Search results for: interest flooding attack
3869 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments
Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem
Abstract:
The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar
Procedia PDF Downloads 2353868 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar
Abstract:
This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI
Procedia PDF Downloads 953867 Accounting Propositions for Sustainability Performance Information Systems Introduction: Environmental Attributes from Croatian Hotels
Authors: Vanja Vejzagic, Jackie Brander Brown, Peter Schmidt
Abstract:
Purpose: For some time now, the global hotel industry trends are strongly oriented towards sustainable development and environmental management accounting (EMA) should have the supporting role for hotel’s corporate social responsibility (CSR) management. The aim of this paper is thus to analyse and present data on the key steps leading toward the effective incorporation of EMA within hotel performance information systems. Design/Methodology/Approach: The research study is a continuation of the process carried out on the sample of 20 eco-hotels in the UK, a year ago. Research evidence was obtained via in-depth case studies on sample of 180 hotels (4 and 5 stars hotels) located in Croatia. Research was conducted through interviews with key personnel and an online survey which specifically focused on 10 business areas considered vital for successful EMA integration. Findings: The research results indicate a pattern by which hotels can determine the existing level of their sustainable (environmental) business. Furthermore, the management understanding of the sustainability concept was still proven to lead to a relatively subjective appreciation and presentation of sustainable hotel operations and their performance. It was determined that majority of analysed hotel organisations reflect typical short-term, financially oriented performance information systems. Steps for EMA introduction have been offered. Research Limitations/Implications: CSR is still a broad-set concept. Exploring the effects of EMA on such-like a defined management system may be subject to considerable influence of the respondent’s subjective perception of the concept. Originality/Value: This article should be of interest to higher education academics and careers staff who have an interest in CSR introduction and the ways of implementing its informational support for performance measurement.Keywords: environmental management accounting, EMA, corporate social responsibility, CSR, sustainability, hotel
Procedia PDF Downloads 1743866 A Hybrid Energy Storage Module for the Emergency Energy System of the Community Shelter in Yucatán, México
Authors: María Reveles-Miranda, Daniella Pacheco-Catalán
Abstract:
Sierra Papacal commissary is located north of Merida, Yucatan, México, where the indigenous Maya population predominates. Due to its location, the region has an elevation of fewer than 4.5 meters above sea level, with a high risk of flooding associated with storms and hurricanes and a high vulnerability of infrastructure and housing in the presence of strong gusts of wind. In environmental contingencies, the challenge is providing an autonomous electrical supply using renewable energy sources that cover vulnerable populations' health, food, and water pumping needs. To address this challenge, a hybrid energy storage module is proposed for the emergency photovoltaic (PV) system of the community shelter in Sierra Papacal, Yucatán, which combines high-energy-density batteries and high-power-density supercapacitors (SC) in a single module, providing a quick response to energy demand, reducing the thermal stress on batteries and extending their useful life. Incorporating SC in energy storage modules can provide fast response times to power variations and balanced energy extraction, ensuring a more extended period of electrical supply to vulnerable populations during contingencies. The implemented control strategy increases the module's overall performance by ensuring the optimal use of devices and balanced energy exploitation. The operation of the module with the control algorithm is validated with MATLAB/Simulink® and experimental tests.Keywords: batteries, community shelter, environmental contingencies, hybrid energy storage, isolated photovoltaic system, supercapacitors
Procedia PDF Downloads 913865 Sustainable Water Supply: Rainwater Harvesting as Flood Reduction Measures in Ibadan, Nigeria
Authors: Omolara Lade, David Oloke
Abstract:
Ibadan City suffers serious water supply problems; cases of dry taps are common in virtually every part of the City. The scarcity of piped water has made communities find alternative water sources; groundwater sources being a ready source. These wells are prone to pollution due to the close proximity of septic tanks to wells, disposal of solid or liquid wastes in pits, abandoned boreholes or even stream channels and landfills. Storms and floods in Ibadan have increased with consequent devastating effects claiming over 120 lives and displacing 600 people on August 2011 alone. In this study, an analysis of the water demand and sources of supply for the city was carried out through questionnaire survey and collection of data from City’s main water supply - Water Corporation of Oyo State (WCOS), groundwater sources were explored and 30 years rainfall data were collected from Meteorological station in Ibadan. 1067 questionnaire were administered at household level with a response rate of 86.7 %. A descriptive analysis of the survey revealed that 77.1 % of the respondents did not receive water at all from WCOS while 83.8 % depend on groundwater sources. Analysis of data from WCOS revealed that main water supply is inadequate as < 10 % of the population water demand was met. Rainfall intensity is highest in June with a mean value of 188 mm, which can be harvested at community—based level and used to complement the population water demand. Rainwater harvesting if planned, and managed properly will become a valuable alternative source of managing urban flood and alleviating water scarcity in the city.Keywords: Ibadan, rainwater harvesting, sustainable water, urban flooding
Procedia PDF Downloads 1823864 Numerical Study on Parallel Rear-Spoiler on Super Cars
Authors: Anshul Ashu
Abstract:
Computers are applied to the vehicle aerodynamics in two ways. One of two is Computational Fluid Dynamics (CFD) and other is Computer Aided Flow Visualization (CAFV). Out of two CFD is chosen because it shows the result with computer graphics. The simulation of flow field around the vehicle is one of the important CFD applications. The flow field can be solved numerically using panel methods, k-ε method, and direct simulation methods. The spoiler is the tool in vehicle aerodynamics used to minimize unfavorable aerodynamic effects around the vehicle and the parallel spoiler is set of two spoilers which are designed in such a manner that it could effectively reduce the drag. In this study, the standard k-ε model of the simplified version of Bugatti Veyron, Audi R8 and Porsche 911 are used to simulate the external flow field. Flow simulation is done for variable Reynolds number. The flow simulation consists of three different levels, first over the model without a rear spoiler, second for over model with single rear spoiler, and third over the model with parallel rear-spoiler. The second and third level has following parameter: the shape of the spoiler, the angle of attack and attachment position. A thorough analysis of simulations results has been found. And a new parallel spoiler is designed. It shows a little improvement in vehicle aerodynamics with a decrease in vehicle aerodynamic drag and lift. Hence, it leads to good fuel economy and traction force of the model.Keywords: drag, lift, flow simulation, spoiler
Procedia PDF Downloads 5003863 Investigating the Flow Physics within Vortex-Shockwave Interactions
Authors: Frederick Ferguson, Dehua Feng, Yang Gao
Abstract:
No doubt, current CFD tools have a great many technical limitations, and active research is being done to overcome these limitations. Current areas of limitations include vortex-dominated flows, separated flows, and turbulent flows. In general, turbulent flows are unsteady solutions to the fluid dynamic equations, and instances of these solutions can be computed directly from the equations. One of the approaches commonly implemented is known as the ‘direct numerical simulation’, DNS. This approach requires a spatial grid that is fine enough to capture the smallest length scale of the turbulent fluid motion. This approach is called the ‘Kolmogorov scale’ model. It is of interest to note that the Kolmogorov scale model must be captured throughout the domain of interest and at a correspondingly small-time step. In typical problems of industrial interest, the ratio of the length scale of the domain to the Kolmogorov length scale is so great that the required grid set becomes prohibitively large. As a result, the available computational resources are usually inadequate for DNS related tasks. At this time in its development, DNS is not applicable to industrial problems. In this research, an attempt is made to develop a numerical technique that is capable of delivering DNS quality solutions at the scale required by the industry. To date, this technique has delivered preliminary results for both steady and unsteady, viscous and inviscid, compressible and incompressible, and for both high and low Reynolds number flow fields that are very accurate. Herein, it is proposed that the Integro-Differential Scheme (IDS) be applied to a set of vortex-shockwave interaction problems with the goal of investigating the nonstationary physics within the resulting interaction regions. In the proposed paper, the IDS formulation and its numerical error capability will be described. Further, the IDS will be used to solve the inviscid and viscous Burgers equation, with the goal of analyzing their solutions over a considerable length of time, thus demonstrating the unsteady capabilities of the IDS. Finally, the IDS will be used to solve a set of fluid dynamic problems related to flow that involves highly vortex interactions. Plans are to solve the following problems: the travelling wave and vortex problems over considerable lengths of time, the normal shockwave–vortex interaction problem for low supersonic conditions and the reflected oblique shock–vortex interaction problem. The IDS solutions obtained in each of these solutions will be explored further in efforts to determine the distributed density gradients and vorticity, as well as the Q-criterion. Parametric studies will be conducted to determine the effects of the Mach number on the intensity of vortex-shockwave interactions.Keywords: vortex dominated flows, shockwave interactions, high Reynolds number, integro-differential scheme
Procedia PDF Downloads 1373862 Characterization of White Spot Lesion Using Focused Ion Beam - Scanning Electron Microscopy
Authors: Malihe Moeinin, Robert Hill, Ferranti Wong
Abstract:
Background: A white spot lesion (WSL) is defined as subsurface enamel porosity from carious demineralisation on the smooth surfaces of the tooth. It appears as a milky white opacity. Lesions shown an apparently intact surface layer, followed underneath by the more porous lesion body. The small pores within the body of the lesion act as diffusion pathway for both acids and minerals, so allowing the demineralisation of enamel to occur at the advancing front of the lesion. Objectives: The objective is to mapthe porosity and its size on WSL with Focused Ion Bean- Scanning Electron Microscopy (FIB-SEM) Method: The basic method used for FIB-SEM consisted of depositing a one micron thick layer of platinum over 25μmx 25μm of the interest region of enamel. Then, making a rough cut (25μmx 5μmx 20μm) with 3nA current and 30Kv was applied with the help of drift suppression (DS), using a standard “cross-sectional” cutting pattern, which ended at the front of the deposited platinum layer. Two adjacent areas (25μmx 5μmx 20μm) on the both sides of the platinum layer were milled under the same conditions. Subsequent, cleaning cross-sections were applied to polish the sub-surface edge of interest running perpendicular to the surface. The "slice and view" was carried out overnight for milling almost 700 slices with 2Kv and 4nA and taking backscattered (BS) images. Then, images were imported into imageJ and analysed. Results: The prism structure is clearly apparent on FIB-SEM slices of WSL with the dissolution of prism boundaries as well as internal porosity within the prism itself. Porosity scales roughly 100-400nm, which is comparable to the light wavelength (500nm). Conclusion: FIB-SEM is useful to characterize the porosity of WSL and it clearly shows the difference between WSL and normal enamel.Keywords: white spot lesion, FIB-SEM, enamel porosity, porosity
Procedia PDF Downloads 943861 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century
Authors: Jimoh Yusuf Amuda
Abstract:
Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.Keywords: human, insecurity, security, terrorism
Procedia PDF Downloads 3413860 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 2533859 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)
Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi
Abstract:
Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.Keywords: vanname, shrimp, WSSV, viral protein 19
Procedia PDF Downloads 5353858 Risk Issues for Controlling Floods through Unsafe, Dual Purpose, Gated Dams
Authors: Gregory Michael McMahon
Abstract:
Risk management for the purposes of minimizing the damages from the operations of dams has met with opposition emerging from organisations and authorities, and their practitioners. It appears that the cause may be a misunderstanding of risk management arising from exchanges that mix deterministic thinking with risk-centric thinking and that do not separate uncertainty from reliability and accuracy from probability. This paper sets out those misunderstandings that arose from dam operations at Wivenhoe in 2011, using a comparison of outcomes that have been based on the methodology and its rules and those that have been operated by applying misunderstandings of the rules. The paper addresses the performance of one risk-centric Flood Manual for Wivenhoe Dam in achieving a risk management outcome. A mixture of engineering, administrative, and legal factors appear to have combined to reduce the outcomes from the risk approach. These are described. The findings are that a risk-centric Manual may need to assist administrations in the conduct of scenario training regimes, in responding to healthy audit reporting, and in the development of decision-support systems. The principal assistance needed from the Manual, however, is to assist engineering and the law to a good understanding of how risks are managed – do not assume that risk management is understood. The wider findings are that the critical profession for decision-making downstream of the meteorologist is not dam engineering or hydrology, or hydraulics; it is risk management. Risk management will provide the minimum flood damage outcome where actual rainfalls match or exceed forecasts of rainfalls, that therefore risk management will provide the best approach for the likely history of flooding in the life of a dam, and provisions made for worst cases may be state of the art in risk management. The principal conclusion is the need for training in both risk management as a discipline and also in the application of risk management rules to particular dam operational scenarios.Keywords: risk management, flood control, dam operations, deterministic thinking
Procedia PDF Downloads 873857 Lung Cancer Detection and Multi Level Classification Using Discrete Wavelet Transform Approach
Authors: V. Veeraprathap, G. S. Harish, G. Narendra Kumar
Abstract:
Uncontrolled growth of abnormal cells in the lung in the form of tumor can be either benign (non-cancerous) or malignant (cancerous). Patients with Lung Cancer (LC) have an average of five years life span expectancy provided diagnosis, detection and prediction, which reduces many treatment options to risk of invasive surgery increasing survival rate. Computed Tomography (CT), Positron Emission Tomography (PET), and Magnetic Resonance Imaging (MRI) for earlier detection of cancer are common. Gaussian filter along with median filter used for smoothing and noise removal, Histogram Equalization (HE) for image enhancement gives the best results without inviting further opinions. Lung cavities are extracted and the background portion other than two lung cavities is completely removed with right and left lungs segmented separately. Region properties measurements area, perimeter, diameter, centroid and eccentricity measured for the tumor segmented image, while texture is characterized by Gray-Level Co-occurrence Matrix (GLCM) functions, feature extraction provides Region of Interest (ROI) given as input to classifier. Two levels of classifications, K-Nearest Neighbor (KNN) is used for determining patient condition as normal or abnormal, while Artificial Neural Networks (ANN) is used for identifying the cancer stage is employed. Discrete Wavelet Transform (DWT) algorithm is used for the main feature extraction leading to best efficiency. The developed technology finds encouraging results for real time information and on line detection for future research.Keywords: artificial neural networks, ANN, discrete wavelet transform, DWT, gray-level co-occurrence matrix, GLCM, k-nearest neighbor, KNN, region of interest, ROI
Procedia PDF Downloads 1533856 Teaching English for Specific Purposes to Business Students through Social Media
Authors: Candela Contero Urgal
Abstract:
Using realia to teach English for Specific Purposes (ESP) is a must, as it is thought to be designed to meet the students’ real needs in their professional life. Teachers are then expected to offer authentic materials and set students in authentic contexts where their learning outcomes can be highly meaningful. One way of engaging students is using social networks as a way to bridge the gap between their everyday life and their ESP learning outcomes. It is in ESP, particularly in Business English teaching, that our study focuses, as the ongoing process of digitalization is leading firms to use social media to communicate with potential clients. The present paper is aimed at carrying out a case study in which different digital tools are employed as a way to offer a collection of formats businesses are currently using so as to internationalize and advertise their products and services. A secondary objective of our study will then be to progress on the development of multidisciplinary competencies students are to acquire during their degree. A two-phased study will be presented. The first phase will cover the analysis of course tasks accomplished by undergraduate students at the University of Cadiz (Spain) in their third year of the Degree in Business Management and Administration by comparing the results obtained during the years 2019 to 2021. The second part of our study will present a survey conducted to these students in 2021 and 2022 so as to verify their interest in learning new ways to digitalize as well as internationalize their future businesses. Findings will confirm students’ interest in working with updated realia in their Business English lessons, as a consequence of their strong belief in the necessity to have authentic contexts and didactic resources. Despite the limitations social media can have as a means to teach business English, students will still find it highly beneficial since it will foster their familiarisation with the digital tools they will need to use when they get to the labour market.Keywords: English for specific purposes, business English, internationalization of higher education, foreign language teaching
Procedia PDF Downloads 1153855 Analysis of Access to Credit among Rural Farmers in Giwa Local Government Area of Kaduna State, Nigeria
Authors: S. Ibrahim, Bashir Umar
Abstract:
Agricultural credit is very important for sustainable agricultural development to be achieved in any country of the world. Rural credit has proven to be a powerful instrument against poverty reduction and development in rural area. Agricultural credit enhances productivity and promotes standard of living by breaking vicious cycle of poverty of small scale farmers. This study examined access to credit among rural farmers in Giwa local government area of Kaduna state. Two stages sampling procedure was employed to select forty-two (42) respondents for the study. Primary data were collected using structured questionnaire with the help of well-trained enumerators. Data were analyzed using simple descriptive statistics. The results revealed that farmers were predominantly male (57.1%) and most (54.7%), were married with one level of education or another (66.5.%). Majority of the households’ head were between the ages of 31 to 50. majority of the farmers (68.2%) had more than 2ha of farmlands with at least 5 years of farming experience and an annual farm income of N 61,000 to 100,000 (61.9%). The Various sources of credit by the farmers in the study area were commercial banks (38.1%), Co-operative banks (47.6%), Development banks (14.2%) (formal) and Relatives (26.1%), Personal Savings (Adashi scheme) (52.3%), Moneylenders (21.4%) (informal). As regard to the amount of credit obtained by the farmers 38.1% received N 50,000-100,000, 50 % obtained N 100,001-500,000 while 11.9% obtained N 500,001-1,000,000. High interest Inadequate collateral, Complicated Procedures, lack of guarantor were the major constrains encountered by the farmers in accessing loans. The study therefore recommends that Rural farmers should be encouraged to form credit and thrift cooperative societies from which they can access much cheaper credits, Moreover, to ensure that any credit obtained may be manageable for the farmers, financial institutions should provide loans with low interest rates and government and non-governmental organizations should simplify procedures associated with accessing loans.Keywords: analysis, access, credit, farmers
Procedia PDF Downloads 623854 Protective Effect of hsa-miR-124 against to Bacillus anthracis Toxins on Human Macrophage Cells
Authors: Ali Oztuna, Meral Sarper, Deniz Torun, Fatma Bayrakdar, Selcuk Kilic, Mehmet Baysallar
Abstract:
Bacillus anthracis is one of the biological agents most likely to be used in case of bioterrorist attack as well as being the cause of anthrax. The bacterium's major virulence factors are the anthrax toxins and an antiphagocytic polyglutamic capsule. TEM8 (ANTXR1) and CMG2 (ANTXR2) are ubiquitously expressed type I transmembrane proteins, and ANTXR2 is the major receptor for anthrax toxins. MicroRNAs are 21-24 bp small noncoding RNAs that regulate gene expression by base pairing with the 3' UTR (untranslated regions) of their target mRNAs resulting in mRNA degradation and/or translational repression. MicroRNAs contribute to regulation of most biological processes and influence numerous pathological states like infectious disease. In this study, post-exposure (toxins) protective effect of the hsa-miR-124-3p against Bacillus anthracis was examined. In this context, i) THP-1 and U937 cells were differentiated to MΦ macrophage, ii) miRNA transfection efficiencies were evaluated by flow cytometry and qPCR, iii) protection against Bacillus anthracis toxins were investigated by XTT, cAMP ELISA and MEK2 cleavage assays. Acknowledgements: This work was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant SBAG-218S467.Keywords: ANTXR2, hsa-miR-124-3p, MΦ macrophage, THP-1, U937
Procedia PDF Downloads 1533853 An Empirical Study on the Impact of Peace in Tourists' Country of Origin on Their Travel Behavior
Authors: Claudia Seabra, Elisabeth Kastenholz, José Luís Abrantes, Manuel Reis
Abstract:
In a world of increasing mobility and global risks, terrorism has, in a perverse way, capitalized on contemporaneous society’s growing interest in travel to explore a world whose national boundaries and distances have decreased. Terrorists have identified the modern tourist flows originated from the economically more developed countries as new appealing targets so as to: i) call attention to the causes they defend and ii) destroy a country’s foundations of tourism, with the final aim of disrupting the economic and consequently social fabric of the affected countries. The present study analyses sensitivity towards risk and travel behaviors in international travel amongst a sample of 600 international tourists from 49 countries travelling by air. Specifically, the sample was segmented according to the Global Peace Index. This index defines country profiles regarding the levels of peace. The indicators used are established over three broad themes: i) ongoing domestic and international conflict; ii) societal safety and security; and iii) militarisation. Tourists were segmented, according to their country of origin, in different levels of peacefulness. Several facets of travel behavior were evaluated, namely motivations, attitude towards trip planning, quality perception and perceived value of the trip. Also factors related with risk perception were evaluated, specifically terrorism risk perception during the trip, unsafety sensation as well as importance attributed to safety in travel. Results contribute to our understanding of the role of previous exposure to the lack of peace and safety at home in the international tourists behaviors, which is further discussed in terms of tourism management and marketing implications which should particularly interest tourism services and destinations more affected by terrorism, war, political turmoil, crime and other safety risks.Keywords: terrorism, tourism, safety, risk perception
Procedia PDF Downloads 4413852 Condition Assessment of Reinforced Concrete Bridge Deck Using Ground Penetrating Radar
Authors: Azin Shakibabarough, Mojtaba Valinejadshoubi, Ashutosh Bagchi
Abstract:
Catastrophic bridge failure happens due to the lack of inspection, lack of design and extreme events like flooding, an earthquake. Bridge Management System (BMS) is utilized to diminish such an accident with proper design and frequent inspection. Visual inspection cannot detect any subsurface defects, so using Non-Destructive Evaluation (NDE) techniques remove these barriers as far as possible. Among all NDE techniques, Ground Penetrating Radar (GPR) has been proved as a highly effective device for detecting internal defects in a reinforced concrete bridge deck. GPR is used for detecting rebar location and rebar corrosion in the reinforced concrete deck. GPR profile is composed of hyperbola series in which sound hyperbola denotes sound rebar and blur hyperbola or signal attenuation shows corroded rebar. Interpretation of GPR images is implemented by numerical analysis or visualization. Researchers recently found that interpretation through visualization is more precise than interpretation through numerical analysis, but visualization is time-consuming and a highly subjective process. Automating the interpretation of GPR image through visualization can solve these problems. After interpretation of all scans of a bridge, condition assessment is conducted based on the generated corrosion map. However, this such a condition assessment is not objective and precise. Condition assessment based on structural integrity and strength parameters can make it more objective and precise. The main purpose of this study is to present an automated interpretation method of a reinforced concrete bridge deck through a visualization technique. In the end, the combined analysis of the structural condition in a bridge is implemented.Keywords: bridge condition assessment, ground penetrating radar, GPR, NDE techniques, visualization
Procedia PDF Downloads 1493851 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 3013850 New Biobased(Furanic-Sulfonated) Poly(esteramide)s
Authors: Souhir Abid
Abstract:
The growing interest in vegetal biomass as an alternative for fossil resources has stimulated the development of numerous classes of monomers. Polymers from renewable resources have attracted an increasing amount of attention over the last two decades, predominantly due to two major reasons (i) firstly environmental concerns, and (ii) secondly the use of monomers from renewable feedstock is a steadily growing field of interest in order to reduce the amount of petroleum consumed in the chemical industry and to open new high-value-added markets to agriculture. Furanic polymers have been considered as alternative environmentally friendly polymers. In our earlier work, modifying furanic polyesters by incorporation of amide functions along their backbone, lead to a particular class of polymer ‘poly(ester-amide)s’, was investigated to combine the excellent mechanical properties of polyamides and the biodegradability of polyesters. As a continuation of our studies on this family of polymer, a series of furanic poly(ester-amide)s bearing sulfonate groups in the main chain were synthesized from 5,5’-Isopropylidene-bis(ethyl 2-furoate), dimethyl 5-sodiosulfoisophthalate, ethylene glycol and hexamethylene diamine by melt polycondensation using zinc acetate as a catalyst. In view of the complexity of the NMR spectrum analysis of the resulting sulfonated poly(ester-amide)s, we found that it is useful to prepare initially the corresponding homopolymers: sulfonated polyesters and polyamides. Structural data of these polymers will be used as a basic element in 1H NMR characterization. The hydrolytic degradation in acidic aqueous conditions (pH = 4,35 ) at 37 °C over the period of four weeks show that the mechanism of the hydrolysis of poly(ester amide)s was elucidated in relation with the microstructure. The strong intermolecular hydrogen bonding interactions between amide functions and water molecules increases the hydrophilicity of the macromolecular chains and consequently their hydrolytic degradation.Keywords: furan, hydrolytic degradation, polycondensation, poly(ester amide)
Procedia PDF Downloads 2953849 The Types of Annuities with Flexible Premium
Authors: Deniz Ünal Özpalamutcu, Burcu Altman
Abstract:
Actuaria uses mathematics, statistic and financial information when analyzing the financial impacts of uncertainties, risks, insurance and pension related issues. In other words, it deals with the likelihood of potential risks, their financial impacts and especially the financial measures. Handling these measures require some long-term payment and investments. So, it is obvious it is inevitable to plan the periodic payments with equal time intervals considering also the changing value of money over time. These series of payment made specific intervals of time is called annuity or rant. In literature, rants are classified based on start and end dates, start times, payments times, payments amount or frequency. Classification of rants based on payment amounts changes based on the constant, descending or ascending payment methods. The literature about handling the annuity is very limited. Yet in a daily life, especially in today’s world where the economic issues gained a prominence, it is very crucial to use the variable annuity method in line with the demands of the customers. In this study, the types of annuities with flexible payment are discussed. In other words, we focus on calculating payment amount of a period by adding a certain percentage of previous period payment was studied. While studying this problem, formulas were created considering both start and end period payments for cash value and accumulated. Also increase of each period payment by r interest rate each period payments calculated with previous periods increases. And the problem of annuities (rants) of which each period payment increased with previous periods’ increase by r interest rate has been analyzed. Cash value and accumulated value calculation of this problem were studied separately based on the period start/end and their relations were expressed by formulas.Keywords: actuaria, annuity, flexible payment, rant
Procedia PDF Downloads 2213848 Spatio-Temporal Analysis of Rabies Incidence in Herbivores of Economic Interest in Brazil
Authors: Francisco Miroslav Ulloa-Stanojlovic, Gina Polo, Ricardo Augusto Dias
Abstract:
In Brazil, there is a high incidence of rabies in herbivores of economic interest (HEI) transmitted by the common vampire bat Desmodus rotundus, the presence of human rabies cases and the huge economic losses in the world's largest cattle industry, it is important to assist the National Program for Control of Rabies in herbivores in Brazil, that aims to reduce the incidence of rabies in HEI populations, mainly through epidemiological surveillance, vaccination of herbivores and control of vampire-bat roosts. Material and Methods: A spatiotemporal retrospective Kulldorff's spatial scan statistic based on a Poisson model and Monte Carlo simulation and an Anselin's Local Moran's I statistic were used to uncover spatial clustering of HEI rabies from 2000 – 2014. Results: Were identify three important clusters with significant year-to-year variation (Figure 1). In 2000, was identified one area of clustering in the North region, specifically in the State of Tocantins. Between the year 2000 and 2004, a cluster centered in the Midwest and Southeast region including the States of Goiás, Minas Gerais, Rio de Janeiro, Espirito Santo and São Paulo was prominent. And finally between 2000 and 2005 was found an important cluster in the North, Midwest and South region. Conclusions: The HEI rabies is endemic in the country, in addition, appears to be significant differences among the States according to their surveillance services, that may be difficulting the control of the disease, also other factors could be influencing in the maintenance of this problem like the lack of information of vampire-bat roosts identification, and limited human resources for realization of field monitoring. A review of the program control by the authorities it’s necessary.Keywords: Brazil, Desmodus rotundus, herbivores, rabies
Procedia PDF Downloads 4183847 Rainwater Harvesting for Household Consumption in Rural Demonstration Sites of Nong Khai Province, Thailand
Authors: Shotiros Protong
Abstract:
In recent years, Thailand has been affected by climate change phenomenon, which is clearly seen from the season change for different times. The occurrence of violent storms, heavy rains, floods, and drought were found in several areas. In a long dry period, the water supply is not adequate in drought areas. Nowadays, it is renowned that there is a significant decrease of rainwater use for household consumption in rural area of Thailand. Rainwater harvesting is the practice of collection and storage of rainwater in storage tanks before it is lost as surface run-off. Rooftop rainwater harvesting is used to provide drinking water, domestic water, and water for livestock. Rainwater harvesting in households is an alternative for people to readily prepare water resources for their own consumptions during the drought season, can help mitigate flooding of flooded plains, and also may reduce demand on the basin and well. It also helps in the availability of potable water, as rainwater is substantially free of salts. Application of rainwater harvesting in rural water system provide a substantial benefit for both water supply and wastewater subsystems by reducing the need for clean water in water distribution systems, less generated storm water in sewer systems, and a reduction in storm water runoff polluting freshwater bodies. The combination of rainwater quality and rainfall quantity is used to determine proper rainwater harvesting for household consumption to be safe and adequate for survivals. Rainwater quality analysis is compared with the drinking water standard. In terms of rainfall quantity, the observed rainfall data are interpolated by GIS 10.5 and showed by map during 1980 to 2020, used to assess the annual yield for household consumptions.Keywords: rainwater harvesting, drinking water standard, annual yield, rainfall quantity
Procedia PDF Downloads 1603846 Functional Beverage to Boosting Immune System in Elderly
Authors: Adineh Tajmousavilangerudi, Ali Zein Alabiden Tlais, Raffaella Di Cagno
Abstract:
The SARS-Cov-2 pandemic has exposed our vulnerability to new illnesses and novel viruses that attack our immune systems, particularly in the elderly. The vaccine is being gradually introduced over the world, but new strains of the virus and COVID-19 will emerge and continue to cause illness. Aging is associated with significant changes in intestinal physiology, which increases the production of inflammatory products, alters the gut microbiota, and consequently establish inadequate immune response to minimize symptoms and disease development. In this context, older people who followed a Mediterranean-style diet, rich in polyphenols and dietary fiber, performed better physically and mentally (1,2). This demonstrates the importance of the human gut microbiome in transforming complex dietary macromolecules into the most biologically available and active nutrients, which in turn help to regulate metabolism and both intestinal and systemic immune function (3,4). The role of lactic acid fermentation is prominent also as a powerful tool for improving the nutritional quality of the human diet by releasing nutrients and boosting the complex bioactive compounds and vitamin content. the PhD project aims to design fermented and functional foods/beverages capable of modulating human immune function via the gut microbiome.Keywords: functional bevarage, fermented beverage, gut microbiota functionality, immun system
Procedia PDF Downloads 1123845 A Computational Fluid Dynamics Study of Turbulence Flow and Parameterization of an Aerofoil
Authors: Mohamed Z. M. Duwahir, Shian Gao
Abstract:
The main objective of this project was to introduce and test a new scheme for parameterization of subsonic aerofoil, using a function called Shape Function. Python programming was used to create a user interactive environment for geometry generation of aerofoil using NACA and Shape Function methodologies. Two aerofoils, NACA 0012 and NACA 1412, were generated using this function. Testing the accuracy of the Shape Function scheme was done by Linear Square Fitting using Python and CFD modelling the aerofoil in Fluent. NACA 0012 (symmetrical aerofoil) was better approximated using Shape Function than NACA 1412 (cambered aerofoil). The second part of the project involved comparing two turbulent models, k-ε and Spalart-Allmaras (SA), in Fluent by modelling the aerofoils NACA 0012 and NACA 1412 in conditions of Reynolds number of 3 × 106. It was shown that SA modelling is better for aerodynamic purpose. The experimental coefficient of lift (Cl) and coefficient of drag (Cd) were compared with empirical wind tunnel data for a range of angle of attack (AOA). As a further step, this project involved drawing and meshing 3D wings in Gambit. The 3D wing flow was solved and compared with 2D aerofoil section experimental results and wind tunnel data.Keywords: CFD simulation, shape function, turbulent modelling, aerofoil
Procedia PDF Downloads 3583844 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 4003843 A QoS Aware Cluster Based Routing Algorithm for Wireless Mesh Network Using LZW Lossless Compression
Authors: J. S. Saini, P. P. K. Sandhu
Abstract:
The multi-hop nature of Wireless Mesh Networks and the hasty progression of throughput demands results in multi- channels and multi-radios structures in mesh networks, but the main problem of co-channels interference reduces the total throughput, specifically in multi-hop networks. Quality of Service mentions a vast collection of networking technologies and techniques that guarantee the ability of a network to make available desired services with predictable results. Quality of Service (QoS) can be directed at a network interface, towards a specific server or router's performance, or in specific applications. Due to interference among various transmissions, the QoS routing in multi-hop wireless networks is formidable task. In case of multi-channel wireless network, since two transmissions using the same channel may interfere with each other. This paper has considered the Destination Sequenced Distance Vector (DSDV) routing protocol to locate the secure and optimised path. The proposed technique also utilizes the Lempel–Ziv–Welch (LZW) based lossless data compression and intra cluster data aggregation to enhance the communication between the source and the destination. The use of clustering has the ability to aggregate the multiple packets and locates a single route using the clusters to improve the intra cluster data aggregation. The use of the LZW based lossless data compression has ability to reduce the data packet size and hence it will consume less energy, thus increasing the network QoS. The MATLAB tool has been used to evaluate the effectiveness of the projected technique. The comparative analysis has shown that the proposed technique outperforms over the existing techniques.Keywords: WMNS, QOS, flooding, collision avoidance, LZW, congestion control
Procedia PDF Downloads 3383842 Pulmonary Hydatid Cyst in a 13-Year-Old Child: A Case Report
Authors: Ghada Esheba, Bayan Hafiz, Ashwaq Al-Qarni, Abdulelah AlMalki, Esraa Kaheel
Abstract:
Hydatid disease is caused by genus Echinococcus, it is transmitted to human through sheep and cattle. People who lived in an endemic area should be suspected to have the disease. Pulmonary hydatid disease can be presented by respiratory manifestations as in our case. We report a case of child, 13 years old, who was presented by shortness of breath and non-productive cough 2 months ago. The patient had an attack of hemoptysis 3 months ago but there is no history of fever, other constitutional symptoms or any medical illness. The patient has had a close contact with a horse. On examination, the patient was oriented and vitally stable. Both side of chest were moving equally with decrease air entry on the left side of the chest. Cervical lymph node enlargement was also detected. The case was provisionally diagnosed as tuberculosis. The x-ray was normal, while CT scan showed two cysts in the left side. The patient was treated surgically with resection of both cysts without lobectomy. Broncho-alveolar lavage was done and together with plural effusion and both cysts were sent for histopathology. The patient received the following medication: albendazole 200MG/BID/Orally for 30 days and Cefuroxime 250MG/Q12H/Orally for 10 days.Keywords: Echinococcus granulosus, hydatid disease, pediatrics, pulmonary hydatid cyst
Procedia PDF Downloads 2733841 Study of the Microflora of Cedar Forests with Different Degrees of Decline in the National Park Belezma (Batna, Algeria)
Authors: Cherak Imen, Sellami Mehdi
Abstract:
The Atlas cedar, Cedrus atlantica, is endemic to the mountains of North Africa. This is one of the most valuable softwood, both economically, ecologically, aesthetically and culturally. In Algeria, the cedar forests currently have worrying symptoms of decline which therefore require special monitoring. Fungal endophytes are involved in various diseases of the Atlas cedar. They attack all organs on which they cause many symptoms. These microflora live in complex interaction with plants. In this study, we identified a total of 09 mycotaxons collected needles Cedarwood at three stations with different degrees of decline (Talmet, Boumerzoug and Tuggurt) in the National Park Belezma (Batna, Algeria). The study conducted on a total of 12 trees were identified 08 mycoendophytes in Talmet station, 04 species in the Boumerzoug station and 03 in Tuggurt station. The total species richness mycoendophytes depending on the types of cedar forests showed that the largest diversity was recorded at the cedar forest healthy, Alternaria is the most common type in all stations. This work should be completed by further detailed studies to identify other endophyte species and better know its interactions with the Atlas cedar.Keywords: Cedrus atlantica, endophytic fungi, microflora, mycotaxons, mycoendophyte
Procedia PDF Downloads 3463840 Mobile Communication Technologies, Romantic Attachment and Relationship Quality: An Exploration of Partner Attunement
Authors: Jodie Bradnam, Mark Edwards, Bruce Watt
Abstract:
Mobile technologies have emerged as tools to create and sustain social and romantic relationships. The integration of technologies in close relationships has been of particular research interest with findings supporting the positive role of mobile phones in nurturing feelings of closeness and connection. More recently, the use of text messaging to manage conflict has become a focus of research attention. Four hundred and eleven adults in committed romantic relationships completed a series of questionnaires measuring attachment orientation, relationship quality, texting frequencies, attitudes, and response expectations. Attachment orientation, relationship length, texting for connection and disconnection were significant predictors of relationship quality, specifically relationship intimacy. Text frequency varied as a function of attachment orientation, with high attachment anxiety associated with high texting frequencies and with low relationship quality. Sending text messages of love and support was related to higher intimacy and relationship satisfaction scores, while sending critical or impersonal texts was associated with significantly lower intimacy and relationship satisfaction scores. The use of texting to manage relational conflict was a stronger negative predictor of relationship satisfaction than was the use of texting to express love and affection. Consistent with research on face-to-face communication in couples, the expression of negative sentiments via text were related to lower relationship quality, and these negative sentiments had a stronger and more enduring impact on relationship quality than did the expression of positive sentiments. Attachment orientation, relationship length and relationship status emerged as variables of interest in understanding the use of mobile technologies in romantic relationships.Keywords: attachment, destructive conflict, intimacy, mobile communication, relationship quality, relationship satisfaction, texting
Procedia PDF Downloads 385