Search results for: doctoral defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 549

Search results for: doctoral defense

489 The Effects of Aging on the Cost of Operating and Support: An Empirical Study Applied to Weapon Systems

Authors: Byungchae Kim, Jiwoo Nam

Abstract:

Aging of weapon systems can cause the failure and degeneration of components which results in increase of operating and support costs. However, whether this aging effect is significantly strong and it influences a lot on national defense spending due to the rapid increase in operating and support (O&S) costs is questionable. To figure out this, we conduct a literature review analyzing the aging effect of US weapon systems. We also conduct an empirical research using a maintenance database of Korean weapon systems, Defense Logistics Integrated Information System (DAIIS). We run regression of various types of O&S cost on weapon system age to investigate the statistical significance of aging effect and use generalized linear model to find relations between the failure of different priced components and the age. Our major finding is although aging effect exists, its impacts on weapon system cost seem to be not too large considering several characteristics of O&S cost elements not relying on the age.

Keywords: O&S cost, aging effect, weapon system, GLM

Procedia PDF Downloads 126
488 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 325
487 Intramuscular Heat Shock Protein 72 and Heme Oxygenase-1 mRNA are Reduced in Patients with Type 2 Diabetes Evidence That Insulin Resistance is Associated with a Disturbed Antioxidant Defense Mechanism

Authors: Ghibeche Abderrahmane

Abstract:

To examine whether genes associated with cellular defense against oxidative stress are associated with insulin sensitivity, patients with type 2 diabetes (n=7) and age-matched (n=5) and young (n=9) control subjects underwent a euglycemic-hyperinsulinemic clamp for 120 min. Muscle samples were obtained before and after the clamp and analyzed for heat shock protein (HSP)72 and heme oxygenase (HO)-1 mRNA, intramuscular triglyceride content, and the maximal activities of β-hyroxyacyl-CoA dehydrogenase (β-HAD) and citrate synthase (CS). Basal expression of both HSP72 and HO-1 mRNA were lower (P < 0.05) by 33 and 55%, respectively, when comparing diabetic patients with age-matched and young control subjects, with no differences between the latter groups. Both basal HSP72 (r = 0.75, P < 0.001) and HO-1 (r = 0.50,P < 0.05) mRNA expression correlated with the glucose infusion rate during the clamp. Significant correlations were also observed between HSP72 mRNA and both β-HAD (r = 0.61, P < 0.01) and CS (r = 0.65, P < 0.01). HSP72 mRNA was induced (P < 0.05) by the clamp in all groups. Although HO-1 mRNA was unaffected by the clamp in both the young and age-matched control subjects, it was increased (P < 0.05) ∼70-fold in the diabetic patients after the clamp. These data demonstrate that genes involved in providing cellular protection against oxidative stress are defective in patients with type 2 diabetes and correlate with insulin-stimulated glucose disposal and markers of muscle oxidative capacity. The data provide new evidence that the pathogenesis of type 2 diabetes involves perturbations to the antioxidant defense mechanism within skeletal muscle.

Keywords: euglycemic-hyperinsulinemic, HSP72, mRNA, diabete

Procedia PDF Downloads 428
486 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 189
485 Learning Motivation Factors for Pre-Cadets in Armed Forces Academies Preparatory School, Ministry of Defense

Authors: Prachya Kamonphet

Abstract:

The purposes of this research were to study the learning motivation factors for Pre-cadets in Armed Forces Academies Preparatory School, Ministry of Defense. The subjects were 320 Pre-cadets (from all 3-year classes of Pre-cadets, the academic year 2015). The research instruments were questionnaires. The collected data were analyzed by means of Descriptive Statistic and One-Way Analysis of Variance. The results of this study were as follows: The relation between the Pre-cadets’ average grade and the motivation in studying was significance.In the aspect of the environment related to Pre-cadets’ families and the motivation in studying.In the aspect of the environment related to Pre-cadets’ studying, it was found that teaching method, learning place, educational media, relationship between teachers and Pre-cadets, relationship between Pre-cadets and their friends, and relationship between Pre-cadets and the commanders were significant.

Keywords: learning motivation factors, learning motivation, armed forces academies preparatory school, learning

Procedia PDF Downloads 230
484 Mycorrhizal Autochthonous Consortium Induced Defense-Related Mechanisms of Olive Trees against Verticillium dahliae

Authors: Hanane Boutaj, Abdelilah Meddich, Said Wahbi, Zainab El Alaoui-Talibi, Allal Douira, Abdelkarim Filali-Maltouf, Cherkaoui El Modafar

Abstract:

The present work aims to investigate the effect of arbuscular mycorrhizal fungi (AMF) in improving the olive tree resistance to Verticillium wilt caused by Verticillium dahliae. Inoculated plants with a mycorrhizal autochthonous consortium 'Rhizolive consortium' and pure strain 'Glomus irregulare' were infected after three months with V. dahliae. The improving of olive tree resistance was determined through disease severity, incidence, and defoliation. On the other hand, the defense mechanisms of olive plants were evaluated through lignin content, phenylalanine ammonia lyase (PAL) activity, and polyphenol content. The results revealed that both AMF significantly (p < 0.05) reduced disease development and the rate of defoliation in infected olive plants. Moreover, the contents of lignin were boosted after mycorrhizal inoculation in both the roots and the stems of olive plants, which remained significantly (p < 0.001) higher after the 90th days of V. dahliae inoculation. PAL activity was increased after V. dahliae inoculation in the stems of 'Rhizolive consortium' treatment that were 17 times higher than those in the roots of olive plants. The polyphenol content in the stems was about twice higher than those in the roots. The reduction of disease severity was accompanied by increased levels of lignin content, PAL activity, and polyphenol content, particularly in the stems of olive plants, indicating the strengthening of the olive plant immune system against V. dahliae.

Keywords: olive tree, Mycorrhizal autochthonous consortium, Glomus irregulare, Verticillium dahliae, defense mechanisms

Procedia PDF Downloads 105
483 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 171
482 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 96
481 Destination of the PhDs: Determinants of International Mobility of UK PhD Graduates

Authors: Anna Siuda-Bak

Abstract:

This paper adopts a comparative approach to examining the determinants of international mobility of German, Italian and British researchers who completed their doctoral education in the UK. Structured sampling and data collection techniques have been developed in order to retrieve information on participants from publicly available sources. This systematically collected data was supplemented with an on-line survey which captures participants’ job trajectories, including movements between positions, institutions and countries. In total, data on 949 German, Italian and British PhDs was collected. Logistic regression was employed to identify factors associated with one’s probability of moving outside the UK after his or her graduation. The predictor variables included factors associated with one’s PhD (field of study, ranking of the university which awarded the PhD degree) and family factors (having a child, nationality of the partner). Then, 9 constrained models were estimated to test the effect each variable has on probability of going to a specific destination, being English-speaking country, non-English speaking country or returning to the home country. The results show that females, arts and humanities graduates, and respondents with a partner from the UK are less mobile than their counterparts. The effect of the ranking of the university differed in two groups. The UK graduates from higher ranked universities were more likely to move abroad than to stay in the UK after their graduation. In contrast, non-UK natives from the same universities were less likely to be internationally mobile than non-UK natives from lower ranked universities. The nationality of the partner was the most important predictor of the specific destination choices. Graduates with partner from the home county were more likely to return home and those with a partner from the third country least likely to return.

Keywords: doctoral graduates, international mobility, nationality, UK

Procedia PDF Downloads 311
480 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service

Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla

Abstract:

With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.

Keywords: compulsory, military, service, reinforcement, perception

Procedia PDF Downloads 148
479 Modeling of a Small Unmanned Aerial Vehicle

Authors: Ahmed Elsayed Ahmed, Ashraf Hafez, A. N. Ouda, Hossam Eldin Hussein Ahmed, Hala Mohamed ABD-Elkader

Abstract:

Unmanned Aircraft Systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized,and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end, the model is checked by matching between the behavior of the states of the non-linear UAV and the resulted linear model with doublet at the control surfaces.

Keywords: UAV, equations of motion, modeling, linearization

Procedia PDF Downloads 725
478 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 453
477 Early Modern Controversies of Mobility within the Spanish Empire: Francisco De Vitoria and the Peaceful Right to Travel

Authors: Beatriz Salamanca

Abstract:

In his public lecture ‘On the American Indians’ given at the University of Salamanca in 1538-39, Francisco de Vitoria presented an unsettling defense of freedom of movement, arguing that the Spanish had the right to travel and dwell in the New World, since it was considered part of the law of nations [ius gentium] that men enjoyed free mutual intercourse anywhere they went. The principle of freedom of movement brought hopeful expectations, promising to bring mankind together and strengthen the ties of fraternity. However, it led to polemical situations when those whose mobility was in question represented a harmful threat or was for some reason undesired. In this context, Vitoria’s argument has been seen on multiple occasions as a justification of the expansion of the Spanish empire. In order to examine the meaning of Vitoria’s defense of free mobility, a more detailed look at Vitoria’s text is required, together with the study of some of his earliest works, among them, his commentaries on Thomas Aquinas’s Summa Theologiae, where he presented relevant insights on the idea of the law of nations. In addition, it is necessary to place Vitoria’s work in the context of the intellectual tradition he belonged to and the responses he obtained from some of his contemporaries who were concerned with similar issues. The claim of this research is that the Spanish right to travel advocated by Vitoria was not intended to be interpreted in absolute terms, for it had to serve the purpose of bringing peace and unity among men, and could not contradict natural law. In addition, Vitoria explicitly observed that the right to travel was only valid if the Spaniards caused no harm, a condition that has been underestimated by his critics. Therefore, Vitoria’s legacy is of enormous value as it initiated a long lasting discussion regarding the question of the grounds under which human mobility could be restricted. Again, under Vitoria’s argument it was clear that this freedom was not absolute, but the controversial nature of his defense of Spanish mobility demonstrates how difficult it was and still is to address the issue of the circulation of peoples across frontiers, and shows the significance of this discussion in today’s globalized world, where the rights and wrongs of notions like immigration, international trade or foreign intervention still lack sufficient consensus. This inquiry about Vitoria’s defense of the principle of freedom of movement is being placed here against the background of the history of political thought, political theory, international law, and international relations, following the methodological framework of contextual history of the ‘Cambridge School’.

Keywords: Francisco de Vitoria, freedom of movement, law of nations, ius gentium, Spanish empire

Procedia PDF Downloads 356
476 Imidocloprid as a Systemic-Acquired Resistant (SAR) Inducer in Nicotiana tabacum Var. Samsun NN Infected with Tobacco Mild Green Mosaic Virus

Authors: Mohammad Reza Hossein Zadeh

Abstract:

Plants have different layers of defense responses against biotic and abiotic stresses. One of the well-defined defense mechanism in plants is systemic acquired resistance (SAR) against a broad-range of pathogens. Salicylic acid (SA) plays a crucial role in regulation of the SAR pathway. It has been proved that Chemically SA-like compounds can mimic the SA signaling role. Imidocloprid is an insecticide being used to control whiteflies on crop plants. In order to study the possible role of Imidocloprid as an elicitor of SAR in plants, experiments were conducted in a completely randomized design frame with three treatments and duplicates on the detached leaves and whole Nicotiana tabacum var. Samsun NN. plants inoculated with Tobacco mild green mosaic virus (TMGMV). Compared with the effect of other SAR-inducers such as SA, Imidoclorid conferred a robust SAR induction in the infected plants. The results suggested that Imidocloprid even more powerful than SA can be considered as strong SAR inducer in the infected plants with viruses, which develop the local lesion symptoms.

Keywords: imidocloprid, Nicotiana tabacum var. Samsun NN, SAR, tobacco mild green, mosaic virus

Procedia PDF Downloads 574
475 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 297
474 “The Day I Became a Woman” by Marziyeh Meshkiny: An Analysis of the Cinematographic Image of the Middle East

Authors: Ana Carolina Domingues

Abstract:

This work presents the preliminary results of the above-titled doctoral research. Based on this film and on Middle East authors who discuss films made by women, it has been concluded so far, that it is part of a larger movement, which together with other productions, show the perceptions of the world of these women, who see the world otherwise, for not holding positions of power. These modes of perception revealed from the encounter of women with the cameras, educate viewers to denaturalize the impressions constructed in relation to the Middle East.

Keywords: cinema, image, middle east, women

Procedia PDF Downloads 103
473 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 513
472 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 442
471 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 301
470 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 526
469 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density

Authors: Jill Round

Abstract:

In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.

Keywords: risk management, structural equation model, supervisory practice, three lines of defense

Procedia PDF Downloads 206
468 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law

Authors: Amalia Sholihati, Bambang Riyanto Trilaksono

Abstract:

As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).

Keywords: RKX-200, guidance system, optimal guidance law, Hils

Procedia PDF Downloads 240
467 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 349
466 Detection of Viral-Plant Interaction Using Some Pathogenesis Related Protein Genes to Identify Resistant Genes against Potato LeafRoll Virus and Potato Virus Y in Egyptian Isolates

Authors: Dalia. G. Aseel, E. E. Hafez, S. M. Hammad

Abstract:

Viral RNAs of both potato leaf roll virus (PLRV) and potato virus Y (PVY) were extracted from infected potato leaves collected from different Egyptian regions. Differential Display Polymerase Chain Reaction (DD-PCR) using (Endogluconase, β-1,3-glucanases, Chitinase, Peroxidase and Polyphenol oxidase) primers (forward strand) for was performed. The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, a 58 up regulated and 19 down regulated genes were detected, while, 31 up regulated and 14 down regulated genes were observed in case of PVY. Based on the nucleotide sequencing, variable phylogenetic relationships were reported for the three sequenced genes coding for: Induced stolen tip protein, Disease resistance RPP-like protein and non-specific lipid-transfer protein. In a complementary approach, using the quantitative Real-time PCR, the expressions of PRs genes understudy were estimated in the infected leaves by PLRV and PVY of three potato cultivars (Spunta, Diamont and Cara). The infection with both viruses inhibited the expressions of the five PRs genes. On the contrary, infected leaves by PLRV or PVY elevated the expression of some defense genes. This interaction also may be enhanced and/or inhibited the expression of some genes responsible for the plant defense mechanisms.

Keywords: PLRV, PVY, PR genes, DD-PCR, qRT-PCR, sequencing

Procedia PDF Downloads 324
465 The Effect of Artesunate on Myeloperoxidase Activity of Human Polymorphonuclear Neutrophil

Authors: J. B. Minari, O. B. Oloyede, A. A. Odutuga

Abstract:

Myeloperoxidase is the most abundant enzyme found in the polymorphonuclear neutrophil and is known to play a central role in the host defense system of the leukocyte. The enzyme has been reported to interact with some drugs to generate free radical which inhibits its activity. This study investigated the effects of artesunate on the activity of the enzyme and the subsequent effect on the host immune system. In investigating the effects of the drugs on myeloperoxidase, the influence of concentration, pH, partition ratio estimation and kinetics of inhibition were studied. This study showed that artesunate is concentration-dependent inhibitor of myeloperoxidase with an IC50 of 0.078mM. Partition ratio estimation showed that 60 enzymatic turnover cycles are required for complete inhibition of myeloperoxidase in the presence of artesunate. The influence of pH on the effect of artesunate on the enzyme showed least activity of myeloperoxidase at physiological pH. The kinetic inhibition studies showed that artesunate caused a competitive inhibition with an increase in the Km value from 0.12mM to 0.26mM and no effect on the Vmax value. The Ki value was estimated to be 2.5mM. The results obtained from this study show that artesunate is a potent inhibitor of myeloperoxidase and it is capable of inactivating the enzyme. It is considered that the inhibition of myeloperoxidase in the presence of artesunate as revealed in this study may partly explain the impairment of polymorphonuclear neutrophil and consequent reduction of the strength of the host defense system against secondary infections.

Keywords: myeloperoxidase, artesunate, inhibition, nuetrophill

Procedia PDF Downloads 353
464 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia

Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko

Abstract:

Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.

Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia

Procedia PDF Downloads 137
463 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 141
462 A Rational Intelligent Agent to Promote Metacognition a Situation of Text Comprehension

Authors: Anass Hsissi, Hakim Allali, Abdelmajid Hajami

Abstract:

This article presents the results of a doctoral research which aims to integrate metacognitive dimension in the design of human learning computing environments (ILE). We conducted a detailed study on the relationship between metacognitive processes and learning, specifically their positive impact on the performance of learners in the area of reading comprehension. Our contribution is to implement methods, using an intelligent agent based on BDI paradigm to ensure intelligent and reliable support for low readers, in order to encourage regulation and a conscious and rational use of their metacognitive abilities.

Keywords: metacognition, text comprehension EIAH, autoregulation, BDI agent

Procedia PDF Downloads 309
461 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 116
460 The Impact of Cognition and Communication on the Defense of Capital Murder Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: communication disorders, cognitive disorders, capital murder, death penalty, executive function

Procedia PDF Downloads 149