Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2170

Search results for: man in middle attack

1960 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 244
1959 Optimizing Mechanical Behavior of Middle Ear Prosthesis Using Finite Element Method with Material Degradation Functionally Graded Materials in Three Functions

Authors: Khatir Omar, Fekih Sidi Mohamed, Sahli Abderahmene, Benkhettou Abdelkader, Boudjemaa Ismail

Abstract:

Advancements in technology have revolutionized healthcare, with notable impacts on auditory health. This study introduces an approach aimed at optimizing materials for middle ear prostheses to enhance auditory performance. We have developed a finite element (FE) model of the ear incorporating a pure titanium TORP prosthesis, validated against experimental data. Subsequently, we applied the Functionally Graded Materials (FGM) methodology, utilizing linear, exponential, and logarithmic degradation functions to modify prosthesis materials. Biocompatible materials suitable for auditory prostheses, including Stainless Steel, titanium, and Hydroxyapatite, were investigated. The findings indicate that combinations such as Stainless Steel with titanium and Hydroxyapatite offer improved outcomes compared to pure titanium and Hydroxyapatite ceramic in terms of both displacement and stress. Additionally, personalized prostheses tailored to individual patient needs are feasible, underscoring the potential for further advancements in auditory healthcare.

Keywords: middle ear, prosthesis, ossicles, FGM, vibration analysis, finite-element method

Procedia PDF Downloads 60
1958 The Importance of Parental Projective Care in Perceived Parenting Effectiveness in African American Upper Middle Class Families

Authors: Susan D. Toliver

Abstract:

Within the professional research literature on parenting in the United States, there is a paucity of research on parenting within the African American or Black community. Research on parenting focused on African Americans within the upper middle class, who constitute a critical and growing sector within the African American population, is all but non-existent. Research to address this void is needed. Despite the progress that has been made toward eliminating the long-standing racial divides in U.S. society, these divides persist and continue to affect different experiences and opportunity structures for White Americans versus Black Americans, including those in the upper middle class. Achievement of middle and upper middle class status of adult heads of families has generally been seen as the route to greater success and well-being for their children. While higher family class status is positively correlated with these factors, the strength of the relationship between higher social class and success and well-being is weaker for Black American families as compared to White American families. In light of the realities of racial inequality, African American parents, including those who have achieved higher status, have unique concerns for their children. African American parents, on the basis of their own experiences and their sense of the world as being highly racialized, anticipate the kinds of experiences that their children are likely to encounter as they grow and mature from childhood to adulthood and beyond. Racial discrimination and macro and micro racial aggressions are continued sources of concern for these parents. On the basis of in-depth personal interviews with upper middle class African American parents, findings suggest that the parenting goals and strategies of African American parents are influenced by the continuing significance of race as a social divide, including in higher socio-economic strata, in the United States. Black American families' parenting practices differ from those of White American families and are inclusive of the unique factors that threaten the well-being of African American children. Specifically, parenting practices are shaped by parents' fears about the racial experiences that they anticipate that their children will encounter. Parents' perceptions of parental effectiveness are linked to their ability to prepare their children for success in confronting, understanding, and contextualizing racial inequalities and aggressions. Theories of Parental Projective Care are useful in understanding the special considerations and unique parenting goals and behaviors of higher status African Americans.

Keywords: African American parenting, parental projective care, parenting effectiveness, racial socialization, upper middle class parenting

Procedia PDF Downloads 127
1957 Determination of Cadmium and Lead in Sewage Sludge from the Middle Region (Misrata, Msallata and Tarhünah Cities) of Libya

Authors: J. A. Mayouf, Q. A. Najim, H. S. Al-Bayati

Abstract:

The concentrations of cadmium and lead in sewage sludge samples were determined by Atomic Absorption Spectrometric Method. Samples of sewage sludge were obtained from three sewage treatment plants localised in Middle Region of Libya (Misrata, Msallata and Tarhünah cities). The results shows that, the mean levels of Cadmium for all regions are ranges from 81 to 123.4 ppm and these values are higher than the limitations for the international standard which are not registered more than 50 ppm (dry weight) in USA, Egypt and the EU countries. While, the lead concentrations are ranged from 8.0 to 189.2 ppm and all values are within the standard limits which graduated between (275–613) ppm.

Keywords: cadmium, lead, sewage, spectrometry

Procedia PDF Downloads 353
1956 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 238
1955 Fatigue-Induced Debonding Propagation in FM300 Adhesive

Authors: Reza Hedayati, Meysam Jahanbakhshi

Abstract:

Fracture Mechanics is used to predict debonding propagation in adhesive joint between aluminum and composite plates. Three types of loadings and two types of glass-epoxy composite sequences: [0/90]2s and [0/45/-45/90]s are considered for the composite plate and their results are compared. It was seen that generally the cases with stacking sequence of [0/45/-45/90]s have much shorter lives than cases with [0/90]2s. It was also seen that in cases with λ=0 the ends of the debonding front propagates forward more than its middle, while in cases with λ=0.5 or λ=1 it is vice versa. Moreover, regardless of value of λ, the difference between the debonding propagations of the ends and the middle of the debonding front is very close in cases λ=0.5 and λ=1. Another main conclusion was the non-dimensionalized debonding front profile is almost independent of sequence type or the applied load value.

Keywords: adhesive joint, debonding, fracture, LEFM, APDL

Procedia PDF Downloads 347
1954 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 176
1953 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 52
1952 Execution of Joinery in Large Scale Projects: Middle East Region as a Case Study

Authors: Arsany Philip Fawzy

Abstract:

This study is going to address the hurdles of project management in the joinery field. It is widely divided into two sections; the first one will shed light on how to execute large-scale projects with a specific focus on the middle east region. It will also raise major obstacles that may face the joinery team from the site clearance and the coordination between the joinery team and the construction team. The second section is going to technically analyze the commercial side of the joinery and how to control the main cost of the project to avoid financial problems. It will also suggest empirical solutions to monitor the cost impact (e.g., Variation of contract quantity and claims).

Keywords: clearance, quality, cost, variation, claim

Procedia PDF Downloads 82
1951 Development of a CFD Model for PCM Based Energy Storage in a Vertical Triplex Tube Heat Exchanger

Authors: Pratibha Biswal, Suyash Morchhale, Anshuman Singh Yadav, Shubham Sanjay Chobe

Abstract:

Energy demands are increasing whereas energy sources, especially non-renewable sources are limited. Due to the intermittent nature of renewable energy sources, it has become the need of the hour to find new ways to store energy. Out of various energy storage methods, latent heat thermal storage devices are becoming popular due to their high energy density per unit mass and volume at nearly constant temperature. This work presents a computational fluid dynamics (CFD) model using ANSYS FLUENT 19.0 for energy storage characteristics of a phase change material (PCM) filled in a vertical triplex tube thermal energy storage system. A vertical triplex tube heat exchanger, just like its name consists of three concentric tubes (pipe sections) for parting the device into three fluid domains. The PCM is filled in the middle domain with heat transfer fluids flowing in the outer and innermost domains. To enhance the heat transfer inside the PCM, eight fins have been incorporated between the internal and external tubes. These fins run radially outwards from the outer-wall of innermost tube to the inner-wall of the middle tube dividing the middle domain (between innermost and middle tube) into eight sections. These eight sections are then filled with a PCM. The validation is carried with earlier work and a grid independence test is also presented. Further studies on freezing and melting process were carried out. The results are presented in terms of pictorial representation of isotherms and liquid fraction

Keywords: heat exchanger, thermal energy storage, phase change material, CFD, latent heat

Procedia PDF Downloads 143
1950 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 136
1949 Prediction of Fatigue Crack Propagation in Bonded Joints Using Fracture Mechanics

Authors: Reza Hedayati, Meysam Jahanbakhshi

Abstract:

Fracture Mechanics is used to predict debonding propagation in adhesive joint between aluminum and composite plates. Three types of loadings and two types of glass-epoxy composite sequences: [0/90]2s and [0/45/-45/90]s are considered for the composite plate and their results are compared. It was seen that generally the cases with stacking sequence of [0/45/-45/90]s have much shorter lives than cases with [0/90]2s. It was also seen that in cases with λ=0 the ends of the debonding front propagates forward more than its middle, while in cases with λ=0.5 or λ=1 it is vice versa. Moreover, regardless of value of λ, the difference between the debonding propagations of the ends and the middle of the debonding front is very close in cases λ=0.5 and λ=1. Another main conclusion was the non-dimensionalized debonding front profile is almost independent of sequence type or the applied load value.

Keywords: fatigue, debonding, Paris law, APDL, adhesive

Procedia PDF Downloads 351
1948 Investigation of the Kutta Condition Using Unsteady Flow

Authors: K. Bhojnadh, M. Fiddler, D. Cheshire

Abstract:

An investigation into the Kutta effect on the trailing edge of a subsonic aerofoil was conducted which led to an analysis using Ansys Fluent to determine the effect of flow separation over a NACA 0012 aerofoil. This aerofoil was subjected to oscillations to create an unsteady flow over the aerofoil, therefore, creating turbulence, with unsteady aerodynamics playing a key role to determine the flow regimes when the aerofoil is subjected to different angles of attack along with varying Reynolds numbers. Many theories were evolved to determine the flow parameters of a 2-D aerofoil in these unsteady conditions because they behave unpredictably at the trailing edge when subjected to a different angle of attack. The shear area observed in the boundary layer at the trailing edge tends towards an unsteady turbulent flow even at small angles of attack, creating drag as the flow separates, reducing the aerodynamic performance of aerofoil. In this paper, research was conducted to determine the effect of Kutta circulation over the aerofoil and the effect of that circulation in reducing the effect of pressure and boundary layer distribution over the aerofoil. The effect of circulation is observed by using Ansys Fluent by using varying flow parameters and differential schemes to observe the flow behaviour on the aerofoil. Initially, steady flow analysis was conducted on the aerofoil to determine the effect of circulation, and it was noticed that the effect of circulation could only be properly observed when the aerofoil is subjected to oscillations. Therefore, that was modelled by using Ansys user-defined functions, which define the motion of the aerofoil by creating a dynamic mesh on the aerofoil. Initial results were observed, and further development of the dynamic mesh functions in Ansys is taking place. This research will determine the overall basic principles of unsteady flow aerodynamics applied to the investigation of Kutta related circulation, and gives an indication regarding the generation of vortices which is discussed further in this paper.

Keywords: circulation, flow seperation, turbulence modelling, vortices

Procedia PDF Downloads 192
1947 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 144
1946 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 363
1945 Effect of Retained Austenite Stability in Corrosion Mechanism of Dual Phase High Carbon Steel

Authors: W. Handoko, F. Pahlevani, V. Sahajwalla

Abstract:

Dual-phase high carbon steels (DHCS) are commonly known for their improved strength, hardness, and abrasive resistance properties due to co-presence of retained austenite and martensite at the same time. Retained austenite is a meta-stable phase at room temperature, and stability of this phase governs the response of DHCS at different conditions. This research paper studies the effect of RA stability on corrosion behaviour of high carbon steels after they have been immersed into 1.0 M NaCl solution for various times. For this purpose, two different steels with different RA stabilities have been investigated. The surface morphology of the samples before and after corrosion attack was observed by secondary electron microscopy (SEM) and atomic force microscopy (AFM), along with the weight loss and Vickers hardness analysis. Microstructural investigations proved the preferential attack to retained austenite phase during corrosion. Hence, increase in the stability of retained austenite in dual-phase steels led to decreasing the weight loss rate.

Keywords: high carbon steel, austenite stability, atomic force microscopy, corrosion

Procedia PDF Downloads 198
1944 Nutritional Status in Ramadan Influences Body Compositions Differently in Men and Women

Authors: Meskure Pak, Nihal Buyukuslu

Abstract:

During Ramadan Muslims refrain from eating and drinking from dawn to sunset. Transformation of the eating habits cause profound changes in body composition. This study was performed during Ramadan of June-July 2015 with the regular fasting healthy adults (15 women and 15 men). The participants who were not fasting the whole month, have chronic diseases, pregnant and lactated were excluded. All attendances were informed about study. Written informed consent was taken from the voluntary participants. The work was approved by the Ethics and Research Committee of Istanbul Medipol University, Turkey. A questionnaire was conducted to determine the nutritional status, demographic and anthropometric data at the beginning, in the middle and at the end of Ramadan. Statistical Package for Social Sciences version 18.0 (SPSS, Chicago, IL, USA) was used for analyses. The mean ages of women and men were 34.4±9.45 and 28.9±10.55 years respectively. The BMI values (kg/m2) were slightly increased in men (26.5±3.9 to 26.2±3.7) and decreased in women (22.5±3.5 to 23.3±4.5). However the differences in BMI values between genders were not significant. Waist circumferences (WC) (cm) decreased in both women (80.2±14.6 to 79.4±17.7) and men (98.9±8.4 to 95.2±11.0) through the Ramadan. Fat percentages of women (27.0±71) increased in the middle of Ramadan (28.4±7.8) and decreased at the end of Ramadan (27.8±8.3). The fat percentages of men (21.5±6.3) were not affected in the middle of Ramadan (21.5±6.4) however decreased at the end of Ramadan (20.8±6.2). The total change in fat mass from beginning to end of Ramadan was higher in women than in men. The daily energy intake was higher in men than in women during Ramadan. In the middle of Ramadan energy intake (kcal) was reached to the highest level (2057.8±693.1) and at the end of Ramadan it decreased to the beginning level (1656.7±553.2) for men. However, daily energy intake of women slightly decreased from the beginning (1410.0±359.7) to the end (1409.2±366.7) of Ramadan. The comparison of energy intake between men and women was significant in the middle of Ramadan (p < 0.05). Water consumptions for both groups were increased in Ramadan fasting period. In comparison with the beginning of Ramadan, daily carbohydrate and fat consumptions increased and the consumption of protein decreased for men and for women at the end of Ramadan. The gender comparison resulted in a significant increase for protein and carbohydrate consumption of men in the middle of Ramadan (p < 0.05). In the first two weeks, the daily energy intake, the consumption of carbohydrates and fats seemed to increase for both men and women. However the later days of Ramadan daily fat consumption decreased to the level of beginning consumption levels which may indicate the nutritional adaptation period. In spite of the consumption of protein sources such as meat, poultry and egg increased, the decrease in the total amount of protein consumed in Ramadan may be due to a decrease in the consumption of milk and dairy products. In conclusion, the nutritional habits and preferred foods changed during Ramadan as a result affected the body composition.

Keywords: body composition, fasting, nutritional status, Ramadan

Procedia PDF Downloads 212
1943 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study

Authors: Maged El-Sayed Mohamed

Abstract:

Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.

Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction

Procedia PDF Downloads 345
1942 Critical Factors of IFRS Adoption in Bank Industries In Middle East Countries

Authors: Benjamin Bae

Abstract:

This study investigates the relationship between the adoption of International Financial Reporting Standards (IFRS) and the performance of banks in a number of Middle East countries. We examine whether performance levels and audit qualities play any role in adopting the International Financial Reporting Standards (IFRS) in Middle East banks. This study hypothesizes that, in general, banks with high performance and audit quality measures tend to adopt the IFRS than low-performing banks, as the adoption of a new standard takes lots of time and expenses, which could be an additional burden to them. The results show that three hypotheses are strongly supported whereas the cultural factor hypothesis is not. Banks with high ROA and ROE tend to adopt IFRS than low-performing banks. Big banks are also more likely to adopt IFRS than small or medium-sized banks. Contrary to the hypothesis, the Islamic bank status as a cultural factor has some positive impact on the adoption of the banks in the region. Overall, this research adds to our understanding of the bank’s performance. First, evidence on the relationship between the adoption of IFRS and the bank’s performance should be useful to investors. Second, the findings of this study provide financial statement users with useful information about the bank’s performance measures.

Keywords: IFRS, financial performance, audit quality, culture, firm size

Procedia PDF Downloads 25
1941 Numerical Investigations on Dynamic Stall of a Pitching-Plunging Helicopter Blade Airfoil

Authors: Xie Kai, Laith K. Abbas, Chen Dongyang, Yang Fufeng, Rui Xiaoting

Abstract:

Effect of plunging motion on the pitch oscillating NACA0012 airfoil is investigated using computational fluid dynamics (CFD). A simulation model based on overset grid technology and k - ω shear stress transport (SST) turbulence model is established, and the numerical simulation results are compared with available experimental data and other simulations. Two cases of phase angle φ = 0, μ which represents the phase difference between the pitching and plunging motions of an airfoil are performed. Airfoil vortex generation, moving, and shedding are discussed in detail. Good agreements have been achieved with the available literature. The upward plunging motion made the equivalent angle of attack less than the actual one during pitching analysis. It is observed that the formation of the stall vortex is suppressed, resulting in a decrease in the lift coefficient and a delay of the stall angle. However, the downward plunging motion made the equivalent angle of attack higher the actual one.

Keywords: dynamic stall, pitching-plunging, computational fluid dynamics, helicopter blade rotor, airfoil

Procedia PDF Downloads 212
1940 Nutritional Status of Middle School Students and Their Selected Eating Behaviours

Authors: K. Larysz, E. Grochowska-Niedworok, M. Kardas, K. Brukalo, B. Calyniuk, R. Polaniak

Abstract:

Eating behaviours and habits are one of the main factors affecting health. Abnormal nutritional status is a growing problem related to nutritional errors. The number of adolescents presenting excess body weight is also rising. The body's demand for all nutrients increases in the period of intensive development, i.e., during puberty. A varied, well-balanced diet and elimination of unhealthy habits are two of the key factors that contribute to the proper development of a young body. The aim of the study was to assess the nutritional status and selected eating behaviours/habits in adolescents attending middle school. An original questionnaire including 24 questions was conducted. A total of 401 correctly completed questionnaires were qualified for the assessment. Body mass index (BMI) was calculated. Furthermore, the frequency of breakfast consumption, the number of meals per day, types of snacks and sweetened beverages, as well as the frequency of consuming fruit and vegetables, dairy products and fast-foods were assessed. The obtained results were analysed statistically. The study showed that malnutrition was more of a problem than overweight or obesity among middle school students. More than 71% of middle school students have breakfast, whereas almost 30% of adolescents skip this meal. Up to 57.6% of respondents most often consume sweets at school. A total of 37% of adolescents consume sweetened beverages daily or almost every day. Most of the respondents consume an optimal number of meals daily. Only 24.7% of respondents consume fruit and vegetables more than once daily. The majority of respondents (49.40%) declared that they consumed fast food several times a month. Satisfactory frequency of consuming dairy products was reported by 32.7% of middle school students. Conclusions of our study: 1. Malnutrition is more of a problem than overweight or obesity among middle school students. They consume excessive amounts of sweets, sweetened beverages, and fast foods. 2. The consumption of fruit and vegetables was too low in the study group. The intake of dairy products was also low in some cases. 3. A statistically significant correlation was found between the frequency of fast food consumption and the intake of sweetened beverages. A low correlation was found between nutritional status and the number of meals per day. The number of meals consumed by these individuals decreased with increasing nutritional status.

Keywords: adolescent, malnutrition, nutrition, nutritional status, obesity

Procedia PDF Downloads 123
1939 The Language of Fliptop among Filipino Youth: A Discourse Analysis

Authors: Bong Borero Lumabao

Abstract:

This qualitative research is a study on the lines of Fliptop talks performed by the Fliptop rappers employing Finnegan’s (2008) discourse analysis. This paper aimed to analyze the phonological, morphological, and semantic features of the fliptop talk, to explore the structures in the lines of Fliptop among Filipino youth, and to uncover the various insights that can be gained from it. The corpora of the study included all the 20 Fliptop Videos downloaded from the Youtube Channel of Fliptop. Results revealed that Fliptop contains phonological features such as assonance, consonance, deletion, lengthening, and rhyming. Morphological features include acronym, affixation, blending, borrowing, code-mixing and switching, compounding, conversion or functional shifts, and dysphemism. Semantics presented the lexical category, meaning, and words used in the fliptop talks. Structure of Fliptop revolves on the personal attack (physical attributes), attack on the bars (rapping skills), extension: family members and friends, antithesis, profane words, figurative languages, sexual undertones, anime characters, homosexuality, and famous celebrities involvement.

Keywords: discourse analysis, fliptop talks, filipino youth, fliptop videos, Philippines

Procedia PDF Downloads 222
1938 Determination of Anti-Fungal Activity of Cedrus deodara Oil against Oligoporus placentus, Trametes versicolor and Xylaria acuminata on Populus deltoids

Authors: Sauradipta Ganguly, Akhato Sumi, Sanjeet Kumar Hom, Ajan T. Lotha

Abstract:

Populus deltoides is a hardwood used predominantly for the manufacturing of plywood, matchsticks, and paper in India and hence has a higher economical significance. Wood-decaying fungi cause serious damage to Populus deltoides products, as the wood itself is perishable and vulnerable to decaying agents, decreasing their aesthetical value which in return results in significant monetary loss for the wood industries concerned. The aim of the study was to determine the antifungal activity of Cedrus deodara oil against three primary wood-decaying fungi namely white-rot fungi (Trametes versicolor), brown-rot fungi (Oligoporus placentus) and soft-rot fungi (Xylaria acuminata) on Populus deltoides samples under optimum laboratory conditions. The susceptibility of Populus deltoides samples on the fungal attack and the ability of deodar oil to control colonization of the wood rotting fungi on the samples were assessed. Three concentrations of deodar oil were considered for the study as treating solutions, i.e., 4%, 5%, and 6%. The Populus deltoides samples were treated with treating solutions, and the ability of the same to prevent a fungal attack on the samples were assessed using accelerated test in the laboratory at Biochemical Oxygen Demand incubator at temperature (25 ± 2°C) and relative humidity 70 ± 4%. Efficacy test and statistical analysis of deodar oil against Trametes versicolor, Oligoporus placentus, and Xylariaacuminataon P. deltoides samples exhibited light, minor and negligible mycelia growth at 4 %, 5% and 6% concentrations of deodar oil, respectively. Whereas, moderate to heavy attack was observed on the surface of the control samples. Statistical analysis further established that the treatments were statistically significant and had significantly inhibited fungal growth of all the three fungus spp by almost 3 to 5 times.

Keywords: populus deltoides, Trametes versicolor, Oligoporus placentus, Xylaria acuminata, Deodar oil, treatment

Procedia PDF Downloads 115
1937 How Restorative Justice Can Inform and Assist the Provision of Effective Remedies to Hate Crime, Case Study: The Christchurch Terrorist Attack

Authors: Daniel O. Kleinsman

Abstract:

The 2019 terrorist attack on two masjidain in Christchurch, New Zealand, was a shocking demonstration of the harm that can be caused by hate crime. As legal and governmental responses to the attack struggle to provide effective remedies to its victims, restorative justice has emerged as a tool that can assist, in terms of both meeting victims’ needs and discharging the obligations of the state under the International Covenant on Civil and Political Rights (ICCPR), arts 2(3), 26, 27. Restorative justice is a model that emphasizes the repair of harm caused or revealed by unjust behavior. It also prioritises the facilitation of dialogue, the restoration of equitable relationships, and the prevention of future harm. Returning to the case study, in the remarks of the sentencing judge, the terrorist’s actions were described as a hate crime of vicious malevolence that the Court was required to decisively reject, as anathema to the values of acceptance, tolerance and mutual respect upon which New Zealand’s inclusive society is based and which the country strives to maintain. This was one of the reasons for which the terrorist received a life sentence with no possibility of parole. However, in the report of the Royal Commission of Inquiry into the Attack, it was found that victims felt the attack occurred within the context of widespread racism, discrimination and Islamophobia, where hostile behaviors, including hate-based threats and attacks, were rarely recorded, analysed or acted on. It was also found that the Government had inappropriately concentrated intelligence resources on the risk of ‘Islamist’ terrorism and had failed to adequately respond to concerns raised about threats against the Muslim community. In this light, the remarks of the sentencing judge can be seen to reflect a criminal justice system that, in the absence of other remedies, denies systemic accountability and renders hate crime an isolated incident rather than an expression of more widespread discrimination and hate to be holistically addressed. One of the recommendations of the Royal Commission was to explore with victims the desirability and design of restorative justice processes. This presents an opportunity for victims to meet with state representatives and pursue effective remedies (ICCPR art 2(3)) not only for the harm caused by the terrorist but the harm revealed by a system that has exposed the minority Muslim community in New Zealand to hate in all forms, including but not limited to violent extremism. In this sense, restorative justice can also assist the state in discharging its wider obligations to protect all persons from discrimination (art 26) and allow ethnic and religious minorities to enjoy their own culture and profess and practice their own religion (art 27). It can also help give effect to the law and its purpose as a remedy to hate crime, as expressed in this case study by the sentencing judge.

Keywords: hate crime, restorative justice, minorities, victims' rights

Procedia PDF Downloads 96
1936 Health Information Technology in Developing Countries: A Structured Literature Review with Reference to the Case of Libya

Authors: Haythem A. Nakkas, Philip J. Scott, Jim S. Briggs

Abstract:

This paper reports a structured literature review of the application of Health Information Technology in developing countries, defined as the World Bank categories Low-income countries, Lower-middle-income, and Upper-middle-income countries. The aim was to identify and classify the various applications of health information technology to assess its current state in developing countries and explore potential areas of research. We offer specific analysis and application of HIT in Libya as one of the developing countries. Method: A structured literature review was conducted using the following online databases: IEEE, Science Direct, PubMed, and Google Scholar. Publication dates were set for 2000-2013. For the PubMed search, publications in English, French, and Arabic were specified. Using a content analysis approach, 159 papers were analyzed and a total number of 26 factors were identified that affect the adoption of health information technology. Results: Of the 2681 retrieved articles, 159 met the inclusion criteria which were carefully analyzed and classified. Conclusion: The implementation of health information technology across developing countries is varied. Whilst it was initially expected financial constraints would have severely limited health information technology implementation, some developing countries like India have nevertheless dominated the literature and taken the lead in conducting scientific research. Comparing the number of studies to the number of countries in each category, we found that Low-income countries and Lower-middle-income had more studies carried out than Upper-middle-income countries. However, whilst IT has been used in various sectors of the economy, the healthcare sector in developing countries is still failing to benefit fully from the potential advantages that IT can offer.

Keywords: developing countries, developed countries, factors, failure, health information technology, implementation, libya, success

Procedia PDF Downloads 344
1935 Investigating the Role of Algerian Middle School Teachers in Enhancing Academic Self-Regulation: A Key towards Teaching How to Learn

Authors: Houda Zouar, Hanane Sarnou

Abstract:

In the 21st, century the concept of learners' autonomy is crucial. The concept of self-regulated learning has come forward as a result of enabling learners to direct their learning with autonomy towards academic goals achievement. Academic self-regulation is defined as the process by which learners systematically plan, monitor and asses their learning to achieve their academic established goals. In the field of English as a foreign language, teachers emphasise the role of learners’ autonomy to foster the process of English language learning. Consequently, academic self-regulation is considered as a vehicle to enhance autonomy among English language learners. However, not all learners can be equally self-regulators if not well assisted, mainly those novice pupils of basic education. For this matter, understanding the role of teachers in fostering academic self- regulation must be among the preliminary objectives in searching and developing this area. The present research work targets the role of the Algerian middle school teachers in enhancing academic self-regulation and teaching pupils how to learn, besides their role as models in the trajectory of teaching their pupils to become self-regulators. Despite the considerable endeavours in the field of educational setting on Self-Regulated Learning, the literature of the Algerian context indicates confined endeavours to undertake and divulge this notion. To go deeper into this study, a mixed method approach was employed to confirm our hypothesis. For data collection, teachers were observed and addressed by a questionnaire on their role in enhancing academic self- regulation among their pupils. The result of the research indicates that the attempts of middle school Algerian teachers are implicit and limited. This study emphasises the need to prepare English language teachers with the necessary skills to promote autonomous and self-regulator English learners.

Keywords: Algeria, English as a foreign language, middle school, self-regulation, Teachers' role

Procedia PDF Downloads 132
1934 Studying the Effects of Economic and Financial Development as Well as Institutional Quality on Environmental Destruction in the Upper-Middle Income Countries

Authors: Morteza Raei Dehaghi, Seyed Mohammad Mirhashemi

Abstract:

The current study explored the effect of economic development, financial development and institutional quality on environmental destruction in upper-middle income countries during the time period of 1999-2011. The dependent variable is logarithm of carbon dioxide emissions that can be considered as an index for destruction or quality of the environment given to its effects on the environment. Financial development and institutional development variables as well as some control variables were considered. In order to study cross-sectional correlation among the countries under study, Pesaran and Friz test was used. Since the results of both tests show cross-sectional correlation in the countries under study, seemingly unrelated regression method was utilized for model estimation. The results disclosed that Kuznets’ environmental curve hypothesis is confirmed in upper-middle income countries and also, financial development and institutional quality have a significant effect on environmental quality. The results of this study can be considered by policy makers in countries with different income groups to have access to a growth accompanied by improved environmental quality.

Keywords: economic development, environmental destruction, financial development, institutional development, seemingly unrelated regression

Procedia PDF Downloads 334
1933 Assessment of Hygroscopic Characteristics of Hevea brasiliensis Wood

Authors: John Tosin Aladejana

Abstract:

Wood behave differently under different environmental conditions. The knowledge of the hygroscopic nature of wood becomes a key factor in selecting wood for use and required treatment. This study assessed the hygroscopic behaviour of Hevea brasiliensis (Rubber) wood. Void volume, volumetric swelling in the tangential, radial and longitudinal directions and volumetric shrinkage were used to assess the response of the wood when loosing or taking up moisture. Hevea brasiliensis wood samples cut into 20 × 20 × 60 mm taken longitudinally and transversely were used for the study and dried in the oven at 103 ± 2⁰C. The mean values for moisture content in green Hevea brasiliensis wood were 49.74 %, 51.14 % and 54.36 % for top, middle and bottom portion respectively while 51.77 %, 50.02 % and 53.45 % were recorded for outer, middle and inner portions respectively for the tree. The values obtained for volumetric shrinkage and swelling indicated that shrinkage and swelling were higher at the top part of H. brasiliensis. It was also observed that the longitudinal shrinkage was negligible while tangential direction showed the highest shrinkage among the wood direction. The values of the void volume obtained were 43.0 %, 39.0 % and 38.0 % at the top, middle and bottom respectively. The result obtained showed clarification on the wood density of hevea brasiliensis based on the position and portion of the wood species and the variation in moisture content, void volume, volumetric shrinkage and swelling were also revealed. This will provide information in the process of drying hevea brasiliensis wood to ensure better wood quality devoid of defects.

Keywords: moisture content, shrinkage, swelling, void volume

Procedia PDF Downloads 266
1932 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 183
1931 Experience Marketing and Behavioral Intentions: An Exploratory Study Applied to Middle-Aged and Senior Pickleball Participated in Taiwan

Authors: Yi Yau, Chia-Huei Hsiao

Abstract:

The elderly society is already a problem of globalization, and Taiwan will enter a super-aged society in 2025. Therefore, how to improve the health of the elderly and reduce the government's social burden is an important issue at present. Exercise is the best medical care, and it is also a healthy activity for people to live a healthy life. Facing the super-aged society in the future, it is necessary to attract them to participate in sports voluntarily through sports promotion so that they can live healthy and independent lives and continue to participate in society to enhance the well-being of the elderly. Experiential marketing and sports participation are closely related. In the past, it was mainly aimed at consumer behavior at the commercial level. At present, there are not many study objects focusing on participant behavior and middle-aged and elderly people. Therefore, this study takes the news emerged sport-Pickleball that has been loved by silver-haired people in recent years as the research sport. It uses questionnaire surveys and intentional sampling methods. The purpose of the group is to understand the middle-aged and elderly people’s experience and behavior patterns of Pickleball, explore the relationship between experiential marketing and participants' intentional behaviors, and predict which aspects of experiential marketing will affect their intentional behaviors. The findings showed that experience marketing is highly positively correlated with behavioral intentions, and experience marketing has a positive predictive power for behavioral intentions. Among them, "ACT" and "SENSE" are predictive variables that effectively predict behavioral intentions. This study proves the feasibility of pickleball for middle-aged and senior sports. It is recommended that in the future curriculum planning, try to simplify the exercise steps, increase the chances of contact with the sphere, and enhance the sensory experience to enhance the sense of success during exercise, and then generate exercise motivation, and ultimately change the exercise mode or habits and promote health.

Keywords: newly emerged sports, middle age and elderly, health promotion, ACT, SENSE

Procedia PDF Downloads 140