Search results for: defense/attack strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6383

Search results for: defense/attack strategies

6143 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 226
6142 Psychodidactic Strategies to Facilitate Flow of Logical Thinking in Preparation of Academic Documents

Authors: Deni Stincer Gomez, Zuraya Monroy Nasr, Luis Pérez Alvarez

Abstract:

The preparation of academic documents such as thesis, articles and research projects is one of the requirements of the higher educational level. These documents demand the implementation of logical argumentative thinking which is experienced and executed with difficulty. To mitigate the effect of these difficulties this study designed a thesis seminar, with which the authors have seven years of experience. It is taught in a graduate program in Psychology at the National Autonomous University of Mexico. In this study the authors use the Toulmin model as a mental heuristic and for the application of a set of psychodidactic strategies that facilitate the elaboration of the plot and culmination of the thesis. The efficiency in obtaining the degree in the groups exposed to the seminar has increased by 94% compared to the 10% that existed in the generations that were not exposed to the seminar. In this article the authors will emphasize the psychodidactic strategies used. The Toulmin model alone does not guarantee the success achieved. A set of actions of a psychological nature (almost psychotherapeutic) and didactics of the teacher also seem to contribute. These are actions that derive from an understanding of the psychological, epistemological and ontogenetic obstacles and the most frequent errors in which thought tends to fall when it is demanded a logical course. The authors have grouped the strategies into three groups: 1) strategies to facilitate logical thinking, 2) strategies to strengthen the scientific self and 3) strategies to facilitate the act of writing the text. In this work the authors delve into each of them.

Keywords: psychodidactic strategies, logical thinking, academic documents, Toulmin model

Procedia PDF Downloads 179
6141 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach

Authors: Alice Sanwald, Thomas Schober

Abstract:

We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.

Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack

Procedia PDF Downloads 436
6140 When the Lights Go Down in the Delivery Room: Lessons From a Ransomware Attack

Authors: Rinat Gabbay-Benziv, Merav Ben-Natan, Ariel Roguin, Benyamine Abbou, Anna Ofir, Adi Klein, Dikla Dahan-Shriki, Mordechai Hallak, Boris Kessel, Mickey Dudkiewicz

Abstract:

Introduction: Over recent decades, technology has become integral to healthcare, with electronic health records and advanced medical equipment now standard. However, this reliance has made healthcare systems increasingly vulnerable to ransomware attacks. On October 13, 2021, Hillel Yaffe Medical Center experienced a severe ransomware attack that disrupted all IT systems, including electronic health records, laboratory services, and staff communications. The attack, carried out by the group DeepBlueMagic, utilized advanced encryption to lock the hospital's systems and demanded a ransom. This incident caused significant operational and patient care challenges, particularly impacting the obstetrics department. Objective: The objective is to describe the challenges facing the obstetric division following a cyberattack and discuss ways of preparing for and overcoming another one. Methods: A retrospective descriptive study was conducted in a mid-sized medical center. Division activities, including the number of deliveries, cesarean sections, emergency room visits, admissions, maternal-fetal medicine department occupancy, and ambulatory encounters, from 2 weeks before the attack to 8 weeks following it (a total of 11 weeks), were compared with the retrospective period in 2019 (pre-COVID-19). In addition, we present the challenges and adaptation measures taken at the division and hospital levels leading up to the resumption of full division activity. Results: On the day of the cyberattack, critical decisions were made. The media announced the event, calling on patients not to come to our hospital. Also, all elective activities other than cesarean deliveries were stopped. The number of deliveries, admissions, and both emergency room and ambulatory clinic visits decreased by 5%–10% overall for 11 weeks, reflecting the decrease in division activity. Nevertheless, in all stations, there were sufficient activities and adaptation measures to ensure patient safety, decision-making, and workflow of patients were accounted for. Conclusions: The risk of ransomware cyberattacks is growing. Healthcare systems at all levels should recognize this threat and have protocols for dealing with them once they occur.

Keywords: ransomware attack, healthcare cybersecurity, obstetrics challenges, IT system disruption

Procedia PDF Downloads 24
6139 The Correlation between Self-Regulated Learning Strategies and Reading Proficiency

Authors: Nguyen Thu Ha, Vu Viet Phuong, Do Thi Tieu Yen, Nguyen Thi Thanh Ha

Abstract:

This semi-experimental research investigated the correlation between 42 English as a foreign language (EFL) sophomores' self-regulated learning strategies (SRL) use and their reading comprehension in the Vietnamese context. The analysis from TOEIC reading tests with SPSS 25.0 indicated that there are substantial differences between the post-test reading scores between the experimental group and the control group; therefore, SRL impacts the reading comprehension of EFL participants. Contrary to the alternative hypothesis, teaching learners SRL approaches had a statistically significant influence on reading comprehension. The findings may aid educators in teaching reading comprehension as an essential skill and in using SRL to improve reading comprehension and achievement and enhance reading comprehension aids for language students and instructors. They should equip educators with a variety of instructional strategies which assist academics in preparing learners for lifetime language study and independence. Moreover, the results might encourage educators, administrators, and policymakers to capitalize on the effects of teaching SRL strategies by providing EFL teachers with preparation programs and experiences that help them improve their teaching methods and strategies, especially when teaching reading comprehension.

Keywords: correlation, reading proficiency, self-regulated learning strategies, SRL, TOEIC reading comprehension

Procedia PDF Downloads 95
6138 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 521
6137 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 197
6136 Fluid–Structure Interaction Modeling of Wind Turbines

Authors: Andre F. A. Cyrino

Abstract:

Knowing that the technological advance is the focus on the efficient extraction of energy from wind, and therefore in the design of wind turbine structures, this work aims the study of the fluid-structure interaction of an idealized wind turbine. The blade was studied as a beam attached to a cylindrical Hub with rotation axis pointing the air flow that passes through the rotor. Using the calculus of variations and the finite difference method the blade will be simulated by a discrete number of nodes and the aerodynamic forces were evaluated. The study presented here was written on Matlab and performs a numeric simulation of a simplified model of windmill containing a Hub and three blades modeled as Euler-Bernoulli beams for small strains and under the constant and uniform wind. The mathematical approach is done by Hamilton’s Extended Principle with the aerodynamic loads applied on the nodes considering the local relative wind speed, angle of attack and aerodynamic lift and drag coefficients. Due to the wide range of angles of attack, a wind turbine blade operates, the airfoil used on the model was NREL SERI S809 which allowed obtaining equations for Cl and Cd as functions of the angle of attack, based on a NASA study. Tridimensional flow effects were no taken in part, as well as torsion of the beam, which only bends. The results showed the dynamic response of the system in terms of displacement and rotational speed as the turbine reached the final speed. Although the results were not compared to real windmills or more complete models, the resulting values were consistent with the size of the system and wind speed.

Keywords: blade aerodynamics, fluid–structure interaction, wind turbine aerodynamics, wind turbine blade

Procedia PDF Downloads 268
6135 Theoretical Lens Driven Strategies for Emotional Wellbeing of Parents and Children in COVID-19 Era

Authors: Anamika Devi

Abstract:

Based on Vygotsky’s cultural, historical theory and Hedegaard’s concept of transition, this study aims to investigate to propose strategies to maintain digital wellbeing of children and parents during and post COVID pandemic. Due COVID 19 pandemic, children and families have been facing new challenges and sudden changes in their everyday life. While children are juggling to adjust themselves in new circumstance of onsite and online learning settings, parents are juggling with their work-life balance. A number of papers have identified that the COVID-19 pandemic has affected the lives of many families around the world in many ways, for example, the stress level of many parents increased, families faced financial difficulties, uncertainty impacted on long term effects on their emotional and social wellbeing. After searching and doing an intensive literature review from 2020 and 2021, this study has found some scholarly articles provided solution or strategies of reducing stress levels of parents and children in this unprecedented time. However, most of them are not underpinned by proper theoretical lens to ensure they validity and success. Therefore, this study has proposed strategies that are underpinned by theoretical lens to ensure their impact on children’s and parents' emotional wellbeing during and post COVID-19 era. The strategies will highlight on activities for positive coping strategies to the best use of family values and digital technologies.

Keywords: onsite and online learning, strategies, emotional wellbeing, tips, and strategies, COVID19

Procedia PDF Downloads 170
6134 Review and Analysis of Sustainable-Based Risk Management in Humanitarian Supply Chains

Authors: Marinko Maslaric, Maja Jokic

Abstract:

When searching for fast and long term responses, sustainable logistics and supply chain applications have developed irrefutable theories and hypotheses towards market requirements. Nevertheless, there are certain misunderstandings on how the implementation of sustainability principles (social, economical, and environmental) and concepts should work in practice, more specifically, within a humanitarian supply chain management context. This paper will focus on the review and analysis of risk management concepts in humanitarian supply chain in order to identify their compliance with sustainable principles. In this direction, the study will look for strategies that suggest: minimization of environmental impacts throughout the reduction of resources consumption, depreciation of logistics costs, including supply chain ones, minimization of transportation and service costs, elaboration of quality performance of supply chain and logistics, and reduction of supply chain delivery time. On the side of meeting all defense, trades and humanitarian logistics needs, the research will be aligned to UN Sustainable Development Goals, standards, and performances. It will start with relevant strategies for identification of risk indicators and it will end with suggestion of valuable strategic approaches for their minimization or total prevention. Finally, a content analysis will propose a suitable methodological structure for the creation of most sustainable strategy in risk management of humanitarian supply chain. Content analysis will accompany thorough, consistent and methodical approach of literature review for potential disaster risk management plan. Thereupon, the propositions of this research will look for contemporary literature gaps, with respect to operate the literature analysis and to suggest the appropriate sustained risk low master plan. The indicated is here to secure the high quality of logistics practices in hazardous events.

Keywords: humanitarian logistics, sustainability, supply chain risk, risk management plan

Procedia PDF Downloads 239
6133 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
6132 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 269
6131 Active Learning Strategies to Develop Student Skills in Information Systems for Management

Authors: Filomena Lopes, Sandra Fernandes

Abstract:

Active learning strategies are at the center of any change process aimed to improve the development of student skills. This paper aims to analyse the impact of teaching strategies, including problem-based learning (PBL), in the curricular unit of information system for management, based on students’ perceptions of how they contribute to develop the desired learning outcomes of the curricular unit. This course is part of the 1st semester and 3rd year of the graduate degree program in management at a private higher education institution in Portugal. The methodology included an online questionnaire to students (n=40). Findings from students reveal a positive impact of the teaching strategies used. In general, 35% considered that the strategies implemented in the course contributed to the development of courses’ learning objectives. Students considered PBL as the learning strategy that better contributed to enhance the courses’ learning outcomes. This conclusion brings forward the need for further reflection and discussion on the impact of student feedback on teaching and learning processes.

Keywords: higher education, active learning strategies, skills development, student assessment

Procedia PDF Downloads 60
6130 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 454
6129 A Study on How Newlyweds Handle the Difference with Parents on Wedding Arrangements and Its Implication for Services in Hong Kong

Authors: K. M. Yuen

Abstract:

This research examined the literature review of wedding preparation’s challenges and its developmental tasks of family transition under family life cycle. Five interviewees were invited to share their experiences on the differences with their parents in regard to wedding preparations and coping strategies. Some coping strategies and processes were highlighted for facilitating the family to achieve the developmental tasks during the wedding preparation. However, those coping strategies and processes may only act as the step and the behavior, while “concern towards parents” was found to be the essential element behind these behaviors. In addition to pre-marital counseling, a developmental group was suggested to develop under the framework of family life cycle and its related coping strategies on working with the newlyweds who encountered intergenerational differences in regard to their wedding preparations.

Keywords: wedding preparation, difference, parents, family life cycle, developmental tasks, coping strategies, process

Procedia PDF Downloads 339
6128 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 98
6127 Self-Leadership Characteristics of Sub-District Administrative Personnel

Authors: Panyarat Panthong

Abstract:

This research paper was conducted to examine the association between demographic, professional and social characteristics, and self-leadership of personnel who worked at Sub-District Administrative Organization Offices in Muang District, Udon Thani Province, and to identify the degree level of self-leadership of the selected samples in relation with the study variables. A total of 89 samples were collected from the 15 Sub-District Administrative Organization Offices. The paper employed both quantitative and qualitative methods using the Chi- Square and Cramer’s V statistics for the data analysis. The findings unveiled that constructive thought strategies showed a significant existence followed by behavior- focused strategies and natural reward strategies. Moreover, the research found that the respondents’ length of time working in the position and the respondents’ self- leadership presented a significant association in terms of the behavior-focused and constructive thought strategies. On the other hand, the respondents’ demographic characteristics placed no association with the level of self-leadership in behavior-focused strategies, natural reward strategies and constructive thought strategies. It is hoped that this finding will provide informative and practical guidance for the Ministry of Interior of Thailand and Department of Local Administration of the studied province.

Keywords: demographic characteristics, professional characteristics, self- leadership, social characteristics

Procedia PDF Downloads 425
6126 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 315
6125 The Effect of Static Balance Enhance by Table Tennis Training Intervening on Deaf Children

Authors: Yi-Chun Chang, Ching-Ting Hsu, Wei-Hua Ho, Yueh-Tung Kuo

Abstract:

Children with hearing impairment have deficits of balance and motors. Although most of parents teach deaf children communication skills in early life, but rarely teach the deficits of balance. The purpose of this study was to investigate whether static balance improved after table tennis training. Table tennis training was provided four times a week for eight weeks to two 12-year-old deaf children. The table tennis training included crossover footwork, sideway attack, backhand block-sideways-flutter forehand attack, and one-on-one tight training. Data were gathered weekly and statistical comparisons were made with a paired t-test. We observed that the dominant leg is better than the non-dominant leg in static balance and girl balance ability is better than boy. The final result shows that table tennis training significantly improves the deaf children’s static balance performance. It indicates that table tennis training on deaf children helps the static balance ability.

Keywords: deaf children, static balance, table tennis, vestibular structure

Procedia PDF Downloads 433
6124 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 11
6123 The AI Arena: A Framework for Distributed Multi-Agent Reinforcement Learning

Authors: Edward W. Staley, Corban G. Rivera, Ashley J. Llorens

Abstract:

Advances in reinforcement learning (RL) have resulted in recent breakthroughs in the application of artificial intelligence (AI) across many different domains. An emerging landscape of development environments is making powerful RL techniques more accessible for a growing community of researchers. However, most existing frameworks do not directly address the problem of learning in complex operating environments, such as dense urban settings or defense-related scenarios, that incorporate distributed, heterogeneous teams of agents. To help enable AI research for this important class of applications, we introduce the AI Arena: a scalable framework with flexible abstractions for distributed multi-agent reinforcement learning. The AI Arena extends the OpenAI Gym interface to allow greater flexibility in learning control policies across multiple agents with heterogeneous learning strategies and localized views of the environment. To illustrate the utility of our framework, we present experimental results that demonstrate performance gains due to a distributed multi-agent learning approach over commonly-used RL techniques in several different learning environments.

Keywords: reinforcement learning, multi-agent, deep learning, artificial intelligence

Procedia PDF Downloads 158
6122 Three Visions of a Conflict: The Case of La Araucania, Chile

Authors: Maria Barriga

Abstract:

The article focuses on the analysis of three images of the last five years that represent different visions of social groups in the context of the so call “Conflicto Mapuche” in la Araucanía, Chile. Using a multimodal social semiotic approach, we analyze the meaning making of these images and the social groups strategies to achieve visibility and recognition in political contexts. We explore the making and appropriation of symbols and concepts and analyze the different strategies that groups use to built hegemonic views. Among these strategies, we compare the use of digital technologies in design these images and the influence of Chilean Estate's vision on the Mapuche political conflict. Finally, we propose visual strategies to improve basic conditions for dialogue and recognition among these groups.

Keywords: visual culture, power, conflict, indigenous people

Procedia PDF Downloads 285
6121 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 539
6120 Unsteady 3D Post-Stall Aerodynamics Accounting for Effective Loss in Camber Due to Flow Separation

Authors: Aritras Roy, Rinku Mukherjee

Abstract:

The current study couples a quasi-steady Vortex Lattice Method and a camber correcting technique, ‘Decambering’ for unsteady post-stall flow prediction. The wake is force-free and discrete such that the wake lattices move with the free-stream once shed from the wing. It is observed that the time-averaged unsteady coefficient of lift sees a relative drop at post-stall angles of attack in comparison to its steady counterpart for some angles of attack. Multiple solutions occur at post-stall and three different algorithms to choose solutions in these regimes show both unsteadiness and non-convergence of the iterations. The distribution of coefficient of lift on the wing span also shows sawtooth. Distribution of vorticity changes both along span and in the direction of the free-stream as the wake develops over time with distinct roll-up, which increases with time.

Keywords: post-stall, unsteady, wing, aerodynamics

Procedia PDF Downloads 370
6119 EFL Vocabulary Learning Strategies among Students in Greece, Their Preferences and Internet Technology

Authors: Theodorou Kyriaki, Ypsilantis George

Abstract:

Vocabulary learning has attracted a lot of attention in recent years, contrary to the neglected part of the past. Along with the interest in finding successful vocabulary teaching strategies, many scholars focused on locating learning strategies used by language learners. As a result, more and more studies in the area of language pedagogy have been investigating the use of strategies in vocabulary learning by different types of learners. A common instrument in this field is the questionnaire, a tool of work that was enriched by questions involving current technology, and it was further implemented to a sample of 300 Greek students whose age varied from 9 and 17 years. Strategies located were grouped into the three categories of memory, cognitive, and compensatory type and associations between these dependent variables were investigated. In addition, relations between dependent and independent variables (such as age, sex, type of school, cultural background, and grade in English) were pursued to investigate the impact on strategy selection. Finally, results were compared to findings of other studies in the same field to contribute to a hypothesis of ethnic differences in strategy selection. Results initially discuss preferred strategies of all participants and further indicate that: a) technology affects strategy selection while b) differences between ethnic groups are not statistically significant. A number of successful strategies are presented, resulting from correlations of strategy selection and final school grade in English.

Keywords: acquisition of English, internet technology, research among Greek students, vocabulary learning strategies

Procedia PDF Downloads 510
6118 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 501
6117 Correlates of Coping in Individuals with Tinnitus

Authors: Antonio Oliveira, Rute F. Meneses, Nuno Trigueiros-Cunha

Abstract:

Tinnitus is commonly defined as an aberrant perception of sound without external stimulus. It is a chronic condition, with consequences on the QOL. The coping strategies used were not always effective and coping was identified as a predictor of QOL in individuals with tinnitus, which reinforces the idea that in health the use of effective coping styles should be promoted. This work intend to verify relations between coping strategies assessed by BriefCope in subjects with tinnitus and variables such as gender, age and severity of tinnitus measured by THI and the Visual Analogue Scale and also hearing and hyperacusis. The results indicate that there are any statistically significant relationships between the variables assessed in relation to the results of BriefCope except in the Visual Analogue Scale. These results, indicating no relationship between almost all variables, reinforce the need for further study of coping strategies use by these patients.

Keywords: Brief Cope, coping strategies, quality of live, THI, Tinnitus

Procedia PDF Downloads 519
6116 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete

Authors: Gashaw Abebaw

Abstract:

Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.

Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan

Procedia PDF Downloads 119
6115 Effective Strategies for Teaching English Language to Beginners in Primary Schools in Nigeria

Authors: Halima Musa Kamilu

Abstract:

This paper discusses the effective strategies for teaching English language to learners in primary schools in Nigeria. English language development is the systematic use of instructional strategies designed to promote the acquisition of English by pupils in primary schools whose primary language is not English. Learning a second language is through total immersion. These strategies support this learning method, allowing pupils to have the knowledge of English language in a pattern similar to the way they learned their native language through regular interaction with others who already know the language. The focus is on fluency and learning to speak English in a social context with native speakers. The strategies allow for effective acquisition. The paper also looked into the following areas: visuals that reinforce spoken or written words, employ gestures for added emphasis, adjusting of speech, stressing of high-frequency vocabulary words, use of fewer idioms and clarifying the meaning of words or phrases in context, stressing of participatory learning and maintaining a low anxiety level and boosting of enthusiasm. It recommended that the teacher include vocabulary words that will make the content more comprehensible to the learner.

Keywords: effective, strategies, teaching, beginners and primary schools

Procedia PDF Downloads 494
6114 Emotional Labor Strategies and Intentions to Quit among Nurses in Pakistan

Authors: Maham Malik, Amjad Ali, Muhammad Asif

Abstract:

Current study aims to examine the relationship of emotional labor strategies - deep acting and surface acting - with employees' job satisfaction, organizational commitment and intentions to quit. The study also examines the mediating role of job satisfaction and organizational commitment for relationship of emotional labor strategies with intentions to quit. Data were conveniently collected from 307 nurses by using self-administered questionnaire. Linear regression test was applied to find the relationship between the variables. Mediation was checked through Baron and Kenny Model and Sobel test. Results prove the existence of partial mediation of job satisfaction between the emotional labor strategies and quitting intentions. The study recommends that deep acting should be promoted because it is positively associated with quality of work life, work engagement and organizational citizenship behavior of employees.

Keywords: emotional labor strategies, intentions to quit, job satisfaction, organizational commitment, nursing

Procedia PDF Downloads 147