Deficit Hyperactivity Disorder (ADHD) are more likely to develop social skills deficits that can lead to academic underachievement, peer rejection, and maladjustment. Surveying teachers about children's social skills with ADHD will become a significant factor in identifying whether the children will be diagnosed with social skills deficits. The teacher-specific version of the Social Skills Rating System scale (SSRS-T) has been used as a screening tool for children's social behaviors. The psychometric properties of the SSRS-T have been evaluated in various populations and settings, such as when used by teachers to assess social skills for children with learning disabilities. However, few studies have been conducted to examine the psychometric properties of the SSRS-T when used to assess children with ADHD. The purpose of this study was to examine the psychometric properties of the SSRS-T and two SSRS-T subscales, Social Skills and Problem Behaviors. This was a secondary analysis of longitudinal data from the Fragile Families and Child Well-Being Study. This study included a sample of 194 teachers who used the SSRS-T to assess the social skills of children aged 8 to 10 years with ADHD. Exploratory principal components factor analysis was used to assess the construct validity of the SSRS-T scale. Cronbach’s alpha value was used to assess the internal consistency reliability of the total SSRS-T scale and the subscales. Item analyses included item-item intercorrelations, item-to-subscale correlations, and Cronbach’s alpha value changes with item deletion. The results of internal consistency reliability for both the total scale and subscales were acceptable. The results of the exploratory factor analysis supported the five factors of SSRS-T (Cooperation, Self-control, Assertion, Internalize behaviors, and Externalize behaviors) reported in the original version. Findings indicated that SSRS-T is a reliable and valid tool for assessing the social behaviors of children with ADHD.Keywords: ADHD, children, social skills, SSRS-T, psychometric properties
Procedia PDF Downloads 1312241 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2212240 Formulation of the N-Acylethanolamine, Linoleoylethanolamide into Cubosomes for Delivery across the Blood-Brain Barrier
Authors: Younus Mohammad, Anita B. Fallah, Ben J. Boyd, Shakila B. Rizwan
Abstract:
N-acylethanolamines (NAEs) are endogenous lipids, which have neuromodulatory properties. NAEs have shown neuroprotective properties in various neurodegenerative diseases including Alzheimer's disease, Parkinson's disease and ischemic stroke. However, NAEs are eliminated rapidly in vivo by enzymatic hydrolysis. We propose to encapsulate NAEs in liquid crystalline nanoparticles (cubosomes) to increase their biological half-life and explore their therapeutic potential. Recently, we have reported the co-formulation and nanostructural characterization of cubosomes containing the NAE, oleoylethanolamide and a synthetic cubosome forming lipid phytantriol. Here, we report on the formulation of cubosomes with the NAE, linoleoylethanolamide (LEA) as the core cubosome forming lipid. LEA-cubosomes were formulated in the presence of three different steric stabilisers: two brain targeting ligands, Tween 80 and Pluronic P188 and a control, Pluronic F127. Size, morphology and internal structure of formulations were characterized by dynamic light scattering (DLS), cryogenic transmission electron microscopy (Cryo–TEM) and small angle X–ray scattering (SAXS), respectively. Chemical stability of LEA in formulations was investigated using high-performance liquid chromatography (HPLC). Cytotoxicity of formulations towards human cerebral microvascular endothelial cell line (hCMEC/D3) was also investigated using an MTT (3-[4, 5- dimethylthiazol-2-yl]-2, 5-diphenyl tetrazolium bromide) assay. All cubosome formulations had mean particle size of less than 250 nm and were uniformly distributed with polydispersity indices less than 0.2. Cubosomes produced had a bicontinuous cubic internal structure with an Im3m space group but different lattice parameters, indicating the different modes of interaction between the stabilisers and LEA. LEA in formulations was found to be chemically stable. At concentrations of up to 20 µg/mL LEA in the presence of all the stabilisers, greater than 80% cell viability was observed.Keywords: blood-brain barrier, cubosomes, linoleoyl ethanolamide, N-acylethanolamines (NAEs)
Procedia PDF Downloads 2032239 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia
Authors: Andrew D. Henshaw
Abstract:
The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism
Procedia PDF Downloads 3132238 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 2322237 Workplace Development Programmes for Small and Medium-Sized Enterprises in Europe and Singapore: A Conceptual Study
Authors: Zhan Jie How
Abstract:
With the heightened awareness of workplace learning and its impact on improving organizational performance and developing employee competence, governments and corporations around the world are forced to intensify their cooperation to establish national workplace development programmes to guide these corporations in fostering engaging and collaborative workplace learning cultures. This conceptual paper aims to conduct a comparative study of existing workplace development programmes for small and medium-sized enterprises (SMEs) in Europe and Singapore, focusing primarily on the Swedish Production Leap, Finnish TEKES Liideri Programme, and Singapore SkillsFuture SME Mentors Programme. The study carries out a systematic review of the three workplace development programmes to examine the roles of external mentors or coaches in influencing the design and implementation of workplace learning strategies and practices in SMEs. Organizational, personal and external factors that promote or inhibit effective workplace mentorship are also scrutinized, culminating in a critical comparison and evaluation of the strengths and weaknesses of the aforementioned programmes. Based on the findings from the review and analyses, a heuristic conceptual framework is developed to illustrate the complex interrelationships among external workplace development programmes, internal learning and development initiatives instituted by the organization’s higher management, and employees' continuous learning activities at the workplace. The framework also includes a set of guiding principles that can be used as the basis for internal mediation between the competing perspectives of mentors and mentees (employers and employees of the organization) regarding workplace learning conditions, practices and their intended impact on the organization. The conceptual study provides a theoretical blueprint for future empirical research on organizational workplace learning and the impact of government-initiated workplace development programmes.Keywords: employee competence, mentorship, organizational performance, workplace development programme, workplace learning culture
Procedia PDF Downloads 1412236 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1532235 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3022234 Rock-Bed Thermocline Storage: A Numerical Analysis of Granular Bed Behavior and Interaction with Storage Tank
Authors: Nahia H. Sassine, Frédéric-Victor Donzé, Arnaud Bruch, Barthélemy Harthong
Abstract:
Thermal Energy Storage (TES) systems are central elements of various types of power plants operated using renewable energy sources. Packed bed TES can be considered as a cost–effective solution in concentrated solar power plants (CSP). Such a device is made up of a tank filled with a granular bed through which heat-transfer fluid circulates. However, in such devices, the tank might be subjected to catastrophic failure induced by a mechanical phenomenon known as thermal ratcheting. Thermal stresses are accumulated during cycles of loading and unloading until the failure happens. For instance, when rocks are used as storage material, the tank wall expands more than the solid medium during charge process, a gap is created between the rocks and tank walls and the filler material settles down to fill it. During discharge, the tank contracts against the bed, resulting in thermal stresses that may exceed the wall tank yield stress and generate plastic deformation. This phenomenon is repeated over the cycles and the tank will be slowly ratcheted outward until it fails. This paper aims at studying the evolution of tank wall stresses over granular bed thermal cycles, taking into account both thermal and mechanical loads, with a numerical model based on the discrete element method (DEM). Simulations were performed to study two different thermal configurations: (i) the tank is heated homogeneously along its height or (ii) with a vertical gradient of temperature. Then, the resulting loading stresses applied on the tank are compared as well the response of the internal granular material. Besides the study of the influence of different thermal configurations on the storage tank response, other parameters are varied, such as the internal angle of friction of the granular material, the dispersion of particles diameters as well as the tank’s dimensions. Then, their influences on the kinematics of the granular bed submitted to thermal cycles are highlighted.Keywords: discrete element method (DEM), thermal cycles, thermal energy storage, thermocline
Procedia PDF Downloads 402