Search results for: man in middle attack
1319 Optimization of Waqf Land through Sukuk Al-Intifa’ to Build MSMEs in Indonesia
Authors: Khadijah Hasim, Achmad Fauzan Firdaus, Choirunnisa
Abstract:
Waqf land which previously was idle assets can be built on top of a building that is a means for people to conduct business. Nadzir (waqf managers) lease of waqf lands it manages, the agreed rental fee, which is payable in the form of the building, not in cash. After standing building, the developer will lease to interested companies. Given the magnitude of the beginning funds needed, The company later issuing sukuk al-intifa on the trading floor. With this sukuk issuance, the company has sufficient capital to begin operations and pay obligations of the rental fee to the developer each year. Building that had stood trade area will be established (Micro, Small, Middle Entreprises) MSMEs. It is expected that through the sukuk al-intifa, can help to make waqf land previously unproductive due to lack of capital to be very beneficial and help awaken the people of Indonesian MSMEsKeywords: Sukuk Al-Intifa, MSMEs, waqf land, underlying asset
Procedia PDF Downloads 4701318 Mapping of Potential Areas for Groundwater Storage in the Sais Plateau and Its Middle Atlas Borders, Morocco
Authors: Abdelghani Qadem, Zohair Qadem, Mohamed Lasri
Abstract:
At the level of the Moroccan Sais Plateau, groundwater constitutes strategic natural resources for agricultural, industrial, and domestic use. Today, due to climate change and population growth, the pressure on groundwater has increased considerably. This contribution aims to delineate and map potential areas for groundwater storage in the area in question using GIS and remote sensing. The methodology adopted is based on the identification of the thematic layers used to assess the potential recharge of the aquifer. The mapping of potential areas for groundwater storage is developed through the method of modeling and weighted overlay using the spatial analysis tool on the Geographic Information System. The results obtained can be used for the planning of future artificial recharge projects in the study area in order to ensure the good sustainable use of this underground gift.Keywords: Morocco, climate change, groundwater, mapping, recharge
Procedia PDF Downloads 831317 Value-Based Argumentation Frameworks and Judicial Moral Reasoning
Authors: Sonia Anand Knowlton
Abstract:
As the use of Artificial Intelligence is becoming increasingly integrated in virtually every area of life, the need and interest to logically formalize the law and judicial reasoning is growing tremendously. The study of argumentation frameworks (AFs) provides promise in this respect. AF’s provide a way of structuring human reasoning using a formal system of non-monotonic logic. P.M. Dung first introduced this framework and demonstrated that certain arguments must prevail and certain arguments must perish based on whether they are logically “attacked” by other arguments. Dung labelled the set of prevailing arguments as the “preferred extension” of the given argumentation framework. Trevor Bench-Capon’s Value-based Argumentation Frameworks extended Dung’s AF system by allowing arguments to derive their force from the promotion of “preferred” values. In VAF systems, the success of an attack from argument A to argument B (i.e., the triumph of argument A) requires that argument B does not promote a value that is preferred to argument A. There has been thorough discussion of the application of VAFs to the law within the computer science literature, mainly demonstrating that legal cases can be effectively mapped out using VAFs. This article analyses VAFs from a jurisprudential standpoint to provide a philosophical and theoretical analysis of what VAFs tell the legal community about the judicial reasoning, specifically distinguishing between legal and moral reasoning. It highlights the limitations of using VAFs to account for judicial moral reasoning in theory and in practice.Keywords: nonmonotonic logic, legal formalization, computer science, artificial intelligence, morality
Procedia PDF Downloads 741316 Outbreak of Pulmonary Tuberculosis in Cojutepeque Military Brigade, El Salvador, July 2013
Authors: Juan Santos Garcia
Abstract:
Introduction: Tuberculosis is a chronic granulomatous disease caused by a microorganism called Mycobacterium tuberculosis, it has the capacity to spread from the lungs to other parts of the body. Globally, the rate per 100 thousand inhabitants has varied from 136 in 2007 to 122 in 2012; while in the region of the Americas has been much lower: 32 cases per 100,000 in 2007, to 29 in 2012. In El Salvador have also varied incidence rates from 2007 to 2012, from 27.4 cases per 100 000 population to 32 in the period indicated. Methods: Screening was performed with smear and chest X-ray at 80 military personnel from Military Brigade # 5 of El Salvador. Besides HIV tests were taken at the positive cases, which are also made interview, investigating demographic, clinical, laboratory and risk factors data. Frequencies, percentages and rates were calculated using Excel page. The rates were calculated for each of the 5 military bedrooms (called A, B, C, D, and E). Results: Attack rate was 18.75% in the bedroom C. the index case was identified and two secondary cases, with an exposure period of 59 days. Only the index case presented symptoms: cough, fever and weight loss. The other two cases had no symptoms. Discussion: We found a rate of tuberculosis 526 times higher than the national rate. He was also 12.5 times higher than that found in other studies in closed populations such as school facilities. It was not possible to make association analysis.Keywords: tuberculosis, outbreak, military brigade, chronic granulomatous disease
Procedia PDF Downloads 2601315 Aerodynamics and Aeroelastics Studies of Hanger Bridge with H-Beam Profile Using Wind Tunnel
Authors: Matza Gusto Andika, Malinda Sabrina, Syarie Fatunnisa
Abstract:
Aerodynamic and aeroelastics studies on the hanger bridge profile are important to analyze the aerodynamic phenomenon and Aeroelastics stability of hanger. Wind tunnel tests were conducted on a model of H-beam profile from hanger bridge. The purpose of this study is to investigate steady aerodynamic characteristics such as lift coefficient (Cl), drag coefficient (Cd), and moment coefficient (Cm) under the different angle of attack for preliminary prediction of aeroelastics stability problems. After investigation the steady aerodynamics characteristics from the model, dynamic testing is also conducted in wind tunnel to know the aeroelastics phenomenon which occurs at the H-beam hanger bridge profile. The studies show that the torsional vortex induced vibration occur when the wind speed is 7.32 m/s until 9.19 m/s with maximum amplitude occur when the wind speed is 8.41 m/s. The result of wind tunnel testing is matching to hanger vibration where occur in the field, so wind tunnel studies has successful to model the problem. In order that the H-beam profile is not good enough for the hanger bridge and need to be modified to minimize the Aeroelastics problem. The modification can be done with structure dynamics modification or aerodynamics modification.Keywords: aerodynamics, aeroelastic, hanger bridge, h-beam profile, vortex induced vibration, wind tunnel
Procedia PDF Downloads 3501314 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete
Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei
Abstract:
The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.Keywords: admixture, granite dust, permeability, pozzolans
Procedia PDF Downloads 1601313 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 1581312 Droning the Pedagogy: Future Prospect of Teaching and Learning
Authors: Farha Sattar, Laurence Tamatea, Muhammad Nawaz
Abstract:
Drones, the Unmanned Aerial Vehicles are playing an important role in real-world problem-solving. With the new advancements in technology, drones are becoming available, affordable and user- friendly. Use of drones in education is opening new trends in teaching and learning practices in an innovative and engaging way. Drones vary in types and sizes and possess various characteristics and capabilities which enhance their potential to be used in education from basic to advanced and challenging learning activities which are suitable for primary, middle and high school level. This research aims to provide an insight to explore different types of drones and their compatibility to be used in teaching different subjects at various levels. Research focuses on integrating the drone technology along with Australian curriculum content knowledge to reinforce the understanding of the fundamental concepts and helps to develop the critical thinking and reasoning in the learning process.Keywords: critical thinking, drone technology, drone types, innovative learning
Procedia PDF Downloads 3091311 Effects of High Intensity Interval vs. Low Intensity Continuous Training on LXRβ, ABCG5 and ABCG8 Genes Expression in Male Wistar Rats
Authors: Sdiqeh Jalali, M. R. Khazdair
Abstract:
Liver X receptors (LXR) have an essential role in the regulation of cholesterol metabolism, and their activation increase ABCG5 and ABCG8 genes expression for the improvement of cholesterol excretion from the body during reverse cholesterol transport (RCT). The aim of this study was to investigate the effects of high-intensity interval (HIT) and low intensity continuous (LIT) trainings on gene expression of these substances after a high-fat diet in Wistar rats. Materials and Methods: Fifteen male Wistar rats were divided into 3 groups: control group (n = 5), HIT exercise group (n = 5) and LIT exercise group (n = 5). All groups used a high-fat diet for 13 weeks, and the HIT and LIT groups performed the specific training program. The expression of LXRβ, ABCG5, and ABCG8 genes was measured after the training period. Findings: Data analysis showed significantly higher levels of LXRβ, ABCG5, and ABCG8 gene expression in HIT and LIT groups compared to the control group (P ≤ 0.05). Conclusion: HIT and LIT trainings after a high-fat diet have beneficial effects on RCT that prevent heart attack. Also, HIT training may have a greater effect on cholesterol excretion during the reverse cholesterol transport mechanism than LIT.Keywords: liver X receptor, atherosclerosis, interval training, endurance training
Procedia PDF Downloads 1171310 Iraq Water Resources Planning: Perspectives and Prognoses
Authors: Nadhir Al-Ansari, Ammar A. Ali, Sven Knutsson
Abstract:
Iraq is located in the Middle East. It covers an area of 433,970 square kilometres populated by about 32 million inhabitants. Iraq greatly relies in its water resources on the Tigris and Euphrates Rivers. Recently, Iraq is suffering from water shortage problems. This is due to external and internal factors. The former includes global warming and water resources policies of neighbouring countries while the latter includes mismanagement of its water resources. The supply and demand are predicted to be 43 and 66.8 Billion Cubic Meters (BCM) respectively in 2015, while in 2025 it will be 17.61 and 77 BCM respectively. In addition, future prediction suggests that Tigris and Euphrates Rivers will be completely dry in 2040. To overcome this problem, prudent water management policies are to be adopted. This includes Strategic Water Management Vision, development of irrigation techniques, reduction of water losses, use of non-conventional water resources and research and development planning.Keywords: Iraq, Tigris River, Euphrates River, water scarcity, water resources management
Procedia PDF Downloads 4491309 The Effects of Spatial Dimensions and Relocation and Dimensions of Sound Absorbers in a Space on the Objective Parameters of Sound
Authors: Mustafa Kavraz
Abstract:
This study investigated the differences in the objective parameters of sound depending on the changes in the lengths of the lateral surfaces of a space and on the replacement of the sound absorbers that are placed on these surfaces. To this end, three models of room were chosen. The widths and heights of these rooms were the same but the lengths of the rooms were changed. The smallest room was 8 m. wide and 10 m. long. The lengths of the other two rooms were 15 m. and 20 m. For each model, the differences in the objective parameters of sound were determined by keeping all the material in the space intact and by changing only the positions of the sound absorbers that were placed on the walls. The sound absorbers that were used on the walls were of two different sizes. The sound absorbers that were placed on the walls were 4 m and 8 m. long and story-height (3 m.). In all model room types, the sound absorbers were placed on the long walls in three different ways: at the end of the long walls where the long walls meet the front wall; at the end of the long walls where the long walls meet the back wall; and in the middle part of the long walls. Except for the specially placed sound absorbers, the ground, wall and ceiling surfaces were covered with three different materials. There were no constructional elements such as doors and windows on the walls. On the surfaces, the materials specified in the Odeon 10 material library were used as coating material. Linoleum was used as flooring material, painted plaster as wall coating material and gypsum boards as ceiling covering (2 layers with a total of 32 mm. thickness). These were preferred due to the fact that they are the commonly used materials for these purposes. This study investigated the differences in the objective parameters of sound depending on the changes in the lengths of the lateral surfaces of a space and on the replacement of the sound absorbers that are placed on these surfaces. To this end, three models of room were chosen. The widths and heights of these rooms were the same but the lengths of the rooms were changed. The smallest room was 8 m. wide and 10 m. long. The lengths of the other two rooms were 15 m. and 20 m. For each model, the differences in the objective parameters of sound were determined by keeping all the material in the space intact and by changing only the positions of the sound absorbers that were placed on the walls. The sound absorbers that were used on the walls were of two different sizes. The sound absorbers that were placed on the walls were 4 m and 8 m. long and story-height (3 m.). In all model room types, the sound absorbers were placed on the long walls in three different ways: at the end of the long walls where the long walls meet the front wall; at the end of the long walls where the long walls meet the back wall; and in the middle part of the long walls. Except for the specially placed sound absorbers, the ground, wall and ceiling surfaces were covered with three different materials. There were no constructional elements such as doors and windows on the walls. On the surfaces, the materials specified in the Odeon 10 material library were used as coating material. Linoleum was used as flooring material, painted plaster as wall coating material and gypsum boards as ceiling covering (2 layers with a total of 32 mm. thickness). These were preferred due to the fact that they are the commonly used materials for these purposes.Keywords: sound absorber, room model, objective parameters of sound, jnd
Procedia PDF Downloads 3751308 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 1331307 Leveraging Reasoning through Discourse: A Case Study in Secondary Mathematics Classrooms
Authors: Cory A. Bennett
Abstract:
Teaching and learning through the use of discourse support students’ conceptual understanding by attending to key concepts and relationships. One discourse structure used in primary classrooms is number talks wherein students mentally calculate, discuss, and reason about the appropriateness and efficiency of their strategies. In the secondary mathematics classroom, the mathematics understudy does not often lend itself to mental calculations yet learning to reason, and articulate reasoning, is central to learning mathematics. This qualitative case study discusses how one secondary school in the Middle East adapted the number talk protocol for secondary mathematics classrooms. Several challenges in implementing ‘reasoning talks’ became apparent including shifting current discourse protocols and practices to a more student-centric model, accurately recording and probing student thinking, and specifically attending to reasoning rather than computations.Keywords: discourse, reasoning, secondary mathematics, teacher development
Procedia PDF Downloads 1871306 Structural Optimization Using Catenary and Other Natural Shapes
Authors: Mitchell Gohnert
Abstract:
This paper reviews some fundamental concepts of structural optimization, which is focused on the shape of the structure. Bending stresses produce high peak stresses at each face of the member, and therefore, substantially more material is required to resist bending. The shape of the structure has a profound effect on stress levels. Stress may be reduced dramatically by simply changing the shape to accommodate natural stress flow. The main objective of structural optimization is to direct the thrust line along the axis of the member. Optimal shapes include the catenary arch or dome, triangular shapes, and columns. If the natural flow of stress matches the shape of the structures, the most optimal shape is determined. Structures, however, must resist multiple load patterns. An optimal shape is still possible by ensuring that the thrust lines fall within the middle third of the member.Keywords: optimization, natural structures, shells, catenary, domes, arches
Procedia PDF Downloads 431305 Modernization from Above: The (re-)Creation of National Identity through Westernization in Mubarak-era Cairo
Authors: Mariam Aref Mahmoud
Abstract:
A myth surrounding the development of Cairo bases itself in the Fatimid era when the city, as we know it today, was built. Surrounding the city was a wall meant to protect the main center from any possible attack. The effects of global hierarchies of power extend further than labor regulations and trade statistics. Beyond that, they form dialectical oppositions between local and global identities within urban space. As such, those in power often aim to claim national identity as what they perceive to be the most nationally beneficial strategy. These claims over perceptions of national identity take over the streets, the advertisements, and the parks and eventually make their way into the different forms of media. Often, these claims take over the main planning goals of the city. Whether it is through the control over which sounds are allowed to be produced in public space, what type of people are encouraged to enter which spaces, or other forms of performing local and national identity, public space, property, and land have often been used as a method to present to both the public and the global population what people in power wish for these spaces to represent. In Egypt, these developments have been changing since the end of colonial rule. In particular, this paper will analyze how Hosni Mubarak, and to a certain extent Anwar el-Sadat, enacted neoliberal designs dedicated towards modernization in order to present an image of a Cairo that is not uniquely Egyptian but essentially Western cosmopolitan - a Cairo that belongs to a globalized world.Keywords: Egypt, imperialism, westernization, housing
Procedia PDF Downloads 691304 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq
Authors: Rozh Abdulrahman Kareem
Abstract:
The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.Keywords: law, refugee, protection, Kurdistan
Procedia PDF Downloads 641303 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun
Authors: Ndje Ndje Mireille
Abstract:
The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun
Procedia PDF Downloads 1581302 How COVID 19 Changed Policy Makers Behavior toward Environmental Policy
Authors: Ammar Alrefaei
Abstract:
The COVID-19 pandemic changed human life. The vast majority of the COVID effect was on the healthcare sector, but its impact on the global economy cannot be denied. In the field of environment, the pandemic may have a more significant impact on the environment than all environmental activity and policies of recent years. The pandemic consequences for the environment may be far more unpredictable than one might assume. In view of this, it is imperative for legislators from different states to be prepared to apply adequate measures to counteract such consequences. This article aimed to examine the obstacles to implementing effective environmental policies after the COVID-19 pandemic using different examples from different countries. Also, how adopting new initiatives, such as the Saudi Green Initiative and the Middle East Green Initiative, can help policymakers and legislators adopt new laws and policies. In addition, this paper reviewed the developing dangers to environmental protection after the pandemic and analyzed the major challenges to instrument active environmental policies during COVID-19 and in the world after COVID.Keywords: environmental policy, environment law, green initiative, COVID 19
Procedia PDF Downloads 1121301 Understanding Loc Trade in Kashmir: References of Global Episodes in Arena of Economy and Confidence Building Measure
Authors: Aarushi Baloria, Joshina Jamwal
Abstract:
The paper attempts to understand the genesis of the Kashmir conflict, the LoC trade, and the various challenges which impede LoC trade. The paper further understands how this trade assists in mitigating tension between the countries and act as a conference building measure (CBM). The paper discusses later on the positive aspects of LoC trade with the help of statistical data like increase in state's economy along with negatives like smuggling of arms, drugs, swapping and interchanging of Hawala money and other unconstitutional activities like terrorism that took place on trade points across LoC. Moreover, the paper also mentioned in the international context; the episodes of Ireland of Europe, Palestine of Middle East, Uganda of Africa not only as transaction step but also as a peace channel between the fragmented parts. Thus, the paper, in a nutshell, reflects how the trade across LoC benefited in various psychological, economic, and political reasons, and it is worth taking risk, taking its overall positive things into consideration.Keywords: drugs, economy, international, peace, psychological, trade
Procedia PDF Downloads 1361300 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 1521299 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags
Authors: Zhang Shuqi, Liu Dan
Abstract:
For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation
Procedia PDF Downloads 1051298 Half Model Testing for Canard of a Hybrid Buoyant Aircraft
Authors: Anwar U. Haque, Waqar Asrar, Ashraf Ali Omar, Erwin Sulaeman, Jaffer Sayed Mohamed Ali
Abstract:
Due to the interference effects, the intrinsic aerodynamic parameters obtained from the individual component testing are always fundamentally different than those obtained for complete model testing. Consideration and limitation for such testing need to be taken into account in any design work related to the component buildup method. In this paper, the scaled model of a straight rectangular canard of a hybrid buoyant aircraft is tested at 50 m/s in IIUM-LSWT (Low-Speed Wind Tunnel). Model and its attachment with the balance are kept rigid to have results free from the aeroelastic distortion. Based on the velocity profile of the test section’s floor; the height of the model is kept equal to the corresponding boundary layer displacement. Balance measurements provide valuable but limited information of the overall aerodynamic behavior of the model. Zero lift coefficient is obtained at -2.2o and the corresponding drag coefficient was found to be less than that at zero angles of attack. As a part of the validation of low fidelity tool, the plot of lift coefficient plot was verified by the experimental data and except the value of zero lift coefficient, the overall trend has under-predicted the lift coefficient. Based on this comparative study, a correction factor of 1.36 is proposed for lift curve slope obtained from the panel method.Keywords: wind tunnel testing, boundary layer displacement, lift curve slope, canard, aerodynamics
Procedia PDF Downloads 4691297 Variation of Airfoil Pressure Profile Due to Confined Air Streams: Application in Gas-Oil Separators
Authors: Amir Hossein Haji, Nabeel Al-Rawahi, Gholamreza Vakili-Nezhaad
Abstract:
An innovative design has been examined for a gas-oil separator based on pressure reduction over an airfoil surface. The primary motivations are to shorten the release trajectory of the bubbles by minimizing the thickness of the oil layer as well as improving uniform pressure reduction zones. Restricted airflow over an airfoil is investigated for its effect on the pressure drop enhancement and the maximum attainable attack angle prior to the stall condition. Aerodynamic separation is delayed based on numerical simulation of Wortmann FX 63137 Airfoil in a confined domain using FLUENT 6.3.26. The proposed set up results in higher pressure drop compared with the free stream case. With the aim of optimum power consumption we have pursued further restriction to an air jet case over the airfoil. Then, a curved strip model is suggested for the air jet which can be applied as an analysis/design tool for the best performance conditions. Pressure reduction is shown to be inversely proportional to the curvature of the upper airfoil profile. This reduction occurs within the tracking zones where the air jet is effectively attached to the airfoil surface. The zero slope condition is suggested to estimate the onset of these zones after which the minimum curvature should be searched. The corresponding zero slope curvature is applied for estimation of the maximum pressure drop which shows satisfactory agreement with the simulation results.Keywords: airfoil, air jet, curved fluid flow, gas-oil separator
Procedia PDF Downloads 4741296 Coarse Grid Computational Fluid Dynamics Fire Simulations
Authors: Wolfram Jahn, Jose Manuel Munita
Abstract:
While computational fluid dynamics (CFD) simulations of fire scenarios are commonly used in the design of buildings, less attention has been given to the use of CFD simulations as an operational tool for the fire services. The reason of this lack of attention lies mainly in the fact that CFD simulations typically take large periods of time to complete, and their results would thus not be available in time to be of use during an emergency. Firefighters often face uncertain conditions when entering a building to attack a fire. They would greatly benefit from a technology based on predictive fire simulations, able to assist their decision-making process. The principal constraint to faster CFD simulations is the fine grid necessary to solve accurately the physical processes that govern a fire. This paper explores the possibility of overcoming this constraint and using coarse grid CFD simulations for fire scenarios, and proposes a methodology to use the simulation results in a meaningful way that can be used by the fire fighters during an emergency. Data from real scale compartment fire tests were used to compare CFD fire models with different grid arrangements, and empirical correlations were obtained to interpolate data points into the grids. The results show that the strongly predominant effect of the heat release rate of the fire on the fluid dynamics allows for the use of coarse grids with relatively low overall impact of simulation results. Simulations with an acceptable level of accuracy could be run in real time, thus making them useful as a forecasting tool for emergency response purposes.Keywords: CFD, fire simulations, emergency response, forecast
Procedia PDF Downloads 3191295 Investigation of Norovirus Genogroups (GI, GII and GIV) in Stool of Pet Dogs with Diarrhea
Abstract:
Norovirus (NoV) infection is effective and contagious in humans and many animals such as calves, pigs, dogs, cats, monkeys. There is not enough evidence about the zoonotic transmission of NoV between humans and animals. However, the fact that contamination of foods and environment by animal/human waste happens in indirect way leads to consideration of the agent as a zoonotic character. In our study, we aim to search the presence of NoV infection, which is a major public health problem, in possessed dogs showing diarrhea symptoms, to detect its genotype and to study nutrition and life conditions. We searched the existence of human NoV GI, GII and GIV in the stool of 128 pet dogs in Burdur Province with diarrhoea in various sex, age and breed by using Real-Time PCR method. Human NoV GII was found in only 5 of the 128 dog stool samples (3.91%). In the study, it was determined that the owners of the dogs with NoV GII are middle aged or elderly people most of whom are male and that there were no children in their houses. As these dogs are treated like the owner’s child, it is assumed that they could be transmitted with NoV GII as a result of close interaction with their owner.Keywords: dog, human, norovirus, Real-Time PCR, stool
Procedia PDF Downloads 1511294 Information Society-Education Space
Authors: Monica Lia
Abstract:
This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. Second step was to identify how information space intersects the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school). Interrelationship between the above-mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support for the family space, education and institutional space. In addition, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. However, this paper demonstrates that Informational space can be an enemy of the educational system or be support systems if we know the internal structure and mechanisms. We can make the Informational Space to work for accomplish the educational objectives.Keywords: informational space, education, educational tool, social diagram, information, information structure, lessons
Procedia PDF Downloads 3341293 Awakeness, Awareness and Learning Mathematics for Arab Students: A Pilot Study
Authors: S. Rawashdi, D. Bshouty
Abstract:
This paper aimed at discussing how to urge middle and high school Arab students in Israel to be aware of the importance of and investing in learning mathematics. In the first phase of the study, three questionnaires were passed to two nine-grade classes, one on Awareness, one on Awakeness and one on Learning. One of the two classes was an outstanding class from a public school (PUBS) of 31 students, and the other a heterogeneous class from a private school (PRIS) with 31 students. The Learning questionnaire which was administrated to the Awareness and Awareness topics was passed to PRIS and the Awareness and Awareness Questionnaires were passed to the PUBS class After two months we passed the post-questionnaire to both classes to validate the long-term impact of the study. The findings of the study show that awakeness and awareness processes have an effect on the math learning process, on its context in students' daily lives and their growing interest in learning math.Keywords: awakeness, awareness, learning mathematics, pupils
Procedia PDF Downloads 1381292 The Developmental of Ethical Behavior of Nursing Students in Borommarajonani College of Nursing, Suratthani, Thailand
Authors: Ubonrattan Phophatanachai, Phensri Thongphet, Weerawan Kerdtong
Abstract:
The purposes of this study were to compare the ethical behavior regarding responsibility and polite manners of nursing students of Boromarajonani College of Nursing, Suratthani, Thailand before and after providing the activity session of ethical behavior development. The samples consisted of 103 sophomores in the academic year 2006. The tools were tested for reliability and content validity. The reliability of the Ethical Behavior Questionnaire measured by Cronbach’s alpha coefficient was 0.94. Data were analyzed using means, standard deviations, and dependent t-test. The findings were as follows: a) after the activity session, the mean scores of ethical behavior regarding responsibility and polite manners of nursing students increased from middle level to high level; b) mean scores of responsibilities and polite manners after the activity session were significantly higher than those before the session (t =28.36, p < .001; t =23.9, p < .001, respectively).Keywords: development of ethical behavior, nursing students, health, nursing informatics
Procedia PDF Downloads 2961291 A High-Resolution Refractive Index Sensor Based on a Magnetic Photonic Crystal
Authors: Ti-An Tsai, Chun-Chih Wang, Hung-Wen Wang, I-Ling Chang, Lien-Wen Chen
Abstract:
In this study, we demonstrate a high-resolution refractive index sensor based on a magnetic photonic crystal (MPC) composed of a triangular lattice array of air holes embedded in Si matrix. A microcavity is created by changing the radius of an air hole in the middle of the photonic crystal. The cavity filled with gyrotropic materials can serve as a refractive index sensor. The shift of the resonant frequency of the sensor is obtained numerically using finite difference time domain method under different ambient conditions having refractive index from n = 1.0 to n = 1.1. The numerical results show that a tiny change in refractive index of Δn = 0.0001 is distinguishable. In addition, the spectral response of the MPC sensor is studied while an external magnetic field is present. The results show that the MPC sensor exhibits a dramatic improvement in resolution.Keywords: magnetic photonic crystal, refractive index sensor, sensitivity, high-resolution
Procedia PDF Downloads 5911290 A Computational Study on Flow Separation Control of Humpback Whale Inspired Sinusoidal Hydrofoils
Authors: J. Joy, T. H. New, I. H. Ibrahim
Abstract:
A computational study on bio-inspired NACA634-021 hydrofoils with leading-edge protuberances has been carried out to investigate their hydrodynamic flow control characteristics at a Reynolds number of 14,000 and different angles-of-attack. The numerical simulations were performed using ANSYS FLUENT and based on Reynolds-Averaged Navier-Stokes (RANS) solver mode incorporated with k-ω Shear Stress Transport (SST) turbulence model. The results obtained indicate varying flow phenomenon along the peaks and troughs over the span of the hydrofoils. Compared to the baseline hydrofoil with no leading-edge protuberances, the leading-edge modified hydrofoils tend to reduce flow separation extents along the peak regions. In contrast, there are increased flow separations in the trough regions of the hydrofoil with leading-edge protuberances. Interestingly, it was observed that dissimilar flow separation behaviour is produced along different peak- or trough-planes along the hydrofoil span, even though the troughs or peaks are physically similar at each interval for a particular hydrofoil. Significant interactions between adjacent flow structures produced by the leading-edge protuberances have also been observed. These flow interactions are believed to be responsible for the dissimilar flow separation behaviour along physically similar peak- or trough-planes.Keywords: computational fluid dynamics, flow separation control, hydrofoils, leading-edge protuberances
Procedia PDF Downloads 328