Search results for: dissertation defense
269 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 77268 No-Fee Shot for Life: Immune Defense from Covid-19, Acute Debilitation and Untimely Death through Vaccinations for Ages 60 and Above, Protection of the Elderly and Seniors
Authors: Maeah Stephanie A. Macapaz Abadejos
Abstract:
Covid-19 shook the whole world. Every person on all sides of the world was affected by the pandemic. All the nations and world leaders were searching for a variety of cures and solutions to stop the spread of the virus. In connection with this, this investigative case study aims to show a relationship between COVID-19 vaccinations to the immune system of the seniors and elderly. The seniors and elderly are one of the most vulnerable populations that show high morbidity and mortality in any illnesses and diseases. This study will show lived experiences of the senior’s immune system and health status, how it is being affected by the COVID-19 virus and its vaccines, Risk for COVID-19 Infection, Hospitalization, and Death by Age Group. Participants of this study are from 3 Cebu City Barangays and 2 from Barangays of the Cities of the Cebu Province. To conclude, this study shall serve its purpose of providing clear and concise results in strengthening the evidence of the effects of the COVID-19 virus infection, especially the free vaccinations, on the health and overall well-being of the elderly and seniors.Keywords: gerontology nursing, vaccination, protection and immunity, seniors and the elderly
Procedia PDF Downloads 32267 Protective Effect of the Standardized Extract of Holmskioldia sanguinea on Tumor Bearing Mice
Authors: Mahesh Pal, Tripti Mishra, Chandana Rao, Dalip Upreti
Abstract:
Cancer has been considered to be a very dreadful disease. Holmskioldia sanguinea is a large climbing shrub found in the Himalayas at an altitude of 5,000 ft and preliminary investigation showed the excellent yield of andrographolide and subjected for the anticancer activity. Protective effect of Holmskioldia sanguinea leaf ethanolic extract has been investigated against Ehrlich ascites carcinoma (EAC) and Daltons ascites lymphoma (DAL) in Swiss albino mice to evaluate the possible mechanism of action. The enzymatic antioxidant status was studied on tumor bearing mice, which shows the potential of the compound to possess significant free radical scavenging property and revealed significant tumor regression and prolonged survival time. The isolated bioactive molecule andrographolide from Holmskioldia sanguinea yields (2.5%) in subject to HPTLC/HPLC analysis. The cellular defense system constituting the superoxide dismutase, catalyses was enhanced whereby the lipid peroxidation content was restricted to a larger extent. The Holmskioldia sanguinea is a new source of andrographolide and demonstrated the potency in treatment of cancer.Keywords: Holmskioldia sanguinea, tumor, mice, andrographolide
Procedia PDF Downloads 264266 Effect of Silica Fume at Cellular Sprayed Concrete
Authors: Kyong-Ku Yun, Seung-Yeon Han, Kyeo-Re Lee
Abstract:
Silica fume which is a super-fine byproduct of ferrosilicon or silicon metal has a filling effect on micro-air voids or a transition zone in a hardened cement paste by appropriate mixing, placement, and curing. It, also, has a Pozzolan reaction which enhances the interior density of the hydrated cement paste through a formation of calcium silicate hydroxide. When substituting cement with silica fume, it improves water tightness and durability by filling effect and Pozzolan reaction. However, it needs high range water reducer or super-plasticizer to distribute silica fume into a concrete because of its finesses and high specific surface area. In order to distribute into concrete evenly, cement manufacturers make a pre-blended cement of silica fume and provide to a market. However, a special mixing procedures and another transportation charge another cost and this result in a high price of pre-blended cement of silica fume. The purpose of this dissertation was to investigate the dispersion of silica fume by air slurry and its effect on the mechanical properties of at ready-mixed concrete. The results are as follows: A dispersion effect of silica fume was measured from an analysis of standard deviation for compressive strength test results. It showed that the standard deviation decreased as the air bubble content increased, which means that the dispersion became better as the air bubble content increased. The test result of rapid chloride permeability test showed that permeability resistance increased as the percentages of silica fume increased, but the permeability resistance decreased as the quantity of mixing air bubble increased. The image analysis showed that a spacing factor decreased and a specific surface area increased as the quantity of mixing air bubble increased.Keywords: cellular sprayed concrete, silica fume, deviation, permeability
Procedia PDF Downloads 131265 Studying the Anti-Cancer Effects of Thymoquinone on Tumor Cells Through Natural Killer Cells Activity
Authors: Nouf A. Aldarmahi, Nesrin I. Tarbiah, Nuha A. Alkhattabi, Huda F. Alshaibi
Abstract:
Nigella sativa which is known as dark cumin is a well-known example for a widely applicable herbal medicine. Nigella sativa can be effective in a variety of diseases such as hypertension, diabetes, bronchitis, gastrointestinal upset, and cancer. The anticancer effect of Nigella sativa appeared to be mediated by immune-modulatory effect through stimulating human natural killer (NK) cells. This is a type of lymphocytes which is part of the innate immunity, also known as the first line of defense in the body against pathogens. This study investigated the effect of thymoquinone as a major component of Nigella sativa on the molecular cytotoxic pathway of NK cell and the role of thymoquinone therapeutic effect on NK cells. NK cells were cultured with breast tumor cells in different ways and cultured media was collected and the concentration of perforin, granzyme B and interferon-α were measured by ELISA. The cytotoxic effect of NK cells on breast tumor cells was enhanced in the presence of thymoquinone, with increased activity of perforin in NK cells. This improved anticancer effect of thymoquinone on breast cancer cells.Keywords: breast cancer, cancer cells, natural killer cells, thymoquinone
Procedia PDF Downloads 242264 Improvements in Transient Testing in The Transient REActor Test (TREAT) with a Choice of Filter
Authors: Harish Aryal
Abstract:
The safe and reliable operation of nuclear reactors has always been one of the topmost priorities in the nuclear industry. Transient testing allows us to understand the time-dependent behavior of the neutron population in response to either a planned change in the reactor conditions or unplanned circumstances. These unforeseen conditions might occur due to sudden reactivity insertions, feedback, power excursions, instabilities, and accidents. To study such behavior, we need transient testing, which is like car crash testing, to estimate the durability and strength of a car design. In nuclear designs, such transient testing can simulate a wide range of accidents due to sudden reactivity insertions and helps to study the feasibility and integrity of the fuel to be used in certain reactor types. This testing involves a high neutron flux environment and real-time imaging technology with advanced instrumentation with appropriate accuracy and resolution to study the fuel slumping behavior. With the aid of transient testing and adequate imaging tools, it is possible to test the safety basis for reactor and fuel designs that serves as a gateway in licensing advanced reactors in the future. To that end, it is crucial to fully understand advanced imaging techniques both analytically and via simulations. This paper presents an innovative method of supporting real-time imaging of fuel pins and other structures during transient testing. The major fuel-motion detection device that is studied in this dissertation is the Hodoscope which requires collimators. This paper provides 1) an MCNP model and simulation of a Transient Reactor Test (TREAT) core with a central fuel element replaced by a slotted fuel element that provides an open path between test samples and a hodoscope detector and 2) a choice of good filter to improve image resolution.Keywords: hodoscope, transient testing, collimators, MCNP, TREAT, hodogram, filters
Procedia PDF Downloads 77263 Effects of Starvation Stress on Antioxidant Defense System in Rainbow Trout (Oncorhynchus mykiss)
Authors: Metin Çenesi̇z, Büşra Şahi̇n
Abstract:
The sustainability of aquaculture is possible through the conscious use of resources and minimization of environmental impacts. These can be achieved through science-based planning, ecosystem-based management, strict observations and controls. The ideal water temperature for rainbow trout, which are intensively farmed in the Black Sea Region of Turkey, should be below 20 oC. In summer, the water temperature exceeds this value in some dams where production is carried out. For this reason, it has become obligatory to transfer to dams where the water temperature is low in order to provide suitable temperature conditions. There are many factors that may cause stress to trout during transportation. Some of these stress factors are starvation of the fish for a while to avoid contamination of the water, mobility and noise during transportation and loading, dissolved oxygen content and composition of the water in the transportation tanks, etc. The starvation stress caused by starvation/lack of food during transportation causes a certain amount of loss of macronutrients such as carbohydrates, proteins and fats in the tissues. This situation causes changes in metabolic activities and the energy balance of fish species. In this study, oxidant-antioxidant values and stress markers of rainbow trout starved before transplantation will be evaluated.Keywords: oncorhynchus mykiss, starvation stress, TAS, TOS
Procedia PDF Downloads 81262 The Effectiveness of Copegus (Ribavirin) Placed in a Field of Unexplored Properties of Low-Level Laser Radiation in the Treatment of Long-Covid Syndrome
Authors: Naylya Djumaeva
Abstract:
Since the end of 2019, the world has been shaken by an infection that has claimed the lives of more than six and a half million patients. Currently, SARS-CoV-2 not only causes acute damage but has long-term consequences affecting every organ and has brought a wave of a new chronic disabling condition called Long-Covid..This preliminary study describes an application of un-explored properties of low-level laser radiation with laser- light emitter in the field of which is placed Copegus (Ribavirin) with the aim of treatment of patients with Long-Covid syndrome. The difference from the traditional use of the drug is that Copegus was not prescribed to the patient by the traditional method - orally or intravenously, and the medicinal properties of the drug were introduced into the patient’s body using the un-explored properties of low-power laser radiation. Ninety eight patients with Long- Covid syndrome were observed. The obtained findings suggest that under the influence of the field formed into the laser- light emitter with a Copegus placed inside the field, the remote transfer of pharmacological properties of Сopegus occurs. Conclusions about the produced effect of exposure were made based on improvement in the condition of patients, the disappearance of complaints, and positive changes in various diagnostic tests performed by the patients. Biography: Djumaeva N completed her PhD from the Institute of Epidemiology, Microbiology and Infectious Diseases in 2000. In her dissertation work devoted to the treatment of patients with chronic hepatitis B virus infection, she presented data on the possible influence of Complex Homeopathic Preparations on the organization of bound intracellular water in the cells of the body. She is the Consultant (Neurologist) at the Scientific-Research Institute for Virology, Uzbekistan, and an expert in “medicament testing” method (30 years). She has published 43 papers, including 2 patents.Keywords: long covid, low level laser, copegus, laser- light emmiter
Procedia PDF Downloads 95261 Effect of Vesicular Arbuscular mycorrhiza on Phytoremedial Potential and Physiological Changes in Solanum melongena Plants Grown under Heavy Metal Stress
Authors: Ritu Chaturvedi, Mayank Varun, M. S. Paul
Abstract:
Heavy metal contamination of soil is a growing area of concern since the soil is the matrix that supports flora and impacts humans directly. Phytoremediation of contaminated sites is gaining popularity due to its cost effectiveness and solar driven nature. Some hyperaccumulators have been identified for their potential. Metal-accumulating plants have various mechanisms to cope up with stress and one of them is increasing antioxidative capacity. The aim of this research is to assess the effect of Vesicular arbuscular mycorrhiza (VAM) application on the phytoremedial potential of Solanum melongena (Eggplant) and level of photosynthetic pigments along with antioxidative enzymes. Results showed that VAM application increased shoot length, root proliferation pattern of plants. The level of photosynthetic pigments, proline, SOD, CAT, APX altered significantly in response to heavy metal treatment. In conclusion, VAM increased the uptake of heavy metals which lead to the activation of the defense system in plants for scavenging free radicals.Keywords: heavy metal, phytoextraction, phytostabilization, reactive oxygen species
Procedia PDF Downloads 275260 Antibacterial Potential from the Crude Extracts of Hemolymph and Hepatopancreas of Portunus segnis and Grapsus albolineatus
Authors: Mona Hajirasouli
Abstract:
Abstract: introduction: Antimicrobial compounds are important in the first line of the host defense system of many animal species. Material and methods: In the present study antibacterial activity of crude and proteins precipitate of hemolymph and crude hepatopancreas extracts from Portunus segnis and Grapsus albolineatus against a range of 6 different bacterial strains evaluated. Amoxicillin as a positive control were also used. Results: Maximum activity (15.9 mm) was recorded in male haemolymph of p.segnis against Entrobacter and minimum activity (7 mm) was recorded against Serratia marcescens, Enterobacter sp. and Proteus mirabilis from different extracts of Grapsus albolineatus. Data were analyzed using independent-t in SPSS version 16, and results indicate that there were not any significant differences between hemolymph and hepatopancreas extracts of 2 species. Discussion: Antimicrobial activity has been reported earlier in the hemolymph of some brachyuran crabs such as: blue crab Callinectes sapidus, mud crab Scylla serrata, Ocypode macrocera and Carcinus maenas. This study shows that hemolymph and hepatopancreas of Portunus segnis and Grapsus albolineatus may potential antibiotics.Keywords: brachyuran, Portunus segnis, Grapsus albolineatus, hemolymph, hepatopancreas, antibacterial
Procedia PDF Downloads 168259 Effect of Vinclozolin on Some Biochemical Parameters of Galleria mellonella (Lepidoptera: Pyralidae)
Authors: Rahile Ozturk, Esra Maltas
Abstract:
This study aimed to determine the effect of vinclozolin on some biochemical characteristics of Galleria mellonella (Lepidoptera: Pyralidae) which is an economically harmful species damaging the honeycomb in beekeeping. For experimental groups, the eggs obtained from stock were dropped into the mixed feed of vinclozolin at different doses (20, 40 and 60 ppm) and had the larvae fed with this feed. As result of the addition of vinclozolin at concentrations of 20, 40 and 60 ppm, glycogen contents of G. mellonella were determined and a significant reduction in the amount of glycogen was observed with increasing concentration of vinclozolin. In this study, activity of catalase enzyme, particularly effective in defense mechanism, activity of xanthine oxidase involved in nucleotide metabolism and activity of glucose oxidase in the metabolism of carbohydrates were measured. When compared with the results from control groups, the enzyme activities of the larvaes fed with the feed including 20, 40 and 60 ppm of vinclozolin were observed to vary or remain constant. Accordingly, glucose oxidase and catalase activities increased with the increase in amount of vinclozolin in the feed and the activity of xanthine oxidase remained stable.Keywords: Catalase, Galleria mellonella, glucose oxidase, vinclozolin, xanthine oxidase.
Procedia PDF Downloads 297258 Seismic Safety Evaluation of Weir Structures Using the Finite and Infinite Element Method
Authors: Ho Young Son, Bu Seog Ju, Woo Young Jung
Abstract:
This study presents the seismic safety evaluation of weir structure subjected to strong earthquake ground motions, as a flood defense structure in civil engineering structures. The seismic safety analysis procedure was illustrated through development of Finite Element (FE) and InFinite Element (IFE) method in ABAQUS platform. The IFE model was generated by CINPS4, 4-node linear one-way infinite model as a sold continuum infinite element in foundation areas of the weir structure and then nonlinear FE model using friction model for soil-structure interactions was applied in this study. In order to understand the complex behavior of weir structures, nonlinear time history analysis was carried out. Consequently, it was interesting to note that the compressive stress gave more vulnerability to the weir structure, in comparison to the tensile stress, during an earthquake. The stress concentration of the weir structure was shown at the connection area between the weir body and stilling basin area. The stress both tension and compression was reduced in IFE model rather than FE model of weir structures.Keywords: seismic, numerical analysis, FEM, weir, boundary condition
Procedia PDF Downloads 452257 The Role of the Injured Party's Fault in the Apportionment of Damages in Tort Law: A Comparative-Historical Study between Common Law and Islamic Law
Authors: Alireza Tavakoli Nia
Abstract:
In order to understand the role of the injured party's fault in dividing liability, we studied its historical background. In common law, the traditional contributory negligence rule was a complete defense. Then the legislature and judicial procedure modified that rule to one of apportionment. In Islamic law, too, the Action rule was at first used when the injured party was the sole cause, but jurists expanded the scope of this rule, so this rule was used in cases where both the injured party's fault and that of the other party are involved. There are some popular approaches for apportionment of damages. Some common law countries like Britain had chosen ‘the causal potency approach’ and ‘fixed apportionment’. Islamic countries like Iran have chosen both ‘the relative blameworthiness’ and ‘equal apportionment’ approaches. The article concludes that both common law and Islamic law believe in the division of responsibility between a wrongdoer claimant and the defendant. In contrast, in the apportionment of responsibility, Islamic law mostly believes in equal apportionment that is way easier and saves time and money, but common law legal systems have chosen the causal potency approach, which is more complicated than the rival approach but is fairer.Keywords: contributory negligence, tort law, damage apportionment, common law, Islamic law
Procedia PDF Downloads 147256 Impact of Dietary L-Threonine Supplementation on Performance and Health of Broiler Chickens, a Review
Authors: Mandana Hoseini
Abstract:
During last decades, intensive selection for higher growth rate in broiler chickens has accelerated daily body weight gain, which this has changed/increased the trends and amounts of nutrient requirements in the diet. As a result, considerable studies have been focused on the better determination of protein/amino acids requirements in modern broiler diets. One approach to minimize dietary crude protein inclusion levels is substitution of some of the dietary crude protein with synthetic amino acids. In addition, using synthetic forms of limiting essential amino acids in the diet could help better coincidence of dietary protein with ideal protein concept, which this in turn, minimizes nitrogen dissipation and environmental pollution. Threonine is usually considered as the third limiting amino acid in broiler diets. Recent studies have been demonstrated that dietary supplemental threonine would optimize growth performance, immune system, intestinal morphology, as well as oxidative defense in broiler chickens. In this review, threonine metabolism and its effects in relation with different aspects of broiler performance have been discussed.Keywords: immune system, intestine, performance, requirement, threonine
Procedia PDF Downloads 108255 Improvement of Cross Range Resolution in Through Wall Radar Imaging Using Bilateral Backprojection
Authors: Rashmi Yadawad, Disha Narayanan, Ravi Gautam
Abstract:
Through Wall Radar Imaging is gaining increasing importance now a days in the field of Defense and one of the most important criteria that forms the basis for the image quality obtained is the Cross-Range resolution of the image. In this research paper, the Bilateral Back projection algorithm has been implemented for Through Wall Radar Imaging. The sole purpose is to enhance the resolution in the cross range direction of the obtained Back projection image. Synthetic Data is generated for two targets which are placed at various locations in a room of dimensions 8 m by 6m. Two algorithms namely, simple back projection and Bilateral Back projection have been implemented, images are obtained and the obtained images are compared. Numerical simulations have been coded in MATLAB and experimental results of the two algorithms have been shown. Based on the comparison between the two images, it can be clearly seen that the ringing effect and chess board effect have been heavily reduced in the bilaterally back projected image and hence promising results are obtained giving a relatively sharper image with relatively well defined edges.Keywords: through wall radar imaging, bilateral back projection, cross range resolution, synthetic data
Procedia PDF Downloads 347254 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming
Authors: Meesun Sun, Yongmin Kim
Abstract:
Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost
Procedia PDF Downloads 139253 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 185252 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy
Authors: Lingaraju Dumpala, Narasa Raju Gosangi
Abstract:
Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA
Procedia PDF Downloads 133251 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law
Authors: Gashaw Sisay Zenebe
Abstract:
Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL
Procedia PDF Downloads 71250 The Role of Named Entity Recognition for Information Extraction
Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov
Abstract:
Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area
Procedia PDF Downloads 81249 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 393248 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184247 Characterization and Predictors of Paranoid Ideation in Youths
Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto
Abstract:
Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness
Procedia PDF Downloads 500246 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 211245 An Interactive Online Academic Writing Resource for Research Students in Engineering
Authors: Eleanor K. P. Kwan
Abstract:
English academic writing, it has been argued, is an acquired language even for English speakers. For research students whose English is not their first language, however, the acquisition process is often more challenging. Instead of hoping that students would acquire the conventions themselves through extensive reading, there is a need for the explicit teaching of linguistic conventions in academic writing, as explicit teaching could help students to be more aware of the different generic conventions in different disciplines in science. This paper presents an interuniversity effort to develop an online academic writing resource for research students in five subdisciplines in engineering, upon the completion of the needs analysis which indicates that students and faculty members are more concerned about students’ ability to organize an extended text than about grammatical accuracy per se. In particular, this paper focuses on the materials developed for thesis writing (also called dissertation writing in some tertiary institutions), as theses form an essential graduation requirement for all research students and this genre is also expected to demonstrate the writer’s competence in research and contributions to the research community. Drawing on Swalesian move analysis of research articles, this online resource includes authentic materials written by students and faculty members from the participating institutes. Highlight will be given to several aspects and challenges of developing this online resource. First, as the online resource aims at moving beyond providing instructions on academic writing, a range of interactive activities need to be designed to engage the users, which is one feature which differentiates this online resource from other equally informative websites on academic writing. Second, it will also include discussion on divergent textual practices in different subdisciplines, which help to illustrate different practices among these subdisciplines. Third, since theses, probably one of the most extended texts a research student will complete, require effective use of signposting devices to facility readers’ understanding, this online resource will also provide both explanation and activities on different components that contribute to text coherence. Finally results from piloting will also be included to shed light on the effectiveness of the materials, which could be useful for future development.Keywords: academic writing, English for academic purposes, online language learning materials, scientific writing
Procedia PDF Downloads 269244 Prison Pipeline or College Pathways: Transforming the Urban Classroom
Authors: Marcia J. Watson
Abstract:
The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.Keywords: college access, higher education, school-to-prison pipeline, urban education reform
Procedia PDF Downloads 537243 Fiduciary in Theory and Practice: The Perspective of the Allodial Rights Holders of Customary Land in Ghana
Authors: Kwasi Sarfo, Bernard Okoampah Otu
Abstract:
The 1992 constitution of the Republic of Ghana recognises the authority and roles of traditional leaders and considers them as being entrusted with fiduciary responsibility over land in their respective territories. The new land act, Act 1036 of 2020, in buttressing the fiduciary role of traditional leaders in land matters, inserted the traditional leaders’ accountability clause. Many traditional leaders have expressed their misgivings about the insertion of this clause. Therefore, there appears to be a misunderstanding of the concept of fiduciary in land management in Ghana. The objective of this study is to examine the concept of fiduciary in respect of allodial rights holders in land management and administration and how this concept is perceived and applied by traditional leaders. The study seeks to provide insights into the discrepancy between fiduciary theory and its practical implementation in Ghana. The study is based on a qualitative empirical research approach and adopts in-depth interviews as a primary method of data collection. The study also adopts the theory of New Institutionalism of social anthropology in analysing and interpreting the findings. The data for this study was collected over a period of one year, from July 2022 to July 2023, as part of one of the author's PhD dissertation. The collected data were carefully analysed using the principles of thematic analysis, identifying key themes and patterns. This study does not seek to pursue the discussions from a legal standpoint but from a social anthropological perspective and argues that the concept of fiduciary in theory is far different from what pertains in practice and that traditional leaders’ assumptions and application of this concept contribute to the alienation of customary and communal land at the expense of their subjects. This study deepens our understanding of the continuous expropriation of communal landholders in many rural communities in Africa in the era of global land grabbing, which worsens their poverty levels. It also explains further the theory of new institutionalism of social anthropology by highlighting how the theory manifests in practice in the case of Ghana.Keywords: fiduciary, customary land tenure, allodial rights, land alienation, communal land, Ghana
Procedia PDF Downloads 71242 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications
Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav
Abstract:
Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)
Procedia PDF Downloads 288241 Cultural Adaptation of Foreign Students in Vienna, A Sociolinguistic Case Study of Iranian Students in Vienna
Authors: Roshanak Nouralian
Abstract:
The primary focus of my Ph.D. dissertation revolves around the interconnection between language and culture, as well as the crucial role that language plays in facilitating communication and fostering integration within the host society for immigrants. This research specifically focuses on Iranian students studying at various universities in Vienna. Throughout this study, I have attempted to examine and analyze their challenges in various life situations in Austria. The broad dimensions of the research question led the research process to apply a constructivist grounded theory strategy. I have also used critical discourse analysis that is in line with constructivist GT's point of view to look closely at the borders, contradictions, and inequalities that came up in the participants' real-life experiences. Data from individual interviews and group discussions have expanded the research trajectory beyond disciplinary boundaries toward a transdisciplinary approach. The research findings indicate how the language policy of the host society leads to the establishment of power relationships and the arousal of a sense of cultural dominance among the research participants. This study investigates the problems experienced by participants in their daily interactions within the host society. Additionally, the results illustrate the development of a dependency relationship between participants and their host society despite linguistic policies that cause a sense of cultural hegemony. Conversely, the obtained data allowed me to examine the participants' language ideologies. The findings of this study show that social linguistics has the potential to go beyond the boundaries of its field. This is possible by using a variety of research strategies and analyzing people's real-life experiences to find out how language affects different parts of their daily lives. Therefore, in this conference, discussing the logic of employing a constructivist GT strategy along with critical discourse analysis (CDA) in this research, I intend to discuss the achieved results.Keywords: cultural adapttaion, language policy, language ideology, cultural hegemony, transdisciplinary research, constructivist grounded theory, critical discourse analysis
Procedia PDF Downloads 65240 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm
Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap
Abstract:
The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.Keywords: beta defensin 3, bos taurus, docking, homology modeling
Procedia PDF Downloads 291