Search results for: World Trade Center Attack
10654 Effect of a Stepwise Discontinuity on a 65 Degree Delta Wing
Authors: Nishit L. Sanil, Raza M. Khan
Abstract:
Increasing lift effectively at higher angles of attack has always been a daunting challenge in aviation especially on a delta wing. These are used on military jet fighter planes and has some undesirable characteristics, notably flow separation at high angles of attack and high drag at low speeds. In order to solve this problem, a design modification is modeled on a delta wing which would increase the lift so that we can improve maneuverability. To attain an increase in the lift of a 65 degree delta wing at higher angles of attack, a step-wise discontinuity is created at the upper surface of the delta wing. A normal delta wing is validated for comparison which would thereby give us a measure of flow separation and coefficient of lift affected by the modification. The results obtained deliver a significant increase in lift at higher angles of attack thereby delaying stall. Hence the benefits of the modification would aid the potential designs of aircraft’s in the time to come.Keywords: coefficient of lift, delta wing, flow separation, step-wise discontinuity
Procedia PDF Downloads 31010653 The Effects of the New Silk Road Initiatives and the Eurasian Union to the East-Central-Europe’s East Opening Policies
Authors: Tamas Dani
Abstract:
The author’s research explores the geo-economical role and importance of some small and medium sized states, reviews their adaption strategies in foreign trade and also in foreign affairs in the course of changing into a multipolar world, uses international background. With these, the paper analyses the recent years and the future of ‘Opening towards Eastern foreign economic policies’ from East-Central Europe and parallel with that the ‘Western foreign economy policies’ from Asia, as the Chinese One Belt One Road new silk route plans (so far its huge part is an infrastructural development plan to reach international trade and investment aims). It can be today’s question whether these ideas will reshape the global trade or not. How does the new silk road initiatives and the Eurasian Union reflect the effect of globalization? It is worth to analyse that how did Central and Eastern European countries open to Asia; why does China have the focus of the opening policies in many countries and why could China be seen as the ‘winner’ of the world economic crisis after 2008. The research is based on the following methodologies: national and international literature, policy documents and related design documents, complemented by processing of international databases, statistics and live interviews with leaders from East-Central European countries’ companies and public administration, diplomats and international traders. The results also illustrated by mapping and graphs. The research will find out as major findings whether the state decision-makers have enough margin for manoeuvres to strengthen foreign economic relations. This work has a hypothesis that countries in East-Central Europe have real chance to diversify their relations in foreign trade, focus beyond their traditional partners. This essay focuses on the opportunities of East-Central-European countries in diversification of foreign trade relations towards China and Russia in terms of ‘Eastern Openings’. The effects of the new silk road initiatives and the Eurasian Union to Hungary’s economy with a comparing outlook on East-Central European countries and exploring common regional cooperation opportunities in this area. The essay concentrate on the changing trade relations between East-Central-Europe and China as well as Russia, try to analyse the effects of the new silk road initiatives and the Eurasian Union also. In the conclusion part, it shows how the cooperation is necessary for the East-Central European countries if they want to have a non-asymmetric trade with Russia, China or some Chinese regions (Pearl River Delta, Hainan, …). The form of the cooperation for the East-Central European nations can be Visegrad 4 Cooperation (V4), Central and Eastern European Countries (CEEC16), 3 SEAS Cooperation (or BABS – Baltic, Adriatic, Black Seas Initiative).Keywords: China, East-Central Europe, foreign trade relations, geoeconomics, geopolitics, Russia
Procedia PDF Downloads 18210652 The System Dynamics Research of China-Africa Trade, Investment and Economic Growth
Authors: Emma Serwaa Obobisaa, Haibo Chen
Abstract:
International trade and outward foreign direct investment are important factors which are generally recognized in the economic growth and development. Though several scholars have struggled to reveal the influence of trade and outward foreign direct investment (FDI) on economic growth, most studies utilized common econometric models such as vector autoregression and aggregated the variables, which for the most part prompts, however, contradictory and mixed results. Thus, there is an exigent need for the precise study of the trade and FDI effect of economic growth while applying strong econometric models and disaggregating the variables into its separate individual variables to explicate their respective effects on economic growth. This will guarantee the provision of policies and strategies that are geared towards individual variables to ensure sustainable development and growth. This study, therefore, seeks to examine the causal effect of China-Africa trade and Outward Foreign Direct Investment on the economic growth of Africa using a robust and recent econometric approach such as system dynamics model. Our study impanels and tests an ensemble of a group of vital variables predominant in recent studies on trade-FDI-economic growth causality: Foreign direct ınvestment, international trade and economic growth. Our results showed that the system dynamics method provides accurate statistical inference regarding the direction of the causality among the variables than the conventional method such as OLS and Granger Causality predominantly used in the literature as it is more robust and provides accurate, critical values.Keywords: economic growth, outward foreign direct investment, system dynamics model, international trade
Procedia PDF Downloads 10810651 Numerical Study of Flow Characteristics and Performance of 14-X B Inlet with Blunted Cowl-Lip
Authors: Sergio N. P. Laitón, Paulo G. P. Toro, João F. Martos
Abstract:
A numerical study has been carried out to investigate the flow characteristics and performance of the 14-X B inlet with blunted cowl-lip. The Brazilian aerospace hypersonic vehicle 14-X B is a technology demonstrator of a hypersonic air-breathing propulsion system, based on supersonic combustion ramjet (scramjet). It is designed for Earth's atmospheric flight at Mach number of 6 and an altitude of 30 km. Currently, it is under development in the aerothermodynamics and hypersonic Professor Henry T. Nagamatsu laboratory at Advanced Studies Institute (IEAv). Numerical simulations were conducted at nominal freestream Mach number and altitude for two cowl-lip blunting radius and several angles of attack close to horizontal flight. The results show that the shock interference behavior on the blunted cowl-lip change with the angle of attack and blunted radius. The type VI or V together with III shock interferences are more likely to occur simultaneously at small negative angles of attack. When the inlet operates in positive angles of attack higher to 1, no shock interference occurs, only the bow shock conditions. The results indicate a high air pressure at beginning of the combustor and higher pressure recovery with 2 mm radius and positives angles of attack.Keywords: blunted cowl-lip, hypersonic inlet, inlet unstart, shock interference
Procedia PDF Downloads 32310650 Research on Hangzhou Commercial Center System Based on Point of Interest Data
Authors: Chen Wang, Qiuxiao Chen
Abstract:
With the advent of the information age and the era of big data, urban planning research is no longer satisfied with the analysis and application of traditional data. Because of the limitations of traditional urban commercial center system research, big data provides new opportunities for urban research. Therefore, based on the quantitative evaluation method of big data, the commercial center system of the main city of Hangzhou is analyzed and evaluated, and the scale and hierarchical structure characteristics of the urban commercial center system are studied. In order to make up for the shortcomings of the existing POI extraction method, it proposes a POI extraction method based on adaptive adjustment of search window, which can accurately and efficiently extract the POI data of commercial business in the main city of Hangzhou. Through the visualization and nuclear density analysis of the extracted Point of Interest (POI) data, the current situation of the commercial center system in the main city of Hangzhou is evaluated. Then it compares with the commercial center system structure of 'Hangzhou City Master Plan (2001-2020)', analyzes the problems existing in the planned urban commercial center system, and provides corresponding suggestions and optimization strategy for the optimization of the planning of Hangzhou commercial center system. Then get the following conclusions: The status quo of the commercial center system in the main city of Hangzhou presents a first-level main center, a two-level main center, three third-level sub-centers, and multiple community-level business centers. Generally speaking, the construction of the main center in the commercial center system is basically up to standard, and there is still a big gap in the construction of the sub-center and the regional-level commercial center, further construction is needed. Therefore, it proposes an optimized hierarchical functional system, organizes commercial centers in an orderly manner; strengthens the central radiation to drive surrounding areas; implements the construction guidance of the center, effectively promotes the development of group formation and further improves the commercial center system structure of the main city of Hangzhou.Keywords: business center system, business format, main city of Hangzhou, POI extraction method
Procedia PDF Downloads 14010649 Diagnostic Investigation of Aircraft Performance at Different Winglet Cant Angles
Authors: M. Dinesh, V. Kenny Mark, Dharni Vasudhevan Venkatesan, B. Santhosh Kumar, R. Sree Radesh, V. R. Sanal Kumar
Abstract:
Comprehensive numerical studies have been carried out to examine the best aerodynamic performance of subsonic aircraft at different winglet cant angles using a validated 3D k-ω SST model. In the parametric analytical studies, NACA series of airfoils are selected. Basic design of the winglet is selected from the literature and flow features of the entire wing including the winglet tip effects have been examined with different cant angles varying from 150 to 600 at different angles of attack up to 140. We have observed, among the cases considered in this study that a case with 150 cant angle the aerodynamics performance of the subsonic aircraft during takeoff was found better up to an angle of attack of 2.80 and further its performance got diminished at higher angles of attack. Analyses further revealed that increasing the winglet cant angle from 150 to 600 at higher angles of attack could negate the performance deterioration and additionally it could enhance the peak CL/CD on the order of 3.5%. The investigated concept of variable-cant-angle winglets appears to be a promising alternative for improving the aerodynamic efficiency of aircraft.Keywords: aerodynamic efficiency, cant angle, drag reduction, flexible winglets
Procedia PDF Downloads 52310648 Durability of Cement Bonded Particleboards Produced from Terminalia superba and Gmelina arborea against Subterranean Termite Attack
Authors: Amos Olajide Oluyege, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape
Abstract:
This study was conducted to determine the durability of wood-cement particleboards when exposed to attack by subterranean termites, Macrotermes subhylinus. The boards were made from Terminalia superba and Gmelina arborea wood sawdust at nominal board densities (BD) of 1000, 900, and 800 kg/m³ using wood-cement mixing ratios (MR) of 3:1, 2.5:1, 2:1, and 1:1. Above ground durability tests against termite attack were carried out according to ASTM D 2017 for 14 weeks. Results of visual assessment of the wood cement particleboards show that all the board samples had a visual rating that was not less than 7 (i.e., moderate attack) for both species irrespective of the MR and BD. T. superba boards were found to have higher resistance to termite attack compared to their G. arborea counterparts. The mean values for weight loss following exposure ranged from 1.93 to 6.13% and 3.24 to 12.44%. Analysis of variance (ANOVA) results of the weight loss assessment revealed a significant (p < 0.05) effect of species and mixing ratio on the weight loss of the boards due to termite attack with F(₁,₇₂) = 92.890 and P = 0.000 and F(₃,₇₂) = 8.318 and p = 0.000, while board density did not have any significant effect (p > 0.05) with F (₂,₇₂) = 1.307 and p = 0.277. Thus, boards made from a higher mixing ratio had better resistance against termite attacks. Thus, it can be concluded that the durability of cement-bonded particleboards when exposed to subterranean termite attack is not only dependent on the quality of the wood raw material (species) but also on the enhanced protection imparted by the cement matrix; the protection increased with increase in cement/wood mixing ratio.Keywords: cement-bonded particleboard, mixing ratio, board density, Gmelina arborea, Terminalia superba
Procedia PDF Downloads 21510647 A Shift in the Structure of Economy and Synergy of University: Developing Potential Through Research and Development Center of SMEs in Jember
Authors: Muhamad Nugraha
Abstract:
Economic growth always correlate positively with the magnitude of the unemployment rate. This is caused by labor which one of important variable to keep growth in the real sector of the region. Meanwhile, the economic structure in districts of Jember showed an increase of economic activity began to shift towards the industrial sector and some other economic sectors, so they have an affects to considerations for policy makers to increase economic growth in Jember as an autonomous region in East Java Province. At the fact, SMEs is among the factors driving economic growth in the region. This is shown by the high amount of SMEs. However, employment in the sector grew slightly slowed. It is caused by a lack of productivity in SMEs. Through the analysis of the transformation of economic structure theory, and the theory of Triple Helix using descriptive analytical method Location Quotient and Shift - Share, found that the results of the economic structure in Jember slowly shifting from the agricultural sector to the industrial sector, because it is dominated by trade sector, hotel and restaurant sector. In addition, SMEs is the potential sector of economic growth in Jember. While to maximizing role and functions of the institution's Research and Development Center of SMEs, there are three points to be known, that are Business Landscape, Business Architecture and Value Added.Keywords: economic growth, SMEs, labor, Research and Development Center of SMEs
Procedia PDF Downloads 44410646 Machine Learning in Gravity Models: An Application to International Recycling Trade Flow
Authors: Shan Zhang, Peter Suechting
Abstract:
Predicting trade patterns is critical to decision-making in public and private domains, especially in the current context of trade disputes among major economies. In the past, U.S. recycling has relied heavily on strong demand for recyclable materials overseas. However, starting in 2017, a series of new recycling policies (bans and higher inspection standards) was enacted by multiple countries that were the primary importers of recyclables from the U.S. prior to that point. As the global trade flow of recycling shifts, some new importers, mostly developing countries in South and Southeast Asia, have been overwhelmed by the sheer quantities of scrap materials they have received. As the leading exporter of recyclable materials, the U.S. now has a pressing need to build its recycling industry domestically. With respect to the global trade in scrap materials used for recycling, the interest in this paper is (1) predicting how the export of recyclable materials from the U.S. might vary over time, and (2) predicting how international trade flows for recyclables might change in the future. Focusing on three major recyclable materials with a history of trade, this study uses data-driven and machine learning (ML) algorithms---supervised (shrinkage and tree methods) and unsupervised (neural network method)---to decipher the international trade pattern of recycling. Forecasting the potential trade values of recyclables in the future could help importing countries, to which those materials will shift next, to prepare related trade policies. Such policies can assist policymakers in minimizing negative environmental externalities and in finding the optimal amount of recyclables needed by each country. Such forecasts can also help exporting countries, like the U.S understand the importance of healthy domestic recycling industry. The preliminary result suggests that gravity models---in addition to particular selection macroeconomic predictor variables--are appropriate predictors of the total export value of recyclables. With the inclusion of variables measuring aspects of the political conditions (trade tariffs and bans), predictions show that recyclable materials are shifting from more policy-restricted countries to less policy-restricted countries in international recycling trade. Those countries also tend to have high manufacturing activities as a percentage of their GDP.Keywords: environmental economics, machine learning, recycling, international trade
Procedia PDF Downloads 16810645 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks
Authors: Van Trieu, Shouhuai Xu, Yusheng Feng
Abstract:
Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.Keywords: causality, multilevel graph, cyber-attacks, prediction
Procedia PDF Downloads 15610644 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods
Authors: Bandar Alahmadi, Lethia Jackson
Abstract:
Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 33910643 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware
Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.Keywords: digital forensic, detection, eradication, targeted attack, malware
Procedia PDF Downloads 27510642 Trends in Domestic Terms of Trade of Agricultural Sector of Pakistan
Authors: Anwar Hussain, Muhammad Iqbal
Abstract:
The changes in the prices of the agriculture commodities combined with changes in population and agriculture productivity affect farmers’ profitability and standard of living. This study intends to estimate various domestic terms of trade for agriculture sector and also to assess the volatility in the standard of living and profitability of farmers. The terms of trade has been estimated for Pakistan and its provinces using producer prices indices, consumer price indices, input prices indices and quantity indices using the data for the period 1990-91 to 2008-09. The domestic terms of trade of agriculture sector has been improved in terms of both approaches i.e. the ratio of producer prices indices to consumer prices indices and the real per capita income approach. However, the cross province estimates indicated that the terms of trade also improved for Khyber Pakhtunkhwa, Sindh and Punjab while Balochistan’s domestic terms of trade deteriorated drastically. In other words the standard of living of the farmers in Pakistan and its provinces except Balochistan improved. Using the input prices, the domestic terms of trade deteriorated for Pakistan as a whole and its provinces as well. This also explores that as a whole the profitability of the farmers reduced during the study period. The farmers pay more prices for inputs as compared to they receive for their produce. This further indicates that the poverty at the gross root level has been increased. Further, summing, the standard of living of the farmers improved but their profitability reduced, which indicates that the farmers do not completely rely on the farm income but also utilize some other sources of income for their livelihood. The study supports to give subsidies on farm inputs so as to improve the profitability of the farmers.Keywords: agricultural terms of trade, farmers’ profitability, farmers’ standard of living, consumer and producer price indices, quantity indices
Procedia PDF Downloads 46610641 The Interplay between Technology and Culture in Inbound Call Center Industry
Authors: Joseph Reylan Viray, Kriztine R. Viray
Abstract:
Call center conversations, more than the business dimensions that they normally manifest, are interactions between human beings. These are communication exchanges that are packed with psychological, cultural and social dimensions that affect the specific experience of the parties. The increasing development of information and communication technology over the past decades brought about important advantages and corresponding disadvantages in the process of communicational transactions in call center industry. It has been established that the technology is so powerful that it strongly affects, among others, call center business. In the present study, the author explores the interplay between the technology being utilized by the industry and the cultural orientations of both the call center agents and their customers in the process of communication exchanges. Specifically, the paper seeks to (1) describe the interplay between culture and technology in inbound call center industry as it affects the communication exchange of the agents and customers; (2) understand the nature and the dynamics of the call center industry as regards the cultural dimensions of Hofstede; and (3) come up with a simple study where the cross-cultural aspect of the call center industry could be highlighted and could provide necessary knowledge to the stakeholders. Cognizant of the complexity of the topic, the researchers employed Hofstede's cultural dimensions. Likewise, another theory that was used in this study is the Computer Mediated Communication Theory.Keywords: call center industry, culture, Hofstede, CMT, technology
Procedia PDF Downloads 35210640 The impact of International Trade on Maritime Ecosystems: Evidence from the California Emission Control Area and the Kelp Forests
Authors: Fabien Candau, Florian Lafferrere
Abstract:
This article analyses how an emission policy for vessels (named California’s Ocean-Going Vessel Fuel Rule) was implemented in 2009 in California impacts trade and marine biodiversity. By studying the decrease in emission levels anticipated by the policy, we measure not only the consequences for port activities but also for one of the most important marine ecosystems of the California Coast: the Kelp forests. Using the Difference in Difference (DiD) approach at the Californian ports level, we find that this policy has led to a significant decrease in trade volume during this period. Therefore, we find a positive and significant effect of shipping policy on kelp canopy and biomass growth by controlling the specific climatic and environmental characteristics of California coastal areas.Keywords: international trade, shipping, marine biodiversity, emission control area
Procedia PDF Downloads 6110639 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War
Authors: Mehmet Karabekir
Abstract:
Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.Keywords: attack helicopter, conventional warfare, gulf wars
Procedia PDF Downloads 47310638 An Analysis of the Wheat Export Performance of Ukraine in Europe
Authors: Kiran Bala Das
Abstract:
This paper examines the Ukraine wheat export condition after Russian-Ukrainian military confrontation. The political conflict in Ukraine and the recent military intervention of Russia in Crimea is raising concern full effect of the events there is still uncertain, but some hints can be seen in the wheat market by analyzing the trend and pattern of Ukraine wheat export. Crimea is extremely important as it is where most of Ukraine grain exported by ship from its ports of the black sea. Ukraine is again seeking to establish itself a significant exporter of agricultural product with its rich black soil, it is chornozem the top soil layer that makes the country soil so fertile and become one of the major exporter of wheat in the world, its generous supplier of wheat make Ukraine 'Bread basket of Europe'. Ukraine possesses 30% of the world’s richest black soil; its agricultural industry has huge potential especially in grains. European Union (EU) is a significant trading partner of Ukraine but geopolitical tension adversely affects the wheat trade from black sea, which threatens Europe breadbasket. This study also highlights an index of export intensity to analyze the intensity of existing trade for the period 2011-2014 between Ukraine and EU countries. The result show export has intensified over the years, but this year low trade intensity. The overall consequence is hard to determine but if the situation deteriorates and Ukraine cutoff export, international wheat price will hike and grain prices (wheat) also come under the current circumstances and the recent development indicates how the grain market get affected and Agri future now in danger in Ukraine, and its forecast that Ukraine harvest low wheat crop this year and projected decline in export of wheat.Keywords: breadbasket of Europe, export intensity index, growth rate, wheat export
Procedia PDF Downloads 34910637 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method
Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson
Abstract:
Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.Keywords: adversarial examples, attack, computer vision, image processing
Procedia PDF Downloads 19310636 Information Technology: Assessing Indian Realities Vis-à-Vis World Trade Organisation Disciplines
Authors: Saloni Khanderia
Abstract:
The World Trade Organisation’s (WTO) Information Technology Agreement (ITA), was concluded at the Singapore Ministerial Conference in 1996. The ITA is considered to be one of the biggest tariff-cutting deals because it eliminates all customs-related duties on the exportation of specific categories of information technology products to the territory of any other signatory to the Agreement. Over time, innovations in the information and communication technology (ICT) sector mandated the consideration of expanding the list of products covered by the ITA, which took place in the form of ITA-II negotiations during the WTO’s Nairobi Ministerial Conference. India, which was an original Member of the ITA-I, however, decided to opt-out of the negotiations to expand the list of products covered by the agreement. Instead, it preferred to give priority to its national policy initiative, namely the ‘Make-in-India’ programme [the MiI programme], which embarks upon fostering the domestic production of, inter alia, the ICT sector. India claims to have abstained from the ITA-II negotiations by stating that the zero-tariff regime created by the ITA-I debilitated its electronics-manufacturing sectors and on the contrary resulted in an over-reliance on imported electronic inputs. The author undertakes doctrinal research to examine India’s decision to opt-out of ITA-II negotiations, against the backdrop of the MiI Programme, which endeavours to improve productivity across-the-board. This paper accordingly scrutinises the tariff-cutting strategies of India to weigh the better alternative for India. Apropos, it examines whether initiatives like the MiI programme could plausibly resuscitate the ailing domestic electronics-manufacturing sector. The author opines that the country’s present decision to opt-out of ITA-II negotiations should be perceived as a welcome step. Thus, market-oriented reforms such as the MiI Programme, which focuses on indigenous innovation to improve domestic manufacturing in the ICT sector, should instead, in the present circumstances gain priority. Consequently, the MiI Programme would aid in moulding the country’s current tariff policy in a manner that will concurrently assist the promotion and sustenance of domestic manufacturing in the IT sector.Keywords: electronics-manufacturing sector, information technology agreement, make in india programme, world trade organisation
Procedia PDF Downloads 23010635 Impact of the African Continental Free Trade Area on Ghana: A Computable General Equilibrium Approach
Authors: Gordon Newlove Asamoah
Abstract:
This study’s objective is to determine the impact of the African Continental Free Trade Area (AfCFTA) on Ghana using computable general equilibrium (CGE) modelling. The trade data for the simulation was drawn from the standard GTAP database version 10. The study estimated the Ad valorem equivalent (AVE) of Non-Tariff Measures (NTMs) for the Ghanaian sectors which were used for the analysis. Simulations were performed to remove import tariffs and export taxes for 90% of the tariff lines as well as 50% of the NTMs for all the AfCFTA participating countries. The NTMs' reduction was simulated using these two mechanisms: iceberg costs, also known as import augmenting technological change (AMS), and exporter costs (AXS). The study finds that removing the tariffs and NTMs in the AfCFTA regions has a positive impact on Ghana’s GDP, export and import volumes, terms of trade and welfare as measured by the equivalent variations. However, Ghana recorded a deficit of US$4766.69 million as a trade balance due to its high importation bills. This is not by chance, as Ghana is an importer of high-value-added goods but an exporter of basic agricultural raw materials with low export earnings. The study also finds much larger positive impacts for the AfCFTA regions for both importers and exporters when the NTMs that work as iceberg costs and export costs are reduced. It further finds that by reducing the export cost that increases the cost of intermediate inputs, trade among the AfCFTA regions (intra-AfCFTA trade) is enhanced.Keywords: impact, AfCFTA, NTMs, Ghana, CGE
Procedia PDF Downloads 1110634 Trade Liberalization and Domestic Private Investment in Nigeria
Authors: George-Anokwuru Chioma Chidinma Bernadette
Abstract:
This paper investigated the effect of trade liberalization on domestic private investment in Nigeria from 1981 to 2020. To achieve this objective, secondary data on domestic private investment, trade openness, exchange rate and interest rate were sourced from the statistical bulletin of Nigeria’s apex bank. The Autoregressive Distributed Lag (ARDL) technique was used as the main analytical tool. The ARDL Bounds test revealed the existence of long run association among the variables. The results revealed that trade openness and exchange rate have positive and insignificant relationship with domestic private investment both in the long and short runs. At the same time, interest rate has negative relationship with domestic private investment both in the long and short runs. Therefore, it was concluded that there is no significant relationship between trade openness, exchange rate, interest rate and domestic private investment in Nigeria during the period of study. Based on the findings, the study recommended that government should formulate trade policies that will encourage the growth of domestic private investment in Nigeria. To achieve this, government should ensure consistency in trade policies and at the same time strengthen the existing policies to build investors’ confidence. Also, government should make available an investment-friendly environment, as well as monitor real sector operators to ensure that foreign exchange allocations are not diverted. Government should increase capital investment in education, housing, transportation, agriculture, health, power, road construction, national defense, among others that will help the various sectors of the economy to function very well thereby making the business environment friendly thereby enhancing the growth and development of the country.Keywords: trade openness, domestic private investment, ARDL, exchange rate
Procedia PDF Downloads 6910633 Analysis of the Brazilian Trade Balance in Relation to Mercosur: A Comparison between the Period 1989-1994 and 1994-2012
Authors: Luciana Aparecida Bastos, Tatiana Diair L. F. Rosa, Jesus Creapldi
Abstract:
The idea of Latin American integration occurred from the ideals of Simón Bolívar that, in 1824, called the Ibero-American nations to Amphictyonic Congress of Panama, on June 22, 1826, where he would defend the importance of Latin American unity. However, this congress was frustrating and the idea of Bolívar went no further. It was only after the European Union to start the process, driven by the end of World War II that the subject returned to emerge in Latin America. Thus, in 1960, supported by the European integration process, started in 1957 with the excellent result of the ECSC - European Coal and Steel Community, a result of the Customs Union of the BENELUX (integration between Belgium, the Netherlands and Luxembourg) in 1948, was created in Latin America, LAFTA - Latin American Free Trade Association, in 1960. In 1980, LAFTA was replaced by LAAI- Latin American Association, both with the same goal: to integrate Latin America, it´s economy and its trade. Most researchers in this period agree that the regional market would be expanded through the integration. The creation of one or more economic blocs in the region would provide the union of Latin American countries through a fusion of common interests and by their geographical proximity, which would try to develop common projects to promote mutual growth and economic development, tariff reductions, promotion of increased trade between, among many other goals set together. Thus, taking into account Mercosur, the main Latin-American block, created in 1994, the aim of this paper is to make a brief analysis of the trade balance performance of Brazil (larger economy of the block) in Mercosur in the periods: 1989-1994 and 1994-2012. The choice of this period was because the objective is to compare the period before and after the integration of Brazil in Mercosur. The methodologies used were the literature review and descriptive statistics. The results showed that after the integration of Brazil in Mercosur, the exports and imports grew within the bloc and the country turned out to become the leading importer of other economies of Mercosur after integration, that is, Brazil, after integration to Mercosur, was largely responsible for promoting the expansion of regional trade through the import of products from other members of the block.Keywords: Brazil, mercosur, integration, trade balance, comparison
Procedia PDF Downloads 32410632 Temperature Distribution Enhancement in a Conical Diffuser Fitted with Helical Screw-Tape with and without Center-Rod
Authors: Ehan Sabah Shukri, Wirachman Wisnoe
Abstract:
Temperature distribution investigation in a conical diffuser fitted with helical screw-tape with and without center-rod is studied numerically. A helical screw-tape is inserted in the diffuser to create swirl flow that helps to enhance the temperature distribution rate with inlet Reynolds number 4.3 x 104. Three pitch lengths ratios (Y/L = 0.153, 0.23 and 0.307) for the helical screw-tape with and without center-rod are simulated and compared. The geometry of the conical diffuser and the inlet condition for both arrangements are kept constant. Numerical findings show that the helical screw-tape inserts without center-rod perform significantly better than the helical tape inserts with center-rod in the conical diffuser.Keywords: diffuser, temperature distribution, CFD, pitch ratio
Procedia PDF Downloads 40910631 Geographical Indication (Gi) as a Means of Protecting Traditional Right of Muga Silk (Antheria Assamensis) of Assam-India
Authors: Niranjan Das
Abstract:
‘Geographical indication’ is a sign which is used on products that have a specific geographical origin and possess qualities or a reputation that are due to that origin. Geographical Indication is primarily granted to agricultural, natural, manufactured, handicrafts originating from a definite geographical territory. It is defined in Article 22(1) of the World Trade Organization's (WTO) 1995 Agreement on ‘Trade-Related Aspects of Intellectual Property Rights (TRIPS)’. Assam is literally a ‘Silk country’ where silk culture is rooted in the rural life and culture of Assamese people. This is the only state in India and the world where Muga silk (Antheraea assamensis) is grown. Out of the total production of India’s Muga silk, Assam has the credit of being the sole producer of this 100 percent output, and thus occupies a unique position in the sericulture map of the world. Muga production has been an effective means for generating gainful employment in rural Assam and it has enormous potential in the context of building the rural economy and generating livelihood of this region. Muga, the unique golden-yellow silk of Assam was granted the ‘Geographical Indication (GI)’ registration in 2007. It is the first item from the state of Assam to obtain the GI tag. Besides manufacturing of Muga Silk cloths, the industry is also giving employment to thousands of people, and the silk industry is playing a leading role in the economy of the state. As Brahmaputra Valley is also known for tourist destination, tourists are visiting the valley every year and now the Muga Silk has reached each corner of the country and also in the other parts of the world. This paper tries to emphasizes how the Geographical Indication tag is protecting the traditional right of the Muga Silk of Assam as it has been practised by the Assamese people since times immemorial.Keywords: Geographical Indication, environment, Muga silk, traditional right and livelihood
Procedia PDF Downloads 26810630 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment
Authors: Manas Tripathi, Arunabha Mukhopadhyay
Abstract:
In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security
Procedia PDF Downloads 27810629 Adversarial Attacks and Defenses on Deep Neural Networks
Authors: Jonathan Sohn
Abstract:
Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning
Procedia PDF Downloads 19510628 Readiness Analysis of Indonesian Accountants
Authors: Lisa Listiana
Abstract:
ASEAN leader agreed to accelerate ASEAN Economic Community (AEC) implementation by 2015. The AEC Blueprint has set up obligations for its members to follow which include the establishment of (a) free trade in goods, according to ASEAN Free Trade Area: AFTA, (b) free trade in services, according to ASEAN Framework Agreement on Services: AFAS, (c) free trade in investment, according to ASEAN Comprehensive Investment Agreement: ACIA, (d) free capital flow, and (e) free flow of skilled labors. Consequently, these obligations bring both challenges and opportunities for its members. As accountant is included in the coverage of 8 skilled labors, the readiness of accounting profession to embrace AEC 2015 is pivotal. If Indonesian accountants do not accelerate their learning effort, the knowledge gap between Indonesian accountants and their international colleagues will only be worsened. This paper aims to analyze the current progress of AEC preparation and its challenges and opportunities for Indonesian accountants, and also to propose recommendation as necessary.Keywords: AEC, ASEAN, readiness, Indonesian accountants
Procedia PDF Downloads 43710627 Trade and Economic Relations between Georgia and Germany – the Impediments Caused by the Pandemic and Future Prospects
Authors: Tamar Lazariashvili
Abstract:
There are a number of factors that determine the growth and development of the country's economy; however, trade and economic relations with other countries are the most important of all these factors. The paper analyzes the trade and economic relations between Georgia and Germany, identifies the impediments caused by the Covid pandemic, and substantiates the need for further economic cooperation between the countries. Research objectives. The objective of the research is to develop recommendations and reveal the prospects of further cooperation between Georgia and Germany based on identifying the problems in the field of trade and economy in the post-crisis situation. The research object is Georgian German economic relations. Germany is Georgia's largest trading partner in the European Union. Georgia and Germany actively cooperate within the framework of international organizations as well. The paper analyzes the multilateral and intensive economic relations between Germany and Georgia; evaluates the investments of German companies in Georgia and the activities of Georgian companies in Germany. Research methods. The paper uses general and specific research methods; in particular, analysis, synthesis, induction, deduction, comparison, statistical (selection, grouping, observation, trend), and other research methods.SWOT analysis is used to determine development opportunities between countries. As a result of the research economic ranking of Georgia and Germany are determined according to the above criteria, the causes of the impediments due to the pandemic are studied; the main problems in the field of trade and economy are identified. The paper provides conclusions on the problems in the trade relations between Georgia and Germany and suggests recommendations regarding the prospects for improving these relations.Keywords: georgia-germany, trade and economic relations, economic ranking, perspective directions
Procedia PDF Downloads 15910626 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province
Authors: Sakapas Saengchai, Pichamon Chansuchai
Abstract:
Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .Keywords: Border, Trade, Policy, Promote
Procedia PDF Downloads 17110625 Solution of Logistics Center Selection Problem Using the Axiomatic Design Method
Authors: Fulya Zaralı, Harun Resit Yazgan
Abstract:
Logistics centers represent areas that all national and international logistics and activities related to logistics can be implemented by the various businesses. Logistics centers have a key importance in joining the transport stream and the transport system operations. Therefore, it is important where these centers are positioned to be effective and efficient and to show the expected performance of the centers. In this study, the location selection problem to position the logistics center is discussed. Alternative centers are evaluated according certain criteria. The most appropriate center is identified using the axiomatic design method.Keywords: axiomatic design, logistic center, facility location, information systems
Procedia PDF Downloads 348