Search results for: man in middle attack
2099 The Role of Middle Managers SBU's in Context of Change: Sense-Making Approach
Authors: Hala Alioua, Alberic Tellier
Abstract:
This paper is designed to spotlight the research on corporate strategic planning, by emphasizing the role of middle manager of SBU’s and related issues such as the context of vision change. Previous research on strategic vision has been focused principally at the SME, with relatively limited consideration given to the role of middle managers SBU’s in the context of change. This project of research has been done by using a single case study. We formulated through our immersion for 2.5 years on the ground and by a qualitative method and abduction approach. This entity that we analyze is a subsidiary of multinational companies headquartered in Germany, specialized in manufacturing automotive equipment. The "Delta Company" is a French manufacturing plant that has undergone numerous changes over the past three years. The two major strategic changes that have a significant impact on the Delta plant are the strengths of its core business through « lead plant strategy» in 2011 and the implementation of a new strategic vision in 2014. These consecutive changes impact the purpose of the mission of the middle managers. The plant managers ask the following questions: How the middle managers make sense of the corporate strategic planning imposed by the parent company? How they appropriate the new vision and decline it into actions on the ground? We chose the individual interview technique through open-ended questions as the source of data collection. We first of all carried out an exploratory approach by interviewing 8 members of the Management committee’s decision and 19 heads of services. The first findings and results show that exist a divergence of opinion and interpretations of the corporate strategic planning among organization members and there are difficulties to make sense and interpretations of the signals of the environment. The lead plant strategy enables new projects which insure the workload of Delta Company. Nevertheless, it creates a tension and stress among the middle managers because its provoke lack of resources to the detriment of their main jobs as manufacturer plant. The middle managers does not have a clear vision and they are wondering if the new strategic vision means more autonomy and less support from the group.Keywords: change, middle managers, vision, sensemaking
Procedia PDF Downloads 4012098 Correlation between Physical Fitness and Performance and Grade of Table Tennis of Middle School Students
Authors: Yisong Cong, Mingming Guo, Xiaozan Wang, Yizhi Zhang, Qingqing Yuan
Abstract:
This study is to test the correlation between the Physical Fitness (PF) of middle school students and their performance and sports grade of table tennis. Methods: 398 middle school students from Shanghai Tongji No.2 Middle School participated in the study, including 232 boys and 166 girls. Each participant participated in the Chinese Students’ Physical Fitness Test (CSPFT), including BMI, 50-meter running, vital capacity, sitting body flexion, standing long jump, 800-meter running, 1000-meter running, pull-ups, and sit-ups. Test scores were converted to a percentage score according to the CSPFT guidelines. In addition, each student participated in the Nation Junior Table Tennis grade test, and completed the table tennis sports grade assessment of 1-9. Results: There is a significant positive correlation between the scores of multiple PF tests and the total scores of table tennis, such as BMI (r = 0.15, p < 0.01), standing long jump (r = 0.15, p < 0.05), 800-meter run (r = 0.02, p <0.01); The scores of multiple PF are positively correlated with table tennis grade, such as vital capacity (r = 0.1, p < 0.01) and 50-meter running (r = 0.18, p < 0.05). At the same time, the sit-ups performance showed a significant negative correlation with the table tennis performance (r = -0.08, p < 0.01); There is no significant correlation between the other PF indicators and the performance and grade of table tennis. Conclusions: This study shows that there is a corresponding relationship between some PF indicators of middle school students and their table tennis performance and table tennis grade,but the specific form and reason of the relationship need to be further explored.Keywords: middle school students, physical fitness, table tennis grade, table tennis performance
Procedia PDF Downloads 1602097 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 4552096 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 4302095 Dao Din Student Activists: From Hope to Victims under the Thai Society of Darkness
Authors: Siwach Sripokangkul, Autthapon Muangming
Abstract:
The Dao Din group is a gathering of students from the Faculty of Law, Khon Kaen University, a leading university in the northeast of Thailand. The Dao Din group has been one of the most prominent student movements in the past four decades since the bloody massacre of the 6th of October 1976. The group of student is a movement who gather to oppose and protest against different capitalist-run projects that have impacted upon the environment since 2009. The students have become heroes in Thai society and receive support from various groups, especially the middle class who regard the students as role models for the youth. Subsequently, the Dao Din group has received numerous awards between 2011-2013. However, the Dao Din group opposed the military coup d’état of 2014 and the subsequent military junta. Under the military dictatorship regime (2014-present), security officials have hunted, insulted, arrested, and jailed members of the group many times amidst silence from most of the from the middle class. Therefore, this article posits the question of why the Dao Din group which was once the hero and hope of Thai society, has become a political victim in only a few years. The study methods used are the analysis of documentaries, news articles, and interviews with representatives of the Dao Din group. The author argues that Thailand’s middle class previously demonstrated a positive perception of the Dao Din group precisely because that group had earlier opposed policies of the elected Yingluck Shinawatra government, which most of the middle class already despised. However, once the Dao Din group began to protest against the anti-Yingluck military government, then the middle class turned to harshly criticize the Dao Din group. So it can be concluded that the Thai middle class tends to put its partisan interests ahead of a civil society group which has been critical of elected as well as military administrations. This has led the middle class to support the demolishing of Thai democracy. Such a Thai middle-class characteristic not only poses a strong bulwark for the perpetuation of military rule but also destroys a civil society group (composed of young people) who should be the future hope of the nation rather than under the Thai society of darkness.Keywords: Dao Din student activists, the military coup d’état of 2014, Thai politics, human rights violations
Procedia PDF Downloads 2242094 Navigating through Uncertainty: An Explorative Study of Managers’ Experiences in China-foreign Cooperative Higher Education
Abstract:
To drive practical interpretations and applications of various policies in building the transnational education joint-ventures, middle managers learn to navigate through uncertainties and ambiguities. However, the current literature views very little about those middle managers’ experiences, perceptions, and practices. This paper takes the empirical approach and aims to uncover the middle managers’ experiences by conducting interviews, campus visits, and document analysis. Following the qualitative research method approach, the researchers gathered information from a mixture of fourteen foreign and Chinese managers. Their perceptions of the China-foreign cooperation in higher education and their perceived roles have offered important, valuable insights to this group of people’s attitudes and management performances. The diverse cultural and demographic backgrounds contributed to the significance of the study. There are four key findings. One, middle managers’ immediate micro-contexts and individual attitudes are the top two influential factors in managers’ performances. Two, the foreign middle managers showed a stronger sense of self-identity in risk-taking. Three, the Chinese middle managers preferred to see difficulties as part of their assigned responsibilities. Four, middle managers in independent universities demonstrated a stronger sense of belonging and fewer frustrations than middle managers in secondary institutes. The researchers propose that training for managers in a transnational educational setting should consider these discoveries when select fitting topics and content. In particular, middle managers should be better prepared to anticipate their everyday jobs in the micro-environment; hence, information concerning sponsor organizations’ working culture is as essential as knowing the national and local regulations, and socio-culture. Different case studies can help the managers to recognize and celebrate the diversity in transnational education. Situational stories can help them to become aware of the diverse and wide range of work contexts so that they will not feel to be left alone when facing challenges without relevant previous experience or training. Though this research is a case study based in the Chinese transnational higher education setting, the implications could be relevant and comparable to other transnational higher education situations and help to continue expanding the potential applications in this field.Keywords: educational management, middle manager performance, transnational higher education
Procedia PDF Downloads 1632093 Biochemical Characterization of Meat Goat in Algeria
Authors: Hafid Nadia, Meziane Toufik
Abstract:
The aim of this study was the characterization of the goat meat by the determination of quantity and the quality in Batna region. The first part was the evaluation of production and consumption. The investigations show that the goat meat third after mutton and beef, it’s especially consumed by the indigenous population located in the Mountain and steep area. The second part of this review treats nutritional quality of this meat by the quantification of the chemical composition, including fat profile, and establishes a link between animal age and the values of these parameters. Moisture, fat contents, and cholesterol levels varied with age. Because of the decreasing level of cholesterol in the Chevon meat, it is more recommended for consumption to prevent or reduce the incidence of coronary disease and heart attack.Keywords: biochemical composition, cholesterol, goat meat, heart attack
Procedia PDF Downloads 6692092 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 4142091 A Failure Investigations of High-Temperature Hydrogen Attack at Plat Forming Unit Furnace Elbow
Authors: Altoumi Alndalusi
Abstract:
High-temperature hydrogen attack (HTHA) failure is the common phenomena at elevated temperature in hydrogen environment in oil and gas field. The failure occurred once after four years at the internal surface of Platforming elbow. Both visual and microscopic examinations revealed that the failure was initiated due to blistering forming followed by large cracking at the inner surface. Crack morphology showed that the crack depth was about 50% of material wall thickness and its behavior generally was intergranular. This study concluded that the main reason led to failure due to incorrect material selection comparing to the platforming conditions.Keywords: decarburization, failure, heat affected zone, morphology, partial pressure, plate form
Procedia PDF Downloads 1562090 Multidisciplinary Approach to Diagnosis of Primary Progressive Aphasia in a Younger Middle Aged Patient
Authors: Robert Krause
Abstract:
Primary progressive aphasia (PPA) is a neurodegenerative disease similar to frontotemporal and semantic dementia, while having a different clinical image and anatomic pathology topography. Nonetheless, they are often included under an umbrella term: frontotemporal lobar degeneration (FTLD). In the study, examples of diagnosing PPA are presented through the multidisciplinary lens of specialists from different fields (neurologists, psychiatrists, clinical speech therapists, clinical neuropsychologists and others) using a variety of diagnostic tools such as MR, PET/CT, genetic screening and neuropsychological and logopedic methods. Thanks to that, specialists can get a better and clearer understanding of PPA diagnosis. The study summarizes the concrete procedures and results of different specialists while diagnosing PPA in a patient of younger middle age and illustrates the importance of multidisciplinary approach to differential diagnosis of PPA.Keywords: primary progressive aphasia, etiology, diagnosis, younger middle age
Procedia PDF Downloads 1952089 Performance of a Sailing Vessel with a Solid Wing Sail Compared to a Traditional Sail
Authors: William Waddington, M. Jahir Rizvi
Abstract:
Sail used to propel a vessel functions in a similar way to an aircraft wing. Traditionally, cloth and ropes were used to produce sails. However, there is one major problem with traditional sail design, the increase in turbulence and flow separation when compared to that of an aircraft wing with the same camber. This has led to the development of the solid wing sail focusing mainly on the sail shape. Traditional cloth sails are manufactured as a single element whereas solid wing sail is made of two segments. To the authors’ best knowledge, the phenomena behind the performances of this type of sail at various angles of wind direction with respect to a sailing vessel’s direction (known as the angle of attack) is still an area of mystery. Hence, in this study, the thrusts of a sailing vessel produced by wing sails constructed with various angles (22°, 24°, 26° and 28°) between the two segments have been compared to that of a traditional cloth sail made of carbon-fiber material. The reason for using carbon-fiber material is to achieve the correct and the exact shape of a commercially available mainsail. NACA 0024 and NACA 0016 foils have been used to generate two-segment wing sail shape which incorporates a flap between the first and the second segments. Both the two-dimensional and the three-dimensional sail models designed in commercial CAD software Solidworks have been analyzed through Computational Fluid Dynamics (CFD) techniques using Ansys CFX considering an apparent wind speed of 20.55 knots with an apparent wind angle of 31°. The results indicate that the thrust from traditional sail increases from 8.18 N to 8.26 N when the angle of attack is increased from 5° to 7°. However, the thrust value decreases if the angle of attack is further increased. A solid wing sail which possesses 20° angle between its two segments, produces thrusts from 7.61 N to 7.74 N with an increase in the angle of attack from 7° to 8°. The thrust remains steady up to 9° angle of attack and drops dramatically beyond 9°. The highest thrust values that can be obtained for the solid wing sails with 22°, 24°, 26° and 28° angle respectively between the two segments are 8.75 N, 9.10 N, 9.29 N and 9.19 N respectively. The optimum angle of attack for each of the solid wing sails is identified as 7° at which these thrust values are obtained. Therefore, it can be concluded that all the thrust values predicted for the solid wing sails of angles between the two segments above 20° are higher compared to the thrust predicted for the traditional sail. However, the best performance from a solid wing sail is expected when the sail is created with an angle between the two segments above 20° but below or equal to 26°. In addition, 1/29th scale models in the wind tunnel have been tested to observe the flow behaviors around the sails. The experimental results support the numerical observations as the flow behaviors are exactly the same.Keywords: CFD, drag, sailing vessel, thrust, traditional sail, wing sail
Procedia PDF Downloads 2792088 An Assessment of Poland's Current Macroeconomic Conditions to Determine Whether It Is in a Middle Income Trap
Authors: Bozena Leven
Abstract:
The middle-income trap (MIT) describes a situation faced by countries at a relatively mature stage of development that often poses an obstacle to sustainable long-term growth. MIT is characterized by declining factor productivity from the exhaustion of labor intensive, import and Foreign Direct Investment (FDI) based strategies when middle-income status is achieved. In this paper, we focus on MIT and Poland. In the past two decades, Poland experienced steady growth based largely on imported technologies and low-cost labor. Recently, that economic growth has slowed, prompting economists to ask whether Poland is experiencing MIT. To answer this question, we analyze changes in investment in Poland; specifically- its growth and composition – as well as savings, FDI, educational attainments of the labor force, development of new technologies and products, the role of imports, diversification of exports, and product complexity. We also examine the development of modern infrastructure, institutions (including legal environment) and demographic changes in Poland that support growth. Our findings indicate that certain factors consistent with MIT are gaining importance in Poland, and represent a challenge to that country’s future growth rate.Keywords: engines of growth, factor productivity, middle income trap, sustainable development
Procedia PDF Downloads 2112087 Great Powers’ Proxy Wars in Middle East and Difficulty in Transition from Cold War to Cold Peace
Authors: Arash Sharghi, Irina Dotu
Abstract:
The developments in the Middle East region have activated the involvement of a numerous diverse state and non-state actors in the regional affairs. The goals, positions, ideologies, different, and even contrast policy behaviors had procured the spreading and continuity of crisis. Non-state actors varying from Islamic organizations to takfiri-terrorist movements on one hand and regional and trans- regional actors, from another side, seek to reach their interests in the power struggle. Here, a research worthy question comes on the agenda: taking into consideration actors’ contradictory interests and constraints what are the regional peace and stability perspectives? Therein, different actors’ aims definition, their actions and behaviors, which affect instability, can be regarded as independent variables; whereas, on the contrary, Middle East peace and stability perspective analysis is a dependent variable. Though, this regional peace and war theory based research admits the significant influence of trans-regional actors, it asserts the roots of violence to derive from region itself. Consequently, hot war and conflict prevention and hot peace assurance in the Middle East region cannot be attained only by demands and approaches of trans-regional actors. Moreover, capacity of trans-regional actors is sufficient only for a cold war or cold peace to be reached in the region. Furthermore, within the framework of current conflict (struggle) between regional actors it seems to be difficult and even impossible to turn the cold war into a cold peace in the region.Keywords: cold peace, cold war, hot war, Middle East, non-state actors, regional and Great powers, war theory
Procedia PDF Downloads 2742086 Investigation of the Technological Demonstrator 14x B in Different Angle of Attack in Hypersonic Velocity
Authors: Victor Alves Barros Galvão, Israel Da Silveira Rego, Antonio Carlos Oliveira, Paulo Gilberto De Paula Toro
Abstract:
The Brazilian hypersonic aerospace vehicle 14-X B, VHA 14-X B, is a vehicle integrated with the hypersonic airbreathing propulsion system based on supersonic combustion (scramjet), developing in Aerothermodynamics and hypersonic Prof. Henry T. Nagamatsu Laboratory, to conduct demonstration in atmospheric flight at the speed corresponding to Mach number 7 at an altitude of 30km. In the experimental procedure the hypersonic shock tunnel T3 was used, installed in that laboratory. This device simulates the flow over a model is fixed in the test section and can also simulate different atmospheric conditions. The scramjet technology offers substantial advantages to improve aerospace vehicle performance which flies at a hypersonic speed through the Earth's atmosphere by reducing fuel consumption on board. Basically, the scramjet is an aspirated aircraft engine fully integrated that uses oblique/conic shock waves generated during hypersonic flight, to promote the deceleration and compression of atmospheric air in scramjet inlet. During the hypersonic flight, the vehicle VHA 14-X will suffer atmospheric influences, promoting changes in the vehicle's angles of attack (angle that the mean line of vehicle makes with respect to the direction of the flow). Based on this information, a study is conducted to analyze the influences of changes in the vehicle's angle of attack during the atmospheric flight. Analytical theoretical analysis, simulation computational fluid dynamics and experimental investigation are the methodologies used to design a technological demonstrator prior to the flight in the atmosphere. This paper considers analysis of the thermodynamic properties (pressure, temperature, density, sound velocity) in lower surface of the VHA 14-X B. Also, it considers air as an ideal gas and chemical equilibrium, with and without boundary layer, considering changes in the vehicle's angle of attack (positive and negative in relation to the flow) and bi-dimensional expansion wave theory at the expansion section (Theory of Prandtl-Meyer).Keywords: angle of attack, experimental hypersonic, hypersonic airbreathing propulsion, Scramjet
Procedia PDF Downloads 4092085 Trajectory Optimization of Re-Entry Vehicle Using Evolutionary Algorithm
Authors: Muhammad Umar Kiani, Muhammad Shahbaz
Abstract:
Performance of any vehicle can be predicted by its design/modeling and optimization. Design optimization leads to efficient performance. Followed by horizontal launch, the air launch re-entry vehicle undergoes a launch maneuver by introducing a carefully selected angle of attack profile. This angle of attack profile is the basic element to complete a specified mission. Flight program of said vehicle is optimized under the constraints of the maximum allowed angle of attack, lateral and axial loads and with the objective of reaching maximum altitude. The main focus of this study is the endo-atmospheric phase of the ascent trajectory. A three degrees of freedom trajectory model is simulated in MATLAB. The optimization process uses evolutionary algorithm, because of its robustness and efficient capacity to explore the design space in search of the global optimum. Evolutionary Algorithm based trajectory optimization also offers the added benefit of being a generalized method that may work with continuous, discontinuous, linear, and non-linear performance matrix. It also eliminates the requirement of a starting solution. Optimization is particularly beneficial to achieve maximum advantage without increasing the computational cost and affecting the output of the system. For the case of launch vehicles we are immensely anxious to achieve maximum performance and efficiency under different constraints. In a launch vehicle, flight program means the prescribed variation of vehicle pitching angle during the flight which has substantial influence reachable altitude and accuracy of orbit insertion and aerodynamic loading. Results reveal that the angle of attack profile significantly affects the performance of the vehicle.Keywords: endo-atmospheric, evolutionary algorithm, efficient performance, optimization process
Procedia PDF Downloads 4052084 Aerodynamic Investigation of Baseline-IV Bird-Inspired BWB Aircraft Design: Improvements over Baseline-III BWB
Authors: C. M. Nur Syazwani, M. K. Ahmad Imran, Rizal E. M. Nasir
Abstract:
The study on BWB UV begins in UiTM since 2005 and three designs have been studied and published. The latest designs are Baseline-III and inspired by birds that have features and aerodynamics behaviour of cruising birds without flapping capability. The aircraft featuring planform and configuration are similar to the bird. Baseline-III has major flaws particularly in its low lift-to-drag ratio, stability and issues regarding limited controllability. New design known as Baseline-IV replaces straight, swept wing to delta wing and have a broader tail compares to the Baseline-III’s. The objective of the study is to investigate aerodynamics of Baseline-IV bird-inspired BWB aircraft. This will be achieved by theoretical calculation and wind tunnel experiments. The result shows that both theoretical and wind tunnel experiments of Baseline-IV graph of CL and CD versus alpha are quite similar to each other in term of pattern of graph slopes and values. Baseline-IV has higher lift coefficient values at wide range of angle of attack compares to Baseline-III. Baseline-IV also has higher maximum lift coefficient, higher maximum lift-to-drag and lower parasite drag. It has stable pitch moment versus lift slope but negative moment at zero lift for zero angle-of-attack tail setting. At high angle of attack, Baseline-IV does not have stability reversal as shown in Baseline-III. Baseline-IV is proven to have improvements over Baseline-III in terms of lift, lift-to-drag ratio and pitch moment stability at high angle-of-attack.Keywords: blended wing-body, bird-inspired blended wing-body, aerodynamic, stability
Procedia PDF Downloads 5082083 The Mechanical Strength and Durability of High Performance Concrete Using Local Materials
Authors: I. Guemidi, Y. Abdelaziz, T. Rikioui
Abstract:
In this work, an experimental investigation was carried out to evaluate the mechanical and durability properties of high performance concretes (HPC) containing local southwest Algerian materials. The mechanical properties were assessed from the compressive strength and the flexural strength, whilst the durability characteristics were investigated in terms of sulphate attack. The results obtained allow us to conclude that it is possible to make a high performance concrete (HPC) based on existing materials in the local market, if these are carefully selected and properly mixed in such away to optimize grain size distribution.Keywords: durability, high performance concrete, high strength, local materials, Southwest Algerian, sulphate attack
Procedia PDF Downloads 3902082 The Mediating Role of Resilience in the Association Between Stigma and Psychosocial Adjustment: A Cross-sectional Study Among Young and Middle-Aged Patients With Lung Cancer
Authors: Ziyun Li, Jiudi Zhong, June Zhang
Abstract:
Background: The diagnosis and treatment of lung cancer lead to varying degrees of psychological and social maladjustment among patients with lung cancer. Understanding psychosocial adjustment (PA) and its influencing factors in young and middle-aged lung cancer patients is essential to help them return to society and lead a normal life. Objectives: This study aims to examine the mediating role of resilience in the association between stigma and psychosocial adjustment among young and middle-aged patients with lung cancer. Methods: A total of 235 patients with lung cancer were recruited from a tertiary grade A cancer center in southern China and investigated using a self-designed general information questionnaire, Psychosocial Adjustment to Illness Scale Self-Report, Social Impact Scale, and Conner-Davidson Resilience Scale. Results: The mean score of PA was (32.61±14.75), and its influencing factors included treatment modalities, stigma, and resilience. The total effect of stigma on PA was significant (total effect=0.418, SE=0.045, 95%CI [0.310-0.497]), and a positive indirect effect was identified for stigma on PA via resilience (indirect effect=0.143, SE=0.041, 95% CI [0.075-0.236]). Conclusion: Stigma and resilience are significantly associated with PA, and resilience is also a mediating variable between stigma and PA. This study suggests that individualized interventions can be made to improve the PA by alleviating their stigma, or by enhancing their resilience in young and middle-aged lung cancer patients.Keywords: psychosocial adjustment, lung cancer, cancer caring, nursing, young and middle-aged
Procedia PDF Downloads 922081 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3682080 Academic Motivation Maintenance for Students While Solving Mathematical Problems in the Middle School
Authors: M. Rodionov, Z. Dedovets
Abstract:
The level and type of student academic motivation are the key factors in their development and determine the effectiveness of their education. Improving motivation is very important with regard to courses on middle school mathematics. This article examines the general position regarding the practice of academic motivation. It also examines the particular features of mathematical problem solving in a school setting.Keywords: teaching strategy, mathematics, motivation, student
Procedia PDF Downloads 4452079 The Influence of 3D Printing Course on Middle School Students' Spatial Thinking Ability
Authors: Wang Xingjuan, Qian Dongming
Abstract:
As a common thinking ability, spatial thinking ability plays an increasingly important role in the information age. The key to cultivating students' spatial thinking ability is to cultivate students' ability to process and transform graphics. The 3D printing course enables students to constantly touch the rotation and movement of objects during the modeling process and to understand spatial graphics from different views. To this end, this article combines the classic PSVT: R test to explore the impact of 3D printing courses on the spatial thinking ability of middle school students. The results of the study found that: (1) Through the study of the 3D printing course, the students' spatial ability test scores have been significantly improved, which indirectly reflects the improvement of the spatial thinking ability level. (2) The student's spatial thinking ability test results are influenced by the parent's occupation.Keywords: 3D printing, middle school students, spatial thinking ability, influence
Procedia PDF Downloads 1902078 Complex Dynamics of a Four Species Food-Web Model: An Analysis through Beddington-Deangelis Functional Response in the Presence of Additional Food
Authors: Surbhi Rani, Sunita Gakkhar
Abstract:
The four-dimensional food web system consisting of two prey species for a generalist middle predator and a top predator is proposed and investigated. The middle predator is predating both the prey species with a modified Holling type-II functional response. The food web model is found to be well-posed, bounded, and dissipative. The proposed model's essential dynamical features are studied in terms of local stability. The four species' survival is explored, and persistence conditions are established. The numerical simulations reveal the persistence in the form of a chaotic attractor or stable focus. The conclusion is that providing additional food to the middle predator may help to control the food chain's chaos.Keywords: predator-prey model, existence of equilibrium points, local stability, chaos, numerical simulations
Procedia PDF Downloads 1092077 Detect QOS Attacks Using Machine Learning Algorithm
Authors: Christodoulou Christos, Politis Anastasios
Abstract:
A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping
Procedia PDF Downloads 612076 The Effects of Turkish Soap Operas on the Image of Turkey in the Middle Europe
Authors: Yakup Uslu
Abstract:
The purpose of this study is to reveal how the Turkish soap operas effect the image of Turkey in the Middle Europe. In last decades, Turkish soap operas have been shown on TV in the middle European countries. A research based on face to face questioning was done in February and June 2014 in Slovakia and the Czech Republic. The participants were seven women and six men from the Czech Republic, 8 women and 6 men from Slovakia. According to results of the research, the Turkish image has been changed substantially after broadcasting the soap operas. In general, the Turkish soap operas have had positive effects on the image of Turkey. The other result of the study shows that most of the people in Slovakia and Czech Republic want to come to Turkey as tourists and want to visit the places where the soap operas have been shooted.Keywords: Turkish soap operas, image of Turkey, Slovakia, Czech Republic
Procedia PDF Downloads 4922075 Dependency Theory on Examining the Relationship between the United States and the Middle East: In the Case of Iran, Saudi Arabia, and Turkey
Authors: Abdelhafez Abdel Hafez
Abstract:
Dependency theory was developed since 1950s, with economic concerns. It divided the world into two parts, the states of the peripheral (third world countries) and the states of the core (the developed capitalist countries). Another perspective developed to the theory with the implementation of the idea of semi-peripheral states in the new world order. With these divisions (core, peripheral, semi-peripheral) this study aims to develop a concept from the perspective of dependency theory, to understand the nature of the relationship of the U.S. with the Middle East Regions through its relation with Iran, Saudi Arabia, and Turkey. The tested countries (Saudi Arabia, Iran and Turkey) are seeking a foothold and influential role in the region. The paper argued that the U.S. directs its policies toward the region, in the way to guarantee no country of the region will be in semi-peripheral level (that could create competitions or danger on the U.S. interest). Therefore, U.S. policies in the region have varied from declaring war to diplomatic channels and sometimes ignoring. The paper is based on the dependency theory, and other international relations theories used to study the Middle East in the international context.Keywords: dependency, hegemony, imperialism, middle east
Procedia PDF Downloads 1292074 Investigation on Corrosion Behavior of Copper Brazed Joints
Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari
Abstract:
DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.Keywords: copper, brazing, corrosion, filler metal
Procedia PDF Downloads 4702073 Review of the Anatomy of the Middle Cerebral Artery and Its Anomalies
Authors: Karen Cilliers, Benedict John Page
Abstract:
The middle cerebral artery (MCA) is the most complex cerebral artery although few anomalies are found compared to the other cerebral arteries. The branches of the MCA cover a large part of each hemisphere, therefore it is exposed in various operations. Although the segments of the MCA are similarly described by most authors, there is some disagreement on the branching pattern of the MCA. The aim of this study was to review the available literature on the anatomy and variations of the MCA, and to compare this to a pilot study. For the pilot study, 20 hemispheres were perfused with coloured silicone and the MCA was dissected. According to the literature, the two most common branching configurations are the bifurcating and trifurcating patterns. In the pilot study, bifurcation was observed in 19 hemispheres, and in one hemisphere there was no branching (monofurcation). No trifurcation was observed. The most commonly duplicated branch was the anterior parietal artery in 30%, and most commonly absent was the common temporal artery in 65% and the temporal polar artery in 40%. Very few studies describe the origins of the branches of the MCA, therefore a detailed description is given. Middle cerebral artery variations that are occasionally reported in the literature include fenestration, and a duplicated or accessory MCA, although no variations were observed in the pilot study. Aneurysms can frequently be observed at the branching of cerebral vessels, therefore a thorough knowledge of the vascular anatomy is vital. Furthermore, knowledge of possible variations is important since variations can have serious clinical implications.Keywords: anatomy, anomaly, description, middle cerebral artery, origin, variation
Procedia PDF Downloads 3472072 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2632071 A Study on Wage Discrimination Between Young and Middle-Aged Workers in Indian Informal Sector: Evidence from Periodic Labour Force Survey
Authors: Dharshini S.
Abstract:
India is currently experiencing a shift in wage discrimination from gender, caste and religion to different age groups in both formal and informal sectors. In this milieu, this study examines wage discrimination in the informal labour market between young people (15-29 years) and middle-aged people (30-59 years) among regular and casual employees in the Indian informal sector. The data was collected using periodic labour force (PLFS), and the original data was extracted from the National Sample Survey Office (NSSO) under the Ministry of Statistics and Programme Implementation (MOSPI), Government of India. The OLS regression model explores the determinants of wages for both regular and casual employees. Moreover, the Blinder Oaxaca decomposition method is used to explore the explained and unexplained components of this wage discrimination. The younger people (regular and casual employees) get lower wages as compared to middle-aged employees in the informal sector. The regression result follows the human capital theory, where education, job experience and higher occupation help to raise the wage rate of middle-aged people more than young-aged people in regular work. Furthermore, we found the rising trend of wage discrimination between the above groups over the years from 2017-18 to 2022-23. Unexplained factors (discrimination effects) contribute more to the wage differentiation between the young and middle age groups. It indicates that wage discrimination persists among regular and casual employees in the informal labour market, which is not a good sign for the economy. For the betterment of workers who face discrimination for age, the policies and programs should be implemented like other countries such as the U.S.A to stop age discrimination due to stereotypes in India.Keywords: wage discrimination, young workers, middle workers, Informal sector, blinder oaxaca decomposition, PLFS.
Procedia PDF Downloads 112070 A CFD Study of the Performance Characteristics of Vented Cylinders as Vortex Generators
Authors: R. Kishan, R. M. Sumant, S. Suhas, Arun Mahalingam
Abstract:
This paper mainly researched on influence of vortex generator on lift coefficient and drag coefficient, when vortex generator is mounted on a flat plate. Vented cylinders were used as vortex generators which intensify vortex shedding in the wake of the vented cylinder as compared to base line circular cylinder which ensures more attached flow and increases lift force of the system. Firstly vented cylinders were analyzed in commercial CFD software which is compared with baseline cylinders for different angles of attack and further variation of lift and drag forces were studied by varying Reynolds number to account for influence of turbulence and boundary layer in the flow. Later vented cylinders were mounted on a flat plate and variation of lift and drag coefficients was studied by varying angles of attack and studying the dependence of Reynolds number and dimensions of vortex generator on the coefficients. Mesh grid sensitivity is studied to check the convergence of the results obtained It was found that usage of vented cylinders as vortex generators increased lift forces with small variation in drag forces by varying angle of attack.Keywords: CFD analysis, drag coefficient, FVM, lift coefficient, modeling, Reynolds number, simulation, vortex generators, vortex shedding
Procedia PDF Downloads 432