Search results for: salt and peppers attacks
432 Identification and Characterisation of Oil Sludge Degrading Bacteria Isolated from Compost
Authors: O. Ubani, H. I. Atagana, M. S. Thantsha, R. Adeleke
Abstract:
The oil sludge components (polycyclic aromatic hydrocarbons, PAHs) have been found to be cytotoxic, mutagenic and potentially carcinogenic and microorganisms such as bacteria and fungi can degrade the oil sludge to less toxic compounds such as carbon dioxide, water and salts. In the present study, we isolated different bacteria with PAH-degrading potentials from the co-composting of oil sludge and different animal manure. These bacteria were isolated on the mineral base medium and mineral salt agar plates as a growth control. A total of 31 morphologically distinct isolates were carefully selected from 5 different compost treatments for identification using polymerase chain reaction (PCR) of the 16S rDNA gene with specific primers (16S-P1 PCR and 16S-P2 PCR). The amplicons were sequenced and sequences were compared with the known nucleotides from the gene bank database. The phylogenetical analyses of the isolates showed that they belong to 3 different clades namely Firmicutes, Proteobacteria and Actinobacteria. These bacteria identified were closely related to genera Bacillus, Arthrobacter, Staphylococcus, Brevibacterium, Variovorax, Paenibacillus, Ralstonia and Geobacillus species. The results showed that Bacillus species were more dominant in all treated compost piles. Based on their characteristics these bacterial isolates have high potential to utilise PAHs of different molecular weights as carbon and energy sources. These identified bacteria are of special significance in their capacity to emulsify the PAHs and their ability to utilize them. Thus, they could be potentially useful for bioremediation of oil sludge and composting processes.Keywords: bioaugmentation, biodegradation, bioremediation, composting, oil sludge, PAHs, animal manures
Procedia PDF Downloads 253431 Influence of Layer-by-Layer Coating Parameters on the Properties of Hybrid Membrane for Water Treatment
Authors: Jenny Radeva, Anke-Gundula Roth, Christian Goebbert, Robert Niestroj-Pahl, Lars Daehne, Axel Wolfram, Juergen WIese
Abstract:
The presented investigation studies the correlation between the process parameters of Layer-by-Layer (LbL) coatings and properties of the produced hybrid membranes for water treatment. The coating of alumina ceramic support membrane with polyelectrolyte multilayers on top results in hybrid membranes with increased fouling resistant behavior, high retention (up to 90%) of salt ions and various pharmaceuticals, selectivity to various organic molecules as known from LbL coated polyether sulfone membranes and the possibility of pH response control. Chosen polyelectrolytes were added to the support using the LbL-coating process. Parameters like the type of polyelectrolyte, ionic strength, and pH were varied in order to find the most suitable process conditions and to study how they influence the properties of the final product. The applied LbL-films was investigated in respect to its homogeneity and penetration depth. The analysis of the layer buildup was performed using fluorescence labeled polyelectrolyte molecules and Confocal Laser Scanning Microscopy as well as Scanning and Transmission Electron Microscopy. Furthermore, the influence of the coating parameters on the porosity, surface potential, retention, and permeability of the developed hybrid membranes were estimated. In conclusion, a comparison was drawn between the filtration performance of the uncoated alumina ceramic membrane and modified hybrid membranes.Keywords: water treatment, membranes, ceramic membranes, hybrid membranes, layer-by-layer modification
Procedia PDF Downloads 180430 Solar Energy Applications in Seawater Distillation
Authors: Yousef Abdulaziz Almolhem
Abstract:
Geographically, the most Arabic countries locate in areas confined to arid or semiarid regions. For this reason, most of our countries have adopted the seawater desalination as a strategy to overcome this problem. For example, the water supply of AUE, Kuwait, and Saudi Arabia is almost 100% from the seawater desalination plants. Many areas in Saudia Arabia and other countries in the world suffer from lack of fresh water which hinders the development of these areas, despite the availability of saline water and high solar radiation intensity. Furthermore, most developing countries do not have sufficient meteorological data to evaluate if the solar radiation is enough to meet the solar desalination. A mathematical model was developed to simulate and predict the thermal behavior of the solar still which used direct solar energy for distillation of seawater. Measurement data were measured in the Environment and Natural Resources Department, Faculty of Agricultural and Food sciences, King Faisal University, Saudi Arabia, in order to evaluate the present model. The simulation results obtained from this model were compared with the measured data. The main results of this research showed that there are slight differences between the measured and predicted values of the elements studied, which is resultant from the change of some factors considered constants in the model such as the sky clearance, wind velocity and the salt concentration in the water in the basin of the solar still. It can be concluded that the present model can be used to estimate the average total solar radiation and the thermal behavior of the solar still in any area with consideration to the geographical location.Keywords: mathematical model, sea water, distillation, solar radiation
Procedia PDF Downloads 283429 A Concept of Rational Water Management at Local Utilities: The Use of RO for Water Supply and Wastewater Treatment/Reuse
Authors: N. Matveev, A. Pervov
Abstract:
Local utilities often face problems of local industrial wastes, storm water disposal due to existing strict regulations. For many local industries, the problem of wastewater treatment and discharge into surface reservoirs can’t be solved through the use of conventional biological treatment techniques. Current discharge standards require very strict removal of a number of impurities such as ammonia, nitrates, phosphate, etc. To reach this level of removal, expensive reagents and sorbents are used. The modern concept of rational water resources management requires the development of new efficient techniques that provide wastewater treatment and reuse. As RO membranes simultaneously reject all dissolved impurities such as BOD, TDS, ammonia, phosphates etc., they become very attractive for the direct treatment of wastewater without biological stage. To treat wastewater, specially designed membrane "open channel" modules are used that do not possess "dead areas" that cause fouling or require pretreatment. A solution to RO concentrate disposal problem is presented that consists of reducing of initial wastewater volume by 100 times. Concentrate is withdrawn from membrane unit as sludge moisture. The efficient use of membrane RO techniques is connected with a salt balance in water system. Thus, to provide high ecological efficiency of developed techniques, all components of water supply and wastewater discharge systems should be accounted for.Keywords: reverse osmosis, stormwater treatment, open-channel module, wastewater reuse
Procedia PDF Downloads 319428 Amelioration of Salinity Stress in Spinach (Spinace oleracae) by Exogenous Application of Triacontanol
Authors: Ameer Khan, Iffat Jamal, Ambreen Azam
Abstract:
An experiment was conducted in the Department of Botany, University of Sargodha to observe the amelioration of salinity stress in spinach (Spinacia oleracea) by exogenous application of Triacontanol. Two spinach cultivars (Spinacea oleracea and Rumax dentatus) were obtained from the Agriculture Research institute, Faisalabad. This experiment was conducted in pots. Each pot was filled with 9kg mixture of (sand + soil). Different salinity levels (0mM, 60mM, and 120mM) were created with NaCl according to the saturation percentage of soil after two weeks of seed germination. After the two weeks of salinity treatment, different levels of Triacontanol (0µM, 10µM, 20µM) were applied as foliar spray. Triacontanol was applied along with Tween 80 as surfactant. After the two weeks of Triacontanol application different growth, physiological and biochemical parameters were collected from the experimental study. Both treatments of Triacontanol (10µM, 20µM) were effective to ameliorate the effect of salinity, but 20µM Triacontanol was more effective to increase the shoot length, shoot, root fresh and dry weight. Chlorophyll contents were (chl a, chl b, total chl). Different biochemical parameters were also collected from experimental study. Saline growth medium increased the accumulation of protein and decreased the total free amino acids, and total soluble sugar under salt stress. Application of Triacontanol increased the protein contents. Overall, Application of triacontanol mitigated the effect of salinity.Keywords: salinity, triacontanol, spinach, biochemical, physiological
Procedia PDF Downloads 297427 Representation of Pashtuns in the Context of Terrorism: A Comparative Study of Bollywood and Lollywood Movies After 9/11
Authors: Aamir Ayub, Yasir Shehzad, Shakeel Ahmad
Abstract:
This research paper aims to understand how the Pashtuns have been represented in relationship to terrorism in post-9/11 Bollywood and Lollywood movies. It focuses particularly on ‘Torbaaz’ from Bollywood and ‘Waar’ from Lollywood in order to define the nature of Pashtun characterization, the functioning of intelligence agencies, as well as the socio-political side of the represented narratives. In this research, the analytical approach developed is applied to contemplate how these films represent or fail to represent Pashtun identity, taking into consideration the cultural, historical and social dimensions. The study also aims to examine the effects of the media, particularly on the different ethnic groups’ perceptions of terrorism. In this case, it covers how the movie relates actual events in society – specifically, socio-political – to the messages in the film regarding the Pashtun people and their portrayal. Such elements may constitute the portrayal of intelligence agencies and their fight against terrorism, state-security dynamics, and the Pashtun society. In conclusion, this research paper focuses on the representation of Pashtuns in films after 9/11 and addresses the issue concerning the representation of ethnic groups in the method of the theme of terrorism. It provides ideas about the role of media in influencing the mind of the society and their attitude towards certain communities after geopolitics upheavals.Keywords: pashtun representation, terrorism, 9/11 attacks, socio-political implications, ethnic representation in media
Procedia PDF Downloads 21426 Indonesia's War on Terror and the Consequences on Indonesian Political System
Authors: Salieg L. Munestri
Abstract:
War on Terror became a principal war after the 9/11 attacks on U.S. homeland. Instead of helping to build up worldwide efforts to condemn terror and suicide bombings, the U.S.-led war on terror has given opportunities for the vast spread of terror. In much of Muslim world recently, the Bush’s Doctrine pushing all nations to choose sides in a war that is not truly a war has resulted worse effects. In the world’s most populous Muslim nation, Indonesia, more terror occurred since then. Instead of reinforcing the well-trained anti-terror military forces, Indonesian government established US-funded Special Detachment 88 to guarantee the accomplishment of war on terror in Indonesia and significantly to bring impact on regional security atmosphere. Indonesia is a potential power in Asia but it lacked off sophisticated military equipments. Consequently, Indonesia agrees to become a U.S. mutual partner in combating terrorism managed by Defense Security Cooperation Agency. The formation of elite anti-terror forces and U.S. partnerships perform Indonesia’s commitment to take a position beside the U.S. in coping with terrorism issue. However, this undeniably brings consequences on Indonesian political athmosphere, which encourages the writer to dig deep the consequences on the domestic environment of Indonesian political system. The establishment of the elite forces has aroused fluctuations within government, chiefly Indonesian House, concerning the establishment urgency, the large amount of funding, and the unpleasant performances, particularly the treatment toward suspected terrorists. Hence, evaluation process upon the Detachment 88 is highly demanding.Keywords: anti-terror forces, Indonesia, political system, war on terror
Procedia PDF Downloads 346425 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability
Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi
Abstract:
There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitizationKeywords: cybersecurity, supply chain methodology, secure substation, digitization
Procedia PDF Downloads 64424 Principle Component Analysis on Colon Cancer Detection
Authors: N. K. Caecar Pratiwi, Yunendah Nur Fuadah, Rita Magdalena, R. D. Atmaja, Sofia Saidah, Ocky Tiaramukti
Abstract:
Colon cancer or colorectal cancer is a type of cancer that attacks the last part of the human digestive system. Lymphoma and carcinoma are types of cancer that attack human’s colon. Colon cancer causes deaths about half a million people every year. In Indonesia, colon cancer is the third largest cancer case for women and second in men. Unhealthy lifestyles such as minimum consumption of fiber, rarely exercising and lack of awareness for early detection are factors that cause high cases of colon cancer. The aim of this project is to produce a system that can detect and classify images into type of colon cancer lymphoma, carcinoma, or normal. The designed system used 198 data colon cancer tissue pathology, consist of 66 images for Lymphoma cancer, 66 images for carcinoma cancer and 66 for normal / healthy colon condition. This system will classify colon cancer starting from image preprocessing, feature extraction using Principal Component Analysis (PCA) and classification using K-Nearest Neighbor (K-NN) method. Several stages in preprocessing are resize, convert RGB image to grayscale, edge detection and last, histogram equalization. Tests will be done by trying some K-NN input parameter setting. The result of this project is an image processing system that can detect and classify the type of colon cancer with high accuracy and low computation time.Keywords: carcinoma, colorectal cancer, k-nearest neighbor, lymphoma, principle component analysis
Procedia PDF Downloads 205423 High-Temperature Behavior of Boiler Steel by Friction Stir Processing
Authors: Supreet Singh, Manpreet Kaur, Manoj Kumar
Abstract:
High temperature corrosion is an imperative material degradation method experienced in thermal power plants and other energy generation sectors. Metallic materials such as ferritic steels have special properties such as easy fabrication and machinibilty, low cost, but a serious drawback of these materials is the worsening in properties initiating from the interaction with the environments. The metallic materials do not endure higher temperatures for extensive period of time because of their poor corrosion resistance. Friction Stir Processing (FSP), has emerged as the potent surface modification means and control of microstructure in thermo mechanically heat affecting zones of various metal alloys. In the current research work, FSP was done on the boiler tube of SA 210 Grade A1 material which is regularly used by thermal power plants. The strengthening of SA210 Grade A1 boiler steel through microstructural refinement by Friction Stir Processing (FSP) and analyze the effect of the same on high temperature corrosion behavior. The high temperature corrosion performance of the unprocessed and the FSPed specimens were evaluated in the laboratory using molten salt environment of Na₂SO₄-82%Fe₂(SO₄). The unprocessed and FSPed low carbon steel Gr A1 evaluation was done in terms of microstructure, corrosion resistance, mechanical properties like hardness- tensile. The in-depth characterization was done by EBSD, SEM/EDS and X-ray mapping analyses with an aim to propose the mechanism behind high temperature corrosion behavior of the FSPed steel.Keywords: boiler steel, characterization, corrosion, EBSD/SEM/EDS/XRD, friction stir processing
Procedia PDF Downloads 237422 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand
Authors: John Battersby, Rhys Ball
Abstract:
After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.Keywords: academic, counter terrorism, intelligence, practitioner, research, security
Procedia PDF Downloads 108421 Sociodemographic Approach to Juveniles Directed to Delinquent Behaviour in Zonguldak
Authors: Riza Yilmaz, Samet Kiyak, Sezin Nur Yilmaz, Yasemin Yilmaz
Abstract:
Child delinquency has been increasing in our country as well as in many countries of the world. Child intelligence, abilities, family's social environment and life conditions are the factors which affect the child delinquency. The reports of 73 cases ages of 12-15 which were sent to the University of Bulent Ecevit, School of Medicine, Forensic Medicine Department between January 2011-September 2015, in order to evaluate medically, children pushed to crime by the judicial authorities are examined in terms of age, gender, educational background, place of residence, reasons for being sent, whether it’s a repeating crime or not, type of intelligence test, results revealed by forensic medicine and department of mental and neurological disorders. When children pushed to crime examined in terms of their crimes, the most common type of crime was identified as theft (n = 24). The crimes with 19 physical attacks and 12 sexual abuse were seen. Following that other 12 crimes were determined as damage to property, hemp crop, insult, incitement to crime, forgery of private documents, illegal excavation, threatening, involuntary manslaughter. The alleged crimes in 6 cases were more than one. The children pushed to crime are one of the major social problems of many countries. In this sense, it is not only the responsibility of government agencies to protect children pushed to crime, also, the civil society organizations should take place in this struggle.Keywords: delinquent behaviour, forensic medicine, crime, punishment
Procedia PDF Downloads 437420 Stimulation of Stevioside Accumulation on Stevia rebaudiana (Bertoni) Shoot Culture Induced with Red LED Light in TIS RITA® Bioreactor System
Authors: Vincent Alexander, Rizkita Esyanti
Abstract:
Leaves of Stevia rebaudiana contain steviol glycoside which mainly comprise of stevioside, a natural sweetener compound that is 100-300 times sweeter than sucrose. Current cultivation method of Stevia rebaudiana in Indonesia has yet to reach its optimum efficiency and productivity to produce stevioside as a safe sugar substitute sweetener for people with diabetes. An alternative method that is not limited by environmental factor is in vitro temporary immersion system (TIS) culture method using recipient for automated immersion (RITA®) bioreactor. The aim of this research was to evaluate the effect of red LED light induction towards shoot growth and stevioside accumulation in TIS RITA® bioreactor system, as an endeavour to increase the secondary metabolite synthesis. The result showed that the stevioside accumulation in TIS RITA® bioreactor system induced with red LED light for one hour during night was higher than that in TIS RITA® bioreactor system without red LED light induction, i.e. 71.04 ± 5.36 μg/g and 42.92 ± 5.40 μg/g respectively. Biomass growth rate reached as high as 0.072 ± 0.015/day for red LED light induced TIS RITA® bioreactor system, whereas TIS RITA® bioreactor system without induction was only 0.046 ± 0.003/day. Productivity of Stevia rebaudiana shoots induced with red LED light was 0.065 g/L medium/day, whilst shoots without any induction was 0.041 g/L medium/day. Sucrose, salt, and inorganic consumption in both bioreactor media increased as biomass increased. It can be concluded that Stevia rebaudiana shoot in TIS RITA® bioreactor induced with red LED light produces biomass and accumulates higher stevioside concentration, in comparison to bioreactor without any light induction.Keywords: LED, Stevia rebaudiana, Stevioside, TIS RITA
Procedia PDF Downloads 370419 Lockit: A Logic Locking Automation Software
Authors: Nemanja Kajtez, Yue Zhan, Basel Halak
Abstract:
The significant rise in the cost of manufacturing of nanoscale integrated circuits (IC) has led the majority of IC design companies to outsource the fabrication of their products to other companies, often located in different countries. This multinational nature of the hardware supply chain has led to a host of security threats, including IP piracy, IC overproduction, and Trojan insertion. To combat that, researchers have proposed logic locking techniques to protect the intellectual properties of the design and increase the difficulty of malicious modification of its functionality. However, the adoption of logic locking approaches is rather slow due to the lack of the integration with IC production process and the lack of efficacy of existing algorithms. This work automates the logic locking process by developing software using Python that performs the locking on a gate-level netlist and can be integrated with the existing digital synthesis tools. Analysis of the latest logic locking algorithms has demonstrated that the SFLL-HD algorithm is one of the most secure and versatile in trading-off levels of protection against different types of attacks and was thus selected for implementation. The presented tool can also be expanded to incorporate the latest locking mechanisms to keep up with the fast-paced development in this field. The paper also presents a case study to demonstrate the functionality of the tool and how it could be used to explore the design space and compare different locking solutions. The source code of this tool is available freely from (https://www.researchgate.net/publication/353195333_Source_Code_for_The_Lockit_Tool).Keywords: design automation, hardware security, IP piracy, logic locking
Procedia PDF Downloads 182418 Disaster and Crisis Management Using Geographical Information System (GIS) during the Operation and Maintenance Stages of the Hyderabad Metro Rail in India
Authors: Sai Rajeev Reddy, Ishita Roy, M. Anji Reddy
Abstract:
The paper describes the importance of preventive measures and immediate Emergency logistics during accidents and unfortunate Disasters for the Hyderabad Metro Rails in their various stages of construction. This is the need of the modern generation where accidents, explosions, attacks and sudden crisis are frequent casualties which take huge tolls of life in the present world. The paper utilizes the workflow and application of Geographical information System (GIS) to provide information about problems and crisis structures for efficient Metro Transportation in the city. The study analyzes the difficulties and problems which cause accidents during operation and maintenance stages of the Metro Rail. The paper focuses upon the intermediate and firsthand information of Crisis with the help of GIS technology to share Disaster data for effective measures by the Cyber Police stations, Emergency Responders, Hospitals and First Aid Centre to act immediately and save lives. The results and conclusions have nevertheless proved very informative and useful for the safety board authorities of the Hyderabad Metro Rail. The operation and Maintenance are integral stages in the development of any Multipurpose transportation Projects and are usually prone to various Disasters and tragedies. Hence, the GIS technologies help in distribution of information among the masses with the web Technologies and advanced software developed to prevent and manage crisis widely and in a cost-benefits manner.Keywords: Geographical Information System, emergency assessment, accident zones, surveillance
Procedia PDF Downloads 566417 Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite
Authors: Zheng DianXun, Cheng Bo, Lin Hetong
Abstract:
This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite.Keywords: optical remote sensing satellite, satellite avoidance, virtual satellite, avoid target-point, avoid maneuver
Procedia PDF Downloads 404416 India, Pakistan and the US in the Afghan Imbroglio: The Way Forward
Authors: Saroj Kumar Rath
Abstract:
When insurgency erupted in Kashmir in 1989, it was quickly backed by Pakistan. Kashmir witnessed terrorism for more than a decade till 2004 when Indian forces decimated militancy. After the US pressure in 1992, terrorist training camps of Pakistan shifted to Afghanistan and al Qaeda and the Taliban had taken over training of Kashmiri militants in Afghanistan after 1997 as part of their global jihad. The Indo-Pak rivalry over Kashmir dispute had taken a new turn in the aftermath of 9/11 developments. Islamabad viewed its Afghan policy through the prism of denying India any advantage in Kabul. Pakistan was successful in refuting Indian presence in Kabul for a decade through the Taliban. After the 9/11 attacks the Inter Services Intelligence (ISI) saw Northern Alliance, supported by the Americans and all of Pakistan’s regional rivals – India, Iran, and Russia – as claiming victory in Kabul. For Pakistan’s military regime, this was a strategic disaster and prompted the ISI to give refuge to the escaping Taliban, while denying full support to Hamid Karzai. The new development in Afghanistan prompted India to establish a foothold it had lost nearly a decade earlier. India established diplomatic contacts with Afghanistan; supported the Karzai government and funded aid programs. Pakistan alleged that Indian agents are training Baloch and Sindhi dissidents in Pakistan through Afghanistan. Kabul had suddenly become the new Kashmir – the new battleground for India-Pakistan rivalry.Keywords: Afghan imbroglio, Kashmir conflict, Indo-Pak rivalry, US policy in South Asia
Procedia PDF Downloads 433415 Correlation Volumic Shrinkage, Conversion Degree of Dental Composites
Authors: A. Amirouche, M. Mouzali, D. C. Watts
Abstract:
During polymerization of dental composites, the volumic shrinkage is related to the conversion degree. The variation of the volumic shrinkage (S max according to the degree of conversion CD.), was examined for the experimental composites: (BisGMA/TEGDMA): (50/50), (75/25), (25/75) mixed with seven radiopac fillers: La2O3, BaO, BaSO4, SrO, ZrO2 , SrZrO3 and BaZrO 3 with different contents in weight, from 0 to 80%. We notice that whatever the filler and the composition in monomers, Smax increases with the increase in CD. This variation is, linear in particular in the case of the fillers containing only one heavy metal, and that whatever the composition in monomers. For a given salt, the increase of BisGMA composition leads to significant increase of S max more pronounced than the increase in CD. The variation of ratio (S max / CD.) with the increase of filler content is negligible. However the fillers containing two types of heavy metals have more effect on the volumic shrinkage than on the degree of conversion. Whatever the composition in monomer, and the content of filler containing only one heavy atom, S max increases with the increase in CD. Nevertheless, S max is affected by the viscosity of the medium compared with CD. For high percentages of mineral fillers (≥ 70% in weight), the diagrams S max according to CD are deviated of the linearity, owing to the fact that S max is affected by the high percentage of fillers compared with CD. The number of heavy atoms influences directly correlation (S max / CD.). In the case of the two mineral fillers: SrZrO3 and BaZrO3 ratio (S max / CD) moves away from the proportionality. The linearity of the diagrams Smax according to CD is less regular, due to the viscosity of high content of BisGMA. The study of Smax and DC of four commercial composites are presented and compared to elaborate experimental composites.Keywords: Dental composites, degree of conversion, volumic shrinkage, photopolymerization
Procedia PDF Downloads 373414 Towards the Modeling of Lost Core Viability in High-Pressure Die Casting: A Fluid-Structure Interaction Model with 2-Phase Flow Fluid Model
Authors: Sebastian Kohlstädt, Michael Vynnycky, Stephan Goeke, Jan Jäckel, Andreas Gebauer-Teichmann
Abstract:
This paper summarizes the progress in the latest computational fluid dynamics research towards the modeling in of lost core viability in high-pressure die casting. High-pressure die casting is a process that is widely employed in the automotive and neighboring industries due to its advantages in casting quality and cost efficiency. The degrees of freedom are however somewhat limited as it has been so far difficult to use lost cores in the process. This is right now changing and the deployment of lost cores is considered a future growth potential for high-pressure die casting companies. The use of this technology itself is difficult though. The strength of the core material, as chiefly salt is used, is limited and experiments have shown that the cores will not hold under all circumstances and process designs. For this purpose, the publicly available CFD library foam-extend (OpenFOAM) is used, and two additional fluid models for incompressible and compressible two-phase flow are implemented as fluid solver models into the FSI library. For this purpose, the volume-of-fluid (VOF) methodology is used. The necessity for the fluid-structure interaction (FSI) approach is shown by a simple CFD model geometry. The model is benchmarked against analytical models and experimental data. Sufficient agreement is found with the analytical models and good agreement with the experimental data. An outlook on future developments concludes the paper.Keywords: CFD, fluid-structure interaction, high-pressure die casting, multiphase flow
Procedia PDF Downloads 332413 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing
Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh
Abstract:
Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis
Procedia PDF Downloads 470412 Modelling Interactions between Saturated and Unsaturated Zones by Hydrus 1D, Plain of Kairouan, Central Tunisia
Authors: Mariem Saadi, Sabri Kanzari, Adel Zghibi
Abstract:
In semi-arid areas like the Kairouan region, the constant irrigation with saline water and the overuse of groundwater resources, soils and aquifers salinization has become an increasing concern. In this study, a methodology has been developed to evaluate the groundwater contamination risk based on the unsaturated zone hydraulic properties. Two soil profiles with different ranges of salinity, one located in the north of the plain and another one in the south of plain (each 30 m deep) and both characterized by direct recharge of the aquifer were chosen. Simulations were conducted with Hydrus-1D code using measured precipitation data for the period 1998-2003 and calculated evapotranspiration for both chosen profiles. Four combinations of initial conditions of water content and salt concentration were used for the simulation process in order to find the best match between simulated and measured values. The success of the calibration of Hydrus-1D allowed the investigation of some scenarios in order to assess the contamination risk under different natural conditions. The aquifer risk contamination is related to the natural conditions where it increased while facing climate change and temperature increase and decreased in the presence of a clay layer in the unsaturated zone. Hydrus-1D was a useful tool to predict the groundwater level and quality in the case of a direct recharge and in the absence of any information related to the soil layers except for the texture.Keywords: Hydrus-1D, Kairouan, salinization, semi-arid region, solute transport, unsaturated zone
Procedia PDF Downloads 183411 The Influence of Online Audience Response on Journalists
Authors: Raja Arslan Ahmad Khan
Abstract:
Audience feedback and data play an increasingly crucial role, particularly in the digital age. The advent of digital media and the digitalization of news have given rise to novel forms of audience feedback, markedly different from traditional channels. The engagement of online audiences challenges the conventional role of journalists, introducing a dynamic where audiences can wield both direct and indirect influence. This struggle between the audience and journalists is evident in their contributions and interactions. Media professionals are grappling with challenges such as derogatory remarks, hate speech, online harassment, audience hostility, and attacks from online audiences. The influence of online audiences extends to shaping journalists' daily routines and work practices. Consequently, this study seeks to analyze the impact of online audience feedback on journalists at a routine level within the Malaysian context. Employing a Hierarchy of Influence model as a theoretical framework, the study will utilize a quantitative approach with a snowball survey method. The study's findings aim to enhance our understanding of how online audiences influence journalists and their work practices, encompassing aspects like journalists' autonomy and integrity, editorial decision-making, performance and accountability, daily routines, work practices, as well as the psychological and emotional costs they bear. It's important to note that the study has limitations due to the use of the snowball survey method and its focus within the specific context of Malaysia, making it relatively small in scale.Keywords: online audiences, feedback, influence, journalists, Malaysia
Procedia PDF Downloads 67410 Stability Analysis of Rock Tunnel Subjected to Internal Blast Loading
Authors: Mohammad Zaid, Md. Rehan Sadique
Abstract:
Underground structures are an integral part of urban infrastructures. Tunnels are being used for the transportation of humans and goods from distance to distance. Terrorist attacks on underground structures such as tunnels have resulted in the improvement of design methodologies of tunnels. The design of underground tunnels must include anti-terror design parameters. The study has been carried out to analyse the rock tunnel when subjected to internal blast loading. The finite element analysis has been carried out for 30m by 30m of the cross-section of the tunnel and 35m length of extrusion of the rock tunnel model. The effect of tunnel diameter and overburden depth of tunnel has been studied under internal blast loading. Four different diameters of tunnel considered are 5m, 6m, 7m, and 8m, and four different overburden depth of tunnel considered are 5m, 7.5m, 10m, and 12.5m. The mohr-coulomb constitutive material model has been considered for the Quartzite rock. A concrete damage plasticity model has been adopted for concrete tunnel lining. For the trinitrotoluene (TNT) Jones-Wilkens-Lee (JWL) material model has been considered. Coupled-Eulerian-Lagrangian (CEL) approach for blast analysis has been considered in the present study. The present study concludes that a shallow tunnel having smaller diameter needs more attention in comparison to blast resistant design of deep tunnel having a larger diameter. Further, in the case of shallow tunnels, more bulging has been observed, and a more substantial zone of rock has been affected by internal blast loading.Keywords: finite element method, blast, rock, tunnel, CEL, JWL
Procedia PDF Downloads 147409 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 216408 The Trauma Suffered by Left behind Children and Its Impact on Their Emotional Development: A Pilot Study with Brazilian Immigrants in the United States
Authors: Liliane Clark
Abstract:
Immigrating to a different country may imply having to handle many difficult exertions. There is a particular issue that has to be endured by some immigrants: the children they had to leave behind. It is a phenomenon that occurs with certain frequency. Surprisingly, despite the fact that immigration in the United States is such a large proceeding, there is not much research about the topic in America exploring the trauma of the abandonment caused by this separation and its consequences on the mental health of those children. The term “left behind children” is usually applied to children who were left behind by their parents in their original nation under the care of a noteworthy relative, frequently the grandparents, when they moved to another country. This preliminary research, which is a partial study projected for a doctoral thesis, investigated whether the trauma of abandonment experienced by ten left behind children had affected their emotional development. The Strengths and Difficulties Questionnaire (SDQ) and a brief interview were utilized to assess the information. The SDQ explored scales such as emotional symptoms, conduct problems, hyperactivity, peer problems and prosocial behavior. In this pilot study, the results indicated that all these issues had some sort of significant correlation between them. During the interviews, the participants or their parents identified a range of symptoms: anxiety disorder, eating disorders, panic attacks, psychotic-like experiences, drug use and depression. Hence, it seems that there is a connection between the trauma of abandonment suffered due to the separation and the children’s consequent symptomatic behavior. Further studies are indeed necessary to validate the initial results of this investigation.Keywords: abandonment, parent migration, psychological problems, trauma
Procedia PDF Downloads 187407 Efficacy of Combined CHAp and Lanthanum Carbonate in Therapy for Hyperphosphatemia
Authors: Andreea Cârâc, Elena Morosan, Ana Corina Ionita, Rica Bosencu, Geta Carac
Abstract:
Lanthanum carbonate exhibits a considerable ability to bind phosphate and the substitution of Ca2+ ions by divalent or trivalent lanthanide metal ions attracted attention during the past few years. Although Lanthanum carbonate has not been approved by the FDA for treatment of hyperphosphatemia, we prospectively evaluated the efficacy of the combination of Calcium hydroxyapatite and Lanthanum carbonate for the treatment of hyperphosphatemia on mice. Calcium hydroxyapatite commonly referred as CHAp is a bioceramic material and is one of the most important implantable materials due to its biocompatibility and osteoconductivity. We prepared calcium hydroxyapatite and lanthanum carbonate. CHAp was prepared by co-precipitation method using Ca(OH)2, H3PO4, NH4OH with calcination at 1200ºC. Lanthanum carbonate was prepared by chemical method using NaHCO3 and LaCl3 at low pH environment , ph below 4.0 The confirmation of both substances structures was made using XRD characterization, FTIR spectra and SEM /EDX analysis. The study group included 20 subjects-mice divided into four groups according to the administered substance: lanthanum carbonate (group A), lanthanum carbonate + CHAp (group B), CHAp (group C) and salt water (group D). The results indicate a phosphate decrease when subjects (mice) were treated with CHAp and lanthanum carbonate (0.5 % CMC), in a single dose of 1500 mg/kg. Serum phosphate concentration decreased [from 4.5 ± 0.8 mg/dL) to 4.05 ± 0.2 mg/dL), P < 0.01] in group A and to 3.6 ± 0.2 mg/dL] only after the 24 hours of combination therapy. The combination of CHAp and lanthanum carbonate is a suitable regimen for hyperphosphatemia treatment subjects because it avoids both the hypercalcemia of CaCO3 and the adverse effects of CHAp. The ability of CHAp to decrease the serum phosphate concentration is 1/3 that of lanthanum carbonate.Keywords: calcium hydroxyapatite, hyperphosphatemia, lanthanum carbonate, phosphate, structures
Procedia PDF Downloads 378406 Development and Characterization of a Fluorinated-Ethylene-Propylene (FEP) Polymer Coating on Brass Faucets
Authors: S. Zouari, H. Ghorbel, H. Liao, R. Elleuch
Abstract:
Research is increasingly moving towards the use of surface treatment processes to limit environmental effects. Electrolytic plating has traditionally been seen as a way to protect brass products, especially faucets, from mechanical and chemical damage. However, this method was not effective industrially, economically and ecologically. The aim of this work is to develop non-usual polymer coatings for brass faucets in order to improve the performance of brass and to replace electrolytic chromium coatings, thereby reducing environmental impact. Fluorinated-Ethylene-Propylene polymer (FEP) was chosen for its excellent mechanical and chemical properties and its good environmental performance. This coating was developed by spraying (painting) process onto brass substrates. The coatings obtained were characterized using a scanning electron microscope to evaluate the morphology of the deposits and their porosity rate. Grid adhesion, surface energy and corrosion tests (salt spray) were also performed to evaluate the mechanical and chemical behavior of these coatings properly. The results show that the deposits obtained have a homogeneous microstructure with a very low porosity rate. The results of the grid adhesion test prove the conformity of the test according to the NF077 standard. The coatings have a hydrophobic character following the low values of surface energy obtained and a very good resistance to corrosion. These results are interesting and may represent real technological issues in the industrial field.Keywords: FEP coatings, spraying process, brass, adhesion, surface energy, corrosion resistance
Procedia PDF Downloads 141405 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 218404 Synthesis of New Bio-Based Solid Polymer Electrolyte Polyurethane-Liclo4 via Prepolymerization Method: Effect of NCO/OH Ratio on Their Chemical, Thermal Properties and Ionic Conductivity
Authors: C. S. Wong, K. H. Badri, N. Ataollahi, K. P. Law, M. S. Su’ait, N. I. Hassan
Abstract:
Novel bio-based polymer electrolyte was synthesized with LiClO4 as the main source of charge carrier. Initially, polyurethane-LiClO4 polymer electrolytes were synthesized via polymerization method with different NCO/OH ratios and labelled as PU1, PU2, PU3, and PU4. Subsequently, the chemical, thermal properties and ionic conductivity of the films produced were determined. Fourier transform infrared (FTIR) analysis indicates the co-ordination between Li+ ion and polyurethane in PU1 due to the greatest amount of hard segment of polyurethane in PU1 as proven by soxhlet analysis. The structures of polyurethanes were confirmed by 13 nuclear magnetic resonance spectroscopy (13C NMR) and FTIR spectroscopy. Differential scanning calorimetry (DSC) analysis indicates PU 1 has the highest glass transition temperature (Tg) corresponds to the most abundant urethane group which is the hard segment in PU1. Scanning electron microscopy (SEM) of the PU-LiClO4 shows the good miscibility between lithium salt and the polymer. The study found that PU1 possessed the greatest ionic conductivity (1.19 × 10-7 S.cm-1 at 298 K and 5.01 × 10-5 S.cm-1 at 373 K) and the lowest activation energy, Ea (0.32 eV) due to the greatest amount of hard segment formed in PU 1 induces the coordination between lithium ion and oxygen atom of carbonyl group in polyurethane. All the polyurethanes exhibited linear Arrhenius variations indicating ion transport via simple lithium ion hopping in polyurethane. This research proves the NCO content in polyurethane plays an important role in affecting the ionic conductivity of this polymer electrolyte.Keywords: ionic conductivity, palm kernel oil-based monoester-OH, polyurethane, solid polymer electrolyte
Procedia PDF Downloads 425403 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides
Authors: Maria Elisabete Costa Ferreira
Abstract:
Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force
Procedia PDF Downloads 64