Search results for: internal attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3040

Search results for: internal attack

2830 Simulation of Welded Steel Tube Subjected to Internal Pressure

Authors: H. Zedira, M. T. Hannachi, H. Djebaili, B. Daheche

Abstract:

The rapid pace of technology development and strong competition in the market, prompted us to consider the field of manufacturing of steel pipes by a process complies fully with the requirements of industrial induction welding is high frequency (HF), this technique is better known today in Algeria, more precisely for the manufacture of tubes diameters Single Annabib TG Tebessa. The aim of our study is based on the characterization of processes controlling the mechanical behavior of steel pipes (type E24-2), welded by high frequency induction, considering the different tests and among the most destructive known test internal pressure. The internal pressure test is performed according to the application area of welded pipes, or as leak test, either as a test of strength (bursting). All tubes are subjected to a hydraulic test pressure of 50 bar kept at room temperature for a period of 6 seconds. This study provides information that helps optimize the design and implementation to predict the behavior of the tubes during operation.

Keywords: castem, pressure, stress, tubes, thickness

Procedia PDF Downloads 326
2829 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete

Authors: Gashaw Abebaw

Abstract:

Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.

Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan

Procedia PDF Downloads 119
2828 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 62
2827 Development of High Strength Self Curing Concrete Using Super Absorbing Polymer

Authors: K. Bala Subramanian, A. Siva, S. Swaminathan, Arul. M. G. Ajin

Abstract:

Concrete is an essential building material which is widely used in construction industry all over the world due to its compressible strength. Curing of concrete plays a vital role in durability and other performance necessities. Improper curing can affect the concrete performance and durability easily. When areas like scarcity of water, structures is not accessible by humans external curing cannot be performed, so we opt for internal curing. Internal curing (or) self-curing plays a major role in developing the concrete pore structure and microstructure. The concept of internal curing is to enhance the hydration process to maintain the temperature uniformly. The evaporation of water in the concrete is reduced by self-curing agent (Super Absorbing Polymer – SAP) thereby increasing the water retention capacity of the concrete. The research work was carried out to reduce water, which is prime material used for concrete in the construction industry. Concrete curing plays a major role in developing hydration process. Concept of self-curing will reduce the evaporation of water from concrete. Self-curing will increase water retention capacity as compared to the conventional concrete. Proper self-curing (or) internal curing increases the strength, durability and performance of concrete. Super absorbing Polymer (SAP) used as internal curing agent. In this study 0.2% to 0.4% of SAP was varied in different grade of high strength concrete. In the experiment replacement of cement by silica fumes with 5%, 10% and 15% are studied. It is found that replacement of silica fumes by 10 % gives more strength and durability when compared to others

Keywords: compressive strength, high strength concrete rapid chloride permeability, super absorbing polymer

Procedia PDF Downloads 378
2826 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 44
2825 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 444
2824 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 254
2823 Speed Ratio Control of Pulley Based V-Belt Type Continuously Variable Transmission (CVT) using Fuzzy Logic Controller

Authors: Ikbal Eski, Turan Gürgenç

Abstract:

After nearly more than a century of research and development, internal combustion engines have become almost perfect. Along with such improvement in internal combustion engines, automotive manufacturers are conducting research on design of alternative fuel vehicles. Nevertheless an ideal interim solution is to increase overall efficiency of internal combustion vehicles. A potential solution to achieve that is using continuously variable transmission system which, despite being an old idea, has recently become a hope for automotive manufacturers. CVT system, by continuously varying speed ratio, raises vehicle efficiency. In this study, fuzzy logic controller is used in speed ratio control of pulley based CVT system.

Keywords: continuously variable transmission system, variator, speed ratio, fuzzy logic

Procedia PDF Downloads 285
2822 Jitter Based Reconstruction of Transmission Line Pulse Using On-Chip Sensor

Authors: Bhuvnesh Narayanan, Bernhard Weiss, Tvrtko Mandic, Adrijan Baric

Abstract:

This paper discusses a method to reconstruct internal high-frequency signals through subsampling techniques in an IC using an on-chip sensor. Though there are existing methods to internally probe and reconstruct high frequency signals through subsampling techniques; these methods have been applicable mainly for synchronized systems. This paper demonstrates a method for making such non-intrusive on-chip reconstructions possible also in non-synchronized systems. The TLP pulse is used to demonstrate the experimental validation of the concept. The on-chip sensor measures the voltage in an internal node. The jitter in the input pulse causes a varying pulse delay with respect to the on-chip sampling command. By measuring this pulse delay and by correlating it with the measured on-chip voltage, time domain waveforms can be reconstructed, and the influence of the pulse on the internal nodes can be better understood.

Keywords: on-chip sensor, jitter, transmission line pulse, subsampling

Procedia PDF Downloads 145
2821 Causal-Explanatory Model of Academic Performance in Social Anxious Adolescents

Authors: Beatriz Delgado

Abstract:

Although social anxiety is one of the most prevalent disorders in adolescents and causes considerable difficulties and social distress in those with the disorder, to date very few studies have explored the impact of social anxiety on academic adjustment in student populations. The aim of this study was analyze the effect of social anxiety on school functioning in Secondary Education. Specifically, we examined the relationship between social anxiety and self-concept, academic goals, causal attributions, intellectual aptitudes, and learning strategies, personality traits, and academic performance, with the purpose of creating a causal-explanatory model of academic performance. The sample consisted of 2,022 students in the seven to ten grades of Compulsory Secondary Education in Spain (M = 13.18; SD = 1.35; 51.1% boys). We found that: (a) social anxiety has a direct positive effect on internal attributional style, and a direct negative effect on self-concept. Social anxiety also has an indirect negative effect on internal causal attributions; (b) prior performance (first academic trimester) exerts a direct positive effect on intelligence, achievement goals, academic self-concept, and final academic performance (third academic trimester), and a direct negative effect on internal causal attributions. It also has an indirect positive effect on causal attributions (internal and external), learning goals, achievement goals, and study strategies; (c) intelligence has a direct positive effect on learning goals and academic performance (third academic trimester); (d) academic self-concept has a direct positive effect on internal and external attributional style. Also, has an indirect effect on learning goals, achievement goals, and learning strategies; (e) internal attributional style has a direct positive effect on learning strategies and learning goals. Has a positive but indirect effect on achievement goals and learning strategies; (f) external attributional style has a direct negative effect on learning strategies and learning goals and a direct positive effect on internal causal attributions; (g) learning goals have direct positive effect on learning strategies and achievement goals. The structural equation model fit the data well (CFI = .91; RMSEA = .04), explaining 93.8% of the variance in academic performance. Finally, we emphasize that the new causal-explanatory model proposed in the present study represents a significant contribution in that it includes social anxiety as an explanatory variable of cognitive-motivational constructs.

Keywords: academic performance, adolescence, cognitive-motivational variables, social anxiety

Procedia PDF Downloads 332
2820 Linking Remittances and Household Level Development in India: An Analysis of NSSO 64th Round Data

Authors: Rakesh Mishra, Mukunda Upadhyay, Rajni Singh

Abstract:

This paper attempts to link remittances sent by internal as well as international out-migrants and its domestic preferences of usage in three different dimension of Household level development in India and its states. Investment of remittances in these sectors reveals for mixed choices of preferential among the states from where people have out-migrated. The multivariate analysis implies that among all three indicators of human development, health (Investment in Food and Health) is the one that attracts the major investment followed by capital formation and least on Education. Usage of the remittances has been found to be varying across all the states in India as far as usage in health, capital formation and education are concerned. Orissa, Nagaland, Madhya Pradesh, Jharkhand, Gujarat, D & H Haweli are some of the states and union territory that contributes highest of its international remittances on health, while most of the usage of the internal remittances has second or third preferences of investment on the health except for Uttar Pradesh, D & H Haweli, Arunachal Pradesh and A & N Is. This paper tries to access usage of international remittances as well as internal remittances on the flow of remittances at the micro level and its implications across three basic determinants of Human Development that is Health, Capital formation and Education coupled with the preferences of usage in presence of Several Socio economic and Demographic variable.

Keywords: multivariate analysis, household development, remittances, internal and international migration

Procedia PDF Downloads 446
2819 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 250
2818 Identifying Children at Risk for Specific Language Impairment Using a Wordless Picture Narrative: A Study on Hindi, an Indian Language

Authors: Yozna Gurung

Abstract:

This paper presents preliminary findings from an on-going study on the use of Internal State Terms (IST) in the production of narratives of Hindi-English bilinguals in an attempt to identify children at risk for Specific Language Impairment. Narratives were examined for macrostructure (story structure and story complexity) and internal state terms or mental state terms (IST/MST). 31 students generated stories based on six pictures that were matched for content and story structure in L1 (Hindi) and L2 (English) using a wordless picture narrative. From 30 sample population, 2 students are at risk of Specific Language Impairment, according to this study i.e 6.45%. They showed least development in story grammar as well as IST in both their languages.

Keywords: internal state terms, macrostructure, specific language impairment, wordless picture narrative

Procedia PDF Downloads 231
2817 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 196
2816 Seasonal Variability of M₂ Internal Tides Energetics in the Western Bay of Bengal

Authors: A. D. Rao, Sachiko Mohanty

Abstract:

The Internal Waves (IWs) are generated by the flow of barotropic tide over the rapidly varying and steep topographic features like continental shelf slope, subsurface ridges, and the seamounts, etc. The IWs of the tidal frequency are generally known as internal tides. These waves have a significant influence on the vertical density and hence causes mixing in the region. Such waves are also important in submarine acoustics, underwater navigation, offshore structures, ocean mixing and biogeochemical processes, etc. over the shelf-slope region. The seasonal variability of internal tides in the Bay of Bengal with special emphasis on its energetics is examined by using three-dimensional MITgcm model. The numerical simulations are performed for different periods covering August-September, 2013; November-December, 2013 and March-April, 2014 representing monsoon, post-monsoon and pre-monsoon seasons respectively during which high temporal resolution in-situ data sets are available. The model is initially validated through the spectral estimates of density and the baroclinic velocities. From the estimates, it is inferred that the internal tides associated with semi-diurnal frequency are more dominant in both observations and model simulations for November-December and March-April. However, in August, the estimate is found to be maximum near-inertial frequency at all the available depths. The observed vertical structure of the baroclinic velocities and its magnitude are found to be well captured by the model. EOF analysis is performed to decompose the zonal and meridional baroclinic tidal currents into different vertical modes. The analysis suggests that about 70-80% of the total variance comes from Mode-1 semi-diurnal internal tide in both observations as well as in the model simulations. The first three modes are sufficient to describe most of the variability for semidiurnal internal tides, as they represent 90-95% of the total variance for all the seasons. The phase speed, group speed, and wavelength are found to be maximum for post-monsoon season compared to other two seasons. The model simulation suggests that the internal tide is generated all along the shelf-slope regions and propagate away from the generation sites in all the months. The model simulated energy dissipation rate infers that its maximum occurs at the generation sites and hence the local mixing due to internal tide is maximum at these sites. The spatial distribution of available potential energy is found to be maximum in November (20kg/m²) in northern BoB and minimum in August (14kg/m²). The detailed energy budget calculation are made for all the seasons and results are analysed.

Keywords: available potential energy, baroclinic energy flux, internal tides, Bay of Bengal

Procedia PDF Downloads 170
2815 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 64
2814 High Temperature Behavior of a 75Cr3C2–25NiCr Coated T91 Boiler Steel in an Actual Industrial Environment of a Coal Fired Boiler

Authors: Buta Singh Sidhu, Sukhpal Singh Chatha, Hazoor Singh Sidhu

Abstract:

In the present investigation, 75Cr3C2-25NiCr coating was deposited on T91 boiler tube steel substrate by high velocity oxy-fuel (HVOF) process to enhance high-temperature corrosion resistance. High-temperature performance of bare, as well as HVOF-coated steel specimens was evaluated for 1500 h under cyclic conditions in the platen superheater zone coal-fired boiler, where the temperature was around 900 °C. Experiments were carried out for 15 cycles each of 100 h duration followed by 1 h cooling at ambient temperature. The performance of the bare and coated specimens was assessed via metal thickness loss corresponding to the corrosion scale formation and the depth of internal corrosion attack. 75Cr3C2-25NiCr coating deposited on T91 steel imparted better hot corrosion resistance than the uncoated steel. Inferior resistance of bare T91 steel is attributed to the formation of pores and loosely bounded oxide scale rich in Fe2O3.

Keywords: 75Cr3C2-25NiCr, HVOF process, boiler steel, coal fired boilers

Procedia PDF Downloads 608
2813 Determine the Effectiveness of Group Therapy with Reality Therapy Approach to Reduce Symptoms of Anxiety, Increase Self-esteem, and Internal Control in Infertile Women

Authors: Fatemeh Alsadat Borhani, Hassan Heydari, Mansour Abdi

Abstract:

The purpose of this study to determine the effectiveness of group therapy with approach reality therapy in reducing symptoms of anxiety and increased self- esteem and internal control of infertile women. The population of this study is all infertile women in Qom city in 2012 that with the use of purposeful sampling, 32 individuals were selected as sample. 16 individuals of infertile women in the control group and 16 infertile women in the experimental group is replaced. The research design was of type quasi-experimental with design pretest-posttest with control group. Thus, infertile women were randomly appointed in the experimental and control groups. Also, in this study data through normalized questionnaires, the Beck Anxiety scale, Rotter's Locus of control inventory, Cooper Smith self-esteem inventory was collected. For analysis of data, descriptive statistics, mean, standard deviation and inferential statistics, one way analysis of covariance model with SPSS version 20 software was used. The findings indicated that intervention of the group therapy with approach reality therapy in experimental group reduced symptoms of anxiety and mutually increased self-esteem and internal control in infertile women of experimental group.

Keywords: reality therapy, infertile women, anxiety, self esteem, internal control

Procedia PDF Downloads 574
2812 Single Ended Primary Inductance Converter with Internal Model Controller

Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan

Abstract:

In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.

Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply

Procedia PDF Downloads 628
2811 Origin Variability of Superior Vesical Artery

Authors: Waseem Al-Talalwah

Abstract:

The superior vesical artery usually arises directly from the anterior division of the internal iliac artery. It may arise from the umbilical artery as three or four branches to supply the upper and middle parts of bladder. Current study focuses on the different origins of the superior vesical artery to provide a sufficient data for surgeons to disease iatrogenic fault. The superior vesical artery arises directly from the anterior division of the internal iliac artery in 24.5% whereas it arises indirectly as from umbilical artery in 83.7%. Further, it may arise from any branch of the anterior division as from the utrine and obturator arteries in 6.1% and in 6.3% respectively. It also shares the origin of the internal pudendal and inferior glutyeal artery as it arises from the gluteopudendal trunk in 4.1%. The superior vesical artery arises as a single, double, triple and quadruple in 69.4%, 20.4%, 8.2% and 2% respectively. In case of cystectomy for bladder cancer, surgeons have to be aware of the origin variability of superior vesical artery to prevent post-surgical complication such as intra-pelvic bleeding. Also, the as intra-pelvic bleeding has to be expected in case of hysterectomy therefore a great caution of the vesical branches arising from uterine artery has to be considered. In case of aneurysm resection of inferior gluteal artery arising from the gluteopudendal trunk, the surgeons have to be careful of the vascular supply of urinary bladder coming from above and below this common trunk as from superior and inferior vesical arteries respectively. Therefore, present study increases the awareness of clinical significance of superior vesical artery origin for surgeons to minimise the iatroginc errors.

Keywords: superior vesical artery, anterior division, internal iliac, internal pudendal, inferior glutyeal, intra-pelvic bleeding, hysterectomy, cystectomy

Procedia PDF Downloads 392
2810 Quality of Care of Medical Male Circumcisions: A Non-Negotiable for Right to Care

Authors: Nelson Igaba, C. Onaga, S. Hlongwane

Abstract:

Background: Medical Male Circumcision (MMC) is part of a comprehensive HIV prevention strategy. The quality of MMC done at Right To Care (RtC) sites is maintained by Continuous Quality Improvement (CQI) based on findings of assessments by internal and independent external assessors who evaluate such parameters as the quality of the surgical procedure, infection control, etc. There are 12 RtC MMC teams in Mpumalanga, two of which are headed by Medical Officers and 10 by Clinical Associates (Clin A). Objectives: To compare the quality (i) of care rendered at doctor headed sites (DHS) versus Clin A headed sites (CHS); (ii) of CQI assessments (external versus internal). Methodology: A retrospective review of data from RightMax™ (a novel RtC data management system) and CQI reports (external and internal) was done. CQI assessment scores of October 2015 and October 2016 were taken as the baseline and latest respectively. Four sites with 745-810 circumcisions per annum were purposively selected; the two DHS (group A) and two CHS (group B). Statistical analyses were conducted using R (2017 version). Results: There were no significant difference in latest CQI scores between the two groups (DHS and CHS) (Anova, F = 1.97, df = 1, P = 0.165); between internal and external CQI assessment scores (Anova, F = 2.251, df = 1, P = 0.139) or among the individual sites (Anova, F = 1.095, df = 2, P = 0.341). Of the total of 16 adverse events reported by the four sites in the 12 months reviewed (all were infections), there was no statistical evidence that the documented severity of the infection was different for DHS and CHS (Fisher’s exact test, p-value = 0.269). Conclusion: At RtC VMMC sites in Mpumalanga, internal and external/independent CQI assessments are comparable, and quality of care of VMMC is standardized with the performance of well-supervised clinical associates comparing well with those of medical officers.

Keywords: adverse events, Right to Care, male medical circumcision, continuous quality improvement

Procedia PDF Downloads 176
2809 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 95
2808 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 148
2807 The Internal Migration in Jiangxi Province, China after the Migrating Decision

Authors: Gourida Siham

Abstract:

Chinese society has witnessed a continuing trend of nationwide rural to urban migration since the 1970's. Before that age, under restricted hukou systems, peasants were kept still and fixed in the farm land. The year 1978 and later years saw the control of migration in China was relaxed gradually, freeing peasants to start their own businesses and reach out to work also in urban areas. Since then the “floating population” (migrants without local hukou) took great momentum and drew great attention from both the media and academia. The scale of such internal migration is enormous –the floating population has reached to a number of 79 million in 2000, and as of 2010, the number of migrant workers from rural China amounts to over 221 million and according to the annual survey results projections by National Bureau of Statistics; the total migrant workers in china in 2012 amounted to 262.61 million, which refers to an increase of 9.83 million compared with the previous year with increase percentage by 3.9%. Using China’s Jiangxi Province as a case, this paper examines patterns of internal migration as a response of emigrations in the context of high emigration communities. Our findings suggest that emigration of individuals initially deterred both inter-provincial and intra- provincial migration of other family members, and yet, overtime they had an increasing propensity to migrate internally at both scales.

Keywords: internal migration, jiangxi, nanchang, remittances

Procedia PDF Downloads 407
2806 Experimental and Comparative Study of Composite Thin Cylinder Subjected to Internal Pressure

Authors: Hakim S. Sultan Aljibori

Abstract:

An experimental procedure is developed to study the performance of composite thin wall cylinders subjected to internal pressure loading for investigations of stress distribution through the composite cylinders wall. Three types of fibers were used in this study are; woven roving glass fiber/epoxy, hybrid fiber/epoxy, and Kevlar fiber/epoxy composite specimens were fabricated and tested. All of these specimens subjected to uniformed pressure load using the hydraulic pump. Axial stress is identified, and values were found after collecting all the results. Comparison between the deferent types of specimens was done. Thus, the present investigation concludes the efficient and effective composite cylinder experimentally and provides a considerable advantage for using woven roving fibers in pressure vessels applications.

Keywords: stress distribution, composite material, internal pressure, glass fiber, hybrid fiber

Procedia PDF Downloads 162
2805 Investigation of the Kutta Condition Using Unsteady Flow

Authors: K. Bhojnadh, M. Fiddler, D. Cheshire

Abstract:

An investigation into the Kutta effect on the trailing edge of a subsonic aerofoil was conducted which led to an analysis using Ansys Fluent to determine the effect of flow separation over a NACA 0012 aerofoil. This aerofoil was subjected to oscillations to create an unsteady flow over the aerofoil, therefore, creating turbulence, with unsteady aerodynamics playing a key role to determine the flow regimes when the aerofoil is subjected to different angles of attack along with varying Reynolds numbers. Many theories were evolved to determine the flow parameters of a 2-D aerofoil in these unsteady conditions because they behave unpredictably at the trailing edge when subjected to a different angle of attack. The shear area observed in the boundary layer at the trailing edge tends towards an unsteady turbulent flow even at small angles of attack, creating drag as the flow separates, reducing the aerodynamic performance of aerofoil. In this paper, research was conducted to determine the effect of Kutta circulation over the aerofoil and the effect of that circulation in reducing the effect of pressure and boundary layer distribution over the aerofoil. The effect of circulation is observed by using Ansys Fluent by using varying flow parameters and differential schemes to observe the flow behaviour on the aerofoil. Initially, steady flow analysis was conducted on the aerofoil to determine the effect of circulation, and it was noticed that the effect of circulation could only be properly observed when the aerofoil is subjected to oscillations. Therefore, that was modelled by using Ansys user-defined functions, which define the motion of the aerofoil by creating a dynamic mesh on the aerofoil. Initial results were observed, and further development of the dynamic mesh functions in Ansys is taking place. This research will determine the overall basic principles of unsteady flow aerodynamics applied to the investigation of Kutta related circulation, and gives an indication regarding the generation of vortices which is discussed further in this paper.

Keywords: circulation, flow seperation, turbulence modelling, vortices

Procedia PDF Downloads 205
2804 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 158
2803 An Examination of Internal Control System, Executive Duality and Audit Alarm Committee of Listed Nigerian Companies

Authors: Mansur Lubabah Kwanbo

Abstract:

Existing literatures have demonstrated the importance of executive duality (ED) and audit committee (AC) in the financial growth of companies. To some extent this points to corporate governance mechanism aiming at addressing makers and implementers of company policies to be centered on promoting only company objectives. However, furthering organizational objectives needs an adequate structure of control to realize that. Recent development in the various industries in Nigeria have indicated the internal control system (ICS)has not been able to adequately address most of the activities that results in ills of sustaining growth for these industries. It is from this premise the study has as one of its objective to determine the extent to which ICS significantly relates to ED and AC in listed Nigerian corporation. Data were sourced from 308 financial statements and accounts of the corporations that made the sample of the study. Logistic regression aided the test of the hypothesis formulated for the study. Findings revealed a significant relationship between the study variables. The study concludes that the internal control system (ICS) is effective despite the bifurcation of executive duality (ED) and the presence of the Audit Committee (AC) to the extent of preventing ills that encourage lack of sustainability of company’s growth. Sustaining legitimate policies that translate into huge earnings, and create value to stake holders should be pursued.

Keywords: audit committee (AC), executive duality (ED), internal control system (ICS), Nigeria

Procedia PDF Downloads 295
2802 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 382
2801 Effect of Retained Austenite Stability in Corrosion Mechanism of Dual Phase High Carbon Steel

Authors: W. Handoko, F. Pahlevani, V. Sahajwalla

Abstract:

Dual-phase high carbon steels (DHCS) are commonly known for their improved strength, hardness, and abrasive resistance properties due to co-presence of retained austenite and martensite at the same time. Retained austenite is a meta-stable phase at room temperature, and stability of this phase governs the response of DHCS at different conditions. This research paper studies the effect of RA stability on corrosion behaviour of high carbon steels after they have been immersed into 1.0 M NaCl solution for various times. For this purpose, two different steels with different RA stabilities have been investigated. The surface morphology of the samples before and after corrosion attack was observed by secondary electron microscopy (SEM) and atomic force microscopy (AFM), along with the weight loss and Vickers hardness analysis. Microstructural investigations proved the preferential attack to retained austenite phase during corrosion. Hence, increase in the stability of retained austenite in dual-phase steels led to decreasing the weight loss rate.

Keywords: high carbon steel, austenite stability, atomic force microscopy, corrosion

Procedia PDF Downloads 210