Search results for: internal sulfate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3306

Search results for: internal sulfate attack

2466 Long Term Follow-Up, Clinical Outcomes and Quality of Life after Total Arterial Revascularisation versus Conventional Coronary Surgery: A Retrospective Study

Authors: Jitendra Jain, Cassandra Hidajat, Hansraj Riteesh Bookun

Abstract:

Graft patency underpins long-term prognosis after coronary artery bypass grafting surgery (CABG). The benefits of the combined use of only the left internal mammary artery and radial artery, referred to as total arterial revascularisation (TAR), on long-term clinical outcomes and quality of life are relatively unknown. The aim of this study was to identify whether there were differences in long term clinical outcomes between recipients of TAR compared to a cohort of mostly arterial revascularization involving the left internal mammary, at least one radial artery and at least one saphenous vein graft. A retrospective analysis was performed on all patients who underwent TAR or were re-vascularized with supplementary saphenous vein graft from February 1996 to December 2004. Telephone surveys were conducted to obtain clinical outcome parameters including major adverse cardiac and cerebrovascular events (MACCE) and Short Form (SF-36v2) Health Survey responses. A total of 176 patients were successfully contacted to obtain postop follow up results. The mean follow-up length from time of surgery in our study was TAR 12.4±1.8 years and conventional 12.6±2.1. PCS score was TAR 45.9±8.8 vs LIMA/Rad/ SVG 44.9±9.2 (p=0.468) and MCS score was TAR 52.0±8.9 vs LIMA/Rad/SVG 52.5±9.3 (p=0.723). There were no significant differences between groups for NYHA class 3+ TAR 9.4% vs. LIMA/Rad/SVG 6.6%; or CCS 3+ TAR 2.35% vs. LIMA/Rad/SVG 0%.

Keywords: CABG; MACCEs; quality of life; total arterial revascularisation

Procedia PDF Downloads 217
2465 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 238
2464 Migrant Women’s Rights “with Chinese Characteristics: The State of Migrant Women in the People’s Republic of China

Authors: Leigha C. Crout

Abstract:

This paper will investigate the categorical disregard of the People’s Republic of China (PRC) in establishing and maintaining a baseline standard of civil guarantees for economic migrant women and their dependents. In light of the relative forward strides in terms of policy facilitating the ascension of female workers in China, this oft-invisible subgroup of women remains neglected from the modern-day “iron rice bowl” of the self-identified communist state. This study is being undertaken to rectify the absence of data on this subject and provide a baseline for future studies on the matter, as the human rights of migrants has become an established facet of transnational dialogue and debate. The basic methodology of this research will consist of the evaluation of China’s compliance with its own national guidelines, and the eight international human rights law treaties it has ratified. Data will be extracted and cross-checked from a number of relevant sources to monitor the extent of compliance, including but by no means limited to the United Nations Human Rights Council (UNHRC) Universal Periodic Review (UPR) reports and responses, submissions and responses of international human rights treaty bodies, local and international nongovernmental organizations (NGOs) and their annual reports, and articles and commentaries authored by specialists on the modern state and implementation of Chinese law. Together, these data will illuminate the vast network of compliance that has forced many migrant women to work within situations of extreme economic precarity. The structure will proceed as follows: first, an outline of the current status of migrant workers and the enforcement of stipulated protections will be provided; next, the analysis of the oft-debated regulations directing and the outline of mandatory services guaranteed to external and internal migrants; and finally, a conclusion incorporating various recommendations to improve transparency and gradually decrease the amount of migrant work turned forced labor that typifies the economic migrant experience, especially in the case of women. The internal and international migrant workers in China are bound by different and uncomplimentary systems. The first, which governs Chinese citizens moving to different regions or provinces to find more sustainable employment (internal migrants), is called the hukou (or huji) residency system. This law enforces strict regulation of the movement of peoples, while ensuring that residents of urban areas receive preferential benefits to those received by their so-called “agricultural” resident counterparts. Given the overwhelming presence of the Communist Party of China throughout the vast state, the management of internal migrants and the disregard for foreign domestic workers is, at minimum, a surprising oversight. This paper endeavors to provide a much-needed foundation for future commentary and discussion on the treatment of female migrant workers and their families in the People’s Republic of China.

Keywords: female migrant worker’s rights, the People’s Republic of China, forced labor, Hukou residency system

Procedia PDF Downloads 146
2463 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report

Authors: Khaled Alabduljabbar

Abstract:

Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.

Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy

Procedia PDF Downloads 89
2462 An investigation of Leading Edge and Trailing Edge Corrugation for Low Reynolds Number Application

Authors: Syed Hassan Raza Shah, Mohammad Mohammad Ali

Abstract:

The flow over a smoothly profiled airfoil at a low Reynolds number is highly susceptible to separate even at a very low angle of attack. An investigation was made to study the effect of leading-edge and trailing-edge corrugation with the spanwise change in the ridges resulted due to the change in the chord length for an infinite wing. The wind tunnel results using NACA0018 wings revealed that leading and trailing edge corrugation did not have any benefit in terms of aerodynamic efficiency or delayed stall. The leading edge and trailing edge corrugation didn't change the lift curve slope, with the leading edge corrugation wing stalling first in the range of Reynolds number of 50,000 to 125,000.

Keywords: leading and trailing edge corrugations, low reynolds number, wind tunnel testing, NACA0018

Procedia PDF Downloads 291
2461 Optimization Technique for the Contractor’s Portfolio in the Bidding Process

Authors: Taha Anjamrooz, Sareh Rajabi, Salwa Bheiry

Abstract:

Selection between the available projects in bidding processes for the contractor is one of the essential areas to concentrate on. It is important for the contractor to choose the right projects within its portfolio during the tendering stage based on certain criteria. It should align the bidding process with its origination strategies and goals as a screening process to have the right portfolio pool to start with. Secondly, it should set the proper framework and use a suitable technique in order to optimize its selection process for concertation purpose and higher efforts during the tender stage with goals of success and winning. In this research paper, a two steps framework proposed to increase the efficiency of the contractor’s bidding process and the winning chance of getting the new projects awarded. In this framework, initially, all the projects pass through the first stage screening process, in which the portfolio basket will be evaluated and adjusted in accordance with the organization strategies to the reduced version of the portfolio pool, which is in line with organization activities. In the second stage, the contractor uses linear programming to optimize the portfolio pool based on available resources such as manpower, light equipment, heavy equipment, financial capability, return on investment, and success rate of winning the bid. Therefore, this optimization model will assist the contractor in utilizing its internal resource to its maximum and increase its winning chance for the new project considering past experience with clients, built-relation between two parties, and complexity in the exertion of the projects. The objective of this research will be to increase the contractor's winning chance in the bidding process based on the success rate and expected return on investment.

Keywords: bidding process, internal resources, optimization, contracting portfolio management

Procedia PDF Downloads 142
2460 Relation between Chronic Mechanical Low Back Pain and Hip Rotation

Authors: Mohamed M. Diab, Koura G. Mohamed, A. Balbaa, Radwan Sh. Ahamed

Abstract:

Background: Chronic mechanical low back pain (CMLBP) is the most common complaint of the working-age population. Mechanical low back pain is often a chronic, dull, aching pain of varying intensity that affects the lower spine. In the current proposal the hip rotation-CMLBP relationship is based on that limited hip motion will be compensated by motion in the lumbopelvic region and this increase force translates to the lumbar spine. The purpose of this study was to investigate if there a relationship between chronic mechanical low back pain (CMLBP) and hip medial and lateral rotation (peak torque and Range of motion (ROM) in patients with CMLBP. Methods: Sixty patients with CMLBP diagnosed by an orthopedist participated in the current study after signing a consent form. Their mean of age was (23.76±2.39) years, mean of weight (71.8±12.7) (Kg), mean of height (169.65±7.49) (Cm) and mean of BMI (25.5±3.86) (Kg/m2). Visual Analogue Scale (VAS) was used to assess pain. Fluid Filled Inclinometer was used to measure Hip rotation ROM (medial and lateral). Isokinetic Dynamometer was used to measure peak torque of hip rotators muscles (medial and lateral), concentric peak torque with tow Isokinetic speeds (60ᵒ/sec and 180ᵒ/sec) was selected to measure peak torque. Results: The results of this study demonstrated that there is poor relationship between pain and hip external rotation ROM, also there is poor relation between pain and hip internal rotation ROM. There is poor relation between pain and hip internal rotators peak torque and hip external rotators peak torque in both speeds. Conclusion: Depending on the current study it is not recommended to give an importance to hip rotation in treating Chronic Mechanical Low Back Pain.

Keywords: hip rotation ROM, hip rotators strength, low back pain, chronic mechanical

Procedia PDF Downloads 311
2459 Providing a Proposed Framework for the Copyright of Library Resources in Iran: A Comparative Study of the Copyright Laws of Iran, Australia and U.S.

Authors: Zeinab Papi

Abstract:

This study was aimed at analyzing the copyright laws of Iran, Australia, the U.S., and library portals, thereby providing a proposed framework for the copyright of library resources for the NLAI and other Iranian libraries while considering the current situation and the internal Iranian laws. This is an applied study falling in the category of qualitative approach research. Documentary analysis method and comparative method were used to resolve the problem and answer the questions of the research. The two National Library of Australia (NLA) and Library of Congress (LC), together with the NLAI formed the research community. In addition, the Iranian Law for the Protection of Authors, Composers and Artists Rights (1970); the Australian Copyright Act (1968), and the U.S. Copyright Law (1976) were purposefully selected as three main resources among other documents and resources. Findings revealed that the dimensions of fair and non-profit use, duration of copyright, license, and agreement, copyright policy, moral rights, economic rights, and infringement of copyright were the main dimensions that, along with 49 main components, formed the proposed framework for the copyright of information resources for the NLAI and other Iranian libraries. It should be acknowledged that there are some differences in different copyright fields between countries' laws, and each country takes into account its internal conditions to compile and revise the laws. By following the laws of other countries, it is possible to effectively improve and develop copyright laws. The researcher hopes that this research can have its effects in creating awareness and ability among librarians, formulating a copyright policy in Iranian libraries, and helping legislators in revising copyright laws regarding library exceptions and exemptions.

Keywords: copyright, library resources, National Library and Archives of the I.R. of Iran, National Library of Australia, Library of Congress, copyright law

Procedia PDF Downloads 75
2458 The Impact of Migrants’ Remittances on Household Poverty and Income Inequality: A Case Study of Mazar-i-Sharif, Balkh Province, Afghanistan

Authors: Baqir Khawari

Abstract:

This study critically examines the influence of remittances on household poverty and income inequality in Mazar-i-Sharif, Balkh Province, Afghanistan, utilizing robust OLS and Logit models with a rigorous multi-random sampling method. The empirical findings reveal that a 1% increase in per capita international remittances is associated with a substantial 0.071% and 0.059% rise in per capita income during the fiscal years 2019/20 and 2020/21, respectively. Furthermore, this increase significantly mitigates the per capita depth of poverty by 0.0272% and 0.025% and the severity of poverty by 0.0149% and 0.0145% over the same periods. Notably, the impact of international remittances on poverty alleviation surpasses that of internal remittances. In addressing income inequality, the analysis demonstrates that remittances contribute to a reduction in the Gini coefficient by 2% in 2019/20 and 7% in 2020/21, underscoring their pivotal role in promoting equitable economic distribution. However, the COVID-19 pandemic has posed significant challenges, diminishing remittance flows and, consequently, their positive effects on household welfare. The logistic regression results further corroborate these findings, indicating that increased per capita remittances, both international and internal, markedly decrease the likelihood of households falling below the poverty line. Specifically, a 1% rise in per capita external remittances reduces this likelihood by 4.5% in 2019/20 and by 3.7% in 2020/21, while internal remittances decrease it by 3% and 2.4%, respectively. The study also explores the demographic determinants of poverty. Larger household sizes and older household heads correlate positively with poverty, whereas higher education levels among household heads and members, and a greater proportion of male members, correlate negatively with poverty incidence and severity. Female-headed households are disproportionately affected by poverty, exacerbated by socio-cultural restrictions. Despite these adversities, the data suggest that remittances are a crucial instrument for poverty alleviation and income inequality reduction in Afghanistan. The findings advocate for policy interventions aimed at enhancing formal remittance channels, promoting education, and empowering women. Effective governance and sustained international assistance are essential to harness the full potential of remittances in combating poverty and inequality. This study highlights the need for strategic, multifaceted approaches to foster sustainable economic development in Afghanistan’s challenging socio-political context.

Keywords: migration, remittances, poverty, inequality, COVID-19, Afghanistan

Procedia PDF Downloads 34
2457 Valorisation of a Bioflocculant and Hydroxyapatites as Coagulation-Flocculation Adjuvants in Wastewater Treatment of the Steppe in the Wilaya of Saida

Authors: Fatima Zohra Choumane, Belkacem Benguella, Bouhana Maachou, Nacera Saadi

Abstract:

Pollution caused by wastewater is a serious problem in Algeria. This pollution has certainly harmful effects on the environment. In order to reduce the bad effects of these pollutants, many wastewater treatment processes, mainly physicochemical, are implemented. This study consists in using two flocculants; the first one is a biodegradable natural bioflocculant, i.e. Cactaceaeou ficus-indica cactus juice, and the second is the synthetic hydroxyapatite, in a physico-chemical process through coagulation-flocculation, using two coagulants, i.e. ferric chloride and aluminum sulfate, to treat wastewater collected at the entrance of the treatment plant, in the town of Saida. The influence of various experimental parameters, such as the amounts of coagulants and flocculants used, pH, turbidity, COD and BOD5, was investigated. The coagulation - flocculation jar tests of wastewater reveal that ferric chloride, containing a mass of 0.3 g – hydroxyapatite, treated for 1 hour through calcination, is the most effective adjuvant in clarifying the wastewater, with turbidity equal to 98.16 %. In the presence of the two bioflocculants, Cactaceae juice and aluminum sulphate, with a dose of 0.2 g, flocculation is good, with turbidity equal to 95.61 %. Examination of the key reaction parameters, following the flocculation tests of wastewater, shows that the degree of pollution decreases. This is confirmed by the COD and turbidity values obtained. Examination of these results suggests the use of these flocculants in wastewater treatment.

Keywords: wastewater, cactus ficus-indica, hydroxyapatite, coagulation - flocculation

Procedia PDF Downloads 341
2456 Cross-Cultural Adaptation and Validation of the Child Engagement in Daily Life in Greek

Authors: Rigas Dimakopoulos, Marianna Papadopoulou, Roser Pons

Abstract:

Background: Participation in family, recreational activities and self-care is an integral part of health. It is also the main outcome of rehabilitation services for children and adolescents with motor disabilities. There are currently no tools in Greek to assess participation in young children. Purpose: To culturally adapt and validate the Greek version of the Child Engagement in Daily Living (CEDL). Method: The CEDL was cross-culturally translated into Greek using forward-backward translation, review by the expert committee, pretest application and final review. Internal consistency was evaluated using the Cronbach alpha and test-retest reliability using the intra-class correlation coefficient (ICC). Parents of children aged 18 months to 5 years and with motor disabilities were recruited. Participants completed the CEDL and the children’s gross motor function was classified using the Gross Motor Function Classification System (GMFCS). Results: Eighty-three children were included, GMFCS I-V. Mean ± standard deviation of the CEDL domains “frequency of participation” “enjoyment of participation” and “self-care” were 58.4±14.0, 3.8±1.0 and 49.9±24, respectively. Internal consistency of all domains was high; Cronbach alpha for “frequency of participation” was 0.83, for “enjoyment of participation” was 0.76 and for “self-care” was 0.92. Test-retest reliability (ICC) was excellent for the “self-care” (0.95) and good for “frequency of participation” and “enjoyment of participation” domains (0.90 and 0.88, respectively). Conclusion: The Greek CEDL has good reliability. It can be used to evaluate participation in Greek young children with motor disabilities GMFCS levels I-V.

Keywords: participation, child, disabilities, child engagement in daily living

Procedia PDF Downloads 175
2455 Selective Electrooxidation of Ammonia to Nitrogen Gas on the Crystalline Cu₂O/Ni Foam Electrode

Authors: Ming-Han Tsai, Chihpin Huang

Abstract:

Electrochemical oxidation of ammonia (AEO) is one of the highly efficient and environmentally friendly methods for NH₃ removal from wastewater. Recently, researchers have focused on non-Pt-based electrodes (n-PtE) for AEO, aiming to evaluate the feasibility of these low-cost electrodes for future practical applications. However, for most n-PtE, NH₃ is oxidized mainly to nitrate ion NO₃⁻ instead of the desired nitrogen gas N₂, which requires further treatment to remove excess NO₃⁻. Therefore, developing a high N₂ conversion electrode for AEO is highly urgent. In this study, we fabricated various Cu₂O/Ni foam (NF) electrodes by electrodeposition of Cu on NF. The Cu plating bath contained different additives, including cetyltrimethylammonium chloride (CTAC), sodium dodecyl sulfate (SDS), polyamide acid (PAA), and sodium alginate (SA). All the prepared electrodes were physically and electrochemically investigated. Batch AEO experiments were conducted for 3 h to clarify the relation between electrode structures and N₂ selectivity. The SEM and XRD results showed that crystalline platelets-like Cu₂O, particles-like Cu₂O, cracks-like Cu₂O, and sheets-like Cu₂O were formed in the Cu plating bath by adding CTAC, SDS, PAA, and SA, respectively. For electrochemical analysis, all Cu₂O/NF electrodes revealed a higher current density (2.5-3.2 mA/cm²) compared to that without additives modification (1.6 mA/cm²). At a constant applied potential of 0.95 V (vs Hg/HgO), the Cu₂O sheet (51%) showed the highest N₂ selectivity, followed by Cu₂O cracks (38%), Cu₂O particles (30%), and Cu₂O platelet (18%) after 3 h reaction. Our result demonstrated that the selectivity of N₂ during AEO was surface structural dependent.

Keywords: ammonia, electrooxidation, selectivity, cuprous oxide, Ni foam

Procedia PDF Downloads 86
2454 AER Model: An Integrated Artificial Society Modeling Method for Cloud Manufacturing Service Economic System

Authors: Deyu Zhou, Xiao Xue, Lizhen Cui

Abstract:

With the increasing collaboration among various services and the growing complexity of user demands, there are more and more factors affecting the stable development of the cloud manufacturing service economic system (CMSE). This poses new challenges to the evolution analysis of the CMSE. Many researchers have modeled and analyzed the evolution process of CMSE from the perspectives of individual learning and internal factors influencing the system, but without considering other important characteristics of the system's individuals (such as heterogeneity, bounded rationality, etc.) and the impact of external environmental factors. Therefore, this paper proposes an integrated artificial social model for the cloud manufacturing service economic system, which considers both the characteristics of the system's individuals and the internal and external influencing factors of the system. The model consists of three parts: the Agent model, environment model, and rules model (Agent-Environment-Rules, AER): (1) the Agent model considers important features of the individuals, such as heterogeneity and bounded rationality, based on the adaptive behavior mechanisms of perception, action, and decision-making; (2) the environment model describes the activity space of the individuals (real or virtual environment); (3) the rules model, as the driving force of system evolution, describes the mechanism of the entire system's operation and evolution. Finally, this paper verifies the effectiveness of the AER model through computational and experimental results.

Keywords: cloud manufacturing service economic system (CMSE), AER model, artificial social modeling, integrated framework, computing experiment, agent-based modeling, social networks

Procedia PDF Downloads 79
2453 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Saaid, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, experimental investigation, aerodynamic performance

Procedia PDF Downloads 437
2452 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 372
2451 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 67
2450 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 154
2449 Characterization of Zn-Ni Alloy Elaborated Under Low and High Magnetic Field Immersed in Corrosive Medium

Authors: Sabiha Chouchane, Azzedine Hani, Jean-Paul Chopart, Alexandra Levesque

Abstract:

The electrodeposition of Zn-Ni alloy is mostly studied for its high degree of corrosion and mechanical properties. In this work, the zinc–nickel alloy coatings elaborated from sulfate bath have been carried out under low and high applied magnetic field. The effect of alloy stuctural parameters upon corrosion behavior is studied. It has been found that the magnetically induced convection changes the phase composition, promoting the zinc phase in spite of the γ-Ni₅Zn₂₁. Low magnetic field acts also on the morphology of the deposits as a levelling agent and a refiner by lowering the deposit roughness Ra and the spot size. For alloy obtained with low magnetic field (up to 1T) superimposition, surface morphology modification has no significant influence on corrosion behavior whereas for low nickel content alloy, the modification of phase composition, induced by applied magnetic field, favours higher polarization resistance. When high magnetic field amplitude is involved (up to12T), the phase composition modifications are the same that for low applied B and the morphology is not largely modified. In this case, the hydrogen reduction current dramatically decreases that leads to a large shift of the corrosion potential. It is suggested that the surface reactivity of electrodeposited alloys depends on the magnetically induced convection that is efficient during the codeposition process.

Keywords: magnetic field, Zn-Ni alloy, corrosion, corrosive medium

Procedia PDF Downloads 50
2448 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 158
2447 Wettability Properties of Pineapple Leaf Fibers and Banana Pseudostem Fibers Treated by Cold Plasma

Authors: Tatiana Franco, Hugo A. Estupinan

Abstract:

Banana pseudostem fiber (BPF) and pineapple leaf fiber (PLF) for their excellent mechanical properties and biodegradability characteristics arouse interest in different areas of research. F In tropical regions, where the banana pseudostem and the pineapple leaf are transformed into hard-to-handle solid waste, they can be low-cost raw material and environmentally sustainable in research for composite materials. In terms of functionality of this type of fiber, an open structure would allow the adsorption and retention of organic, inorganic and metallic species. In general, natural fibers have closed structures on their surface with intricate internal arrangements that can be used for the solution of environmental problems and other technological uses, however it is not possible to access their internal structure and sublayers, exposing the fibers in the natural state. An alternative method to chemical and enzymatic treatment are the processes with the plasma treatments, which are known to be clean, economical and controlled. In this type of treatment, a gas contained in a reactor in the form of plasma acts on the fiber generating changes in its structure, morphology and topography. This work compares the effects on fibers of PLF and BPF treated with cold argon plasma, alternating time and current. These fibers are grown in the regions of Antioquia-Colombia. The morphological, compositional and wettability properties of the fibers were analyzed by Raman microscopy, contact angle measurements, scanning electron microscopy (SEM) and atomic force microscopy analysis (AFM). The treatment with cold plasma on PLF and BPF allowed increasing its wettability, the topography and the microstructural relationship between lignin and cellulose.

Keywords: cold plasma, contact angle, natural fibers, Raman, SEM, wettability

Procedia PDF Downloads 156
2446 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 64
2445 Effect of Silicon Sulphate and Silicic Acid Rates on Growth, Yield and Nutritional Status of Wheat (Triticum aestivum L.)

Authors: R. G. Shemi, M. A. Abo Horish, Kh. M. A. Mekled

Abstract:

The utilization of silicon (Si) sources is a crucial agricultural tool that requires optimization to promote sustainable practices. The application of Si provides the implementation of biological mechanisms of plant nutrition, growth promotion, and protection. The aims of this experiment were to investigate the relative efficacy of Si sources and levels on the growth, yield, and mineral content of wheat. The study examined the effects of silicon sulphate and silicic acid levels on growth, spike characteristics, yield parameters, and macro- and micronutrient concentrations of wheat during the 2-season. The entire above-indicated parameters were significantly (p < 0.05) increased with increasing levels of silicon sulphate and silicic acid compared to the control. Foliar application of silicon sulphate 150 ppm and silicic acid 60 ppm statistically (p < 0.05) enhanced grain N concentration and the grain yield by 136.14 and 77.85%, 43.49 and 34.52% in the 1st season, and by 78.62 and 54.40%, 43.53 and 33.18% in the 2nd season, respectively, as compared with control. Overall, foliar applications of silicon sulphate at 150 ppm and silicic acid at 60 ppm were greatly efficient amongst all Si levels and sources in improving growth and spike characters, increasing yield parameters, and elevating grain nutrients. Finally, the treatment of silicon sulfate at 150 ppm was more effective than the treatment of silicic acid at 60 ppm in increasing growth, grain nutrients, and productivity of wheat and attaining agricultural sustainability under experiment conditions.

Keywords: wheat, silicon sulphate, silicic acid, grain nutrients

Procedia PDF Downloads 18
2444 Assessing the Feasibility of Commercial Meat Rabbit Production in the Kumasi Metropolis of Ghana

Authors: Nana Segu Acquaah-Harrison, James Osei Mensah, Richard Aidoo, David Amponsah, Amy Buah, Gilbert Aboagye

Abstract:

The study aimed at assessing the feasibility of commercial meat rabbit production in the Kumasi Metropolis of Ghana. Structured and unstructured questionnaires were utilized in obtaining information from two hundred meat consumers and 15 meat rabbit farmers. Data were analyzed using Net Present Value (NPV), Internal Rate of Return (IRR), Benefit Cost Ratio (BCR)/Profitability Index (PI) technique, percentages and chi-square contingency test. The study found that the current demand for rabbit meat is low (36%). The desirable nutritional attributes of rabbit meat and other socio economic factors of meat consumers make the potential demand for rabbit meat high (69%). It was estimated that GH¢5,292 (approximately $ 2672) was needed as a start-up capital for a 40-doe unit meat rabbit farm in Kumasi Metropolis. The cost of breeding animals, housing and equipment formed 12.47%, 53.97% and 24.87% respectively of the initial estimated capital. A Net Present Value of GH¢ 5,910.75 (approximately $ 2984) was obtained at the end of the fifth year, with an internal rate return and profitability index of 70% and 1.12 respectively. The major constraints identified in meat rabbit production were low price of rabbit meat, shortage of fodder, pest and diseases, high cost of capital, high cost of operating materials and veterinary care. Based on the analysis, it was concluded that meat rabbit production is feasible in the Kumasi Metropolis of Ghana. The study recommends embarking on mass advertisement; farmer association and adapting to new technologies in the production process will help to enhance productivity.

Keywords: feasibility, commercial meat rabbit, production, Kumasi, Ghana

Procedia PDF Downloads 132
2443 Geochemical Characterization of Geothermal Waters in Albania, Preliminary Results

Authors: Aurela Jahja, Katarzyna Wątor, Arjan Beqiraj, Piotr Rusiniak, Nevton Kodhelaj

Abstract:

Albanian geological terrains represent an important node of the Alpine – Mediterranean mountain belt and are divided into several predominantly NNW - SSE striking geotectonic units, which, based on the presence or lack of Cretaceous transgression and magmatic rocks, belong to Internal or External Albanides. The internal (Korabi, Mirdita and Gashi) units are characterized by the Lower Cretaceous discordance and the presence of abundant magmatic rocks whereas in the external (Alps, Krasta-Cukali, Kruja, Ionian, Sazani and Peri Adriatic Depression) units an almost continuous sedimentation from Triassic to Paleogene is evidenced. The internal and external units show relevant differences in both geothermal and heat flow density values. The gradient values vary from 15-21.3 to 36 mK/m, while the heat flow density ranges from 42 to 60 mW/m2, in the external (Preadriatic Depression) and internal (ophiolitic belt) units, respectively. The geothermal fluids, which are found in natural springs and deep oil wells of Albania, are located in four thermo-mineral provinces: a) Peshkopi (Korabi) province; b) Kruja province; c) Preadriatic basin province, and d) South Ionian province. Thirteen geothermal waters were sampled from 11 natural springs and 2 deep wells, of which 6 springs and 2 wells from Kruja, 1 spring from Peshkopia, 2 springs from Preadriatic basin and 2 springs South Ionian province. Temperature, pH and Electrical Conductivity were measured in situ, while in laboratory were analyzed by ICP method major anions and cations and several trace elements (B, Li, Sr, Rb, I, Br, etc.). The measured values of temperature, pH and electrical conductivity range within 17-63°C, 6.26-7.92 and 724- 26856µS/cm intervals, respectively. The chemical type of the Albania thermal waters is variable. In the Kruja province prevail the Cl-SO4-NaCa and Cl-Na-Ca water types; while SO4-Ca, HCO3-Ca and Cl-HCO3-Na-Ca, and Cl-Na are found in the provinces of Peshkopi, Ionian and Preadriatic basin, respectively. In the Cl-SO4-HCO3 triangular diagram most of the geothermal waters are close to the chloride corner that belong to “mature waters”, typical of geothermal deep and hot fluids. Only samples from the Ionian province are located within the region of high bicarbonate concentration and they can be classified as peripheral waters that may have mixed with cold groundwater. In the Na-Ca-Mg and Na-K-Mg triangular diagram the majority of waters fall in the corner of sodium, suggesting that their cation ratios are controlled by mineral-solution equilibrium. There is a linear relationship between Cl and B which indicates the mixing of geothermal water with cold water, where the low-chlorine thermal waters from Ionian basin and Preadriatic depression provinces are distinguished by high-chlorine thermal waters from Kruja province. The Cl/Br molar ration of the thermal waters from Kruja province ranges from 1000 to 2660 and separates them from the thermal waters of Ionian basin and Preadriatic depression provinces having Cl/Br molar ratio lower than 650. The apparent increase of Cl/Br molar ratio that correlates with the increasing of the chloride, is probably related with dissolution of the Halite.

Keywords: geothermal fluids, geotectonic units, natural springs, deep wells, mature waters, peripheral waters

Procedia PDF Downloads 217
2442 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 95
2441 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 378
2440 Development and Evaluation of a Psychological Adjustment and Adaptation Status Scale for Breast Cancer Survivors

Authors: Jing Chen, Jun-E Liu, Peng Yue

Abstract:

Objective: The objective of this study was to develop a psychological adjustment and adaptation status scale for breast cancer survivors, and to examine the reliability and validity of the scale. Method: 37 breast cancer survivors were recruited in qualitative research; a five-subject theoretical framework and an item pool of 150 items of the scale were derived from the interview data. In order to evaluate and select items and reach a preliminary validity and reliability for the original scale, the suggestions of study group members, experts and breast cancer survivors were taken, and statistical methods were used step by step in a sample of 457 breast cancer survivors. Results: An original 24-item scale was developed. The five dimensions “domestic affections”, “interpersonal relationship”, “attitude of life”, “health awareness”, “self-control/self-efficacy” explained 58.053% of the total variance. The content validity was assessed by experts, the CVI was 0.92. The construct validity was examined in a sample of 264 breast cancer survivors. The fitting indexes of confirmatory factor analysis (CFA) showed good fitting of the five dimensions model. The criterion-related validity of the total scale with PTGI was satisfactory (r=0.564, p<0.001). The internal consistency reliability and test-retest reliability were tested. Cronbach’s alpha value (0.911) showed a good internal consistency reliability, and the intraclass correlation coefficient (ICC=0.925, p<0.001) showed a satisfactory test-retest reliability. Conclusions: The scale was brief and easy to understand, was suitable for breast cancer patients whose physical strength and energy were limited.

Keywords: breast cancer survivors, rehabilitation, psychological adaption and adjustment, development of scale

Procedia PDF Downloads 513
2439 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 165
2438 High Power Thermal Energy Storage for Industrial Applications Using Phase Change Material Slurry

Authors: Anastasia Stamatiou, Markus Odermatt, Dominic Leemann, Ludger J. Fischer, Joerg Worlitschek

Abstract:

The successful integration of thermal energy storage in industrial processes is expected to play an important role in the energy turnaround. Latent heat storage technologies can offer more compact thermal storage at a constant temperature level, in comparison to conventional, sensible thermal storage technologies. The focus of this study is the development of latent heat storage solutions based on the Phase Change Slurry (PCS) concept. Such systems promise higher energy densities both as refrigerants and as storage media while presenting better heat transfer characteristics than conventional latent heat storage technologies. This technology is expected to deliver high thermal power and high-temperature stability which makes it ideal for storage of process heat. An evaluation of important batch processes in industrial applications set the focus on materials with a melting point in the range of 55 - 90 °C. Aluminium ammonium sulfate dodecahydrate (NH₄Al(SO₄)₂·12H₂O) was chosen as the first interesting PCM for the next steps of this study. The ability of this material to produce slurries at the relevant temperatures was demonstrated in a continuous mode in a laboratory test-rig. Critical operational and design parameters were identified.

Keywords: esters, latent heat storage, phase change materials, thermal properties

Procedia PDF Downloads 298
2437 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 107