Search results for: code reuse attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2363

Search results for: code reuse attack

593 An Investigation into the Effects of Anxiety Sensitivity in Adolescents on Anxiety Disorder and Childhood Depression

Authors: Ismail Seçer

Abstract:

The purpose of this study is to investigate the effects of anxiety sensitivity in adolescents on anxiety disorder and childhood depression. Mood disorders and anxiety disorders in children and adolescents can be given examples of important research topics in recent years. The participants of the study consist of 670 students in Erzurum and Erzincan city centers. The participants of the study were 670 secondary and high school students studying in city centers of Erzurum and Erzincan. The participants were chosen based on convenience sampling. The participants were between the ages of 13 and 18 (M=15.7, Ss= 1.35) and 355 were male and 315 were female. The data were collected through Anxiety Sensitivity Index and Anxiety and Depression Index for Children and Adolescents. For data analysis, Correlation analysis and Structural Equation Model were used. In this study, correlational descriptive survey was used. This model enables the researcher to make predictions related to different variables based on the information obtained from one or more variables. Therefore, the purpose is to make predictions considering anxiety disorder and childhood depression based on anxiety sensitivity. For this purpose, latent variable and structural equation model was used. Structural equation model is an analysis method which enables the identification of direct and indirect effects by determining the relationship between observable and latent variables and testing their effects on a single model. CFI, RMR, RMSEA and SRMR, which are commonly accepted fit indices in structural equation model, were used. The results revealed that anxiety sensitivity impacts anxiety disorder and childhood depression through direct and indirect effects in a positive way. The results are discussed in line with the relevant literature. This finding can be considered that anxiety sensitivity can be a significant risk source in terms of children's and adolescents’ anxiety disorder experience. This finding is consistent with relevant research highlighting that in case the anxiety sensitivity increases then the obsessive compulsive disorder and panic attack increase too. The adolescents’ experience of anxiety can be attributed to anxiety sensitivity.

Keywords: anxiety sensitivity, anxiety, depression, structural equation

Procedia PDF Downloads 292
592 Investigation of External Pressure Coefficients on Large Antenna Parabolic Reflector Using Computational Fluid Dynamics

Authors: Varun K, Pramod B. Balareddy

Abstract:

Estimation of wind forces plays a significant role in the in the design of large antenna parabolic reflectors. Reflector surface accuracies are very sensitive to the gain of the antenna system at higher frequencies. Hence accurate estimation of wind forces becomes important, which is primary input for design and analysis of the reflector system. In the present work, numerical simulation of wind flow using Computational Fluid Dynamics (CFD) software is used to investigate the external pressure coefficients. An extensive comparative study has been made between the CFD results and the published wind tunnel data for different wind angle of attacks (α) acting over concave to convex surfaces respectively. Flow simulations using CFD are carried out to estimate the coefficients of Drag, Lift and Moment for the parabolic reflector. Coefficients of pressures (Cp) over the front and the rear face of the reflector are extracted over surface of the reflector to study the net pressure variations. These resultant pressure variations are compared with the published wind tunnel data for different angle of attacks. It was observed from the CFD simulations, both convex and concave face of reflector system experience a band of pressure variations for the positive and negative angle of attacks respectively. In the published wind tunnel data, Pressure variations over convex surfaces are assumed to be uniform and vice versa. Chordwise and spanwise pressure variations were calculated and compared with the published experimental data. In the present work, it was observed that the maximum pressure coefficients for α ranging from +30° to -90° and α=+90° was lower. For α ranging from +45° to +75°, maximum pressure coefficients were higher as compared to wind tunnel data. This variation is due to non-uniform pressure distribution observed over front and back faces of reflector. Variations in Cd, Cl and Cm over α=+90° to α=-90° was in close resemblance with the experimental data.

Keywords: angle of attack, drag coefficient, lift coefficient, pressure coefficient

Procedia PDF Downloads 242
591 Effect of Infill Walls on Response of Multi Storey Reinforced Concrete Structure

Authors: Ayman Abd-Elhamed, Sayed Mahmoud

Abstract:

The present research work investigates the seismic response of reinforced concrete (RC) frame building considering the effect of modeling masonry infill (MI) walls. The seismic behavior of a residential 6-storey RC frame building, considering and ignoring the effect of masonry, is numerically investigated using response spectrum (RS) analysis. The considered herein building is designed as a moment resisting frame (MRF) system following the Egyptian code (EC) requirements. Two developed models in terms of bare frame and infill walls frame are used in the study. Equivalent diagonal strut methodology is used to represent the behavior of infill walls, whilst the well-known software package ETABS is used for implementing all frame models and performing the analysis. The results of the numerical simulations such as base shear, displacements, and internal forces for the bare frame as well as the infill wall frame are presented in a comparative way. The results of the study indicate that the interaction between infill walls and frames significantly change the responses of buildings during earthquakes compared to the results of bare frame building model. Specifically, the seismic analysis of RC bare frame structure leads to underestimation of base shear and consequently damage or even collapse of buildings may occur under strong shaking. On the other hand, considering infill walls significantly decrease the peak floor displacements and drifts in both X and Y-directions.

Keywords: masonry infill, bare frame, response spectrum, seismic response

Procedia PDF Downloads 393
590 Numerical Investigation of Nanofluid Based Thermosyphon System

Authors: Kiran Kumar K., Ramesh Babu Bejjam, Atul Najan

Abstract:

A thermosyphon system is a heat transfer loop which operates on the basis of gravity and buoyancy forces. It guarantees a good reliability and low maintenance cost as it does not involve any mechanical pump. Therefore it can be used in many industrial applications such as refrigeration and air conditioning, electronic cooling, nuclear reactors, geothermal heat extraction, etc. But flow instabilities and loop configuration are the major problems in this system. Several previous researchers studied that stabilities can be suppressed by using nanofluids as loop fluid. In the present study a rectangular thermosyphon loop with end heat exchangers are considered for the study. This configuration is more appropriate for many practical applications such as solar water heater, geothermal heat extraction, etc. In the present work, steady-state analysis is carried out on thermosyphon loop with parallel flow coaxial heat exchangers at heat source and heat sink. In this loop nano fluid is considered as the loop fluid and water is considered as the external fluid in both hot and cold heat exchangers. For this analysis one-dimensional homogeneous model is developed. In this model, conservation equations like conservation of mass, momentum, energy are discretized using finite difference method. A computer code is written in MATLAB to simulate the flow in thermosyphon loop. A comparison in terms of heat transfer is made between water and nano fluid as working fluids in the loop.

Keywords: heat exchanger, heat transfer, nanofluid, thermosyphon loop

Procedia PDF Downloads 467
589 The Human Rights of Women in Brazilian Territory: A Literature Review of the Axes of the National Human Rights Program III

Authors: Ana Luiza Casasanta Garcia, Maria Del Carmen Cortizo

Abstract:

From the classic contractualist and early declarations of modern rights, discussions on policies for the protection and promotion of human rights were highlighted in an attempt to ensure the realization of human dignity and its values, which are (re) negotiated according to the needs evidenced in each historical and contextual moment. Aiming at guaranteeing human rights to Brazilian citizens, created in 2009 and updated in 2010, the Third National Human Rights Program (PNDH III) in force highlights guidelines and recommendations to guarantee human rights, among them, to guarantee the rights of women in Brazil. Based on this document, this article aims to locate historically and culturally the understanding of human rights related to the rights of women in Brazilian territory, from the analysis of the guiding axes of women's rights of the PNDH III. In methodological terms, the qualitative approach and documentary research were used to analyze the data according to the critical discourse analysis. As a result, it has been found that the process of building and maintaining the guarantee of women's human rights needs a reformulation that also shows a social revolution. This is justified by the fact that even with the provision in the PNDH III that, in order to guarantee the rights of women, it is necessary, for example, to adapt the Penal Code to the decriminalization of abortion and the professionalization of prostitution, these points are still very controversial and are not put into practice by the State. Finally, the importance of the critique of politics and the current system of production of understandings in favor of this social transformation is emphasized.

Keywords: human rights of women, social transformation, national human rights program III, public politics

Procedia PDF Downloads 117
588 Numerical Simulation of Unsteady Cases of Fluid Flow Using Modified Dynamic Boundary Condition (mDBC) in Smoothed Particle Hydrodynamics Models

Authors: Exa Heydemans, Jessica Sjah, Dwinanti Rika Marthanty

Abstract:

This paper presents numerical simulations using an open boundary algorithm with modified dynamic boundary condition (mDBC) for weakly compressible smoothed particle hydrodynamics models from particle-based code Dualsphysics. The problems of piping erosion in dams and dikes are aimed for studying the algorithm. The case 2D model of unsteady fluid flow past around a fixed cylinder is simulated, where various values of Reynold’s numbers (Re40, Re60, Re80, and Re100) and different model’s resolution are considered. A constant velocity with different values of viscosity for generating various Reynold’s numbers and different numbers of particles over a cylinder for the resolution are modeled. The interaction between solid particles of the cylinder and fluid particles is concerned. The cylinder is affected by the hydrodynamics force caused by the flow of fluid particles. The solid particles of the cylinder are the observation points to obtain force and pressure due to the hydrodynamics forces. As results of the simulation, which is to show the capability to model 2D unsteady with various Reynold’s numbers, the pressure coefficient, drag coefficient, lift coefficient, and Strouhal number are compared to the previous work from literature.

Keywords: hydrodynamics, internal erosion, dualsphysics, viscous fluid flow

Procedia PDF Downloads 149
587 Index t-SNE: Tracking Dynamics of High-Dimensional Datasets with Coherent Embeddings

Authors: Gaelle Candel, David Naccache

Abstract:

t-SNE is an embedding method that the data science community has widely used. It helps two main tasks: to display results by coloring items according to the item class or feature value; and for forensic, giving a first overview of the dataset distribution. Two interesting characteristics of t-SNE are the structure preservation property and the answer to the crowding problem, where all neighbors in high dimensional space cannot be represented correctly in low dimensional space. t-SNE preserves the local neighborhood, and similar items are nicely spaced by adjusting to the local density. These two characteristics produce a meaningful representation, where the cluster area is proportional to its size in number, and relationships between clusters are materialized by closeness on the embedding. This algorithm is non-parametric. The transformation from a high to low dimensional space is described but not learned. Two initializations of the algorithm would lead to two different embeddings. In a forensic approach, analysts would like to compare two or more datasets using their embedding. A naive approach would be to embed all datasets together. However, this process is costly as the complexity of t-SNE is quadratic and would be infeasible for too many datasets. Another approach would be to learn a parametric model over an embedding built with a subset of data. While this approach is highly scalable, points could be mapped at the same exact position, making them indistinguishable. This type of model would be unable to adapt to new outliers nor concept drift. This paper presents a methodology to reuse an embedding to create a new one, where cluster positions are preserved. The optimization process minimizes two costs, one relative to the embedding shape and the second relative to the support embedding’ match. The embedding with the support process can be repeated more than once, with the newly obtained embedding. The successive embedding can be used to study the impact of one variable over the dataset distribution or monitor changes over time. This method has the same complexity as t-SNE per embedding, and memory requirements are only doubled. For a dataset of n elements sorted and split into k subsets, the total embedding complexity would be reduced from O(n²) to O(n²=k), and the memory requirement from n² to 2(n=k)², which enables computation on recent laptops. The method showed promising results on a real-world dataset, allowing to observe the birth, evolution, and death of clusters. The proposed approach facilitates identifying significant trends and changes, which empowers the monitoring high dimensional datasets’ dynamics.

Keywords: concept drift, data visualization, dimension reduction, embedding, monitoring, reusability, t-SNE, unsupervised learning

Procedia PDF Downloads 134
586 Corporate Governance, Performance, and Financial Reporting Quality of Listed Manufacturing Firms in Nigeria

Authors: Jamila Garba Audu, Shehu Usman Hassan

Abstract:

The widespread failure in the financial information quality has created the need to improve the financial information quality and to strengthen the control of managers by setting up good firms structures. Published accounting information in financial statements is required to provide various users - shareholders, employees, suppliers, creditors, financial analysts, stockbrokers and government agencies – with timely and reliable information useful for making prudent, effective and efficient decisions. The relationship between corporate governance and performance to financial reporting quality is imperative; this is because despite rapid researches in this area the findings obtained from these studies are constantly inconclusive. Data for the study were extracted from the firms’ annual reports and accounts. After running the OLS regression, a robustness test was conducted for the validity of statistical inferences; the data was empirically tested. A multiple regression was employed to test the model as a technique for data analysis. The results from the analysis revealed a negative association between all the regressors and financial reporting quality except the performance of listed manufacturing firms in Nigeria. This indicates that corporate governance plays a significant role in mitigating earnings management and improving financial reporting quality while performance does not. The study recommended among others that the composition of audit committee should be made in accordance with the provision for code of corporate governance which is not more than six (6) members with at least one (1) financial expert.

Keywords: corporate governance, financial reporting quality, manufacturing firms, Nigeria, performance

Procedia PDF Downloads 235
585 A Mathematical Investigation of the Turkevich Organizer Theory in the Citrate Method for the Synthesis of Gold Nanoparticles

Authors: Emmanuel Agunloye, Asterios Gavriilidis, Luca Mazzei

Abstract:

Gold nanoparticles are commonly synthesized by reducing chloroauric acid with sodium citrate. This method, referred to as the citrate method, can produce spherical gold nanoparticles (NPs) in the size range 10-150 nm. Gold NPs of this size are useful in many applications. However, the NPs are usually polydisperse and irreproducible. A better understanding of the synthesis mechanisms is thus required. This work thoroughly investigated the only model that describes the synthesis. This model combines mass and population balance equations, describing the NPs synthesis through a sequence of chemical reactions. Chloroauric acid reacts with sodium citrate to form aurous chloride and dicarboxy acetone. The latter organizes aurous chloride in a nucleation step and concurrently degrades into acetone. The unconsumed precursor then grows the formed nuclei. However, depending on the pH, both the precursor and the reducing agent react differently thus affecting the synthesis. In this work, we investigated the model for different conditions of pH, temperature and initial reactant concentrations. To solve the model, we used Parsival, a commercial numerical code, whilst to test it, we considered various conditions studied experimentally by different researchers, for which results are available in the literature. The model poorly predicted the experimental data. We believe that this is because the model does not account for the acid-base properties of both chloroauric acid and sodium citrate.

Keywords: citrate method, gold nanoparticles, Parsival, population balance equations, Turkevich organizer theory

Procedia PDF Downloads 188
584 Risk Factors Associated with Outbreak of Cerebrospinal Meningitis in Kano State- Nigeria, March-May 2017

Authors: Visa I. Tyakaray, M. Abdulaziz, O. Badmus, N. Karaye, M. Dalhat, A. Shehu, I. Bello, T. Hussaini, S. Akar, G. Effah, P. Nguku

Abstract:

Introduction: Nigeria has recorded outbreaks of meningitis in the past, being in the meningitis belt. A multi-state outbreak of Cerebrospinal Meningitis (CSM) from Neisseria meningitides occurred in 2017 involving 24 states, and Kano State reported its first two confirmed CSM cases on 22nd March, 2017. We conducted the outbreak investigation to characterize the outbreak, determine its associated risk factors and institute appropriate control measures. Method: We conducted an unmatched Case-control study with ratio 1:2. A case was defined as any person with sudden onset of fever (>38.5˚C rectal or 38.0˚C axillary) and one of the following: neck stiffness, altered consciousness or bulging fontanelle in toddlers while a control was defined as any person who resides around the case such as family members, caregivers, neighbors, and healthcare personnel. We reviewed and validated line list and conducted active case search in health facilities and neighboring communities. Descriptive, bivariate, stratified and multivariate analysis were performed. Laboratory confirmation was by Latex agglutination and/or Culture. Results: We recruited 48 cases with median age of 11 years (1 month – 65 years), attack rate was 2.4/100,000 population with case fatality rate of 8%; 34 of 44 local government areas were affected.On stratification, age was found to be a confounder. Independent factors associated with the outbreak were age (Adjusted Odds Ratio, AOR =6.58; 95% Confidence Interval (CI) =2.85-15.180, history of Vaccination (AOR=0.37; 95% CI=0.13-0.99) and history of travel (AOR=10.16; (1.99-51.85). Laboratory results showed 22 positive cases for Neisseria meningitides types C and A/Y. Conclusion: Major risk factors associated with this outbreak were age (>14years), not being vaccinated and history of travel. We sensitized communities and strengthened case management. We recommended immediate reactive vaccination and enhanced surveillance in bordering communities.

Keywords: cerebrospinal, factors, Kano-Nigeria, meningitis, risk

Procedia PDF Downloads 202
583 Saliva Cortisol and Yawning as a Predictor of Neurological Disease

Authors: Simon B. N. Thompson

Abstract:

Cortisol is important to our immune system, regulates our stress response, and is a factor in maintaining brain temperature. Saliva cortisol is a practical and useful non-invasive measurement that signifies the presence of the important hormone. Electrical activity in the jaw muscles typically rises when the muscles are moved during yawning and the electrical level is found to be correlated with the cortisol level. In two studies using identical paradigms, a total of 108 healthy subjects were exposed to yawning-provoking stimuli so that their cortisol levels and electrical nerve impulses from their jaw muscles was recorded. Electrical activity is highly correlated with cortisol levels in healthy people. The Hospital Anxiety and Depression Scale, Yawning Susceptibility Scale, General Health Questionnaire, demographic, health details were collected and exclusion criteria applied for voluntary recruitment: chronic fatigue, diabetes, fibromyalgia, heart condition, high blood pressure, hormone replacement therapy, multiple sclerosis, and stroke. Significant differences were found between the saliva cortisol samples for the yawners as compared with the non-yawners between rest and post-stimuli. Significant evidence supports the Thompson Cortisol Hypothesis that suggests rises in cortisol levels are associated with yawning. Ethics approval granted and professional code of conduct, confidentiality, and safety issues are approved therein.

Keywords: cortisol, diagnosis, neurological disease, thompson cortisol hypothesis, yawning

Procedia PDF Downloads 328
582 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 369
581 Numerical Simulation of Two-Dimensional Flow over a Stationary Circular Cylinder Using Feedback Forcing Scheme Based Immersed Boundary Finite Volume Method

Authors: Ranjith Maniyeri, Ahamed C. Saleel

Abstract:

Two-dimensional fluid flow over a stationary circular cylinder is one of the bench mark problem in the field of fluid-structure interaction in computational fluid dynamics (CFD). Motivated by this, in the present work, a two-dimensional computational model is developed using an improved version of immersed boundary method which combines the feedback forcing scheme of the virtual boundary method with Peskin’s regularized delta function approach. Lagrangian coordinates are used to represent the cylinder and Eulerian coordinates are used to describe the fluid flow. A two-dimensional Dirac delta function is used to transfer the quantities between the sold to fluid domain. Further, continuity and momentum equations governing the fluid flow are solved using fractional step based finite volume method on a staggered Cartesian grid system. The developed code is validated by comparing the values of drag coefficient obtained for different Reynolds numbers with that of other researcher’s results. Also, through numerical simulations for different Reynolds numbers flow behavior is well captured. The stability analysis of the improved version of immersed boundary method is tested for different values of feedback forcing coefficients.

Keywords: Feedback Forcing Scheme, Finite Volume Method, Immersed Boundary Method, Navier-Stokes Equations

Procedia PDF Downloads 297
580 Characteristic Study of Polymer Sand as a Potential Substitute for Natural River Sand in Construction Industry

Authors: Abhishek Khupsare, Ajay Parmar, Ajay Agarwal, Swapnil Wanjari

Abstract:

The extreme demand for aggregate leads to the exploitation of river-bed for fine aggregates, affecting the environment adversely. Therefore, a suitable alternative to natural river sand is essentially required. This study focuses on preventing environmental impact by developing polymer sand to replace natural river sand (NRS). Development of polymer sand by mixing high volume fly ash, bottom ash, cement, natural river sand, and locally purchased high solid content polycarboxylate ether-based superplasticizer (HS-PCE). All the physical and chemical properties of polymer sand (P-Sand) were observed and satisfied the requirement of the Indian Standard code. P-Sand yields good specific gravity of 2.31 and is classified as zone-I sand with a satisfactory friction angle (37˚) compared to natural river sand (NRS) and Geopolymer fly ash sand (GFS). Though the water absorption (6.83%) and pH (12.18) are slightly more than those of GFS and NRS, the alkali silica reaction and soundness are well within the permissible limit as per Indian Standards. The chemical analysis by X-Ray fluorescence showed the presence of high amounts of SiO2 and Al2O3 with magnitudes of 58.879% 325 and 26.77%, respectively. Finally, the compressive strength of M-25 grade concrete using P-sand and Geopolymer sand (GFS) was observed to be 87.51% and 83.82% with respect to natural river sand (NRS) after 28 days, respectively. The results of this study indicate that P-sand can be a good alternative to NRS for construction work as it not only reduces the environmental effect due to sand mining but also focuses on utilising fly ash and bottom ash.

Keywords: polymer sand, fly ash, bottom ash, HSPCE plasticizer, river sand mining

Procedia PDF Downloads 61
579 A Series of Teaching Modules to Prepare International Students for Real-World China

Authors: Jui-Chien Wang

Abstract:

Because of China’s continued economic growth and dominance, increasingly many students of Chinese from western countries are interested in pursuing careers related to China. Unless we do more to teach them about contemporary Chinese society and Chinese cultural codes, however, few will be able to do so successfully. Most traditional language textbooks treat these topics only cursorily, and, because of the rapid pace of China’s social and economic development, what they do cover is frequently outdated and insufficient. However, understanding contemporary Chinese society and Chinese cultural codes is essential to successfully negotiating real-world China. The current paper details one of the main ways in which the presenter has dealt with this educational lacuna: the development and implementation of a series of teaching modules for advanced Chinese language classes. Each module explores a particular area, provides resources, and raises questions to engage students in strengthening their language and cultural competencies. The teaching modules address four main areas: (1) Chinese behavioral culture; (2) critical issues in contemporary China; (3) current events in China; and (4) great social transformations in contemporary China. The presenter will also discuss lessons learned and insights gained during the development and implementation process as well as the benefits of using these modules. In addition, the presenter will offer suggestions for the application of these modules, so that other language teachers will be able to make better use of them in their own classrooms.

Keywords: behavioral culture, contemporary Chinese society, cultural code, teaching module

Procedia PDF Downloads 256
578 Hierarchical Optimization of Composite Deployable Bridge Treadway Using Particle Swarm Optimization

Authors: Ashraf Osman

Abstract:

Effective deployable bridges that are characterized by an increased capacity to weight ratio are recently needed for post-disaster rapid mobility and military operations. In deployable bridging, replacing metals as the fabricating material with advanced composite laminates as lighter alternatives with higher strength is highly advantageous. This article presents a hierarchical optimization strategy of a composite bridge treadway considering maximum strength design and bridge weight minimization. Shape optimization of a generic deployable bridge beam cross-section is performed to achieve better stress distribution over the bridge treadway hull. The developed cross-section weight is minimized up to reserving the margins of safety of the deployable bridging code provisions. Hence, the strength of composite bridge plates is maximized through varying the plies orientation. Different loading cases are considered of a tracked vehicle patch load. The orthotropic plate properties of a composite sandwich core are used to simulate the bridge deck structural behavior. Whereas, the failure analysis is conducted using Tsai-Wu failure criterion. The naturally inspired particle swarm optimization technique is used in this study. The proposed technique efficiently reduced the weight to capacity ratio of the developed bridge beam.

Keywords: CFRP deployable bridges, disaster relief, military bridging, optimization of composites, particle swarm optimization

Procedia PDF Downloads 125
577 Coding and Decoding versus Space Diversity for ‎Rayleigh Fading Radio Frequency Channels ‎

Authors: Ahmed Mahmoud Ahmed Abouelmagd

Abstract:

The diversity is the usual remedy of the transmitted signal level variations (Fading phenomena) in radio frequency channels. Diversity techniques utilize two or more copies of a signal and combine those signals to combat fading. The basic concept of diversity is to transmit the signal via several independent diversity branches to get independent signal replicas via time – frequency - space - and polarization diversity domains. Coding and decoding processes can be an alternative remedy for fading phenomena, it cannot increase the channel capacity, but it can improve the error performance. In this paper we propose the use of replication decoding with BCH code class, and Viterbi decoding algorithm with convolution coding; as examples of coding and decoding processes. The results are compared to those obtained from two optimized selection space diversity techniques. The performance of Rayleigh fading channel, as the model considered for radio frequency channels, is evaluated for each case. The evaluation results show that the coding and decoding approaches, especially the BCH coding approach with replication decoding scheme, give better performance compared to that of selection space diversity optimization approaches. Also, an approach for combining the coding and decoding diversity as well as the space diversity is considered, the main disadvantage of this approach is its complexity but it yields good performance results.

Keywords: Rayleigh fading, diversity, BCH codes, Replication decoding, ‎convolution coding, viterbi decoding, space diversity

Procedia PDF Downloads 428
576 Land Art in Public Spaces Design: Remediation, Prevention of Environmental Risks and Recycling as a Consequence of the Avant-Garde Activity of Landscape Architecture

Authors: Karolina Porada

Abstract:

Over the last 40 years, there has been a trend in landscape architecture which supporters do not perceive the role of pro-ecological or postmodern solutions in the design of public green spaces as an essential goal, shifting their attention to the 'sculptural' shaping of areas with the use of slopes, hills, embankments, and other forms of terrain. This group of designers can be considered avant-garde, which in its activities refers to land art. Initial research shows that such applications are particularly frequent in places of former post-industrial sites and landfills, utilizing materials such as debris and post-mining waste in their construction. Due to the high degradation of the environment surrounding modern man, the brownfields are a challenge and a field of interest for the representatives of landscape architecture avant-garde, who through their projects try to recover lost lands by means of transformations supported by engineering and ecological knowledge to create places where nature can develop again. The analysis of a dozen or so facilities made it possible to come up with an important conclusion: apart from the cultural aspects (including artistic activities), the green areas formally referring to the land are important in the process of remediation of post-industrial sites and waste recycling (e. g. from construction sites). In these processes, there is also a potential for applying the concept of Natural Based Solutions, i.e. solutions allowing for the natural development of the site in such a way as to use it to cope with environmental problems, such as e.g.  air pollution, soil phytoremediation and climate change. The paper presents examples of modern parks, whose compositions are based on shaping the surface of the terrain in a way referring to the land art, at the same time providing an example of brownfields reuse and application of waste recycling.  For the purposes of object analysis, research methods such as historical-interpretation studies, case studies, qualitative research or the method of logical argumentation were used. The obtained results provide information about the role that landscape architecture can have in the process of remediation of degraded areas, at the same time guaranteeing the benefits, such as the shaping of landscapes attractive in terms of visual appearance, low costs of implementation, and improvement of the natural environment quality.

Keywords: brownfields, contemporary parks, landscape architecture, remediation

Procedia PDF Downloads 138
575 Methylglyoxal Induced Glycoxidation of Human Low Density Lipoprotein: A Biophysical Perspective and Its Role in Diabetes and Periodontitis

Authors: Minhal Abidi, Moinuddin

Abstract:

Diabetes mellitus (DM) induced metabolic abnormalities causes oxidative stress which leads to the pathogenesis of complications associated with diabetes like retinopathy, nephropathy periodontitis etc. Combination of glycation and oxidation 'glycoxidation' occurs when oxidative reactions affect the early state of glycation products. Low density lipoprotein (LDL) is prone to glycoxidative attack by sugars and methylglyoxal (MGO) being a strong glycating agent may have severe impact on its structure and consequent role in diabetes. Pro-inflammatory cytokines like IL1β and TNFα produced by the action of gram negative bacteria in periodontits (PD) can in turn lead to insulin resistance. This work discusses modifications to LDL as a result of glycoxidation. The changes in the protein molecule have been characterized by various physicochemical techniques and the immunogenicity of the modified molecules was also evaluated as they presented neo-epitopes. Binding of antibodies present in diabetes patients to the native and glycated LDL has been evaluated. Role of modified epitopes in the generation of antibodies in diabetes and periodontitis has been discussed. The structural perturbations induced in LDL were analyzed by UV–Vis, fluorescence, circular dichroism and FTIR spectroscopy, molecular docking studies, thermal denaturation studies, Thioflavin T assay, isothermal titration calorimetry, comet assay. MALDI-TOF, ketoamine moieties, carbonyl content and HMF content were also quantitated in native and glycated LDL. IL1β and TNFα levels were also measured in the type 2 DM and PD patients. We report increased carbonyl content, ketoamine moieties and HMF content in glycated LDL as compared to native analogue. The results substantiate that in hyperglycemic state MGO modification of LDL causes structural perturbations making the protein antigenic which could obstruct normal physiological functions and might contribute in the development of secondary complications in diabetic patients like periodontitis.

Keywords: advanced glycation end products, diabetes mellitus, glycation, glycoxidation, low density lipoprotein, periodontitis

Procedia PDF Downloads 185
574 Modeling and Behavior of Structural Walls

Authors: Salima Djehaichia, Rachid Lassoued

Abstract:

Reinforced concrete structural walls are very efficient elements for protecting buildings against excessive early damage and against collapse under earthquake actions. It is therefore of interest to develop a numerical model which simulates the typical behavior of these units, this paper presents and describes different modeling techniques that have been used by researchers and their advantages and limitations mentioned. The earthquake of Boumerdes in 2003 has demonstrated the fragility of structures and total neglect of sismique design rules in the realization of old buildings. Significant damage and destruction of buildings caused by this earthquake are not due to the choice of type of material, but the design and the study does not congruent with seismic code requirements and bad quality of materials. For idealizing the failure of rules, a parametric study focuses on: low rate of reinforcements, type of reinforcement, resistance moderate of concrete. As an application the modeling strategy based on finite elements combined with a discretization of wall more solicited by successive thin layers. The estimated performance level achieved during a seismic action is obtained from capacity curves under incrementally increasing loads. Using a pushover analysis, a characteristic non linear force-displacement relationship can be determined. The results of numeric model are confronted with those of Algerian Para seismic Rules (RPA) in force have allowed the determination of profits in terms of displacement, shearing action, ductility.

Keywords: modeling, old building, pushover analysis, structural walls

Procedia PDF Downloads 233
573 The Non-Stationary BINARMA(1,1) Process with Poisson Innovations: An Application on Accident Data

Authors: Y. Sunecher, N. Mamode Khan, V. Jowaheer

Abstract:

This paper considers the modelling of a non-stationary bivariate integer-valued autoregressive moving average of order one (BINARMA(1,1)) with correlated Poisson innovations. The BINARMA(1,1) model is specified using the binomial thinning operator and by assuming that the cross-correlation between the two series is induced by the innovation terms only. Based on these assumptions, the non-stationary marginal and joint moments of the BINARMA(1,1) are derived iteratively by using some initial stationary moments. As regards to the estimation of parameters of the proposed model, the conditional maximum likelihood (CML) estimation method is derived based on thinning and convolution properties. The forecasting equations of the BINARMA(1,1) model are also derived. A simulation study is also proposed where BINARMA(1,1) count data are generated using a multivariate Poisson R code for the innovation terms. The performance of the BINARMA(1,1) model is then assessed through a simulation experiment and the mean estimates of the model parameters obtained are all efficient, based on their standard errors. The proposed model is then used to analyse a real-life accident data on the motorway in Mauritius, based on some covariates: policemen, daily patrol, speed cameras, traffic lights and roundabouts. The BINARMA(1,1) model is applied on the accident data and the CML estimates clearly indicate a significant impact of the covariates on the number of accidents on the motorway in Mauritius. The forecasting equations also provide reliable one-step ahead forecasts.

Keywords: non-stationary, BINARMA(1, 1) model, Poisson innovations, conditional maximum likelihood, CML

Procedia PDF Downloads 119
572 Test Suite Optimization Using an Effective Meta-Heuristic BAT Algorithm

Authors: Anuradha Chug, Sunali Gandhi

Abstract:

Regression Testing is a very expensive and time-consuming process carried out to ensure the validity of modified software. Due to the availability of insufficient resources to re-execute all the test cases in time constrained environment, efforts are going on to generate test data automatically without human efforts. Many search based techniques have been proposed to generate efficient, effective as well as optimized test data, so that the overall cost of the software testing can be minimized. The generated test data should be able to uncover all potential lapses that exist in the software or product. Inspired from the natural behavior of bat for searching her food sources, current study employed a meta-heuristic, search-based bat algorithm for optimizing the test data on the basis certain parameters without compromising their effectiveness. Mathematical functions are also applied that can effectively filter out the redundant test data. As many as 50 Java programs are used to check the effectiveness of proposed test data generation and it has been found that 86% saving in testing efforts can be achieved using bat algorithm while covering 100% of the software code for testing. Bat algorithm was found to be more efficient in terms of simplicity and flexibility when the results were compared with another nature inspired algorithms such as Firefly Algorithm (FA), Hill Climbing Algorithm (HC) and Ant Colony Optimization (ACO). The output of this study would be useful to testers as they can achieve 100% path coverage for testing with minimum number of test cases.

Keywords: regression testing, test case selection, test case prioritization, genetic algorithm, bat algorithm

Procedia PDF Downloads 361
571 Text as Reader Device Improving Subjectivity on the Role of Attestation between Interpretative Semiotics and Discursive Linguistics

Authors: Marco Castagna

Abstract:

Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.

Keywords: attestation, meaning, reader, text

Procedia PDF Downloads 228
570 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 341
569 Characterization of Defense-Related Genes and Metabolite Profiling in Oil Palm Elaeis guineensis during Interaction with Ganoderma boninense

Authors: Mohammad Nazri Abdul Bahari, Nurshafika Mohd Sakeh, Siti Nor Akmar Abdullah

Abstract:

Basal stem rot (BSR) is the most devastating disease in oil palm. Among the oil palm pathogenic fungi, the most prevalent and virulent species associated with BSR is Ganoderma boninense. Early detection of G. boninense attack in oil palm wherein physical symptoms has not yet appeared can offer opportunities to prevent the spread of the necrotrophic fungus. However, poor understanding of molecular defense responses and roles of antifungal metabolites in oil palm against G. boninense has complicated the resolving measures. Hence, characterization of defense-related molecular responses and production of antifungal compounds during early interaction with G. boninense is of utmost important. Four month-old oil palm (Elaeis guineensis) seedlings were artificially infected with G. boninense-inoculated rubber wood block via sitting technique. RNA of samples were extracted from roots and leaves tissues at 0, 3, 7 and 11 days post inoculation (d.p.i) followed with sequencing using RNA-Seq method. Differentially-expressed genes (DEGs) of oil palm-G. boninense interaction were identified, while changes in metabolite profile will be scrutinized related to the DEGs. The RNA-Seq data generated a total of 113,829,376 and 313,293,229 paired-end clean reads from untreated (0 d.p.i) and treated (3, 7, 11 d.p.i) samples respectively, each with two biological replicates. The paired-end reads were mapped to Elaeis guineensis reference genome to screen out non-oil palm genes and subsequently generated 74,794 coding sequences. DEG analysis of phytohormone biosynthetic genes in oil palm roots revealed that at p-value ≤ 0.01, ethylene and jasmonic acid may act in antagonistic manner with salicylic acid to coordinate defense response at early interaction with G. boninense. Findings on metabolite profiling of G. boninense-infected oil palm roots and leaves are hoped to explain the defense-related compounds elicited by Elaeis guineensis in response to G. boninense colonization. The study aims to shed light on molecular defense response of oil palm at early interaction with G. boninense and promote prevention measures against Ganoderma infection.

Keywords: Ganoderma boninense, metabolites, phytohormones, RNA-Seq

Procedia PDF Downloads 249
568 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 646
567 Numerical Analysis of the Aging Effects of RC Shear Walls Repaired by CFRP Sheets: Application of CEB-FIP MC 90 Model

Authors: Yeghnem Redha, Guerroudj Hicham Zakaria, Hanifi Hachemi Amar Lemiya, Meftah Sid Ahmed, Tounsi Abdelouahed, Adda Bedia El Abbas

Abstract:

Creep deformation of concrete is often responsible for excessive deflection at service loads which can compromise the performance of elements within a structure. Although laboratory test may be undertaken to determine the deformation properties of concrete, these are time-consuming, often expensive and generally not a practical option. Therefore, relatively simple empirically design code models are relied to predict the creep strain. This paper reviews the accuracy of creep and shrinkage predictions of reinforced concrete (RC) shear walls structures strengthened with carbon fibre reinforced polymer (CFRP) sheets, which is characterized by a widthwise varying fibre volume fraction. This review is yielded by CEB-FIB MC90 model. The time-dependent behavior was investigated to analyze their static behavior. In the numerical formulation, the adherents and the adhesives are all modelled as shear wall elements, using the mixed finite element method. Several tests were used to dem¬onstrate the accuracy and effectiveness of the proposed method. Numerical results from the present analysis are presented to illustrate the significance of the time-dependency of the lateral displacements.

Keywords: RC shear walls strengthened, CFRP sheets, creep and shrinkage, CEB-FIP MC90 model, finite element method, static behavior

Procedia PDF Downloads 295
566 Negotiating Strangeness: Narratives of Forced Return Migration and the Construction of Identities

Authors: Cheryl-Ann Sarita Boodram

Abstract:

Historically, the movement of people has been the subject of socio-political and economic regulatory policies which congeal to regulate human mobility and establish geopolitical and spatial identities and borderlands. As migratory practices evolved, so too has the problematization associated with movement, migration and citizenship. The emerging trends have led to active development of immigration technology governing human mobility and the naming of migratory practices. One such named phenomenon is ‘deportation’ or the forced removal of individuals from their adopted country. Deportation, has gained much attention within the human mobility landscape in the past twenty years following the September 2001 terrorist attack on the World Trade Centre in New York. In a reactionary move, several metropolitan countries, including Canada and the United Kingdom enacted or reviewed immigration laws which further enabled the removal of foreign born criminals to the land of their birth in the global south. Existing studies fall short of understanding the multiple textures of the forced returned migration experiences and the social injustices resulting from deportation displacement. This study brings together indigenous research methodologies through the use of participatory action research and social work with returned migrants in Trinidad and Tobago to uncover the experiences of displacement of deported nationals. The study explores the experiences of negotiating life as a ‘stranger’ and how return has influenced the construction of identities of returned nationals. Findings from this study reveal that deportation has led to inequalities and facilitated ‘othering’ of this group within their own country of birth. The study further highlighted that deportation leads to circuits of dispossession, and perpetuates inequalities. This study provides original insights into the way returned migrants negotiate, map and embody ‘strangeness’ and manage their return to a soil they consider unfamiliar and alien.

Keywords: stranger, alien geographies, displacement, deportation, negotiating strangeness, identity, otherness, alien landscapes

Procedia PDF Downloads 495
565 Preliminary Study on the Factors Affecting Safety Parameters of (Th, U)O₂ Fuel Cycle: The Basis for Choosing Three Fissile Enrichment Zones

Authors: E. H. Uguru, S. F. A. Sani, M. U. Khandaker, M. H. Rabir

Abstract:

The beginning of cycle transient safety parameters is paramount for smooth reactor operation. The enhanced operational safety of UO₂ fuelled AP1000 reactor being the first using three fissile enrichment zones motivated this research for (Th, U)O₂ fuel. This study evaluated the impact of fissile enrichment, soluble boron, and gadolinia on the transient safety parameters to determine the basis for choosing the three fissile enrichment zones. Fuel assembly and core model of Westinghouse small modular reactor were investigated using different fuel and reactivity control arrangements. The Monte Carlo N-Particle eXtended (MCNPX) integrated with CINDER90 burn-up code was used for the calculations. The results show that the moderator temperature coefficient of reactivity (MTC) and the fuel temperature coefficient of reactivity (FTC) were respectively negative and decreased with increasing fissile enrichment. Soluble boron significantly decreased the MTC but slightly increased FTC while gadolinia followed the same trend with a minor impact. However, the MTC and FTC respectively decreased significantly with increasing change in temperature. These results provide a guide on the considerable factors in choosing the three fissile enrichment zones for (Th, U)O₂ fuel in anticipation of their impact on safety parameters. Therefore, this study provides foundational results on the factors that must be considered in choosing three fissile arrangement zones for (Th, U)O₂ fuel.

Keywords: reactivity, safety parameters, small modular reactor, soluble boron, thorium fuel cycle

Procedia PDF Downloads 121
564 Culture as a Barrier: Political Rights of Women in Pakhtun Society

Authors: Muhammad Adil

Abstract:

Women in different parts of the world confront several barriers to accomplishing their legal rights, particularly political rights. One of the common barriers in this respect is the indigenous culture of the locality. In the same way, women in Khyber Pakhtunkhwa are facing difficulties in accomplishing their political rights. The most significant obstacle in this context is Pakhtunwali, the traditional code of conduct in Pakhtun society, which is perceived as a substantial impediment for Pakhtun women in practicing their political rights as guaranteed by the Constitution of Pakistan and international legal instruments. Several codes of Pakhtunwali, like peghor (slander or abuse), tor (blame or disgraced), sharam (shame and dishonor), purdah (gender segregation), and ghayrat (honor) have a prominent role in this regard. The research approach employed a combination of both qualitative and quantitative methods to ensure a thorough exploration of the subject. Not only different documents have been analyzed but also a questionnaire has been developed to get accurate findings. Simultaneously, both primary and secondary data have been utilized. The finding shows that the Pakhtun culture is a formidable hurdle in accomplishing women’s political rights in Pakhtun society, particularly in rural areas. Observation reveals that a prevailing societal perception is that having women as their representatives would be viewed as a challenge to the honor of Pakhtun men. Consequently, women candidates who participated in the general elections in Khyber Pakhtunkhwa received only 1 percent or less than 1 percent of the votes compared to their male counterparts. It is recommended that certain codes of Pakhtunwali should be redefined and made compatible with international legal instruments.

Keywords: constitution, fundamental rights, honor, pakhtunwali.

Procedia PDF Downloads 39