Search results for: right to defense
237 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 393236 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184235 Characterization and Predictors of Paranoid Ideation in Youths
Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto
Abstract:
Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness
Procedia PDF Downloads 500234 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 211233 Prison Pipeline or College Pathways: Transforming the Urban Classroom
Authors: Marcia J. Watson
Abstract:
The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.Keywords: college access, higher education, school-to-prison pipeline, urban education reform
Procedia PDF Downloads 537232 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications
Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav
Abstract:
Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)
Procedia PDF Downloads 288231 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm
Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap
Abstract:
The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.Keywords: beta defensin 3, bos taurus, docking, homology modeling
Procedia PDF Downloads 291230 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer
Authors: Chao Wu
Abstract:
Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS
Procedia PDF Downloads 122229 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism
Authors: SanXi Wu
Abstract:
A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism
Procedia PDF Downloads 50228 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company
Authors: Shanshan Zhou, Massimo Battaglia
Abstract:
Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.Keywords: community identity, disaster, identity, organizational learning
Procedia PDF Downloads 732227 Computational Analysis of Variation in Thrust of Oblique Detonation Ramjet Engine With Adaptive Inlet
Authors: Aditya, Ganapati Joshi, Vinod Kumar
Abstract:
IN THE MODERN-WARFARE ERA, THE PRIME REQUIREMENT IS A HIGH SPEED AND MACH NUMBER. WHEN THE MISSILES STRIKE IN THE HYPERSONIC REGIME THE OPPONENT CAN DETECT IT WITH THE ANTI-DEFENSE SYSTEM BUT CAN NOT STOP IT FROM CAUSING DAMAGE. SO, TO ACHIEVE THE SPEEDS OF THIS LEVEL THERE ARE TWO ENGINES THAT ARE AVAILABLE WHICH CAN WORK IN THIS REGION ARE RAMJET AND SCRAMJET. THE PROBLEM WITH RAMJET STARTS TO OCCUR WHEN MACH NUMBER EXCEEDS 4 AS THE STATIC PRESSURE AT THE INLET BECOMES EQUAL TO THE EXIT PRESSURE. SO, SCRAMJET ENGINE DEALS WITH THIS PROBLEM AS IT NEARLY HAS THE SAME WORKING BUT HERE THE FLOW IS NOT MUCH SLOWED DOWN AS COMPARED TO RAMJET IN THE DIFFUSER BUT IT SUFFERS FROM THE PROBLEMS SUCH AS INLET BUZZ, THERMAL CHOCKING, MIXING OF FUEL AND OXIDIZER, THERMAL HEATING, AND MANY MORE. HERE THE NEW ENGINE IS DEVELOPED ON THE SAME PRINCIPLE AS THE SCRAMJET ENGINE BUT BURNING HAPPENS DUE TO DETONATION INSTEAD OF DEFLAGRATION. THE PROBLEM WITH THE ENGINE STARTS WHEN THE MACH NUMBER BECOMES VARIABLE AND THE INLET GEOMETRY IS FIXED AND THIS LEADS TO INLET SPILLAGE WHICH WILL AFFECT THE THRUST ADVERSELY. SO, HERE ADAPTIVE INLET IS MADE OF SHAPE MEMORY ALLOYS WHICH WILL ENHANCE THE INLET MASS FLOW RATE AS WELL AS THRUST.Keywords: detonation, ramjet engine, shape memory alloy, ignition delay, shock-boundary layer interaction, eddy dissipation, asymmetric nozzle
Procedia PDF Downloads 102226 Minors and Terrorism: A Discussion about the Recruitment and Resilience
Authors: Marta Maria Aguilar Carceles
Abstract:
This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).Keywords: criminality, minors, recruitment, resilience, terrorism
Procedia PDF Downloads 135225 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 95224 Stage-Gate Based Integrated Project Management Methodology for New Product Development
Authors: Mert Kıranç, Ekrem Duman, Murat Özbilen
Abstract:
In order to achieve new product development (NPD) activities on time and within budgetary constraints, the NPD managers need a well-designed methodology. This study intends to create an integrated project management methodology for the ones who focus on new product development projects. In the scope of the study, four different management systems are combined. These systems are called as 'Schedule-oriented Stage-Gate Method, Risk Management, Change Management and Earned Value Management'. New product development term is quite common in many different industries such as defense industry, construction, health care/dental, higher education, fast moving consumer goods, white goods, electronic devices, marketing and advertising and software development. All product manufacturers run against each other’s for introducing a new product to the market. In order to achieve to produce a more competitive product in the market, an optimum project management methodology is chosen, and this methodology is adapted to company culture. The right methodology helps the company to present perfect product to the customers at the right time. The benefits of proposed methodology are discussed as an application by a company. As a result, how the integrated methodology improves the efficiency and how it achieves the success of the project are unfolded.Keywords: project, project management, management methodology, new product development, risk management, change management, earned value, stage-gate
Procedia PDF Downloads 312223 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling
Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar
Abstract:
Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.Keywords: toolpath, part program, optimization, pocket
Procedia PDF Downloads 288222 Stability Analysis of Tumor-Immune Fractional Order Model
Authors: Sadia Arshad, Yifa Tang, Dumitru Baleanu
Abstract:
A fractional order mathematical model is proposed that incorporate CD8+ cells, natural killer cells, cytokines and tumor cells. The tumor cells growth in the absence of an immune response is modeled by logistic law as it was the simplest form for which predictions also agreed with the experimental data. Natural Killer Cells are our first line of defense. NK cells directly kill tumor cells through several mechanisms, including the release of cytoplasmic granules containing perforin and granzyme, expression of tumor necrosis factor (TNF) family members. The effect of the NK cells on the tumor cell population is expressed with the product term. Rational form is used to describe interaction between CD8+ cells and tumor cells. A number of cytokines are produced by NKs, including tumor necrosis factor TNF, IFN, and interleukin (IL-10). Source term for cytokines is modeled by Michaelis-Menten form to indicate the saturated effects of the immune response. Stability of the equilibrium points is discussed for biologically significant values of bifurcation parameters. We studied the treatment of fractional order system by investigating analytical conditions of tumor eradication. Numerical simulations are presented to illustrate the analytical results.Keywords: cancer model, fractional calculus, numerical simulations, stability analysis
Procedia PDF Downloads 315221 Impact of Cytokines Alone and Primed with Macrophages on Balamuthia mandrillaris Interactions with Human Brain Microvascular Endothelial Cells in vitro
Authors: Abdul Matin, Salik Nawaz, Suk-Yul Jung
Abstract:
Balamuthia mandrillaris is well known to cause fatal Balamuthia amoebic encephalitis (BAE). Amoebic transmission into the central nervous system (CNS), haematogenous spread is thought to be the prime step, followed by blood-brain barrier (BBB) dissemination. Macrophages are considered to be the foremost line of defense and present in excessive numbers during amoebic infections. The aim of the present investigation was to evaluate the effects of macrophages alone or primed with cytokines on the biological characteristics of Balamuthia in vitro. Using human brain microvascular endothelial cells (HBMEC), which constitutes the BBB, we have shown that Balamuthia demonstrated > 90% binding and > 70% cytotoxicity to host cells. However, macrophages further increased amoebic binding and Balamuthia-mediated cell cytotoxicity. Furthermore, macrophages exhibited no amoebicidal effect against Balamuthia. Zymography assay demonstrated that macrophages exhibited no inhibitory effect on proteolytic activity of Balamuthia. Overall, to our best knowledge, we have shown for the first time macrophages has no inhibitory effects on the biological properties of Balamuthia in vitro. This also strengthened the concept that how and why Balamuthia can cause infections in both immuno-competent and immuno-compromised individuals.Keywords: Balamuthia mandrillaris, macrophages, cytokines, human brain microvascular endothelial cells, Balamuthia amoebic encephalitis
Procedia PDF Downloads 156220 Iranian Intellectuals, Localism, Globalization and the Challenge of Rebuilding National Identity
Authors: Mohammad Afghari
Abstract:
Since the inception of intellectual movements in Iran, Iranian thinkers have perennially found themselves at the crossroads of indigenous traditionalism and Western orientation. On the one hand, supporters of indigenous thinking have emphasized the defense of cultural, national, and religious values. On the other hand, Western-leaning intellectuals, often derogatorily labeled as ‘Westoxication’ by their indigenous counterparts, have been inclined towards embracing non-indigenous ideas and ideologies, primarily of Western origin. In this historical context, the dualistic nature of Iranian intellectuals, evolving amidst the era of globalization and its swift advancements in communication, has not only retained its inherent character but has evolved into a broader duality that can identified as ‘Iranian-Cosmopolitan’. In this duality, both in its classical form of indigenous-Western and its contemporary manifestation as Iranian-Cosmopolitan, the Iranian national identity has consistently been a significant part of intellectual discussions. While critically examining this dualism through a historical lens and drawing upon the theories of Anthony Smith, a historical sociologist and British theorist of nationalism, this article delves into the importance of aligning national identity with the prevailing societal transformations, especially globalization. It underscores that Iranian intellectuals, to national identity reconstruction in the present age, will find no solution other than discarding this dualism and reconstructing national identity within a global framework.Keywords: Iran, Iranian intellectuals, globalization, localism, national identity, cosmopolitan
Procedia PDF Downloads 48219 The Aminoguanidine Reduced NO Synthase Activity and Infiltration of Macrophages in Inflammation Induced by LPS in Rats
Authors: Hakim Chayeb
Abstract:
Macrophages (Mo) play an essential role in host defense against pathogens. These inflammatory cells contain a large group of inducible enzymes such as NO synthase (NOS). This study was conducted to characterize experimentally induced inflammation in vivo by lipopolysaccharides (LPS). LPS is an essential component of the outer membrane of Gram-negative bacteria and a potent inducer of macrophage. Except control rats, all rats received different doses of LPS intra-peritoneally. The involvement of inducible NO synthase (iNOS) and constitutive (cNOS ) in the modulation of the inflammatory response was studied by treating the rats with L-NAME (non-selective NOS inhibitor) or aminoguanidine (AG inhibitor of iNOS). Inhibitors were injected 24 hours before LPS administration. The results showed that esterase activity (a marker of macrophage infiltration) which is induced by LPS is reduced by AG, was potentiated by treatment with L-NAME in tissue homogenates of the liver, kidney and spleen. Meanwhile, the concentrations of nitric oxide (NO) induced by LPS were reduced with AG and are completely inhibited with L-NAME in the tissues studied. NO concentrations and plasma transaminase levels have undergone remarkable increases in rats treated with LPS alone. However, the AG significantly reduced these rates. Our results highlighted the role of NO synthase inhibitors in reducing of inflammatory responses that characterize many infectious diseases.Keywords: aminoguanidine, esterase, LPS, L-NAME, macrophage, nitric oxide
Procedia PDF Downloads 259218 The South Looking East: The New Geopolitics of Latin America
Authors: Heike Pintor Pirzkall
Abstract:
The positive economic evolution of many countries in the Latin American Continent, mainly in South America, has changed the geopolitical position of the region in the world. It is no longer the Hinterland or backyard of the United States, now it has become the Heartland for Europe and Asia. This position has favored the interest of countries like China or India, who are combining trade agreements with special assistance and aid agreements in many fields like agriculture, alternative energy resources, defense and mining. As many countries in the region are no longer low income countries, a more equal relationship in development aid has been created were the donor and the recipient have become partners and where new actors intervene in a triangular relationship that promotes new alternative aid structures. Triangular co-operation brings together the best of different actors who are providers of development co-operation, partners in SouthSouth co-operation and international organizations. The objective is to share knowledge and implement projects that support the common goal of reducing poverty and promoting development. The intention of this paper is to explain the reasons for Latin America´s “virage” to the east and to give examples of projects and agreements between Latin American countries, China and India which will help to understand the intensification of south-east relations in recent years.Keywords: development cooperation, China, Latin America, triangular cooperation, natural resources, partnership
Procedia PDF Downloads 384217 Dynamic Shear Energy Absorption of Ultra-High Performance Concrete
Authors: Robert J. Thomas, Colton Bedke, Andrew Sorensen
Abstract:
The exemplary mechanical performance and durability of ultra-high performance concrete (UHPC) has led to its rapid emergence as an advanced cementitious material. The uncharacteristically high mechanical strength and ductility of UHPC makes it a promising potential material for defense structures which may be subject to highly dynamic loads like impact or blast. However, the mechanical response of UHPC under dynamic loading has not been fully characterized. In particular, there is a need to characterize the energy absorption of UHPC under high-frequency shear loading. This paper presents preliminary results from a parametric study of the dynamic shear energy absorption of UHPC using the Charpy impact test. UHPC mixtures with compressive strengths in the range of 100-150 MPa exhibited dynamic shear energy absorption in the range of 0.9-1.5 kJ/m. Energy absorption is shown to be sensitive to the water/cement ratio, silica fume content, and aggregate gradation. Energy absorption was weakly correlated to compressive strength. Results are highly sensitive to specimen preparation methods, and there is a demonstrated need for a standardized test method for high frequency shear in cementitious composites.Keywords: Charpy impact test, dynamic shear, impact loading, ultra-high performance concrete
Procedia PDF Downloads 295216 Comparative Analysis of Photosynthetic and Antioxidative Responses of Two Species of Anabaena under Ni and As(III) Stress
Authors: Shivam Yadav, Neelam Atri
Abstract:
Cyanobacteria, the photosynthetic prokaryotes are indispensable components of paddy soil contribute substantially to the nitrogen economy however often appended with metal load. They are well known to play crucial roles in maintenance of soil fertility and rice productivity. Nickel is one such metal that plays a vital role in the cellular physiology, however at higher concentrations it exerts adverse effects. Arsenic is another toxic metalloid that negatively affects the cyanobacterial proliferation. However species-specific comparative responses under As and Ni is largely unknown. The present study focuses on the comparative effects of nickel (Ni2+) and arsenite (As(III)) on two diazotrophic cyanobacterial species (Anabaena doliolum and Anabaena sp. PCC7120) in terms of antioxidative aspects. Oxidative damage measured in terms of lipid peroxidation and peroxide content was significantly higher after As(III) than Ni treatment as compared to control. Similarly, all the studied enzymatic and non-enzymatic parameters of antioxidative defense system except glutathione reductase (GR) showed greater induction against As(III) than Ni. Moreover, integrating comparative analysis of all studied parameters also demonstrated interspecies variation in terms of stress adaptive strategies reflected through higher sensitivity of Anabaena doliolum over Anabaena PCC7120.Keywords: antioxidative system, arsenic, cyanobacteria, nickel
Procedia PDF Downloads 154215 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse
Authors: Maryam Vaezi
Abstract:
In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party
Procedia PDF Downloads 336214 Characterization Study of Aluminium 6061 Hybrid Composite
Authors: U. Achutha Kini, S. S. Sharma, K. Jagannath, P. R. Prabhu, M. C. Gowri Shankar
Abstract:
Aluminium matrix composites with alumina reinforcements give superior mechanical & physical properties. Their applications in several fields like automobile, aerospace, defense, sports, electronics, bio-medical and other industrial purposes are becoming essential for the last several decades. In the present work, fabrication of hybrid composite was done by Stir casting technique using Al 6061 as a matrix with alumina and silicon carbide (SiC) as reinforcement materials. The weight percentage of alumina is varied from 2 to 4% and the silicon carbide weight percentage is maintained constant at 2%. Hardness and wear tests are performed in the as cast and heat treated conditions. Age hardening treatment was performed on the specimen with solutionizing at 550°C, aging at two temperatures (150 and 200°C) for different time durations. Hardness distribution curves are drawn and peak hardness values are recorded. Hardness increase was very sensitive with respect to the decrease in aging temperature. There was an improvement in wear resistance of the peak aged material when aged at lower temperature. Also increase in weight percent of alumina, increases wear resistance at lower temperature but opposite behavior was seen when aged at higher temperature.Keywords: hybrid composite, hardness test, wear test, heat treatment, pin on disc wear testing machine
Procedia PDF Downloads 320213 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination
Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan
Abstract:
The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility
Procedia PDF Downloads 124212 The Client-Supplier Relationship in Managing Innovation: Delineating Defence Industry First Mover Challenges within the Government Contract Competition
Authors: Edward Pol
Abstract:
All companies are confronted with the need to innovate in order to meet market demands. In so doing they are challenged with the dilemma of whether to aim to be first into the market with a new innovative product or to deliberately wait and learn from a pioneers’ mistakes; potentially avoiding higher risks. It is therefore important to critically understand from a first-mover advantage and disadvantage perspective the decision-making implications of defence industry transformation onset by an innovative paradigm shift. This paper will argue that the type of industry characteristics matter, especially when considering what role the clients play in the innovation process and what is their level of influence. Through investigation of qualitative case study research, this inquiry will focus on first mover advantages and first mover disadvantages with a view to establish practical and value-added academic findings by focusing on specific industries where the clients play an active role in cooperation with the supplier innovation. The resulting findings will help managers to mitigate risk in innovative technology introduction. A selection from several defense industry innovations is specifically chosen because of the client-supplier relationship typically differing from traditional first-mover research. In this instance, case studies will be used referencing vertical-takeoff-and-landing defence equipment innovations.Keywords: innovation, pioneer, first-mover advantage, first-mover disadvantage, risk
Procedia PDF Downloads 190211 Rejuvenation of Peanut Seedling from Collar Rot Disease by Azotobacter sp. RA2
Authors: Ravi R. Patel, Vasudev R. Thakkar
Abstract:
Use of plant growth-promoting rhizobacteria (PGPR) to increase the production and decrees disease occurrence is a recent method in agriculture. An RA2 rhizospheric culture was isolated from peanut rhizosphere from Junagadh region of Gujarat, India and showed different direct and indirect plant growth promoting activity like indole acetic acid, gibberellic acid, siderophore, hydrogen cyanide, Ammonia and (1-Aminocyclopropane-1-Carboxylate) deaminase production, N2 fixation, phosphate and potassium solubilization in vitro. RA2 was able to protect peanut germinating seedling from A. niger infection and reduce collar rot disease incidence 60-35% to 72-41% and increase germination percentage from 70-82% to 75-97% in two varieties GG20 and GG2 of peanut. RA2 was found to induce resistance in A. hypogaea L. seedlings via induction of different defense-related enzymes like phenylalanine ammonia lyase, peroxidase, polyphenol oxidase, lipoxygenase and pathogenesis related protein like chitinase, ß – 1,3- glucanase. Jasmonic acid one of the major signaling molecules of inducing systemic resistance was also found to induced due to RA2 treatments. RA2 bacterium was also promoting peanut growth and reduce A. niger infection in pot studies. 16S rDNA sequence of RA2 showed 99 % homology to Azotobacter species.Keywords: plant growth promoting rhizobacteria, peanut, aspergillus niger, induce systemic resistance
Procedia PDF Downloads 242210 Field-Programmable Gate Array Based Tester for Protective Relay
Authors: H. Bentarzi, A. Zitouni
Abstract:
The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester
Procedia PDF Downloads 216209 Cognition and Communication Disorders Effect on Death Penalty Cases
Authors: Shameka Stanford
Abstract:
This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.Keywords: cognitive impairments, communication disorders, death penalty, executive function
Procedia PDF Downloads 156208 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia
Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki
Abstract:
Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering
Procedia PDF Downloads 160