Search results for: instrument security factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8707

Search results for: instrument security factor

7837 Competitive Advantage Challenges in the Apparel Manufacturing Industries of South Africa: Application of Porter’s Factor Conditions

Authors: Sipho Mbatha, Anne Mastament-Mason

Abstract:

South African manufacturing global competitiveness was ranked 22nd (out of 38 countries), dropped to 24th in 2013 and is expected to drop further to 25th by 2018. These impacts negatively on the industrialisation project of South Africa. For industrialization to be achieved through labour intensive industries like the Apparel Manufacturing Industries of South Africa (AMISA), South Africa needs to identify and respond to factors negatively impacting on the development of competitive advantage This paper applied factor conditions from Porter’s Diamond Model (1990) to understand the various challenges facing the AMISA. Factor conditions highlighted in Porter’s model are grouped into two groups namely, basic and advance factors. Two AMISA associations representing over 10 000 employees were interviewed. The largest Clothing, Textiles and Leather (CTL) apparel retail group was also interviewed with a government department implementing the industrialisation policy were interviewed The paper points out that while AMISA have basic factor conditions necessary for competitive advantage in the clothing and textiles industries, Advance factor coordination has proven to be a challenging task for the AMISA, Higher Education Institutions (HEIs) and government. Poor infrastructural maintenance has contributed to high manufacturing costs and poor quick response as a result of lack of advanced technologies. The use of Porter’s Factor Conditions as a tool to analyse the sector’s competitive advantage challenges and opportunities has increased knowledge regarding factors that limit the AMISA’s competitiveness. It is therefore argued that other studies on Porter’s Diamond model factors like Demand conditions, Firm strategy, structure and rivalry and Related and supporting industries can be used to analyse the situation of the AMISA for the purposes of improving competitive advantage.

Keywords: compliance rule, apparel manufacturing industry, factor conditions, advance skills and South African industrial policy

Procedia PDF Downloads 353
7836 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 121
7835 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 155
7834 ATC in Competitive Electricity Market Using TCSC

Authors: S. K. Gupta, Richa Bansal

Abstract:

In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.

Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric

Procedia PDF Downloads 492
7833 The Study of Genetic Diversity in Canola Cultivars of Kashmar-Iran Region

Authors: Seyed Habib Shojaei, Reza Eivazi, Mir Sajad Shojaei, Alireza Akbari, Pooria Mazloom, Seyede Mitra Sadati, Mir Zeinalabedin Shojaei, Farnaz Farbakhsh

Abstract:

To study the genetic diversity in rapeseeds and agronomic traits, an experiment was conducted using multivariate statistical methods at Agricultural Research Station of Kashmar in 2012-2013.In this experiment, ten genotypes of rapeseed in a Randomized Complete Block designs with three replications were evaluated. The following traits were studied: seed yield, number of days to the fifty percent of flowering, plant height, number of pods on main stem, length of the pod, seed yield per plant, number of seed in pod, harvest index, weight of 100 seeds, number of pods on lateral branch, number of lateral branches. In analyzing the variance, differences between cultivars were significant. The average comparative revealed that the most valuable variety was Licord regarding to the traits while the least valuable variety was Opera. In stepwise regression, harvest index, grain yield per plant and number of pods per lateral branches were entering to model. Correlation analysis showed that the grain yield with the number of pods per lateral branches and seed yield per plant have positive and significant correlation. In the factor analysis, the first five components explained more than 83% of the variance in the data. In the first factor, seed yield and the number of pods per lateral branches were of the highest importance. The traits, seed yield per plant, and pod per main stem were of a great significance in the second factor. Moreover, in the third factor, plant height and the number of lateral branches were more important. In the fourth factor, plant height and one hundred seeds weight were of the highest variance. Finally, days to fifty percent of flowering and one hundred seeds weight were more important in fifth factor.

Keywords: rapeseed, variance analysis, regression, factor analysis

Procedia PDF Downloads 248
7832 Mother Tounge Based Multilingual Education Policy: Voices of Two Cities, 'The Voice of Laguna'

Authors: Cecilia Velasco, Q.

Abstract:

This study was undertaken to find out the perceived efficiency, appropriateness effectiveness, acceptability and relevance, if at all such exist, of the Mother Tongue Based Multilingual Education Policy under the K-12 Curriculum, as seen by the stakeholders who are directly affected by this policy. The researcher believed that it is right and fitting to get the views and opinions of the people directly involved and/or concerned about this education policy. The results of the study will hopefully guide lawmakers and/or policymakers to fine-tune educational policy or policies. The locale of the study was the DepEd schools in Laguna, (San Pablo City and other nearby cities). The subjects of the study were the teachers (first phase) from the public schools of Department of Education (San Pablo City), in particular and parents (second phase) from nearby cities who are the direct stakeholders of this Policy. To determine the perception of the teachers toward Mother Tongue Based Multilingual Education Policy; its acceptability, efficiency, appropriateness, effectiveness and relevance, factor analysis was used to refine the instrument (questionnaire). To find out the significant difference between the perceptions of the primary and intermediate group of teachers, including those who teach mother tongue and non-mother tongue subjects, t-test of difference between means was employed.

Keywords: DepEd, K12 curriculum, MTBMLE, stakeholders

Procedia PDF Downloads 291
7831 Potential of Landslides Based On Maximum Monthly Rainfall in Sumber Sari Village Watershed Tirtomoyo Wonogiri Indonesia

Authors: Heny Pratiwi, Niken Silmi Surjandari, Noegroho Djarwanti

Abstract:

This study was conducted to determine the potential for landslides as a result of monthly rainfall in a watershed. Rainfall data that will be used is rainfall from years 2007-2011. Research methods created by modeling the slope on some variation of angle in a row 30◦, 45◦, and 60◦ with a homogeneous layer of soil. Slope Stability Analysis using Method Fellenius. The results of the slope stability analysis without rain on slope 30◦, 45◦, and 60◦ respectively 1.3846, 1.0115, and 0.7284. Results in the absence of rain showed that the slope on the slope 45◦ are in critical condition and on a slope with a slope 60◦ already avalanche with safety factor value <1. The results in the rainy conditions shows slopes 30◦ are in critical condition with a value factor <1 due to the intensity of monthly rainfall> 250 mm/month.

Keywords: slope stability, monthly rainfall, infiltration, safety factor, Fellenius method

Procedia PDF Downloads 436
7830 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 99
7829 Computation of Thermal Stress Intensity Factor for Bonded Composite Repairs in Aircraft Structures

Authors: Fayçal Benyahia, Abdelmohsen Albedah, Bel Abbes Bachir Bouiadjra

Abstract:

In this study the Finite element method is used to analyse the effect of the thermal residual stresses resulting from adhesive curing on the performances of the bonded composite repair in aircraft structures. The stress intensity factor at the crack tip is chosen as fracture criterion in order to estimate the repair performances. The obtained results show that the presence of the thermal residual stresses reduces considerably the repair performances and consequently decreases the fatigue life of cracked structures. The effects of the curing temperature, the adhesive properties and the adhesive thickness on the Stress Intensity Factor (SIF) variation with thermal stresses are also analysed.

Keywords: bonded composite repair, residual stress, adhesion, stress transfer, finite element analysis

Procedia PDF Downloads 408
7828 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 326
7827 Revealing the Risks of Obstructive Sleep Apnea

Authors: Oyuntsetseg Sandag, Lkhagvadorj Khosbayar, Naidansuren Tsendeekhuu, Densenbal Dansran, Bandi Solongo

Abstract:

Introduction: Obstructive sleep apnea (OSA) is a common disorder affecting at least 2% to 4% of the adult population. It is estimated that nearly 80% of men and 93% of women with moderate to severe sleep apnea are undiagnosed. A number of screening questionnaires and clinical screening models have been developed to help identify patients with OSA, also it’s indeed to clinical practice. Purpose of study: Determine dependence of obstructive sleep apnea between for severe risk and risk factor. Material and Methods: A cross-sectional study included 114 patients presenting from theCentral state 3th hospital and Central state 1th hospital. Patients who had obstructive sleep apnea (OSA)selected in this study. Standard StopBang questionnaire was obtained from all patients.According to the patients’ response to the StopBang questionnaire was divided into low risk, intermediate risk, and high risk.Descriptive statistics were presented mean ± standard deviation (SD). Each questionnaire was compared on the likelihood ratio for a positive result, the likelihood ratio for a negative test result of regression. Statistical analyses were performed utilizing SPSS 16. Results: 114 patients were obtained (mean age 48 ± 16, male 57)that divided to low risk 54 (47.4%), intermediate risk 33 (28.9%), high risk 27 (23.7%). Result of risk factor showed significantly increasing that mean age (38 ± 13vs. 54 ± 14 vs. 59 ± 10, p<0.05), blood pressure (115 ± 18vs. 133 ± 19vs. 142 ± 21, p<0.05), BMI(24 IQR 22; 26 vs. 24 IQR 22; 29 vs. 28 IQR 25; 34, p<0.001), neck circumference (35 ± 3.4 vs. 38 ± 4.7 vs. 41 ± 4.4, p<0.05)were increased. Results from multiple logistic regressions showed that age is significantly independently factor for OSA (odds ratio 1.07, 95% CI 1.02-1.23, p<0.01). Predictive value of age was significantly higher factor for OSA (AUC=0.833, 95% CI 0.758-0.909, p<0.001). Our study showing that risk of OSA is beginning 47 years old (sensitivity 78.3%, specifity74.1%). Conclusions: According to most of all patients’ response had intermediate risk and high risk. Also, age, blood pressure, neck circumference and BMI were increased such as risk factor was increased for OSA. Especially age is independently factor and highest significance for OSA. Patients’ age one year is increased likelihood risk factor 1.1 times is increased.

Keywords: obstructive sleep apnea, Stop-Bang, BMI (Body Mass Index), blood pressure

Procedia PDF Downloads 298
7826 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana

Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.

Abstract:

Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.

Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security

Procedia PDF Downloads 98
7825 Factor Structure of the Korean Version of Multidimensional Experiential Avoidance Questionnaire (MEAQ)

Authors: Juyeon Lee, Sungeun You

Abstract:

Experiential avoidance is one’s tendency to avoid painful internal experience, unwanted adverse thoughts, emotions, and physical sensations. The Multidimensional Experiential Avoidance Questionnaire (MEAQ) is a measure of experiential avoidance, and the original scale consisted of 62 items with six subfactors including behavioral avoidance, distress aversion, procrastination, distraction/suppression, repression/denial, and distress endurance. The purpose of this study was to examine the factor structure of the MEAQ in a Korean sample. Three hundred community adults and university students aged 18 to 35 participated in an online survey assessing experiential avoidance (MEAQ and Acceptance and Action Questionnaire-II; AAQ-II), depression (Patient Health Questionnaire-9; PHQ-9), anxiety (Generalized Anxiety Disoder-7; GAD-7), negative affect (Positive and Negative Affect Scale; PANAS), neuroticism (Big Five Inventory; BFI), and quality of life (Satisfaction with Life Scale; SWLS). Factor analysis with principal axis with direct oblimin rotation was conducted to examine subfactors of the MEAQ. Results indicated that the six-factor structure of the original scale was adequate. Eight items out of 62 items were removed due to insufficient factor loading. These items included 3 items of behavior avoidance (e.g., “When I am hurting, I would do anything to feel better”), 2 items of repression/denial (e.g., “I work hard to keep out upsetting feelings”), and 3 items of distress aversion (e.g., “I prefer to stick to what I am comfortable with, rather than try new activities”). The MEAQ was positively associated with the AAQ-II (r = .47, p < .001), PHQ-9 (r = .37, p < .001), GAD-7 (r = .34, p < .001), PANAS (r = .35, p < .001), and neuroticism (r = .24, p < .001), and negatively correlated with the SWLS (r = -.38, p < .001). Internal consistency was good for the MEAQ total (Cronbach’s α = .90) as well as all six subfactors (Cronbach’s α = .83 to .87). The findings of the study support the multidimensional feature of experiential avoidance and validity of the MEAQ in a sample of Korean adults.

Keywords: avoidance, experiential avoidance, factor structure, MEAQ

Procedia PDF Downloads 353
7824 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 318
7823 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 260
7822 Some Considerations about the Theory of Spatial-Motor Thinking Applied to a Traditional Fife Band in Brazil

Authors: Murilo G. Mendes

Abstract:

This text presents part of the results presented in the Ph.D. thesis that has used John Baily's theory and method as well as its ethnographic application in the context of the fife flutes of the Banda Cabaçal dos Irmãos Aniceto in the state of Ceará, northeast of Brazil. John Baily is a British ethnomusicologist dedicated to studying the relationships between music, musical gesture, and embodied cognition. His methodology became a useful tool to highlight historical-social aspects present in the group's instrumental music. Remaining indigenous and illiterate, these musicians played and transmitted their music from generation to generation, for almost two hundred years, without any nomenclature or systematization of the fingering performed on the flute. In other words, his music, free from any theorization, is learned, felt, perceived, and processed directly through hearing and through the relationship between the instrument's motor skills and its sound result. For this reason, Baily's assumptions became fundamental in the analysis processes. As the author's methodology recommends, classes were held with the natives and provided technical musical learning and some important concepts. Then, transcriptions and analyses of musical aspects were made from patterns of movement on the instrument incorporated by repetitions and/or by the intrinsic facility of the instrument. As a result, it was discovered how the group reconciled its indigenous origins with the demand requested by the public power and the interests of the local financial elite from the mid-twentieth century. The article is structured from the cultural context of the group, where local historical and social aspects influence the social and musical practices of the group. Then, will be present the methodological conceptions of John Baily and, finally, their application in the music of the Irmãos Aniceto. The conclusion points to the good results of identifying, through this methodology and analysis, approximations between discourse, historical-social factors, and musical text. Still, questions are raised about its application in other contexts.

Keywords: Banda Cabaçal dos Irmãos Aniceto, John Baily, pífano, spatial-motor thinking

Procedia PDF Downloads 124
7821 Measurements of Scattering Cross Sections for 5.895 keV Photons in Various Polymers

Authors: H. Duggal, G. Singh, G. Singh, A. Bhalla, S. Kumar, J. S. Shahi, D. Mehta

Abstract:

The total differential cross section for scattering of the 5.895 keV photons by various polymers has been measured at scattering angle of 135o. The experimental measurements were carried out using the energy dispersive setup involving annular source of the 55Fe radioisotope and a low energy germanium (LEGe) detector. The cross section values are measured for 20 polymer targets namely, Paraffin Wax, Polytetrafluoro ethylene (PTFE), Cellulose, Silicone oil, Polyvinyl alcohol (PVA), Polyvinyl purrolidone (PVP), Polymethyl methacrylate (PMMA), Kapton, Mylar, Chitosan, Polyvinyl chloride (PVC), Bakelite, Carbopol, Chlorobutyl rubber (CBR), Polyetylene glycol (PEG), Polysorbate-20, Nylon-6, Cetyl alcohol, Carboxyl methyl sodium cellulose and Sodium starch glucolate. The measurements were performed in vacuum so as to avoid scattering contribution due to air and strong absorption of low energy photons in the air column. In the present investigations, the geometrical factor and efficiency of the detector were determined by measuring the K x-rays emitted from the 22Ti and 23V targets excited by the Mn K x-rays in the same experimental set up. The measured scattering cross sections have been compared with the sum of theoretically calculated elastic and inelastic scattering cross sections. The theoretical elastic (Rayleigh) scattering cross sections based on the various form factor approximations, namely, non-relativistic form factor (NF), relativistic form factor (RF), modified form factor (MF), and MF with anomalous scattering factor (ASF) as well as the second order S-matrix formalisms, and the inelastic scattering differential cross sections based on the Klein-Nishina formula after including the inelastic scattering function (KN+ISF) have been calculated. The experimental results show fairly good agreement with theoretical cross sections.

Keywords: photon, polymers, elastic and inelastic, scattering cross sections

Procedia PDF Downloads 679
7820 Influences of Slope Inclination on the Storage Capacity and Stability of Municipal Solid Waste Landfills

Authors: Feten Chihi, Gabriella Varga

Abstract:

The world's most prevalent waste management strategy is landfills. However, it grew more difficult due to a lack of acceptable waste sites. In order to develop larger landfills and extend their lifespan, the purpose of this article is to expand the capacity of the construction by varying the slope's inclination and to examine its effect on the safety factor. The capacity change with tilt is mathematically determined. Using a new probabilistic calculation method that takes into account the heterogeneity of waste layers, the safety factor for various slope angles is examined. To assess the effect of slope variation on the overall safety of landfills, over a hundred computations were performed for each angle. It has been shown that capacity increases significantly with increasing inclination. Passing from 1:3 to 2:3 slope angles and from 1:3 to 1:2 slope angles, the volume of garbage that can be deposited increases by 40 percent and 25 percent, respectively, of the initial volume. The results of the safety factor indicate that slopes of 1:3 and 1:2 are safe when the standard method (homogenous waste) is used for computation. Using the new approaches, a slope with an inclination of 2:3 can be deemed safe, despite the fact that the calculation does not account for the safety-enhancing effect of daily cover layers. Based on the study reported in this paper, the malty layered nonhomogeneous calculating technique better characterizes the safety factor. As it more closely resembles the actual state of landfills, the employed technique allows for more flexibility in design parameters. This work represents a substantial advance in limiting both safe and economical landfills.

Keywords: landfill, municipal solid waste, slope inclination, capacity, safety factor

Procedia PDF Downloads 180
7819 Barriers to Social Sustainability in Afghan Residential Building Construction: An Exploratory Factor Analysis

Authors: Mohammad Qasim Mohammadi, Mohammad Arif Rohman

Abstract:

Although socially sustainable building is becoming increasingly popular worldwide, past studies indicate that when policymakers support sustainable building development, the social dimension is often given insufficient attention or entirely disregarded. There are not many studies that focus on the problems of socially sustainable buildings in Afghanistan. This research investigates the factors that may hinder social sustainability implementation in residential building construction. The study will gather data from construction professionals by purposive sampling and employ Exploratory Factor Analysis (EFA) and Varimax for analysis. The results will undergo rigorous examination and thorough discussion. The expected results in this research will analyze the underlying barrier structure (factors) that hinder social sustainability, and each of these factors will represent a set of observed variables. In addition, the factor loadings show which barriers pose the greatest challenges. The primary goal of this study is to provide valuable insights into the impediment factors of social sustainability within the residential building environment, aiming to inform decision-making in the industry and encourage the adoption of more socially sustainable construction practices.

Keywords: social sustainability, residential building, barriers, drivers, afghanistan, factor analysis

Procedia PDF Downloads 34
7818 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 535
7817 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 633
7816 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 349
7815 A Numerical Study of Seismic Effects on Slope Stability Using Node-Based Smooth Finite Element Method

Authors: H. C. Nguyen

Abstract:

This contribution considers seismic effects on the stability of slope and footing resting on a slope. The seismic force is simply treated as static inertial force through the values of acceleration factor. All domains are assumed to be plasticity deformations approximated using node-based smoothed finite element method (NS-FEM). The failure mechanism and safety factor were then explored using numerical procedure based on upper bound approach in which optimization problem was formed as second order cone programming (SOCP). The data obtained confirm that upper bound procedure using NS-FEM and SOCP can give stable and rapid convergence results of seismic stability factors.

Keywords: upper bound analysis, safety factor, slope stability, footing resting on slope

Procedia PDF Downloads 104
7814 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 147
7813 Legal Framework of Islamic Social Finance to Support M40 Income Group in Malaysia

Authors: Azlin Suzana Salim

Abstract:

The 12th Malaysian Plan 2021-2025, issued by the Economic Planning Unit in 2021, outlined one of the six important priorities to support M40 towards equitable society. The Financial Sector Blueprint 2022-2026, released by Bank Negara Malaysia in 2022, further outlined the fifth key thrust focusing on Islamic Social Finance. The purpose of this research is to examine the Legal Framework of bridging Islamic Social Finance to support M40 Income Group in Malaysia. This study adopts a doctrinal legal research method to examine the laws and regulations governing Islamic Social Finance in Malaysia and a qualitative method to examine the Islamic Social Finance Instrument to support the M40 income group. The implication of this study is important to propose the legal framework and bridge the Islamic Social Finance instrument to support the M40 income group in Malaysia. The significance of this study is to realign between priorities of the 12th Malaysian Plan 2021-2025 and the Financial Sector Blueprint 2022-2026.

Keywords: legal framework, Islamic social finance, m40 income group, law and regulation

Procedia PDF Downloads 59
7812 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 98
7811 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 232
7810 Evaluation of Subsurface Drilling and Geo Mechanic Properties Based on Stratum Index Factor for Humanities Environment

Authors: Abdull Halim Abdul, Muhaimin Sulam

Abstract:

This paper is about a subsurface study of Taman Pudu Ulu, Cheras, Kuala Lumpur with emphasize of Geo mechanic properties based on stratum index factor in humanities environment. Subsurface drilling and seismic data were used to understand the subsurface condition of the study area such as the type and thickness of the strata. Borehole and soil samples were recovered Geo mechanic properties of the area by conducting number of experiments. Taman Pudu Ulu overlies the Kuala Lumpur Limestone formation that is known for its karstic features such as caves and cavities. Hence by knowing the Geo mechanic properties such as the normal strain and shear strain we can plan a safer and economics construction that is plan at the area in the future.

Keywords: stratum, index factor, geo mechanic properties, humanities environment

Procedia PDF Downloads 490
7809 Synergism in the Inquiry Lab: An Analysis of Time Targets and Achievement

Authors: John M. Basey, Clinton D. Francis, Maxwell B. Joseph

Abstract:

After gathering data from experimental procedures, inquiry-oriented-science labs often allow students the freedom to stay and complete the write up in class or leave lab early and complete the write up later. Teachers must decide whether to allow students this freedom to self-regulate this time. Student interviews have indicated four time-target strategies that may influence how students utilize this time: grade-target-A, grade-target-C, time-limited, and proficiency. The hypothesis tested was that variability in class composition relative to the four grade-target strategies has an impact on when students leave class, which in turn may influence their overall learning as exemplified by grades. Students were divided into the four indicated groups with a survey. Class composition and the GTA teaching the class had significant impacts on how long students stayed in class with class composition having the greatest impact. A factor analysis identified two factors. Factor 1 included classes with percentages of grade-target students opposite time-limited/proficiency students and explained 43% of the variance. Factor 2 included classes with percentages of grade-target-A/proficiency students opposite grade-target-C students and explained 33% of the variance. Students who stayed longer received significantly higher grades (P = 0.008) with no significant relationships between grade and Factor 1 or Factor 2 (P > 0.05). The time students stayed in class was significantly positively related to Factor 1 (P = 0.006) and significantly negatively related to Factor 2 (P = 0.008). These results support the hypothesis and indicate that teachers may want to know the composition of student-target strategies before deciding on how to have students allocate study time at the end of inquiry-oriented labs. According to these results, ideal classes for self-regulation have a high proportion of proficiency and time-limited students and a low proportion of grade-target students, or a high proportion of grade-target-A and proficiency students and a low proportion of grade-target-C students. Non-ideal classes for self-regulation were comprised of the inverse proportions.

Keywords: grades, inquiry lab design, synergism in student motivation, class composition

Procedia PDF Downloads 119
7808 The Development of a Miniaturized Raman Instrument Optimized for the Detection of Biosignatures on Europa

Authors: Aria Vitkova, Hanna Sykulska-Lawrence

Abstract:

In recent years, Europa has been one of the major focus points in astrobiology due to its high potential of harbouring life in the vast ocean underneath its icy crust. However, the detection of life on Europa faces many challenges due to the harsh environmental conditions and mission constraints. Raman spectroscopy is a highly capable and versatile in-situ characterisation technique that does not require any sample preparation. It has only been used on Earth to date; however, recent advances in optical and laser technology have also allowed it to be considered for extraterrestrial exploration. So far, most efforts have been focused on the exploration of Mars, the most imminent planetary target. However, as an emerging technology with high miniaturization potential, Raman spectroscopy also represents a promising tool for the exploration of Europa. In this study, the capabilities of Raman technology in terms of life detection on Europa are explored and assessed. Spectra of biosignatures identified as high priority molecular targets for life detection on Europa were acquired at various excitation wavelengths and conditions analogous to Europa. The effects of extremely low temperatures and low concentrations in water ice were explored and evaluated in terms of the effectiveness of various configurations of Raman instruments. Based on the findings, a design of a miniaturized Raman instrument optimized for in-situ detection of life on Europa is proposed.

Keywords: astrobiology, biosignatures, Europa, life detection, Raman Spectroscopy

Procedia PDF Downloads 197