Search results for: World Trade Center Attack
10586 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform
Authors: B. Yanıktepe, C. Özalp, B. Şahin
Abstract:
Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.Keywords: aerodynamic, delta wing, PIV, vortex breakdown
Procedia PDF Downloads 42010585 The Impact of Economic Growth on Carbon Footprints of High-Income and Non-High-Income Countries: A Comparative Analysis
Authors: Ghunchq Khan
Abstract:
The increase in greenhouse gas (GHGs) emissions is a main environmental problem. Diverse human activities and inappropriate economic growth have stimulated a trade-off between economic growth and environmental deterioration all over the world. The impact of economic growth on the environment has received attention as global warming and environmental problems have become more serious. The focus of this study is on carbon footprints (production and consumption) and analyses the impact of GDP per capita on carbon footprints. A balanced panel of 99 countries from 2000 to 2016 is estimated by employing autoregressive distributed lags (ARDL) model – mean group (MG) and pooled mean group (PMG) estimators. The empirical results indicate that GDP per capita has a significant and positive impact in the short run but a negative effect in the long run on the carbon footprint of production in high-income countries by controlling trade openness, industry share, biological capacity, and population density. At the same time, GDP per capita has a significant and positive impact in both the short and long run on the carbon footprint of the production of non-high-income countries. The results also indicate that GDP per capita negatively impacts the carbon footprint of consumption for high-income countries; on the other hand, the carbon footprint of consumption increases as GDP per capita grows in non-high-income countries.Keywords: ARDL, carbon footprint, economic growth, industry share, trade openness
Procedia PDF Downloads 9510584 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 47210583 Neo-liberalism and Theoretical Explanation of Poverty in Africa: The Nigerian Perspective
Authors: Omotoyosi Bilikies Ilori, Adekunle Saheed Ajisebiyawo
Abstract:
After the Second World War, there was an emergence of a new stage of capitalist globalization with its Neo-liberal ideology. There were global economic and political restructurings that affected third-world countries like Nigeria. Neo-liberalism is the driving force of globalization, which is the latest manifestation of imperialism that engenders endemic poverty in Nigeria. Poverty is severe and widespread in Nigeria. Poverty entails a situation where a person lives on less than one dollar per day and has no access to basic necessities of life. Poverty is inhuman and a breach of human rights. The Nigerian government initiated some strategies in the past to help in poverty reduction. Neo-liberalism manifested in the Third World, such as Nigeria, through the privatization of public enterprises, trade liberalization, and the rollback of the state investments in providing important social services. These main ideas of Neo-liberalism produced poverty in Nigeria and also encouraged the abandonment of the social contract between the government and the people. There is thus a gap in the provision of social services and subsidies for the masses, all of which Neo-liberal ideological positions contradict. This paper is a qualitative study which draws data from secondary sources. The theoretical framework is anchored on the market theory of capitalist globalization and public choice theory. The objectives of this study are to (i) examine the impacts of Neo-liberalism on poverty in Nigeria as a typical example of a Third World country and (ii) find out the effects of Neo-liberalism on the provision of social services and subsidies and employment. The findings from this study revealed that (i) the adoption of the Neo-liberal ideology by the Nigerian government has led to increased poverty and poor provision of social services and employment in Nigeria; and (ii) there is an increase in foreign debts which compounds poverty situation in Nigeria. This study makes the following recommendations: (i) Government should adopt strategies that are pro-poor to eradicate poverty; (ii) The Trade Unions and the masses should develop strategies to challenge Neo-liberalism and reject Neo-liberal ideology.Keywords: neo-liberalism, poverty, employment, poverty reduction, structural adjustment programme
Procedia PDF Downloads 8610582 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 35610581 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software
Authors: Marine Segui, Ruxandra Mihaela Botez
Abstract:
OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time
Procedia PDF Downloads 23510580 Composite 'C' Springs for Anti-Seismic Building Suspension: Positioning 'Virtual Center of Pendulation above Gravity Center'
Authors: Max Sardou, Patricia Sardou
Abstract:
Now that weight saving is mandatory, to author best knowledge composite springs, that we have invented, are best choice for automotive suspensions, against steel. So, we have created a Joint Ventures called S.ARA, in order to mass produce composite coils springs. Start of Production of composite coils springs was in 2014 for AUDI. As we have demonstrated, on the road, that composite springs are not a sweet dream. The present paper describes all the benefits of ‘C’ springs and ‘S’ springs for high performance vehicles suspension, for rocket stage separation, and for satellite injection into orbit. Developing rocket stage separation, we have developed for CNES (Centre National d’Etudes Spatiales) the following concept. If we call ‘line of action’ a line going from one end of a spring to the other. Our concept is to use for instance two springs inclined. In such a way that their line of action cross together and create at this crossing point a virtual center well above the springs. This virtual center, is pulling from above the top stage and is offering a guidance, perfectly stable and straight. About buildings, our solution is to transfer this rocket technology, creating a ‘virtual center’ of pendulation positioned above the building center of gravity. This is achieved by using tilted composite springs benches oriented in such a way that their line of action converges creating the ‘virtual center’. Thanks to the ‘virtual center’ position, the building behaves as a pendulum, hanged from above. When earthquake happen then the building will oscillate around its ‘virtual center’ and will go back safely to equilibrium after the tremor. ‘C’ springs, offering anti-rust, anti-settlement, fail-safe suspension, plus virtual center solution is the must for long-lasting, perfect protection of buildings against earthquakes.Keywords: virtual center of tilt, composite springs, fail safe springs, antiseismic suspention
Procedia PDF Downloads 24410579 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area
Authors: Feng-jie Xie, Jian-hong Yan
Abstract:
Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road
Procedia PDF Downloads 19610578 A Grey-Box Text Attack Framework Using Explainable AI
Authors: Esther Chiramal, Kelvin Soh Boon Kai
Abstract:
Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.Keywords: BERT, explainable AI, Grey-box text attack, transformer
Procedia PDF Downloads 13710577 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 35410576 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 26910575 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 5510574 Emerging Challenges with Collective Bargaining Agreements In Kenya: The Introduction of Salary and Remuneration Commission Through The Constitution of Kenya 2010
Authors: Benard Omogo
Abstract:
The Kenyan Constitution 2010 introduced various commissions to devolve the powers that were previously centralized through the imperial Presidency. One of the commissions that directly determine the levels of remuneration and terms of service of Kenyan workers is the Salary and Remuneration Commission (SRC). Article 230 of the Kenyan Constitution 2010 mandates this commission to regularly review the remuneration and benefits of all the state officers and to advise the national and county governments on the remuneration and benefits of all other public officers. At the same time, article 54 of the Kenyan Labor Relations Act 2007 provides for the recognition of trade unions and collective bargaining agreements. The emerging challenges, therefore, originate from the conflicts of the mandate of the Salary and Remuneration Commission, whose advice is almost adopted as the order and this undermines the outcome of the Collective Bargaining Agreements. This has seen so many trade unions in Kenya being rendered irrelevant. This research paper is therefore going to sample the various trade unions of Kenya to assess the challenges that result from the position of the Salary and Remuneration Commission. We will also extend it by purposively sampling several trade unions in Africa to determine how they handle such challenges. The results from this paper will be useful to the Kenyan Lawmakers and Africa at large and may inform them to consider reviewing the laws and acts that relate to the trade unions for prosperity.Keywords: salary, remuneration, collective, bargaining, labor laws
Procedia PDF Downloads 17810573 Estimation of World Steel Production by Process
Authors: Reina Kawase
Abstract:
World GHG emissions should be reduced 50% by 2050 compared with 1990 level. CO2 emission reduction from steel sector, an energy-intensive sector, is essential. To estimate CO2 emission from steel sector in the world, estimation of steel production is required. The world steel production by process is estimated during the period of 2005-2050. The world is divided into aggregated 35 regions. For a steel making process, two kinds of processes are considered; basic oxygen furnace (BOF) and electric arc furnace (EAF). Steel production by process in each region is decided based on a current production capacity, supply-demand balance of steel and scrap, technology innovation of steel making, steel consumption projection, and goods trade. World steel production under moderate countermeasure scenario in 2050 increases by 1.3 times compared with that in 2012. When domestic scrap recycling is promoted, steel production in developed regions increases about 1.5 times. The share in developed regions changes from 34 %(2012) to about 40%(2050). This is because developed regions are main suppliers of scrap. 48-57% of world steel production is produced by EAF. Under the scenario which thinks much of supply-demand balance of steel, steel production in developing regions increases is 1.4 times and is larger than that in developed regions. The share in developing regions, however, is not so different from current level. The increase in steel production by EAF is the largest under the scenario in which supply-demand balance of steel is an important factor. The share reaches 65%.Keywords: global steel production, production distribution scenario, steel making process, supply-demand balance
Procedia PDF Downloads 45010572 Check Factors Contributing to the Increase or Decrease in Labor Productivity in Employees Applied Science Center Municipal Andimeshk
Authors: Hossein Boromandfar, Ahmad Ghalavandi
Abstract:
This paper examines the importance of human resources as a strategic resource and the factors that lead to increased Labor productivity in Applied Science Center Andimeshk pay. First, the concepts and definitions of productivity and factors affecting it, and then determine the center Recommendations for improving the productivity of the university at a high level its improvement. What leads to increased productivity of labor is worth. The most competent human resources infrastructure is set, because by moving towards the development and promotion. The use of qualified employees in the university with a focus on specific objectives can be effective on its promotion.Keywords: productivity, manage, human resources, center for applied science
Procedia PDF Downloads 41810571 Technological Developments in Logistics and its Applications in the Army
Authors: Gökhan Balci
Abstract:
“Armies march on their stomachs “mentioned Napoleon, who drew attentıon to the importance of logistics for the armies…In today’s World, in whıch continental trade gained importance, the crucial role of logistics became conspicuous since it was accepted by the business World that an effective logistics system is the key factor for success. Depending of the new developments in technology and techniques of logistics, the modern military institutions increase their effectiveness. The modern national armies or allied forces which operate in overseas, realize the importance of logistics as well. This study will focus on the applications of logistics in civilian business sector and modern armies, which may shed light on logistical problems of the other armies.Keywords: modern logistics, application in armies, new technology in logistics, new developments in technology
Procedia PDF Downloads 49110570 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN
Procedia PDF Downloads 33810569 Interdependence of Vocational Skills and Employability Skills: Example of an Industrial Training Centre in Central India
Authors: Mahesh Vishwakarma, Sadhana Vishwakarma
Abstract:
Vocational education includes all kind of education which can help students to acquire skills related to a certain profession, art, or activity so that they are able to exercise that profession, art or activity after acquiring such qualification. However, in this global economy of the modern world, job seekers are expected to have certain soft skills over and above the technical knowledge and skills acquired in their areas of expertise. These soft skills include but not limited to interpersonal communication, understanding, personal attributes, problem-solving, working in team, quick adaptability to the workplace environment, and other. Not only the hands-on, job-related skills, and competencies are now being sought by the employers, but also a complex of attitudinal dispositions and affective traits are being looked by them in their prospective employees. This study was performed to identify the employability skills of technical students from an Industrial Training Centre (ITC) in central India. It also aimed to convey a message to the students currently on the role, that for them to remain relevant in the job market, they would need to constantly adapt to changes and evolving requirements in the work environment, including the use of updated technologies. Five hypotheses were formulated and tested on the employability skills of students as a function of gender, trade, work experience, personal attributes, and IT skills. Data were gathered with the help of center’s training officers who approached 200 recently graduated students from the center and administered the instrument to students. All 200 respondents returned the completed instrument. The instrument used for the study consisted of 2 sections; demographic details and employability skills. To measure the employability skills of the trainees, the instrument was developed by referring to the several instruments developed by the past researchers for similar studies. The 1st section of the instrument of demographic details recorded age, gender, trade, year of passing, interviews faced, and employment status of the respondents. The 2nd section of the instrument on employability skills was categorized into seven specific skills: basic vocational skills; personal attributes; imagination skills; optimal management of resources; information-technology skills; interpersonal skills; adapting to new technologies. The reliability and validity of the instrument were checked. The findings revealed valuable information on the relationship and interdependence of vocational education and employability skills of students in the central Indian scenario. The findings revealed a valuable information on supplementing the existing vocational education programs with few soft skills and competencies so as to develop a superior workforce much better equipped to face the job market. The findings of the study can be used as an example by the management of government and private industrial training centers operating in the other parts of the Asian region. Future research can be undertaken on a greater population base from different geographical regions and backgrounds for an enhanced outcome.Keywords: employability skills, vocational education, industrial training centers, students
Procedia PDF Downloads 13210568 Effective Governance and Administrative Structures for Virile Trade Unions and Cordial Labour Relations
Authors: Theophilius Adekunle Tinuoye
Abstract:
Trade unions are groups formed essentially to promote, articulate and enhance the welfare of workers. They are expected to defend the workers interests and participate actively in workplace exchanges. But for trade unions to function effectively and actualize their lofty aspirations in the context of the current dynamic and ever-changing industrial relations context, they must not only have qualified and competent leaders, but also flexible and effective structure, systems, organograms, constitution, and administrative processes in place to compliment their policies and programmes. An important aspect of industrial relations is the existence of cordial tripartite or bipartite interactions between stakeholders and other social partners that are indispensable to the creation of positive and mutually beneficial exchanges and outcomes. This paper canvassed that unions must be structurally viable and administratively cohesive in order to be effective, pragmatic, functional and remain relevant. It also argued that weak, structurally deficient and less organized unions often find it immensely difficult to actualize workers goals. Finally, it outlined basic principles that will enhance union administration, guarantee that unions will continue to satisfy the yearnings of its members in these trying times and finally foster peaceful industrial relations climate and cordial labor relations between trade unions, employers /management and government.Keywords: governance, labor relations, trade unions, workers
Procedia PDF Downloads 34610567 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 15610566 A Systematic Approach for Identifying Turning Center Capabilities with Vertical Machining Center in Milling Operation
Authors: Joseph Chen, N. Hundal
Abstract:
Conventional machining is a form of subtractive manufacturing, in which a collection of material-working processes utilizing power-driven machine tools are used to remove undesired material to achieve a desired geometry. This paper presents an approach for comparison between turning center and vertical machining center by optimization of cutting parameters at cylindrical workpieces leading to minimum surface roughness by using taguchi methodology. Aluminum alloy was taken to conduct experiments due to its unique high strength-weight ratio that is maintained at elevated temperatures and their exceptional corrosion resistance. During testing, the effects of the cutting parameters on the surface roughness were investigated. Additionally, by using taguchi methodology for each of the cutting parameters (spindle speed, depth of cut, insert diameter, and feed rate) minimum surface roughness for the process of turn-milling was determined according to the cutting parameters. A confirmation experiment demonstrates the effectiveness of taguchi method.Keywords: surface roughness, Taguchi parameter design, turning center, turn-milling operations, vertical machining center
Procedia PDF Downloads 32810565 Detecting and Thwarting Interest Flooding Attack in Information Centric Network
Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S
Abstract:
Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy
Procedia PDF Downloads 20510564 The Importance of the Phases of Information, Diagnosis, Planning, Intervention and Management in a Historic Center
Authors: Giovanni Duran Polo
Abstract:
Demonstrate the importance of the stages such as Information, Diagnosis, Management, and Intervention is fundamental to have a historical, live, and quality inhabited center. One of the major actions to take is to promote the concept of the management of a historic center with harmonious development. For that, concerned actors should strengthen the concept that said historic center may be the neighborhood of all and for all. The centers of historical cities, presented as any other urban area, social, environmental issues etc; yet they get added value that have no other city neighborhoods. The equity component, either by the urban plan, or environmental quality offered properties of architectural, landscape or some land uses are the differentiating element, while the tool that makes them attractive face pressure exerted by new housing developments or shopping centers. That's why through the experience of working in historical centers, they are declared the actions in heritage areas. This paper will show how the encounter with each of these places are trying to take the phases of information, to gather all the data needed to be closer to the territory with specific data, diagnosis; which allowed the actors to see what state they were, felt how the heart is related to the rest of the city, show what problems affected the situation and what potential it had to compete in a global market. Also, to discuss the importance of the organization, as it is legal and normative basis for it have an order and a concept, when you know what can and what cannot, in an area where the citizen has many myth or history, when he wanted to intervene in protected buildings. It is also appropriate to show how it could develop the intervention phase, where the shares on the tangible elements and intervention for the protection of the heritage property are executed. The management is the final phase which will carry out all that was raised on paper, it's time to orient, explain, persuade, promote, and encourage citizens to take care of the heritage. It is profitable and also an obligation and it is not an insurmountable burden. It has to be said this is the time to pull all the cards to make the historical center and heritage becoming more alive today. It is the moment to make it more inhabited and to transformer it into a quality place, so citizens will cherish and understand the importance of such a place. Inhabited historical centers, endowments and equipment required, with trade quality, with constant cultural offer, with well-preserved buildings and tidy, modern and safe public spaces are always attractive for tourism, but first of all, the place should be conceived for citizens, otherwise everything will be doomed to failure.Keywords: development, diagnosis, heritage historic center, intervention, management, patrimony
Procedia PDF Downloads 39610563 The Challenge of the Decarbonization of Shipping and Complex Imo Regulations
Authors: Saiyeed Jakaria Baksh Imran
Abstract:
The earth is being endangered by many of the climate related issues today. The most serious issue for the world today is the global warming. Increase in Greenhouse gas (GHG) emissions post-industrial revolution period is the prime reason for global warming. Shipping is the fifth largest GHG emitting sector worldwide. The key reason for this is because, over 90% of the world trade is conducted through ocean as the ocean alone covers 70% of the earth surface. While the countries continue to develop, trade and commerce continue to increase between them simultaneously. However, there is no sign of reduction in GHG emission from shipping because of many concerned issues. Firstly, there is technological barrier for which ships cannot just become environment friendly immediately. Secondly, there is no alternative fuel available as well. Thirdly, there is no proper mechanism to measure how much ships emit as emission from ships vary according to the size, engine type and loading capacity of ships. The International Maritime Organization (IMO) being the governing body of the international shipping has implemented MARPOL Annex VI. However, the policy alone is not enough unless there is a proper data available regarding ship emissions, which the IMO is yet to figure out. This paper will present a critical analysis of existing IMO policies such as the Energy Efficiency Design Index (EEDI), Ship Energy Efficiency Management Plan (SEEMP), Data Collection System (SEEMP) and the IMO’s Initial Strategy on Reduction of Greenhouse Gas emissions from shipping. Also, the challenges exist in implementing such policies have been presented in the paper.Keywords: GHG, IMO, EEDI, SEEMP, DCS, greenhouse gas, decarbonization, shipping
Procedia PDF Downloads 7610562 Thrust Enhancement on a Two Dimensional Elliptic Airfoil in a Forward Flight
Authors: S. M. Dash, K. B. Lua, T. T. Lim
Abstract:
This paper presents results of numerical and experimental studies on a two-dimensional (2D) flapping elliptic airfoil in a forward flight condition at Reynolds number of 5000. The study is motivated from an earlier investigation which shows that the deterioration in thrust performance of a sinusoidal heaving and pitching 2D (NACA0012) airfoil at high flapping frequency can be recovered by changing the effective angle of attack profile to square wave, sawtooth, or cosine wave shape. To better understand why such modifications lead to superior thrust performance, we take a closer look at the transient aerodynamic force behavior of an airfoil when the effective angle of attack profile changes gradually from a generic smooth trapezoidal profile to a sinusoid shape by modifying the base length of the trapezoid. The choice of using a smooth trapezoidal profile is to avoid the infinite acceleration condition encountered in the square wave profile. Our results show that the enhancement in the time-averaged thrust performance at high flapping frequency can be attributed to the delay and reduction in the drag producing valley region in the transient thrust force coefficient when the effective angle of attack profile changes from sinusoidal to trapezoidal.Keywords: two-dimensional flapping airfoil, thrust performance, effective angle of attack, CFD, experiments
Procedia PDF Downloads 35810561 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 6510560 Sulfate Attack on Pastes Made with Different C3A and C4AF Contents and Stored at 5°C
Authors: Konstantinos Sotiriadis, Radosław Mróz
Abstract:
In the present work the internal sulfate attack on pastes made from pure clinker phases was studied. Two binders were produced: (a) a binder with 2% C3A and 18% C4AF content; (b) a binder with 10% C3A and C4AF content each. Gypsum was used as the sulfate bearing compound, while calcium carbonate added to differentiate the binders produced. The phases formed were identified by XRD analysis. The results showed that ettringite was the deterioration phase detected in the case of the low C3A content binder. Carbonation occurred in the specimen without calcium carbonate addition, while portlandite was observed in the one containing calcium carbonate. In the case of the high C3A content binder, traces of thaumasite were detected when calcium carbonate was not incorporated in the binder. A solid solution of thaumasite and ettringite was found when calcium carbonate was added. The amount of C3A had not fully reacted with sulfates, since its corresponding peaks were detected.Keywords: tricalcium aluminate, calcium aluminate ferrite, sulfate attack, calcium carbonate, low temperature
Procedia PDF Downloads 33410559 Habitat Model Review and a Proposed Methodology to Value Economic Trade-Off between Cage Culture and Habitat of an Endemic Species in Lake Maninjau, Indonesia
Authors: Ivana Yuniarti, Iwan Ridwansyah
Abstract:
This paper delivers a review of various methodologies for habitat assessment and a proposed methodology to assess an endemic fish species habitat in Lake Maninjau, Indonesia as a part of a Ph.D. project. This application is mainly aimed to assess the trade-off between the economic value of aquaculture and the fisheries. The proposed methodology is a generalized linear model (GLM) combined with GIS to assess presence-absence data or habitat suitability index (HSI) combined with the analytical hierarchy process (AHP). Further, a cost of habitat replacement approach is planned to be used to calculate the habitat value as well as its trade-off with the economic value of aquaculture. The result of the study is expected to be a scientific consideration in local decision making and to provide a reference for other areas in the country.Keywords: AHP, habitat, GLM, HSI, Maninjau
Procedia PDF Downloads 15210558 Ethereum Based Smart Contracts for Trade and Finance
Authors: Rishabh Garg
Abstract:
Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance
Procedia PDF Downloads 15310557 Features of Technological Innovation Management in Georgia
Authors: Ketevan Goletiani, Parmen Khvedelidze
Abstract:
discusses the importance of the topic, which is reflected in the advanced and developed countries in the formation of a new innovative stage of the distinctive mark of the modern world development. This phase includes the construction of the economy, which generates stockpiling and use is based. Intensifying the production and use of the results of new scientific and technical innovation has led to a sharp reduction in the cycle and accelerate the pace of product and technology updates. The world's leading countries in the development of innovative management systems for the formation of long-term and stable development of the socio-economic order conditions. The last years of the 20th century, the social and economic relations, modification, accelerating economic reforms, and profound changes in the system of the time. At the same time, the country should own place in the world geopolitical and economic space. Accelerated economic development tasks, the World Trade Organization, the European Union deep and comprehensive trade agreement, the new system of economic management, technical and technological renewal of production potential, and scientific fields in the share of the total volume of GDP growth requires new approaches. XX - XXI centuries Georgia's socio-economic changes is one of the urgent tasks in the form of a rise to the need for change, involving the use of natural resource-based economy to the latest scientific and technical achievements of an innovative and dynamic economy based on an accelerated pace. But Georgia still remains unresolved in many methodological, theoretical, and practical nature of the problem relating to the management of the economy in various fields for the development of innovative systems for optimal implementation. Therefore, the development of an innovative system for the formation of a complex and multi-problem, which is reflected in the following: countries should have higher growth rates than the geopolitical space of the neighboring countries that its competitors are. Formation of such a system is possible only in a deep theoretical research and innovative processes in the multi-level (micro, meso- and macro-levels) management on the basis of creation.Keywords: georgia, innovative, socio-economic, innovative manage
Procedia PDF Downloads 121