Search results for: brute force attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2783

Search results for: brute force attack

1433 Artificial Intelligence in Duolingo

Authors: Elana Mahboub, Lamar Bakhurji, Hind Alhindi, Sara Alesayi

Abstract:

Duolingo is a revolutionary language learning platform that offers an interactive and accessible learning experience. Its gamified approach makes language learning engaging and enjoyable, with a diverse range of languages available. The platform's adaptive learning system tailors lessons to individual proficiency levels, ensuring a personalized and efficient learning journey. The incorporation of multimedia elements enhances the learning experience and promotes practical language application. Duolingo's success is attributed to its mobile accessibility, offering basic access to language courses for free, with optional premium features for those seeking additional resources. Research shows positive outcomes for users, and the app's global impact extends beyond individual learning to formal language education initiatives. Duolingo is a transformative force in language education, breaking down barriers and making language learning an attainable goal for millions worldwide.

Keywords: duolingo, artificial intelligence, artificial intelligence in duolingo, benefit of artificial intelligence

Procedia PDF Downloads 67
1432 Application of Terminal Sliding Mode Control to the Stabilization of the Indoor Temperature in Buildings

Authors: Pawel Skruch, Marek Dlugosz

Abstract:

The paper starts with a general model of the temperature dynamics in buildings. The modelling approach relies on thermodynamics, in particular heat transfer, principles. The model considers heat loses by conduction and ventilation and internal heat gains. The parameters of the model can be determined uniquely from the geometry of the building and from thermal properties of construction materials. The model is presented using state space notation and this form is used in the control design procedure. A sliding surface is defined by the system output and the desired trajectory. The control law is designed to force the trajectory of the system from any initial condition to the sliding surface in finite time. The trajectory of the system after reaching the sliding surface remains on it. A simulation example is included to verify the approach and to demonstrate the achievable performance improvement by the proposed solution in the temperature control in buildings.

Keywords: modelling, building, temperature dynamics, sliding-mode control, sliding surface

Procedia PDF Downloads 542
1431 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 106
1430 Mechanical Response Investigation of Wafer Probing Test with Vertical Cobra Probe via the Experiment and Transient Dynamic Simulation

Authors: De-Shin Liu, Po-Chun Wen, Zhen-Wei Zhuang, Hsueh-Chih Liu, Pei-Chen Huang

Abstract:

Wafer probing tests play an important role in semiconductor manufacturing procedures in accordance with the yield and reliability requirement of the wafer after the backend-of-the-line process. Accordingly, the stable physical and electrical contact between the probe and the tested wafer during wafer probing is regarded as an essential issue in identifying the known good die. The probe card can be integrated with multiple probe needles, which are classified as vertical, cantilever and micro-electro-mechanical systems type probe selections. Among all potential probe types, the vertical probe has several advantages as compared with other probe types, including maintainability, high probe density and feasibility for high-speed wafer testing. In the present study, the mechanical response of the wafer probing test with the vertical cobra probe on 720 μm thick silicon (Si) substrate with a 1.4 μm thick aluminum (Al) pad is investigated by the experiment and transient dynamic simulation approach. Because the deformation mechanism of the vertical cobra probe is determined by both bending and buckling mechanisms, the stable correlation between contact forces and overdrive (OD) length must be carefully verified. Moreover, the decent OD length with corresponding contact force contributed to piercing the native oxide layer of the Al pad and preventing the probing test-induced damage on the interconnect system. Accordingly, the scratch depth of the Al pad under various OD lengths is estimated by the atomic force microscope (AFM) and simulation work. In the wafer probing test configuration, the contact phenomenon between the probe needle and the tested object introduced large deformation and twisting of mesh gridding, causing the subsequent numerical divergence issue. For this reason, the arbitrary Lagrangian-Eulerian method is utilized in the present simulation work to conquer the aforementioned issue. The analytic results revealed a slight difference when the OD is considered as 40 μm, and the simulated is almost identical to the measured scratch depths of the Al pad under higher OD lengths up to 70 μm. This phenomenon can be attributed to the unstable contact of the probe at low OD length with the scratch depth below 30% of Al pad thickness, and the contact status will be being stable when the scratch depth over 30% of pad thickness. The splash of the Al pad is observed by the AFM, and the splashed Al debris accumulates on a specific side; this phenomenon is successfully simulated in the transient dynamic simulation. Thus, the preferred testing OD lengths are found as 45 μm to 70 μm, and the corresponding scratch depths on the Al pad are represented as 31.4% and 47.1% of Al pad thickness, respectively. The investigation approach demonstrated in this study contributed to analyzing the mechanical response of wafer probing test configuration under large strain conditions and assessed the geometric designs and material selections of probe needles to meet the requirement of high resolution and high-speed wafer-level probing test for thinned wafer application.

Keywords: wafer probing test, vertical probe, probe mark, mechanical response, FEA simulation

Procedia PDF Downloads 49
1429 Effect of Different Contact Rollers on the Surface Texture during the Belt Grinding Process

Authors: Amine Hamdi, Sidi Mohammed Merghache, Brahim Fernini

Abstract:

During abrasive machining of hard steels by belt grinding, the finished surface texture is influenced by the pressure between the abrasive belt and the workpiece; this pressure is the force applied by the contact roller on the workpiece. Therefore, the contact roller has an important role and has a direct impact on process efficiency. The objective of this article is to study and compare the influence of different contact rollers on the belt ground surface texture. The quality of the surface texture is characterized by eight roughness parameters (Ra, Rz, Rp, Rv, Rsk, Rku, Rsm, and Rdq) and five parameters of the bearing area curve (Rpk, Rk, Rvk, Mr1, and Mr2). The results of the experimental tests indicate a better surface texture obtained by the PA 6 polyamide roller (hardness 60 Shore D) compared to that obtained with other rollers of the same hardness or of different hardness. Simultaneously, optimum medium pressure between the belt and the workpiece allows chip removal without fracturing the abrasive grains. This generates a good surface texture.

Keywords: belt grinding, contact roller, pressure, abrasive belt, surface texture

Procedia PDF Downloads 178
1428 Development of Hit Marks on Clothes Using Amino Acid Reagents

Authors: Hyo-Su Lim, Ye-Eun Song, Eun-Bi Lee, Sang-Yoon Lee, Young-Il Seo, Jin-Pyo Kim, Nam-Kyu Park

Abstract:

If we analogize any physical external force given to victims in many crimes including violence, it would be possible not only to presume mutual action between victims and suspects, but to make a deduction of more various facts in cases. Therefore, the aim of this study is to identify criminal tools through secretion on clothes by using amino acid reagents such as Ninhydrin, DFO(1,8-dizafluoren-9-one), 1,2 – IND (1,2-indanedione) which are reacting to skin secretion. For more effective collecting condition, porcine skin which is physiologically similar to human was used. Although there were little differences of shape identification according to sensitivity, amino acid reagents were able to identify the fist, foot, and baseball bat. Furthermore, we conducted the experiments for developmental variations through change over time setting up 5-weeks period including first damage as variation factor, and developing materials in each action through certain reagents. Specimen level of development depending on change over time was identified. As a result, each of initial level of development was seen no changes.

Keywords: hit marks, amino acid reagents, porcine skin, criminal tool

Procedia PDF Downloads 262
1427 Thermal Annealing Effects on Nonradiative Recombination Parameters of GaInAsSb/GaSb by Means of Photothermal Defection Technique

Authors: Souha Bouagila, Soufiene Ilahi, Noureddine Yacoubi

Abstract:

We have used Photothermal deflection spectroscopy PTD to investigate the impact of thermal annealing on electronics properties of GaInAsSb/GaSb.GaInAsSb used as an active layer for Vertical Cavity Surface Emitting laser (VCSEL). We have remarked that surface recombination velocity (SRV) from 7963 m / s (± 6.3%) to 1450 m / s (± 3.6) for as grown to sample annealed for 60 min. Accordingly, Force Microscopy images analyses agree well with the measure of surface recombination velocity. We have found that Root-Mean-Square Roughness (RMS) decreases as respect of annealing time. In addition, we have that the diffusion length and minority carrier mobility have been enhanced according to annealing time. However, due to annealing effects, the interface recombination velocity (IRV) is increased from 1196 m / s (± 5) to 6000 m/s (5%) for GaInAsSb in respect of annealed times.

Keywords: nonradiative lifetime, mobility of minority carrier, diffusion length, Surface and interface recombination velocity

Procedia PDF Downloads 68
1426 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 310
1425 Vibration Control of a Functionally Graded Carbon Nanotube-Reinforced Composites Beam Resting on Elastic Foundation

Authors: Gholamhosein Khosravi, Mohammad Azadi, Hamidreza Ghezavati

Abstract:

In this paper, vibration of a nonlinear composite beam is analyzed and then an active controller is used to control the vibrations of the system. The beam is resting on a Winkler-Pasternak elastic foundation. The composite beam is reinforced by single walled carbon nanotubes. Using the rule of mixture, the material properties of functionally graded carbon nanotube-reinforced composites (FG-CNTRCs) are determined. The beam is cantilever and the free end of the beam is under follower force. Piezoelectric layers are attached to the both sides of the beam to control vibrations as sensors and actuators. The governing equations of the FG-CNTRC beam are derived based on Euler-Bernoulli beam theory Lagrange- Rayleigh-Ritz method. The simulation results are presented and the effects of some parameters on stability of the beam are analyzed.

Keywords: carbon nanotubes, vibration control, piezoelectric layers, elastic foundation

Procedia PDF Downloads 263
1424 Development of a Weed Suppression Robot for Rice Cultivation Weed Suppression and Posture Control

Authors: Shohei Nakai, Yasuhiro Yamada

Abstract:

Weed suppression and weeding are necessary measures for rice cultivation. Weed suppression precedes the process of weeding. It means suppressing the growth of young weeds and creating a weed-less environment. If we suppress the growth of weeds, we can reduce the number of weeds in a paddy field. This would result in a reduction of the weeding work load. In this paper, we will show how we developed a weed suppression robot for the purpose of reducing the weeding work load. The robot has a laser range finder for autonomous mobility and a robot arm for weed suppression. It travels along the rice rows without stepping on and injuring the rice plants in a paddy field. The robot arm applies force to the weed seedlings and thereby suppresses the growth of weeds. This paper will explain the methodology of the autonomous mobile, the experiment in weed suppression, and the method of controlling the robot’s posture on uneven ground.

Keywords: mobile robot, paddy field, robot arm, weed

Procedia PDF Downloads 370
1423 Research on the Public Policy of Vehicle Restriction under Traffic Control

Authors: Wang Qian, Bian Cheng Xiang

Abstract:

In recent years, with the improvement of China's urbanization level, the number of urban motor vehicles has grown rapidly. As residents' daily commuting necessities, cars cause a lot of exhaust emissions and urban traffic congestion. In the "Fourteenth Five Year Plan" of China, it is proposed to strive to reach the peak of carbon dioxide emissions by 2030 and achieve carbon neutrality by 2060. Urban transport accounts for a high proportion of carbon emission sources. It is an important driving force for the realization of China's carbon peak strategy. Some cities have introduced and implemented the policy of "car restriction" to solve related urban problems by reducing the use of cars. This paper analyzes the implementation of the "automobile restriction" policy, evaluates the relevant effects of the automobile restriction policy, and discusses how to better optimize the "automobile restriction" policy in the process of urban governance.

Keywords: carbon emission, traffic jams, vehicle restrictions, evaluate

Procedia PDF Downloads 152
1422 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil

Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu

Abstract:

The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.

Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode

Procedia PDF Downloads 149
1421 A Research to Determine the Impact of Mobbing on Organizational Commitment

Authors: A. Bedük, k. Eryeşil, o. Eşmen, m. Onacak

Abstract:

The mobbing is a process that is consisting of negative behaviors such as, systematically and continuously insulting, offending against personal dignity, preventing access to necessary information and disseminating rumors against employee by one or more than one individuals in a work environment through which disturbing the employee physically, psychologically and socially to cause to quit his/her job. This research is aiming to explore the results of mobbing (psychological violence) on employees’ organizational commitment in workplaces. Mobbing takes many forms and is often used to force an employee to leave the work environment. Two different types of scales have been reviewed and revised for use in the research. The Heinz Leymann scale is the first measure, which was developed to define causes and effects, in addition to characteristic behaviors of mobbing. The second scale was developed by Allen and Mayer and indicates levels of organizational commitment. In this research, a questionnaire were applied to 50 employees in a special glass factory in Konya to search mobbing itself and indicate the effects of mobbing to organizational commitments. One of the important findings of this research is that there was no relation between mobbing and general organizational commitment.

Keywords: mobbing, organizational commitment, affective commitment, normative commitment, continuance commitment

Procedia PDF Downloads 223
1420 Experimental Verification and Finite Element Analysis of a Sliding Door System Used in Automotive Industry

Authors: C. Guven, M. Tufekci, E. Bayik, O. Gedik, M. Tas

Abstract:

A sliding door system is used in commercial vehicles and passenger cars to allow a larger unobstructed access to the interior for loading and unloading. The movement of a sliding door on vehicle body is ensured by mechanisms and tracks having special cross-section which is manufactured by roll forming and stretch bending process. There are three tracks and three mechanisms which are called upper, central and lower on a sliding door system. There are static requirements as strength on different directions, rigidity for mechanisms, and door drop off, door sag; dynamic requirements as high energy slam opening-closing and durability requirement to validate these products. In addition, there is a kinematic requirement to find out force values from door handle during manual operating. In this study, finite element analysis and physical test results which are realized for sliding door systems will be shared comparatively.

Keywords: finite element analysis, sliding door, experimental, verification, vehicle tests

Procedia PDF Downloads 329
1419 Aerodynamic Analysis and Design of Banners for Remote-Controlled Aircraft

Authors: Peyman Honarmandi, Mazen Alhirsh

Abstract:

Banner towing is a major form of advertisement. It consists of a banner showing a logo or a selection of words or letters being towed by an aircraft. Traditionally bush planes have been used to tow banners given their high thrust capabilities; however, with the development of remote-controlled (RC) aircraft, they could be a good replacement as RC planes mitigate the risk of human life and can be easier to operate. This paper studies the best banner design to be towed by an RC aircraft. This is done by conducting wind tunnel testing on an array of banners with different materials and designs. A pull gauge is used to record the drag force during testing, which is then used to calculate the coefficient of drag, Cd. The testing results show that the best banner design would be a hybrid design with a solid and mesh material. The design with the lowest Cd of 0.082 was a half ripstop nylon half polyester mesh design. On the other hand, the design with the highest Cd of 0.305 involved incorporating a tail chute to decrease fluttering.

Keywords: aerodynamics of banner, banner design, banner towing, drag coefficients of banner, RC aircraft banner

Procedia PDF Downloads 234
1418 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 164
1417 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases

Authors: Xavier Bertrand, Alexandre Cayrel

Abstract:

The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.

Keywords: aerodynamics, lifting line, surrogate model, CFD

Procedia PDF Downloads 352
1416 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 114
1415 Parallel Vector Processing Using Multi Level Orbital DATA

Authors: Nagi Mekhiel

Abstract:

Many applications use vector operations by applying single instruction to multiple data that map to different locations in conventional memory. Transferring data from memory is limited by access latency and bandwidth affecting the performance gain of vector processing. We present a memory system that makes all of its content available to processors in time so that processors need not to access the memory, we force each location to be available to all processors at a specific time. The data move in different orbits to become available to other processors in higher orbits at different time. We use this memory to apply parallel vector operations to data streams at first orbit level. Data processed in the first level move to upper orbit one data element at a time, allowing a processor in that orbit to apply another vector operation to deal with serial code limitations inherited in all parallel applications and interleaved it with lower level vector operations.

Keywords: Memory Organization, Parallel Processors, Serial Code, Vector Processing

Procedia PDF Downloads 261
1414 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 87
1413 Optimization of Vertical Axis Wind Turbine Based on Artificial Neural Network

Authors: Mohammed Affanuddin H. Siddique, Jayesh S. Shukla, Chetan B. Meshram

Abstract:

The neural networks are one of the power tools of machine learning. After the invention of perceptron in early 1980's, the neural networks and its application have grown rapidly. Neural networks are a technique originally developed for pattern investigation. The structure of a neural network consists of neurons connected through synapse. Here, we have investigated the different algorithms and cost function reduction techniques for optimization of vertical axis wind turbine (VAWT) rotor blades. The aerodynamic force coefficients corresponding to the airfoils are stored in a database along with the airfoil coordinates. A forward propagation neural network is created with the input as aerodynamic coefficients and output as the airfoil co-ordinates. In the proposed algorithm, the hidden layer is incorporated into cost function having linear and non-linear error terms. In this article, it is observed that the ANNs (Artificial Neural Network) can be used for the VAWT’s optimization.

Keywords: VAWT, ANN, optimization, inverse design

Procedia PDF Downloads 317
1412 Investigation of Al/Si, Au/Si and Au/GaAs Interfaces by Positron Annihilation Spectroscopy

Authors: Abdulnasser S. Saleh

Abstract:

The importance of metal-semiconductor interfaces comes from the fact that most electronic devices are interconnected using metallic wiring that forms metal–semiconductor contacts. The properties of these contacts can vary considerably depending on the nature of the interface with the semiconductor. Variable-energy positron annihilation spectroscopy has been applied to study interfaces in Al/Si, Au/Si, and Au/GaAs structures. A computational modeling by ROYPROF program is used to analyze Doppler broadening results in order to determine kinds of regions that positrons are likely to sample. In all fittings, the interfaces are found 1 nm thick and act as an absorbing sink for positrons diffusing towards them and may be regarded as highly defective. Internal electric fields were found to influence positrons diffusing to the interfaces and unable to force them cross to the other side. The materials positron affinities are considered in understanding such motion. The results of these theoretical fittings have clearly demonstrated the sensitivity of interfaces in any fitting attempts of analyzing positron spectroscopy data and gave valuable information about metal-semiconductor interfaces.

Keywords: interfaces, semiconductor, positron, defects

Procedia PDF Downloads 253
1411 Investigation of the Evolutionary Equations of the Two-Planetary Problem of Three Bodies with Variable Masses

Authors: Zhanar Imanova

Abstract:

Masses of real celestial bodies change anisotropically and reactive forces appear, and they need to be taken into account in the study of these bodies' dynamics. We studied the two-planet problem of three bodies with variable masses in the presence of reactive forces and obtained the equations of perturbed motion in Newton’s form equations. The motion equations in the orbital coordinate system, unlike the Lagrange equation, are convenient for taking into account the reactive forces. The perturbing force is expanded in terms of osculating elements. The expansion of perturbing functions is a time-consuming analytical calculation and results in very cumber some analytical expressions. In the considered problem, we obtained expansions of perturbing functions by small parameters up to and including the second degree. In the non resonant case, we obtained evolution equations in the Newton equation form. All symbolic calculations were done in Wolfram Mathematica.

Keywords: two-planet, three-body problem, variable mass, evolutionary equations

Procedia PDF Downloads 55
1410 Correction Requirement to AISC Design Guide 31: Case Study of Web Post Buckling Design for Castellated Beams

Authors: Kitjapat Phuvoravan, Phattaraphong Ponsorn

Abstract:

In the design of Castellated beams (CB), the web post buckling acted by horizontal shear force is one of the important failure modes that have to be considered. It is also a dominant governing mode when design following the AISC 31 design guideline which is just published. However, the equation of the web post buckling given by the guideline is still questionable for most of the engineers. So the purpose of this paper is to study and provide a proposed equation for design the web post buckling with more simplified and convenient to use. The study is also including the improper of the safety factor given by the guideline. The proposed design equation is acquired by regression method based on the results of finite element analysis. An amount of Cellular beam simulated to study is modelled by using shell element, analysis with both geometric and material nonlinearity. The results of the study show that the use of the proposed equation to design the web post buckling in Castellated beams is more simple and precise for computation than the equations provided from the guideline.

Keywords: castellated beam, web opening, web post buckling, design equation

Procedia PDF Downloads 298
1409 Development of an Image-Based Biomechanical Model for Assessment of Hip Fracture Risk

Authors: Masoud Nasiri Sarvi, Yunhua Luo

Abstract:

Low-trauma hip fracture, usually caused by fall from standing height, has become a main source of morbidity and mortality for the elderly. Factors affecting hip fracture include sex, race, age, body weight, height, body mass distribution, etc., and thus, hip fracture risk in fall differs widely from subject to subject. It is therefore necessary to develop a subject-specific biomechanical model to predict hip fracture risk. The objective of this study is to develop a two-level, image-based, subject-specific biomechanical model consisting of a whole-body dynamics model and a proximal-femur finite element (FE) model for more accurately assessing the risk of hip fracture in lateral falls. Required information for constructing the model is extracted from a whole-body and a hip DXA (Dual Energy X-ray Absorptiometry) image of the subject. The proposed model considers all parameters subject-specifically, which will provide a fast, accurate, and non-expensive method for predicting hip fracture risk.

Keywords: bone mineral density, hip fracture risk, impact force, sideways falls

Procedia PDF Downloads 531
1408 Numerical Study on the EHD Pump with a Recirculating Channel

Authors: Dong Sik Cho, Yong Kweon Suh

Abstract:

Numerical study has been conducted on the electro-hydrodynamic (EHD) pumping method in terms of a recirculating channel. The method relies on the principle of EHD generated by the electric-field dependent electrical conductivity (Onsager effect). Before considering the full three-dimensional simulation, we solved the two-dimensional problem of EHD flow in a circular channel like a doughnut shape. We observed that when dc voltage was applied a fast and regular flow was produced around electrodes, which is then used as a driving force for the fluid pumping. In this parametric study, the diameters of circular electrodes are varied in the range 0.3mm~3mm and the gap between the electrodes pair is varied in the range 0.3mm~2mm. We found that both the volume flow rate and the pumping efficiency are increased as the distance between the electrodes is decreased. Finally, we also performed the numerical simulation for the three-dimensional channel and found that the averaged flow velocity is in the same order of magnitude as the two-dimensional one.

Keywords: electro-hydrodynamic, electric-field, onsager effect, DC voltage

Procedia PDF Downloads 294
1407 The Nonlinear Research on Rotational Stiffness of Cuplock Joint

Authors: Liuyu Zhang, Di Mo, Qiang Yan, Min Liu

Abstract:

As the important equipment in the construction field, cuplock scaffold plays an important role in the construction process. As a scaffold connecting member, cuplock joint is of great importance. In order to explore the rotational stiffness nonlinear characteristics changing features of different structural forms of cuplock joint in different tightening torque condition under different conditions of load, ANSYS is used to establish four kinds of cuplock joint models with different forces to simulate the real force situation. By setting the different load conditions which means the cuplock is loaded at a certain distance from the cuplock joint in a certain direction until the cuplock is damaged and considering the gap between the cross bar joint and the vertical bar, the differences in the influence of the structural form and tightening torque on the rotation stiffness of the cuplock under different load conditions are compared. It is significantly important to improve the accuracy of calculating bearing capacity and stability of the cuplock steel pipe scaffold.

Keywords: cuplock joint, highway tunnel, non-linear characteristics, rotational stiffness, scaffold stability, theoretical analysis

Procedia PDF Downloads 118
1406 Difference in the Expression of CIRBP, RBM3 and HSP70 in the Myocardium and Cerebellum after Death by Hypothermi a and Carbon Monoxide Poisoning

Authors: Satoshi Furukawa, Satomu Morita, Lisa Wingenfeld, Katsuji Nishi, Masahito Hitosugi

Abstract:

We studied the expression of hypoxia-related antigens (e.g., cold-inducible antigens and apoptotic antigens) in the myocardium and the cerebellumthat were obtained from individuals after death by carbon monoxide or hypothermia. The immunohistochemistry results revealed that expression of cold-inducible RNA binding protein (CIRBP) and RNA-binding protein 3 (RBM3) may be associated with hpyothermic and the hypoxic conditions. The expression of CIRBP and RBM3 in the myocardium was different from their expression in the cerebellum, especially in the Purkinje cells. The results indicate that agonal duration influences antigen expression. In the hypothermic condition, the myocardium uses more ATP since the force of the excitation-contraction coupling of the myocardium increases by more than 400% when the experimental temperature is reduced from 35°C to 25°C. The results obtained in this study indicate that physicians should pay attention to the myocardium when cooling the patient’s body to protect the brain.

Keywords: carbon monoxide death, cerebellum, CIRBP, hypothermic death, myocardium, RBM3

Procedia PDF Downloads 358
1405 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint

Authors: Oscar Sang, Shadrack David Rotich

Abstract:

Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.

Keywords: Kenya, constitution, judicial restraint, parliamentary privilege

Procedia PDF Downloads 162
1404 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation

Authors: Varsha Shinde, Belle Damodara Shenoy

Abstract:

Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.

Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs

Procedia PDF Downloads 218