Search results for: defense attorney
246 Seismic Safety Evaluation of Weir Structures Using the Finite and Infinite Element Method
Authors: Ho Young Son, Bu Seog Ju, Woo Young Jung
Abstract:
This study presents the seismic safety evaluation of weir structure subjected to strong earthquake ground motions, as a flood defense structure in civil engineering structures. The seismic safety analysis procedure was illustrated through development of Finite Element (FE) and InFinite Element (IFE) method in ABAQUS platform. The IFE model was generated by CINPS4, 4-node linear one-way infinite model as a sold continuum infinite element in foundation areas of the weir structure and then nonlinear FE model using friction model for soil-structure interactions was applied in this study. In order to understand the complex behavior of weir structures, nonlinear time history analysis was carried out. Consequently, it was interesting to note that the compressive stress gave more vulnerability to the weir structure, in comparison to the tensile stress, during an earthquake. The stress concentration of the weir structure was shown at the connection area between the weir body and stilling basin area. The stress both tension and compression was reduced in IFE model rather than FE model of weir structures.Keywords: seismic, numerical analysis, FEM, weir, boundary condition
Procedia PDF Downloads 452245 The Role of the Injured Party's Fault in the Apportionment of Damages in Tort Law: A Comparative-Historical Study between Common Law and Islamic Law
Authors: Alireza Tavakoli Nia
Abstract:
In order to understand the role of the injured party's fault in dividing liability, we studied its historical background. In common law, the traditional contributory negligence rule was a complete defense. Then the legislature and judicial procedure modified that rule to one of apportionment. In Islamic law, too, the Action rule was at first used when the injured party was the sole cause, but jurists expanded the scope of this rule, so this rule was used in cases where both the injured party's fault and that of the other party are involved. There are some popular approaches for apportionment of damages. Some common law countries like Britain had chosen ‘the causal potency approach’ and ‘fixed apportionment’. Islamic countries like Iran have chosen both ‘the relative blameworthiness’ and ‘equal apportionment’ approaches. The article concludes that both common law and Islamic law believe in the division of responsibility between a wrongdoer claimant and the defendant. In contrast, in the apportionment of responsibility, Islamic law mostly believes in equal apportionment that is way easier and saves time and money, but common law legal systems have chosen the causal potency approach, which is more complicated than the rival approach but is fairer.Keywords: contributory negligence, tort law, damage apportionment, common law, Islamic law
Procedia PDF Downloads 147244 Impact of Dietary L-Threonine Supplementation on Performance and Health of Broiler Chickens, a Review
Authors: Mandana Hoseini
Abstract:
During last decades, intensive selection for higher growth rate in broiler chickens has accelerated daily body weight gain, which this has changed/increased the trends and amounts of nutrient requirements in the diet. As a result, considerable studies have been focused on the better determination of protein/amino acids requirements in modern broiler diets. One approach to minimize dietary crude protein inclusion levels is substitution of some of the dietary crude protein with synthetic amino acids. In addition, using synthetic forms of limiting essential amino acids in the diet could help better coincidence of dietary protein with ideal protein concept, which this in turn, minimizes nitrogen dissipation and environmental pollution. Threonine is usually considered as the third limiting amino acid in broiler diets. Recent studies have been demonstrated that dietary supplemental threonine would optimize growth performance, immune system, intestinal morphology, as well as oxidative defense in broiler chickens. In this review, threonine metabolism and its effects in relation with different aspects of broiler performance have been discussed.Keywords: immune system, intestine, performance, requirement, threonine
Procedia PDF Downloads 108243 Improvement of Cross Range Resolution in Through Wall Radar Imaging Using Bilateral Backprojection
Authors: Rashmi Yadawad, Disha Narayanan, Ravi Gautam
Abstract:
Through Wall Radar Imaging is gaining increasing importance now a days in the field of Defense and one of the most important criteria that forms the basis for the image quality obtained is the Cross-Range resolution of the image. In this research paper, the Bilateral Back projection algorithm has been implemented for Through Wall Radar Imaging. The sole purpose is to enhance the resolution in the cross range direction of the obtained Back projection image. Synthetic Data is generated for two targets which are placed at various locations in a room of dimensions 8 m by 6m. Two algorithms namely, simple back projection and Bilateral Back projection have been implemented, images are obtained and the obtained images are compared. Numerical simulations have been coded in MATLAB and experimental results of the two algorithms have been shown. Based on the comparison between the two images, it can be clearly seen that the ringing effect and chess board effect have been heavily reduced in the bilaterally back projected image and hence promising results are obtained giving a relatively sharper image with relatively well defined edges.Keywords: through wall radar imaging, bilateral back projection, cross range resolution, synthetic data
Procedia PDF Downloads 347242 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming
Authors: Meesun Sun, Yongmin Kim
Abstract:
Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost
Procedia PDF Downloads 139241 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 185240 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy
Authors: Lingaraju Dumpala, Narasa Raju Gosangi
Abstract:
Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA
Procedia PDF Downloads 133239 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law
Authors: Gashaw Sisay Zenebe
Abstract:
Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL
Procedia PDF Downloads 71238 The Role of Named Entity Recognition for Information Extraction
Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov
Abstract:
Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area
Procedia PDF Downloads 80237 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 392236 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184235 Characterization and Predictors of Paranoid Ideation in Youths
Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto
Abstract:
Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness
Procedia PDF Downloads 500234 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 210233 Prison Pipeline or College Pathways: Transforming the Urban Classroom
Authors: Marcia J. Watson
Abstract:
The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.Keywords: college access, higher education, school-to-prison pipeline, urban education reform
Procedia PDF Downloads 537232 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications
Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav
Abstract:
Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)
Procedia PDF Downloads 288231 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm
Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap
Abstract:
The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.Keywords: beta defensin 3, bos taurus, docking, homology modeling
Procedia PDF Downloads 290230 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer
Authors: Chao Wu
Abstract:
Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS
Procedia PDF Downloads 122229 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism
Authors: SanXi Wu
Abstract:
A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism
Procedia PDF Downloads 50228 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company
Authors: Shanshan Zhou, Massimo Battaglia
Abstract:
Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.Keywords: community identity, disaster, identity, organizational learning
Procedia PDF Downloads 731227 Computational Analysis of Variation in Thrust of Oblique Detonation Ramjet Engine With Adaptive Inlet
Authors: Aditya, Ganapati Joshi, Vinod Kumar
Abstract:
IN THE MODERN-WARFARE ERA, THE PRIME REQUIREMENT IS A HIGH SPEED AND MACH NUMBER. WHEN THE MISSILES STRIKE IN THE HYPERSONIC REGIME THE OPPONENT CAN DETECT IT WITH THE ANTI-DEFENSE SYSTEM BUT CAN NOT STOP IT FROM CAUSING DAMAGE. SO, TO ACHIEVE THE SPEEDS OF THIS LEVEL THERE ARE TWO ENGINES THAT ARE AVAILABLE WHICH CAN WORK IN THIS REGION ARE RAMJET AND SCRAMJET. THE PROBLEM WITH RAMJET STARTS TO OCCUR WHEN MACH NUMBER EXCEEDS 4 AS THE STATIC PRESSURE AT THE INLET BECOMES EQUAL TO THE EXIT PRESSURE. SO, SCRAMJET ENGINE DEALS WITH THIS PROBLEM AS IT NEARLY HAS THE SAME WORKING BUT HERE THE FLOW IS NOT MUCH SLOWED DOWN AS COMPARED TO RAMJET IN THE DIFFUSER BUT IT SUFFERS FROM THE PROBLEMS SUCH AS INLET BUZZ, THERMAL CHOCKING, MIXING OF FUEL AND OXIDIZER, THERMAL HEATING, AND MANY MORE. HERE THE NEW ENGINE IS DEVELOPED ON THE SAME PRINCIPLE AS THE SCRAMJET ENGINE BUT BURNING HAPPENS DUE TO DETONATION INSTEAD OF DEFLAGRATION. THE PROBLEM WITH THE ENGINE STARTS WHEN THE MACH NUMBER BECOMES VARIABLE AND THE INLET GEOMETRY IS FIXED AND THIS LEADS TO INLET SPILLAGE WHICH WILL AFFECT THE THRUST ADVERSELY. SO, HERE ADAPTIVE INLET IS MADE OF SHAPE MEMORY ALLOYS WHICH WILL ENHANCE THE INLET MASS FLOW RATE AS WELL AS THRUST.Keywords: detonation, ramjet engine, shape memory alloy, ignition delay, shock-boundary layer interaction, eddy dissipation, asymmetric nozzle
Procedia PDF Downloads 102226 Minors and Terrorism: A Discussion about the Recruitment and Resilience
Authors: Marta Maria Aguilar Carceles
Abstract:
This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).Keywords: criminality, minors, recruitment, resilience, terrorism
Procedia PDF Downloads 135225 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 95224 Stage-Gate Based Integrated Project Management Methodology for New Product Development
Authors: Mert Kıranç, Ekrem Duman, Murat Özbilen
Abstract:
In order to achieve new product development (NPD) activities on time and within budgetary constraints, the NPD managers need a well-designed methodology. This study intends to create an integrated project management methodology for the ones who focus on new product development projects. In the scope of the study, four different management systems are combined. These systems are called as 'Schedule-oriented Stage-Gate Method, Risk Management, Change Management and Earned Value Management'. New product development term is quite common in many different industries such as defense industry, construction, health care/dental, higher education, fast moving consumer goods, white goods, electronic devices, marketing and advertising and software development. All product manufacturers run against each other’s for introducing a new product to the market. In order to achieve to produce a more competitive product in the market, an optimum project management methodology is chosen, and this methodology is adapted to company culture. The right methodology helps the company to present perfect product to the customers at the right time. The benefits of proposed methodology are discussed as an application by a company. As a result, how the integrated methodology improves the efficiency and how it achieves the success of the project are unfolded.Keywords: project, project management, management methodology, new product development, risk management, change management, earned value, stage-gate
Procedia PDF Downloads 312223 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling
Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar
Abstract:
Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.Keywords: toolpath, part program, optimization, pocket
Procedia PDF Downloads 287222 Stability Analysis of Tumor-Immune Fractional Order Model
Authors: Sadia Arshad, Yifa Tang, Dumitru Baleanu
Abstract:
A fractional order mathematical model is proposed that incorporate CD8+ cells, natural killer cells, cytokines and tumor cells. The tumor cells growth in the absence of an immune response is modeled by logistic law as it was the simplest form for which predictions also agreed with the experimental data. Natural Killer Cells are our first line of defense. NK cells directly kill tumor cells through several mechanisms, including the release of cytoplasmic granules containing perforin and granzyme, expression of tumor necrosis factor (TNF) family members. The effect of the NK cells on the tumor cell population is expressed with the product term. Rational form is used to describe interaction between CD8+ cells and tumor cells. A number of cytokines are produced by NKs, including tumor necrosis factor TNF, IFN, and interleukin (IL-10). Source term for cytokines is modeled by Michaelis-Menten form to indicate the saturated effects of the immune response. Stability of the equilibrium points is discussed for biologically significant values of bifurcation parameters. We studied the treatment of fractional order system by investigating analytical conditions of tumor eradication. Numerical simulations are presented to illustrate the analytical results.Keywords: cancer model, fractional calculus, numerical simulations, stability analysis
Procedia PDF Downloads 315221 Impact of Cytokines Alone and Primed with Macrophages on Balamuthia mandrillaris Interactions with Human Brain Microvascular Endothelial Cells in vitro
Authors: Abdul Matin, Salik Nawaz, Suk-Yul Jung
Abstract:
Balamuthia mandrillaris is well known to cause fatal Balamuthia amoebic encephalitis (BAE). Amoebic transmission into the central nervous system (CNS), haematogenous spread is thought to be the prime step, followed by blood-brain barrier (BBB) dissemination. Macrophages are considered to be the foremost line of defense and present in excessive numbers during amoebic infections. The aim of the present investigation was to evaluate the effects of macrophages alone or primed with cytokines on the biological characteristics of Balamuthia in vitro. Using human brain microvascular endothelial cells (HBMEC), which constitutes the BBB, we have shown that Balamuthia demonstrated > 90% binding and > 70% cytotoxicity to host cells. However, macrophages further increased amoebic binding and Balamuthia-mediated cell cytotoxicity. Furthermore, macrophages exhibited no amoebicidal effect against Balamuthia. Zymography assay demonstrated that macrophages exhibited no inhibitory effect on proteolytic activity of Balamuthia. Overall, to our best knowledge, we have shown for the first time macrophages has no inhibitory effects on the biological properties of Balamuthia in vitro. This also strengthened the concept that how and why Balamuthia can cause infections in both immuno-competent and immuno-compromised individuals.Keywords: Balamuthia mandrillaris, macrophages, cytokines, human brain microvascular endothelial cells, Balamuthia amoebic encephalitis
Procedia PDF Downloads 156220 Iranian Intellectuals, Localism, Globalization and the Challenge of Rebuilding National Identity
Authors: Mohammad Afghari
Abstract:
Since the inception of intellectual movements in Iran, Iranian thinkers have perennially found themselves at the crossroads of indigenous traditionalism and Western orientation. On the one hand, supporters of indigenous thinking have emphasized the defense of cultural, national, and religious values. On the other hand, Western-leaning intellectuals, often derogatorily labeled as ‘Westoxication’ by their indigenous counterparts, have been inclined towards embracing non-indigenous ideas and ideologies, primarily of Western origin. In this historical context, the dualistic nature of Iranian intellectuals, evolving amidst the era of globalization and its swift advancements in communication, has not only retained its inherent character but has evolved into a broader duality that can identified as ‘Iranian-Cosmopolitan’. In this duality, both in its classical form of indigenous-Western and its contemporary manifestation as Iranian-Cosmopolitan, the Iranian national identity has consistently been a significant part of intellectual discussions. While critically examining this dualism through a historical lens and drawing upon the theories of Anthony Smith, a historical sociologist and British theorist of nationalism, this article delves into the importance of aligning national identity with the prevailing societal transformations, especially globalization. It underscores that Iranian intellectuals, to national identity reconstruction in the present age, will find no solution other than discarding this dualism and reconstructing national identity within a global framework.Keywords: Iran, Iranian intellectuals, globalization, localism, national identity, cosmopolitan
Procedia PDF Downloads 48219 The Aminoguanidine Reduced NO Synthase Activity and Infiltration of Macrophages in Inflammation Induced by LPS in Rats
Authors: Hakim Chayeb
Abstract:
Macrophages (Mo) play an essential role in host defense against pathogens. These inflammatory cells contain a large group of inducible enzymes such as NO synthase (NOS). This study was conducted to characterize experimentally induced inflammation in vivo by lipopolysaccharides (LPS). LPS is an essential component of the outer membrane of Gram-negative bacteria and a potent inducer of macrophage. Except control rats, all rats received different doses of LPS intra-peritoneally. The involvement of inducible NO synthase (iNOS) and constitutive (cNOS ) in the modulation of the inflammatory response was studied by treating the rats with L-NAME (non-selective NOS inhibitor) or aminoguanidine (AG inhibitor of iNOS). Inhibitors were injected 24 hours before LPS administration. The results showed that esterase activity (a marker of macrophage infiltration) which is induced by LPS is reduced by AG, was potentiated by treatment with L-NAME in tissue homogenates of the liver, kidney and spleen. Meanwhile, the concentrations of nitric oxide (NO) induced by LPS were reduced with AG and are completely inhibited with L-NAME in the tissues studied. NO concentrations and plasma transaminase levels have undergone remarkable increases in rats treated with LPS alone. However, the AG significantly reduced these rates. Our results highlighted the role of NO synthase inhibitors in reducing of inflammatory responses that characterize many infectious diseases.Keywords: aminoguanidine, esterase, LPS, L-NAME, macrophage, nitric oxide
Procedia PDF Downloads 259218 The South Looking East: The New Geopolitics of Latin America
Authors: Heike Pintor Pirzkall
Abstract:
The positive economic evolution of many countries in the Latin American Continent, mainly in South America, has changed the geopolitical position of the region in the world. It is no longer the Hinterland or backyard of the United States, now it has become the Heartland for Europe and Asia. This position has favored the interest of countries like China or India, who are combining trade agreements with special assistance and aid agreements in many fields like agriculture, alternative energy resources, defense and mining. As many countries in the region are no longer low income countries, a more equal relationship in development aid has been created were the donor and the recipient have become partners and where new actors intervene in a triangular relationship that promotes new alternative aid structures. Triangular co-operation brings together the best of different actors who are providers of development co-operation, partners in SouthSouth co-operation and international organizations. The objective is to share knowledge and implement projects that support the common goal of reducing poverty and promoting development. The intention of this paper is to explain the reasons for Latin America´s “virage” to the east and to give examples of projects and agreements between Latin American countries, China and India which will help to understand the intensification of south-east relations in recent years.Keywords: development cooperation, China, Latin America, triangular cooperation, natural resources, partnership
Procedia PDF Downloads 382217 Dynamic Shear Energy Absorption of Ultra-High Performance Concrete
Authors: Robert J. Thomas, Colton Bedke, Andrew Sorensen
Abstract:
The exemplary mechanical performance and durability of ultra-high performance concrete (UHPC) has led to its rapid emergence as an advanced cementitious material. The uncharacteristically high mechanical strength and ductility of UHPC makes it a promising potential material for defense structures which may be subject to highly dynamic loads like impact or blast. However, the mechanical response of UHPC under dynamic loading has not been fully characterized. In particular, there is a need to characterize the energy absorption of UHPC under high-frequency shear loading. This paper presents preliminary results from a parametric study of the dynamic shear energy absorption of UHPC using the Charpy impact test. UHPC mixtures with compressive strengths in the range of 100-150 MPa exhibited dynamic shear energy absorption in the range of 0.9-1.5 kJ/m. Energy absorption is shown to be sensitive to the water/cement ratio, silica fume content, and aggregate gradation. Energy absorption was weakly correlated to compressive strength. Results are highly sensitive to specimen preparation methods, and there is a demonstrated need for a standardized test method for high frequency shear in cementitious composites.Keywords: Charpy impact test, dynamic shear, impact loading, ultra-high performance concrete
Procedia PDF Downloads 294