Search results for: perfect security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3032

Search results for: perfect security

1862 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 382
1861 Reducing the Chemical Activity of Ceramic Casting Molds for Producing Decorated Glass Moulds

Authors: Nilgun Kuskonmaz

Abstract:

Ceramic molding can produce castings with fine detail, smooth surface and high degree of dimensional accuracy. All these features are the key factors for producing decorated glass moulds. In the ceramic mold casting process, the fundamental parameters affecting the mold-metal reactions are the composition and the properties of the refractory materials used in the production of ceramic mold. As a result of the reactions taking place between the liquid metal and mold surface, it is not possible to achieve a perfect surface quality, a fine surface detail and maintain a high standard dimensional tolerances. The present research examines the effects of the binder composition on the structural and physical properties of the zircon ceramic mold. In the experiment, the ceramic slurry was prepared by mixing the refractory powders (zircon(ZrSiO4), mullit(3Al2O32SiO2) and alumina (Al2O3)) with the low alkaline silica (ethyl silicate (C8H20O4Si)) and acidic type gelling material suitable binder and gelling agent. This was followed by pouring that ceramic slurry on to a silicon pattern. After being gelled, the mold was removed from the silicon pattern and dried. Then, the ceramic mold was subjected to the reaction sintering at 1600°C for 2 hours in the furnace. The stainless steel (SS) was cast into the sintered ceramic mold. At the end of this process it was observed that the surface quality of decorated glass mold.

Keywords: ceramic mold, stainless steel casting, decorated glass mold

Procedia PDF Downloads 253
1860 Challenges to Ensure Food Safety through Sanitation and Hygiene Coverage in Bangladesh

Authors: Moshiur Rahman, Tahmida Jakia

Abstract:

Bangladesh, a densely populated South Asian country is home to more than 160 million people. In two decades ago, the people of this developing nation drank heavily contaminated surface water. Over the past thirty years, the country, and its development partners, has undertaken extensive efforts to provide microbiologically safe groundwater based drinking water through the use of tube-wells. About 85% of the people now drink tube-well water from about 11 million tube-wells/hand pumps. However, diarrhoeal and other water-related diseases are still reported among the major causes of morbidity and mortality among Bangladeshi children. This implies that the mode of transmission of pathogens through water and/or other modes continue. In addition, massive scale arsenic contamination has been recently reported in the ground water. Thirty five million people may be at risk of consuming arsenic contaminated water exceeding 0.05 mg/l in Bangladesh. Drinking of arsenic contaminated water has been linked with skin problems, cancer, cardiovascular diseases, neurological diseases, eye problems, cancer of the internal organs, and other diseases. In the study area, Narail district, recent investigations about existing water quality situations indicated presence of low to high levels of arsenic, salinity, iron, manganese and bacteriological contamination risks. As challenges for safe water exist; it is likely that sanitation and food hygiene practices are poor which lead threat to ensure food security.The main attempt of this study is to find out the challenges to ensure food security andprovide probable solutions to ensure food safety towards 0.7 million of people in study area. A survey has been conducted at Lohagara and Kalia sub district of Narail district with a pretested questionnaire. Primary data are collected through a questionnaire, while secondary data are collected from pertinent offices as well as academic journals. FGD has also been done to know the knowledge regarding water, sanitation as well as food preparation and consumption practice of community people in study area. The major focus of this study is to assess the state of sanitation and food hygiene condition of rural people. It is found that most of the villagers have lack of knowledge about food safety. Open defecation rate is high which lead threat to ensure food security.

Keywords: food safety, challenges, hygiene, Bangladesh

Procedia PDF Downloads 310
1859 Review of Influential Factors on the Personnel Interview for Employment from Point of View of Human Resources Management

Authors: Abbas Ghahremani

Abstract:

One of the most fundamental management issues in organizations and companies is the recruiting of efficient staff and compiling exact and perfect criteria for testing the applicants,which is guided and practiced by the manager of human resources of the organization. Obviously, each part of the organization seeks special features and abilities in the people apart from common features among all the staff in all units,which are called principal duties and abilities,and we will study them more. This article is trying to find out how we can identify the most efficient people among the applicants of employment by using proper methods of testing appropriate for the needs of different of employment by using proper methods of testing appropriate for the needs of different units of the organization and recruit efficient staff. Acceptable method for recruiting is to closely identify their characters from various aspects such as ability to communicate, flexibility, stress management, risk acceptance, tolerance, vision to future, familiarity with the art, amount of creativity and different thinking and by raising proper questions related with the above named features and presenting a questionnaire, evaluate them from various aspect in order to gain the proper result. According to the above explanations, it can be concluded which aspects of abilities and characteristics of a person must be evaluated in order to reduce any mistake in recruitment and approach an ideal result and ultimately gain an organized system according to the standards and avoid waste of energy for unprofessional personnel which is a marginal issue in the organizations.

Keywords: human resources management, staff recuiting, employment factors, efficient staff

Procedia PDF Downloads 445
1858 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 390
1857 Integrated Microsystem for Multiplexed Genosensor Detection of Biowarfare Agents

Authors: Samuel B. Dulay, Sandra Julich, Herbert Tomaso, Ciara K. O'Sullivan

Abstract:

An early, rapid and definite detection for the presence of biowarfare agents, pathogens, viruses and toxins is required in different situations which include civil rescue and security units, homeland security, military operations, public transportation securities such as airports, metro and railway stations due to its harmful effect on the human population. In this work, an electrochemical genosensor array that allows simultaneous detection of different biowarfare agents within an integrated microsystem that provides an easy handling of the technology which combines a microfluidics setup with a multiplexing genosensor array has been developed and optimised for the following targets: Bacillus anthracis, Brucella abortis and melitensis, Bacteriophage lambda, Francisella tularensis, Burkholderia mallei and pseudomallei, Coxiella burnetii, Yersinia pestis, and Bacillus thuringiensis. The electrode array was modified via co-immobilisation of a 1:100 (mol/mol) mixture of a thiolated probe and an oligoethyleneglycol-terminated monopodal thiol. PCR products from these relevant biowarfare agents were detected reproducibly through a sandwich assay format with the target hybridised between a surface immobilised probe into the electrode and a horseradish peroxidase-labelled secondary reporter probe, which provided an enzyme based electrochemical signal. The potential of the designed microsystem for multiplexed genosensor detection and cross-reactivity studies over potential interfering DNA sequences has demonstrated high selectivity using the developed platform producing high-throughput.

Keywords: biowarfare agents, genosensors, multipled detection, microsystem

Procedia PDF Downloads 256
1856 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 20
1855 Farmers Willingness to Pay for Irrigated Maize Production in Rural Kenya

Authors: Dennis Otieno, Lilian Kirimi Nicholas Odhiambo, Hillary Bii

Abstract:

Kenya is considered to be a middle level income country and usuaaly does not meet household food security needs especially in North and South eastern parts. Approximately half of the population is living under the poverty line (www, CIA 1, 2012). Agriculture is the largest sector in the country, employing 80% of the population. These are thereby directly dependent on the sufficiency of outputs received. This makes efficient, easy-accessible and cheap agricultural practices an important matter in order to improve food security. Maize is the prime staple food commodity in Kenya and represents a substantial share of people’s nutritional intake. This study is the result of questionnaire based interviews, Key informant and focus group discussion involving 220 small scale maize farmers Kenyan. The study was located to two separated areas; Lower Kuja, Bunyala, Nandi, Lower Nzoia, Perkerra, Mwea Bura, Hola and Galana Kulalu in Kenya. The questionnaire captured the farmers’ use and perceived importance of the use irrigation services and irrigated maize production. Viability was evaluated using the four indices which were all positive with NPV giving positive cash flows in less than 21 years at most for one season output. The mean willingness to pay was found to be KES 3082 and willingness to pay increased with increase in irrigation premiums. The economic value of water was found to be greater than the willingness to pay implying that irrigated maize production is sustainable. Farmers stated that viability was influenced by high output levels, good produce quality, crop of choice, availability of sufficient water and enforcement the last two factors had a positive influence while the other had negative effect on the viability of irrigated maize. A regression was made over the correlation between the willingness to pay for irrigated maize production using scheme and plot level factors. Farmers that already use other inputs such as animal manure, hired labor and chemical fertilizer should also have a demand for improved seeds according to Liebig's law of minimum and expansion path theory. The regression showed that premiums, and high yields have a positive effect on willingness to pay while produce quality, efficient fertilizer use, and crop season have a negative effect.

Keywords: maize, food security, profits, sustainability, willingness to pay

Procedia PDF Downloads 206
1854 Improving Activity Recognition Classification of Repetitious Beginner Swimming Using a 2-Step Peak/Valley Segmentation Method with Smoothing and Resampling for Machine Learning

Authors: Larry Powell, Seth Polsley, Drew Casey, Tracy Hammond

Abstract:

Human activity recognition (HAR) systems have shown positive performance when recognizing repetitive activities like walking, running, and sleeping. Water-based activities are a reasonably new area for activity recognition. However, water-based activity recognition has largely focused on supporting the elite and competitive swimming population, which already has amazing coordination and proper form. Beginner swimmers are not perfect, and activity recognition needs to support the individual motions to help beginners. Activity recognition algorithms are traditionally built around short segments of timed sensor data. Using a time window input can cause performance issues in the machine learning model. The window’s size can be too small or large, requiring careful tuning and precise data segmentation. In this work, we present a method that uses a time window as the initial segmentation, then separates the data based on the change in the sensor value. Our system uses a multi-phase segmentation method that pulls all peaks and valleys for each axis of an accelerometer placed on the swimmer’s lower back. This results in high recognition performance using leave-one-subject-out validation on our study with 20 beginner swimmers, with our model optimized from our final dataset resulting in an F-Score of 0.95.

Keywords: time window, peak/valley segmentation, feature extraction, beginner swimming, activity recognition

Procedia PDF Downloads 106
1853 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition

Authors: Qin Long, Li Xiaoge

Abstract:

The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.

Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network

Procedia PDF Downloads 80
1852 Personality Characteristics Managerial Skills and Career Preference

Authors: Dinesh Kumar Srivastava

Abstract:

After liberalization of the economy, technical education has seen rapid growth in India. A large number of institutions are offering various engineering and management programmes. Every year, a number of students complete B. Tech/M. Tech and MBA programmes of different institutes, universities in India and search for jobs in the industry. A large number of companies visit educational institutes for campus placements. These companies are interested in hiring competent managers. Most students show preference for jobs from reputed companies and jobs having high compensation. In this context, this study was conducted to understand career preference of postgraduate students and junior executives. Personality characteristics influence work life as well as personal life. In the last two decades, five factor model of personality has been found to be a valid predictor of job performance and job satisfaction. This approach has received support from studies conducted in different countries. It includes neuroticism, extraversion, and openness to experience, agreeableness, and conscientiousness. Similarly three social needs, namely, achievement, affiliation and power influence motivation and performance in certain job functions. Both approaches have been considered in the study. The objective of the study was first, to analyse the relationship between personality characteristics and career preference of students and executives. Secondly, the study analysed the relationship between personality characteristics and skills of students. Three managerial skills namely, conceptual, human and technical have been considered in the study. The sample size of the study was 266 including postgraduate students and junior executives. Respondents have completed BE/B. Tech/MBA programme. Three dimensions of career preference namely, identity, variety and security and three managerial skills were considered as dependent variables. The results indicated that neuroticism was not related to any dimension of career preference. Extraversion was not related to identity, variety and security. It was positively related to three skills. Openness to experience was positively related to skills. Conscientiousness was positively related to variety. It was positively related to three skills. Similarly, the relationship between social needs and career preference was examined using correlation. The results indicated that need for achievement was positively related to variety, identity and security. Need for achievement was positively related to managerial skills Need for affiliation was positively related to three dimensions of career preference as well as managerial skills Need for power was positively related to three dimensions of career preference and managerial skills Social needs appear to be stronger predictor of career preference and managerial skills than big five traits. Findings have implications for selection process in industry.

Keywords: big five traits, career preference, personality, social needs

Procedia PDF Downloads 261
1851 Preparation, Characterization, and in-Vitro Drug Release Study of Methotrexate-Loaded Hydroxyapatite-Sodium Alginate Nanocomposites

Authors: Friday G. Okibe, Edit B. Agbaji, Victor O. Ajibola, Christain C. Onoyima

Abstract:

Controlled drug delivery systems reduce dose-dependent toxicity associated with potent drugs, including anticancer drugs. In this research, hydroxyapatite (HA) and hydroxyapatite-sodium alginate nanocomposites (HASA) were successfully prepared and characterized using Fourier Transform Infrared spectroscopy (FTIR) and Scanning Electron Microscopy (SEM). The FTIR result showed absorption peaks characteristics of pure hydroxyapatite (HA), and also confirmed the chemical interaction between hydroxyapatite and sodium alginate in the formation of the composite. Image analysis from SEM revealed nano-sized hydroxyapatite and hydroxyapatite-sodium alginate nanocomposites with irregular morphologies. Particle size increased with the formation of the nanocomposites relative to pure hydroxyapatite, with no significant change in particles morphologies. Drug loading and in-vitro drug release study were carried out using synthetic body fluid as the release medium, at pH 7.4 and 37 °C and under perfect sink conditions. The result shows that drug loading is highest for pure hydroxyapatite and decreased with increasing quantity of sodium alginate. However, the release study revealed that HASA-5%wt and HASA-20%wt presented better release profile than pure hydroxyapatite, while HASA-33%wt and HASA-50%wt have poor release profiles. This shows that Methotrexate-loaded hydroxyapatite-sodium alginate if prepared under optimal conditions is a potential carrier for effective delivery of Methotrexate.

Keywords: drug-delivery, hydroxyapatite, methotrexate, nanocomposites, sodium alginate

Procedia PDF Downloads 259
1850 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 140
1849 Origins of Strict Liability for Abnormally Dangerous Activities in the United States, Rylands v. Fletcher and a General Clause of Strict Liability in the UK

Authors: Maria Lubomira Kubica

Abstract:

The paper reveals the birth and evolution of the British precedent Rylands v. Fletcher that, once adopted on the other side of the Ocean (in United States), gave rise to a general clause of liability for abnormally dangerous activities recognized by the §20 of the American Restatements of the Law Third, Liability for Physical and Emotional Harm. The main goal of the paper was to analyze the development of the legal doctrine and of the case law posterior to the precedent together with the intent of the British judicature to leapfrog from the traditional rule contained in Rylands v. Fletcher to a general clause similar to that introduced in the United States and recently also on the European level. As it is well known, within the scope of tort law two different initiatives compete with the aim of harmonizing the European laws: European Group on Tort Law with its Principles of European Tort Law (hereinafter PETL) in which article 5:101 sets forth a general clause for strict liability for abnormally dangerous activities and Study Group on European Civil Code with its Common Frame of Reference (CFR) which promotes rather ad hoc model of listing out determined cases of strict liability. Very narrow application scope of the art. 5:101 PETL, restricted only to abnormally dangerous activities, stays in opposition to very broad spectrum of strict liability cases governed by the CFR. The former is a perfect example of a general clause that offers a minimum and basic standard, possibly acceptable also in those countries in which, like in the United Kingdom, this regime of liability is completely marginalized.

Keywords: Rylands v. Fletcher, strict liability, dangerous activities, general clause

Procedia PDF Downloads 289
1848 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa

Authors: K. Alaka, A. Obi

Abstract:

Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.

Keywords: food security, home gardening, household, income

Procedia PDF Downloads 208
1847 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province

Authors: Sakapas Saengchai, Pichamon Chansuchai

Abstract:

Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .

Keywords: Border, Trade, Policy, Promote

Procedia PDF Downloads 148
1846 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 119
1845 Geographical Information System and Multi-Criteria Based Approach to Locate Suitable Sites for Industries to Minimize Agriculture Land Use Changes in Bangladesh

Authors: Nazia Muhsin, Tofael Ahamed, Ryozo Noguchi, Tomohiro Takigawa

Abstract:

One of the most challenging issues to achieve sustainable development on food security is land use changes. The crisis of lands for agricultural production mainly arises from the unplanned transformation of agricultural lands to infrastructure development i.e. urbanization and industrialization. Land use without sustainability assessment could have impact on the food security and environmental protections. Bangladesh, as the densely populated country with limited arable lands is now facing challenges to meet sustainable food security. Agricultural lands are using for economic growth by establishing industries. The industries are spreading from urban areas to the suburban areas and using the agricultural lands. To minimize the agricultural land losses for unplanned industrialization, compact economic zones should be find out in a scientific approach. Therefore, the purpose of the study was to find out suitable sites for industrial growth by land suitability analysis (LSA) by using Geographical Information System (GIS) and multi-criteria analysis (MCA). The goal of the study was to emphases both agricultural lands and industries for sustainable development in land use. The study also attempted to analysis the agricultural land use changes in a suburban area by statistical data of agricultural lands and primary data of the existing industries of the study place. The criteria were selected as proximity to major roads, and proximity to local roads, distant to rivers, waterbodies, settlements, flood-flow zones, agricultural lands for the LSA. The spatial dataset for the criteria were collected from the respective departments of Bangladesh. In addition, the elevation spatial dataset were used from the SRTM (Shuttle Radar Topography Mission) data source. The criteria were further analyzed with factors and constraints in ArcGIS®. Expert’s opinion were applied for weighting the criteria according to the analytical hierarchy process (AHP), a multi-criteria technique. The decision rule was set by using ‘weighted overlay’ tool to aggregate the factors and constraints with the weights of the criteria. The LSA found only 5% of land was most suitable for industrial sites and few compact lands for industrial zones. The developed LSA are expected to help policy makers of land use and urban developers to ensure the sustainability of land uses and agricultural production.

Keywords: AHP (analytical hierarchy process), GIS (geographic information system), LSA (land suitability analysis), MCA (multi-criteria analysis)

Procedia PDF Downloads 252
1844 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 243
1843 Evolving Maritime Geopolitics of the Indo-Pacific

Authors: Pragya Pandey

Abstract:

A major discussion in the 21st -century international affairs has been around the shifting economic and political center of gravity to Asia. In the maritime realm, it translates into a shift in focus from the Atlantic to the Pacific-Indian Ocean region or what is now popularly called the Indo-Pacific region. The Indo-Pacific is rapidly eclipsing once dominant Asia-Pacific as center of trade, investment, competition and cooperation. The growing inter-connectivity between the Indian Ocean and the Pacific Ocean is bringing forth the ‘confluence of the two seas’. Therefore, the Indo-Pacific strategic arc is acquiring greater salience in consonance with the changing realities of the time. The region is undergoing unprecedented transformation in its security outlook. At present, the region is at an interesting historic epoch- witnessing the simultaneous rise India and China, their economic growth, naval modernization and power projection capabilities, alongside the continued presence of the United States, particularly with its rebalancing strategy. Besides the interplay among the three major stakeholders, other regional players like Japan, Australia, and Indonesia, would play a crucial role in the geopolitical re-arrangement of the Indo-Pacific region. The region will be the future theater of activities to determine the shifts and distribution of sea power, by the virtue of its strategic location, intrinsic value of the energy resources and significant maritime trade routes of the region. Therefore, the central theme of the paper would be to scrutinize the maritime security environment of the region against the backdrop of the tricky geopolitical landscape, contributing to the change in the regional and global balance of power.

Keywords: China, geopolitics, India, United States

Procedia PDF Downloads 245
1842 The Effect of the Environmental Activities of Organizations on Financial Performance

Authors: Fatemeh Khalili Varnamkhasti

Abstract:

Natural administration has outside impacts such that companies regularly respect natural input as a fetched with no clear advantage. In this manner, in case natural security can bring financial benefits, showing that natural security and financial interface are in concordance, companies will effectively fulfill their obligation to ensure the environment. Contamination is, for the most part, related to the squandering of assets, misplaced vitality, and crude materials not completely utilized. Contamination avoidance and clean innovation, as inner organizational hones, can offer assistance to play down taken toll and to develop economic aptitudes for the long run, whereas outside organizational hones (item stewardship and maintainability vision) can offer assistance to coordinated partner sees into trade operations and to define future commerce directions. Taken together, these practices can drive shareholder esteem while at the same time contributing to a more feasible world. On the off chance that the company's budgetary execution is nice, it'll draw in financial specialists to contribute and progress the company's execution. In this way, budgetary execution is additionally the determinant of the progression of a company. This can be because the monetary back gotten by the company gets to be the premise for the running of trade forms in the future. Moreover, A green picture can assist firms in pulling in more clients by influencing shopper choices and moving forward with buyer brand dependability. Numerous shoppers need to purchase items from ecologically inviting firms, in spite of the fact that there are, of course, a few who will not pay premium costs for green items.

Keywords: environmental activities, financial performanance, advantage, clients

Procedia PDF Downloads 40
1841 Legal Doctrine on Rylands v. Fletcher: One more time on Feasibility of a General Clause of Strict Liability in the UK

Authors: Maria Lubomira Kubica

Abstract:

The paper reveals the birth and evolution of the British precedent Rylands v. Fletcher that, once adopted on the other side of the Ocean (in United States), gave rise to a general clause of liability for abnormally dangerous activities recognized by the §20 of the American Restatements of the Law Third, Liability for Physical and Emotional Harm. The main goal of the paper was to analyze the development of the legal doctrine and of the case law posterior to the precedent together with the intent of the British judicature to leapfrog from the traditional rule contained in Rylands v. Fletcher to a general clause similar to that introduced in the United States and recently also on the European level. As it is well known, within the scope of tort law two different initiatives compete with the aim of harmonizing the European laws: European Group on Tort Law with its Principles of European Tort Law (hereinafter PETL) in which article 5:101 sets forth a general clause for strict liability for abnormally dangerous activities and Study Group on European Civil Code with its Common Frame of Reference (CFR) which promotes rather ad hoc model of listing out determined cases of strict liability. Very narrow application scope of the art. 5:101 PETL, restricted only to abnormally dangerous activities, stays in opposition to very broad spectrum of strict liability cases governed by the CFR. The former is a perfect example of a general clause that offers a minimum and basic standard, possibly acceptable also in those countries in which, like in the United Kingdom, this regime of liability is completely marginalized.

Keywords: abnormally dangerous activities, general clause, Rylands v. Fletcher, strict liability

Procedia PDF Downloads 192
1840 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change

Authors: Jesica López, Deniz Koca, Asaf Tzachor

Abstract:

In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).

Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon

Procedia PDF Downloads 79
1839 Integrated Intensity and Spatial Enhancement Technique for Color Images

Authors: Evan W. Krieger, Vijayan K. Asari, Saibabu Arigela

Abstract:

Video imagery captured for real-time security and surveillance applications is typically captured in complex lighting conditions. These less than ideal conditions can result in imagery that can have underexposed or overexposed regions. It is also typical that the video is too low in resolution for certain applications. The purpose of security and surveillance video is that we should be able to make accurate conclusions based on the images seen in the video. Therefore, if poor lighting and low resolution conditions occur in the captured video, the ability to make accurate conclusions based on the received information will be reduced. We propose a solution to this problem by using image preprocessing to improve these images before use in a particular application. The proposed algorithm will integrate an intensity enhancement algorithm with a super resolution technique. The intensity enhancement portion consists of a nonlinear inverse sign transformation and an adaptive contrast enhancement. The super resolution section is a single image super resolution technique is a Fourier phase feature based method that uses a machine learning approach with kernel regression. The proposed technique intelligently integrates these algorithms to be able to produce a high quality output while also being more efficient than the sequential use of these algorithms. This integration is accomplished by performing the proposed algorithm on the intensity image produced from the original color image. After enhancement and super resolution, a color restoration technique is employed to obtain an improved visibility color image.

Keywords: dynamic range compression, multi-level Fourier features, nonlinear enhancement, super resolution

Procedia PDF Downloads 539
1838 Interoperability Standard for Data Exchange in Educational Documents in Professional and Technological Education: A Comparative Study and Feasibility Analysis for the Brazilian Context

Authors: Giovana Nunes Inocêncio

Abstract:

The professional and technological education (EPT) plays a pivotal role in equipping students for specialized careers, and it is imperative to establish a framework for efficient data exchange among educational institutions. The primary focus of this article is to address the pressing need for document interoperability within the context of EPT. The challenges, motivations, and benefits of implementing interoperability standards for digital educational documents are thoroughly explored. These documents include EPT completion certificates, academic records, and curricula. In conjunction with the prior abstract, it is evident that the intersection of IT governance and interoperability standards holds the key to transforming the landscape of technical education in Brazil. IT governance provides the strategic framework for effective data management, aligning with educational objectives, ensuring compliance, and managing risks. By adopting interoperability standards, the technical education sector in Brazil can facilitate data exchange, enhance data security, and promote international recognition of qualifications. The utilization of the XML (Extensible Markup Language) standard further strengthens the foundation for structured data exchange, fostering efficient communication, standardization of curricula, and enhancing educational materials. The IT governance, interoperability standards, and data management critical role in driving the quality, efficiency, and security of technical education. The adoption of these standards fosters transparency, stakeholder coordination, and regulatory compliance, ultimately empowering the technical education sector to meet the dynamic demands of the 21st century.

Keywords: interoperability, education, standards, governance

Procedia PDF Downloads 56
1837 Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations

Authors: Marisa Galiza Filipe

Abstract:

In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war.

Keywords: espionage, Azores, WWI, neutrality

Procedia PDF Downloads 39
1836 A Fuzzy Hybrıd Decısıon Support System for Naval Base Place Selectıon in a Foreıgn Country

Authors: Latif Yanar, Muharrem Kaçan

Abstract:

In this study, an Analytic Hierarchy Process and Analytic Network Process Decision Support System (DSS) model for determination of a navy base place in another country is proposed together with a decision support software (DESTEC 1.0) developed using C Sharp programming language. The proposed software also has the ability of performing the fuzzy models (Fuzzy AHP and Fuzzy ANP) of the proposed DSS to cope with the ambiguous and linguistic nature of the model. The AHP and ANP model, for a decision support for selecting the best place among the alternatives, including the criteria and alternatives, is developed and solved by the experts from Turkish Navy and Turkish academicians related to international relations branches of the universities in Turkey. Also, the questionnaires used for weighting of the criteria and the alternatives are filled by these experts.Some of our alternatives are: economic and political stability of the third country, the effect of another super power in that country, historical relations, security in that country, social facilities in the city in which the base will be built, the transportation security and difficulty from a main city that have an airport to the city will have the base etc. Over 20 criteria like these are determined which are categorized in social, political, economic and military aspects. As a result all the criteria and three alternatives are evaluated by different people who have background and experience to weight the criteria and alternatives as it must be in AHP and ANP evaluation system. The alternatives got their degrees all between 0 – 1 and the total is 1. At the end the DSS advices one of the alternatives as the best one to the decision maker according to the developed model and the evaluations of the experts.

Keywords: analytic hierarchical process, analytic network process, fuzzy logic, naval base place selection, multiple criteria decision making

Procedia PDF Downloads 380
1835 The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link

Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito

Abstract:

Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.

Keywords: arms control, arms race, global security, GMD, ICBM, missile defense, proliferation

Procedia PDF Downloads 130
1834 Organic Farming for Sustainable Production of Some Promising Halophytic Species in Saline Environment

Authors: Medhat Tawfik, Ezzat Abd El Lateef, Bahr Amany, Mohamed Magda

Abstract:

Applying organic farming systems in biosaline agriculture is unconventional approach for sustainable use of marginal soil and desert land for planting non-traditional halophytic crops such as Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens. These plants are highly salt tolerant C4 halophytic forage plants grown well in coastal salt marsh. These halophytic plant will take important place in the farming system, especially in the coastal areas and salt-affected land. We can call it environmentally smart crops because they ensure food security, contribute to energy security, guarantee environmental sustainability, and mitigate the negative impacts of climate change. Organic Agriculture is the most important and widely practiced agro-ecological farming system. It is claimed to be the most sustainable approach and long term adaptation strategy. It promotes soil fertility and diversity at all levels and makes soils less susceptible to erosion. It is also reported to be climate change resilience farming systems as it promotes the proper management of soil, water, biodiversity and local knowledge and provides producers with ecologically sound management decisions. A field experiment was carried out at the Model Farm of National Research Centre, El Tour, South Sinai to study the impact of (Mycorrhiza 1kg/fed., charcoal 4 tons/fed., chicken manure 5 tons/fed., in addition to control treatment) on some growth characters, photosynthetic pigments content, and some physiological aspects i.e. prolind and soluble carbohydrates content, succulence and osmotic pressure values, as well as nutritive values i.e. Crude fat (CF), Acid detergent fiber (ADF), Neutral detergent fiber (NDF), Ether extract (EE) and Nitrogen-free extract (NFE) of five halophytic plant species (Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens). Our results showed that organic fertilizer treatment enhanced all the previous character as compared with control with superiority to chicken manure over the other treatments.

Keywords: organic agriculture, halophytic plants, saline environment, water security

Procedia PDF Downloads 209
1833 Induction Melting as a Fabrication Route for Aluminum-Carbon Nanotubes Nanocomposite

Authors: Muhammad Shahid, Muhammad Mansoor

Abstract:

Increasing demands of contemporary applications for high strength and lightweight materials prompted the development of metal-matrix composites (MMCs). After the discovery of carbon nanotubes (CNTs) in 1991 (revealing an excellent set of mechanical properties) became one of the most promising strengthening materials for MMC applications. Additionally, the relatively low density of the nanotubes imparted high specific strengths, making them perfect strengthening material to reinforce MMCs. In the present study, aluminum-multiwalled carbon nanotubes (Al-MWCNTs) composite was prepared in an air induction furnace. The dispersion of the nanotubes in molten aluminum was assisted by inherent string action of induction heating at 790°C. During the fabrication process, multifunctional fluxes were used to avoid oxidation of the nanotubes and molten aluminum. Subsequently, the melt was cast in to a copper mold and cold rolled to 0.5 mm thickness. During metallographic examination using a scanning electron microscope, it was observed that the nanotubes were effectively dispersed in the matrix. The mechanical properties of the composite were significantly increased as compared to pure aluminum specimen i.e. the yield strength from 65 to 115 MPa, the tensile strength from 82 to 125 MPa and hardness from 27 to 30 HV for pure aluminum and Al-CNTs composite, respectively. To recognize the associated strengthening mechanisms in the nanocomposites, three foremost strengthening models i.e. shear lag model, Orowan looping and Hall-Petch have been critically analyzed; experimental data were found to be closely satisfying the shear lag model.

Keywords: carbon nanotubes, induction melting, strengthening mechanism, nanocomposite

Procedia PDF Downloads 350