Search results for: man in middle attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2219

Search results for: man in middle attack

1979 Nutritional Status of Middle School Students and Their Selected Eating Behaviours

Authors: K. Larysz, E. Grochowska-Niedworok, M. Kardas, K. Brukalo, B. Calyniuk, R. Polaniak

Abstract:

Eating behaviours and habits are one of the main factors affecting health. Abnormal nutritional status is a growing problem related to nutritional errors. The number of adolescents presenting excess body weight is also rising. The body's demand for all nutrients increases in the period of intensive development, i.e., during puberty. A varied, well-balanced diet and elimination of unhealthy habits are two of the key factors that contribute to the proper development of a young body. The aim of the study was to assess the nutritional status and selected eating behaviours/habits in adolescents attending middle school. An original questionnaire including 24 questions was conducted. A total of 401 correctly completed questionnaires were qualified for the assessment. Body mass index (BMI) was calculated. Furthermore, the frequency of breakfast consumption, the number of meals per day, types of snacks and sweetened beverages, as well as the frequency of consuming fruit and vegetables, dairy products and fast-foods were assessed. The obtained results were analysed statistically. The study showed that malnutrition was more of a problem than overweight or obesity among middle school students. More than 71% of middle school students have breakfast, whereas almost 30% of adolescents skip this meal. Up to 57.6% of respondents most often consume sweets at school. A total of 37% of adolescents consume sweetened beverages daily or almost every day. Most of the respondents consume an optimal number of meals daily. Only 24.7% of respondents consume fruit and vegetables more than once daily. The majority of respondents (49.40%) declared that they consumed fast food several times a month. Satisfactory frequency of consuming dairy products was reported by 32.7% of middle school students. Conclusions of our study: 1. Malnutrition is more of a problem than overweight or obesity among middle school students. They consume excessive amounts of sweets, sweetened beverages, and fast foods. 2. The consumption of fruit and vegetables was too low in the study group. The intake of dairy products was also low in some cases. 3. A statistically significant correlation was found between the frequency of fast food consumption and the intake of sweetened beverages. A low correlation was found between nutritional status and the number of meals per day. The number of meals consumed by these individuals decreased with increasing nutritional status.

Keywords: adolescent, malnutrition, nutrition, nutritional status, obesity

Procedia PDF Downloads 135
1978 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense

Authors: Brian Connett, Bryan O'Halloran

Abstract:

Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.

Keywords: critical infrastructure, cyber physical systems, modeling, exploitation

Procedia PDF Downloads 192
1977 Health Information Technology in Developing Countries: A Structured Literature Review with Reference to the Case of Libya

Authors: Haythem A. Nakkas, Philip J. Scott, Jim S. Briggs

Abstract:

This paper reports a structured literature review of the application of Health Information Technology in developing countries, defined as the World Bank categories Low-income countries, Lower-middle-income, and Upper-middle-income countries. The aim was to identify and classify the various applications of health information technology to assess its current state in developing countries and explore potential areas of research. We offer specific analysis and application of HIT in Libya as one of the developing countries. Method: A structured literature review was conducted using the following online databases: IEEE, Science Direct, PubMed, and Google Scholar. Publication dates were set for 2000-2013. For the PubMed search, publications in English, French, and Arabic were specified. Using a content analysis approach, 159 papers were analyzed and a total number of 26 factors were identified that affect the adoption of health information technology. Results: Of the 2681 retrieved articles, 159 met the inclusion criteria which were carefully analyzed and classified. Conclusion: The implementation of health information technology across developing countries is varied. Whilst it was initially expected financial constraints would have severely limited health information technology implementation, some developing countries like India have nevertheless dominated the literature and taken the lead in conducting scientific research. Comparing the number of studies to the number of countries in each category, we found that Low-income countries and Lower-middle-income had more studies carried out than Upper-middle-income countries. However, whilst IT has been used in various sectors of the economy, the healthcare sector in developing countries is still failing to benefit fully from the potential advantages that IT can offer.

Keywords: developing countries, developed countries, factors, failure, health information technology, implementation, libya, success

Procedia PDF Downloads 359
1976 Investigating the Role of Algerian Middle School Teachers in Enhancing Academic Self-Regulation: A Key towards Teaching How to Learn

Authors: Houda Zouar, Hanane Sarnou

Abstract:

In the 21st, century the concept of learners' autonomy is crucial. The concept of self-regulated learning has come forward as a result of enabling learners to direct their learning with autonomy towards academic goals achievement. Academic self-regulation is defined as the process by which learners systematically plan, monitor and asses their learning to achieve their academic established goals. In the field of English as a foreign language, teachers emphasise the role of learners’ autonomy to foster the process of English language learning. Consequently, academic self-regulation is considered as a vehicle to enhance autonomy among English language learners. However, not all learners can be equally self-regulators if not well assisted, mainly those novice pupils of basic education. For this matter, understanding the role of teachers in fostering academic self- regulation must be among the preliminary objectives in searching and developing this area. The present research work targets the role of the Algerian middle school teachers in enhancing academic self-regulation and teaching pupils how to learn, besides their role as models in the trajectory of teaching their pupils to become self-regulators. Despite the considerable endeavours in the field of educational setting on Self-Regulated Learning, the literature of the Algerian context indicates confined endeavours to undertake and divulge this notion. To go deeper into this study, a mixed method approach was employed to confirm our hypothesis. For data collection, teachers were observed and addressed by a questionnaire on their role in enhancing academic self- regulation among their pupils. The result of the research indicates that the attempts of middle school Algerian teachers are implicit and limited. This study emphasises the need to prepare English language teachers with the necessary skills to promote autonomous and self-regulator English learners.

Keywords: Algeria, English as a foreign language, middle school, self-regulation, Teachers' role

Procedia PDF Downloads 147
1975 Studying the Effects of Economic and Financial Development as Well as Institutional Quality on Environmental Destruction in the Upper-Middle Income Countries

Authors: Morteza Raei Dehaghi, Seyed Mohammad Mirhashemi

Abstract:

The current study explored the effect of economic development, financial development and institutional quality on environmental destruction in upper-middle income countries during the time period of 1999-2011. The dependent variable is logarithm of carbon dioxide emissions that can be considered as an index for destruction or quality of the environment given to its effects on the environment. Financial development and institutional development variables as well as some control variables were considered. In order to study cross-sectional correlation among the countries under study, Pesaran and Friz test was used. Since the results of both tests show cross-sectional correlation in the countries under study, seemingly unrelated regression method was utilized for model estimation. The results disclosed that Kuznets’ environmental curve hypothesis is confirmed in upper-middle income countries and also, financial development and institutional quality have a significant effect on environmental quality. The results of this study can be considered by policy makers in countries with different income groups to have access to a growth accompanied by improved environmental quality.

Keywords: economic development, environmental destruction, financial development, institutional development, seemingly unrelated regression

Procedia PDF Downloads 347
1974 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
1973 Assessment of Hygroscopic Characteristics of Hevea brasiliensis Wood

Authors: John Tosin Aladejana

Abstract:

Wood behave differently under different environmental conditions. The knowledge of the hygroscopic nature of wood becomes a key factor in selecting wood for use and required treatment. This study assessed the hygroscopic behaviour of Hevea brasiliensis (Rubber) wood. Void volume, volumetric swelling in the tangential, radial and longitudinal directions and volumetric shrinkage were used to assess the response of the wood when loosing or taking up moisture. Hevea brasiliensis wood samples cut into 20 × 20 × 60 mm taken longitudinally and transversely were used for the study and dried in the oven at 103 ± 2⁰C. The mean values for moisture content in green Hevea brasiliensis wood were 49.74 %, 51.14 % and 54.36 % for top, middle and bottom portion respectively while 51.77 %, 50.02 % and 53.45 % were recorded for outer, middle and inner portions respectively for the tree. The values obtained for volumetric shrinkage and swelling indicated that shrinkage and swelling were higher at the top part of H. brasiliensis. It was also observed that the longitudinal shrinkage was negligible while tangential direction showed the highest shrinkage among the wood direction. The values of the void volume obtained were 43.0 %, 39.0 % and 38.0 % at the top, middle and bottom respectively. The result obtained showed clarification on the wood density of hevea brasiliensis based on the position and portion of the wood species and the variation in moisture content, void volume, volumetric shrinkage and swelling were also revealed. This will provide information in the process of drying hevea brasiliensis wood to ensure better wood quality devoid of defects.

Keywords: moisture content, shrinkage, swelling, void volume

Procedia PDF Downloads 274
1972 Experience Marketing and Behavioral Intentions: An Exploratory Study Applied to Middle-Aged and Senior Pickleball Participated in Taiwan

Authors: Yi Yau, Chia-Huei Hsiao

Abstract:

The elderly society is already a problem of globalization, and Taiwan will enter a super-aged society in 2025. Therefore, how to improve the health of the elderly and reduce the government's social burden is an important issue at present. Exercise is the best medical care, and it is also a healthy activity for people to live a healthy life. Facing the super-aged society in the future, it is necessary to attract them to participate in sports voluntarily through sports promotion so that they can live healthy and independent lives and continue to participate in society to enhance the well-being of the elderly. Experiential marketing and sports participation are closely related. In the past, it was mainly aimed at consumer behavior at the commercial level. At present, there are not many study objects focusing on participant behavior and middle-aged and elderly people. Therefore, this study takes the news emerged sport-Pickleball that has been loved by silver-haired people in recent years as the research sport. It uses questionnaire surveys and intentional sampling methods. The purpose of the group is to understand the middle-aged and elderly people’s experience and behavior patterns of Pickleball, explore the relationship between experiential marketing and participants' intentional behaviors, and predict which aspects of experiential marketing will affect their intentional behaviors. The findings showed that experience marketing is highly positively correlated with behavioral intentions, and experience marketing has a positive predictive power for behavioral intentions. Among them, "ACT" and "SENSE" are predictive variables that effectively predict behavioral intentions. This study proves the feasibility of pickleball for middle-aged and senior sports. It is recommended that in the future curriculum planning, try to simplify the exercise steps, increase the chances of contact with the sphere, and enhance the sensory experience to enhance the sense of success during exercise, and then generate exercise motivation, and ultimately change the exercise mode or habits and promote health.

Keywords: newly emerged sports, middle age and elderly, health promotion, ACT, SENSE

Procedia PDF Downloads 156
1971 The Use of a Geographical Information System in the Field of Irrigation (Moyen-Chéliff)

Authors: Benhenni Abdellaziz

Abstract:

Irrigation is a limiting factor for agricultural production and socio-economic development of many countries in arid and semiarid in the world. However, the sustainability of irrigation systems requires a rational management of the water resource that is becoming increasingly rare in these regions. The objective of this work is to apply a geographic information system (GIS) coupled to a model for calculating crop water requirements (CROPWATER) for the management of irrigation water in irrigated area and offer managers with an effective tool to better manage water resources in these areas. The application area of GIS is the irrigated perimeter of Western Middle Cheliff which is located in a semi-arid region (Middle Cheliff). The scope in question is a considerable agrarian dynamics and an increased need for irrigation of most crops.

Keywords: geographical information, irrigation, economical, use rational

Procedia PDF Downloads 243
1970 Silent Struggles: Unveiling Linguistic Insights into Poverty in Ancient Egypt

Authors: Hossam Mohammed Abdelfattah

Abstract:

In ancient Egypt, poverty, recognized as the foremost challenge, was extensively addressed in teachings, wisdom, and literary texts. These sources vividly depicted the suffering of a class deprived of life's pleasures. The ancient Egyptian language evolved to introduce terms reflecting poverty and hunger, underscoring the society's commitment to acknowledging and cautioning against this prevalent issue. Among the notable expressions, iwty.f emerged during the Middle Kingdom, symbolizing "the one without property" and signifying the destitute poor. iwty n.f traced back to the Pyramid Texts era, referred to "the one who has nothing" or simply, the poor. Another term, , iwty-sw emphasized the state of possessing nothing. rA-awy originating in the Middle Kingdom Period, initially meant "poverty and poor," expanding to signify poverty in various texts with the addition of the preposition "in," conveying strength given to the poor. During the First Intermediate Period, sny - mnt denoted going through a crisis or suffering, possibly referencing a widespread disease or plague. It encompassed meanings of sickness, pain, and anguish. The term .” sq-sn introduced in Middle Kingdom texts, conveyed the notion of becoming miserable. sp-Xsy . represented a temporal expression reflecting a period of misery or poverty, with Xsy ,indicating distress or misery. The term qsnt appearing in Middle Kingdom texts, held meanings of painful, difficult, harsh, miserable, emaciated, and in bad condition. Its feminine form, qsn denoted anxiety and turmoil. Finally, tp-qsn encapsulated the essence of misery and unhappiness. In essence, these expressions provide linguistic insights into the multifaceted experience of poverty in ancient Egypt, illustrating the society's keen awareness and efforts to address this pervasive challenge.

Keywords: poverty, poor, suffering, misery, painful, ancient Egypt

Procedia PDF Downloads 53
1969 Interaction of the Circumferential Lamb Wave with Delamination in the Middle of Pipe Wall

Authors: Li Ziming, He Cunfu, Liu Zenghua

Abstract:

With aim for delamination type defects detection in manufacturing process of seamless pipe,this paper studies the interaction of the circumferential lamb wave with delamination in aluminum pipe.The delamination is located in the middle of pipe wall.A numerical study is carried out,the circumferential lamb wave used here is CL0 mode,which is generated with a finite element method code.Wave structures from the simulation are compared with theoretical results to verify the model’s accuracy.Delamination along the circumferential direction is established by demerging nodes of the same coordinates.When CL0 mode is incident at the entrance and exit of a delamination,it generates new mode-CL1,undergoes multiple reverberation and mode conversions between the two ends of the delamination. Signals of different receptions are obtained to provide insight in using CL0 mode for locating the delamination.

Keywords: circumferential lamb wave, delamination, FEM, seamless pipe

Procedia PDF Downloads 312
1968 Problems of Water Resources : Vulnerability to Climate Change, Modeling with Software WEAP 21 (Upper and Middle Cheliff)

Authors: Mehaiguene Madjid, Meddi Mohamed

Abstract:

The results of applying the model WEAP 21 or 'Water Evaluation and Planning System' in Upper and Middle Cheliff are presented in cartographic and graphic forms by considering two scenarios: -Reference scenario 1961-1990, -Climate change scenarios (low and high) for 2020 and 2050. These scenarios are presented together in the results and compared them to know the impact on aquatic systems and water resources. For the low scenario for 2050, a decrease in the rate of runoff / infiltration will be 81.4 to 3.7 Hm3 between 2010 and 2050. While for the high scenario for 2050, the reduction will be 87.2 to 78.9 Hm3 between 2010 and 2050. Comparing the two scenarios, shows that the water supplied will increase by 216.7 Hm3 to 596 Hm3 up to 2050 if we do not take account of climate change. Whereas, if climate change will decrease step by step: from 2010 to 2026: for the climate change scenario (high scenario) by 2050, water supplied from 346 Hm3 to 361 Hm3. That of the reference scenario (1961-1990) will increase to 379.7 Hm3 in 2050. This is caused by the increased demand (increased population, irrigated area, etc ). The balance water management basin is positive for the different Horizons and different situations. If we do not take account of climate change will be the outflow of 5881.4 Hm3. This excess at the basin can be used as part of a transfer for example.

Keywords: balance water, management basin, climate change scenario, Upper and Middle Cheliff

Procedia PDF Downloads 312
1967 Identifying the Malaysian Perception on the Self-Build Home Concept: Provision of Affordable Housing for MIG

Authors: N. M. Tawil, A. R. Musa, A. I Che-Ani, H. Basri

Abstract:

It is known that rising of house prices recently has affected the home ownership, especially for the future. Hence to overcome the rose of housing prices, the self-build home or DIY concept is perceived as one of the solution. This concept is proposed to be implemented for the future housing design as a strategy in helping the government to provide affordable housing, especially for middle income group to own a landed housing property. This concept is expected to offer a lower housing price for middle-income buyers and provide an opportunity for buyers to design their dream’s home with the self-build home or 'Do It Yourself' (DIY) concept. In order to implement this concept as affordable housing for MIG, the public perceptions and acceptances on the self-build home/ DIY concept itself should be identified. To achieve this aim this study was conducted by using 2 method namely literature review and questionnaire survey. The questionnaire survey was distributed to 200 respondents randomly in Lembah Klang and were analysed through the SPSS program. The results show that respondents are very interested in buying a home that they can have with the appropriate size of the home. Average of them known about Do It Yourself (DIY) concept but none of respondent have implement this concept. Most of respondents were agreed that this DIY method suitable to be implemented in the housing industry in Malaysia and they were agreed that this concept can offer a cheaper housing price because the construction costs were reduced. Moreover by providing a basic home the owner can renovate their home according to their need and financial capability.

Keywords: affordable housing, Do It Yourself, self-Built home, perception, middle income group

Procedia PDF Downloads 414
1966 Experimental Investigation of Boundary Layer Transition on Rotating Cones in Axial Flow in 0 and 35 Degrees Angle of Attack

Authors: Ali Kargar, Kamyar Mansour

Abstract:

In this paper, experimental results of using hot wire anemometer and smoke visualization are presented. The results obtained on the hot wire anemometer for critical Reynolds number and transitional Reynolds number are compared by previous results. Excellent agreement is found for the transitional Reynolds number. The results for the transitional Reynolds number are also compared by previous linear stability results. The results of the smoke visualization clearly show the cross flow vortices which arise in the transition process from a laminar to a turbulent flow. A non-zero angle of attack is also considered. We compare our results by linear stability theory which was done by Garret et. Al (2007). We just emphasis, Also the visualization and hot wire anemometer results have been compared graphically. The goal in this paper is to check reliability of using hot wire anemometer and smoke visualization in transition problems and check reliability of linear stability theory for this case and compare our results with some trusty experimental works.

Keywords: transitional reynolds number, wind tunnel, rotating cone, smoke visualization

Procedia PDF Downloads 307
1965 Parent and Child Body Dissatisfaction: The Roles of Implicit Behavior and Child Gender in Middle Childhood

Authors: Vivienne Langhorne, Helen Sharpe

Abstract:

Body dissatisfaction begins developing in middle childhood, with wide-ranging implications for mental health and well-being. Previous research on parent behavior has focused on the role of explicit parent behaviors in adolescent and young adult body dissatisfaction, leaving a gap in understanding how implicit parent behaviors relate to body dissatisfaction in childhood. The current study investigated how implicit parent behavior (such as modeling own body dissatisfaction and dieting) relates to parent and child body dissatisfaction. It was hypothesized that implicit behavior would be directly related to parent and child body dissatisfaction and mediate the relationship between the two. Furthermore, this study aimed to examine child gender as a potential moderator in this mediation, as research shows that boys and girls experience body dissatisfaction differently. This study analyzed survey responses on parent body dissatisfaction, implicit behavior, and child body dissatisfaction measures from a sample of 166 parent-child dyads with children between the ages of 6 to 9 years old. Regression analyses revealed that parent body dissatisfaction is related to both parent-implicit behavior and child body dissatisfaction. However, implicit behavior did not mediate the relationship between the two body dissatisfaction variables. Additionally, the results of moderated mediation indicated there were no child gender differences in the strength of the association between parental implicit behaviors and child body dissatisfaction. These findings highlight the need for further research into the mechanisms behind parent and child body dissatisfaction to better understand the process through which intergenerational transmission occurs.

Keywords: body dissatisfaction, implicit behaviour, middle childhood, parenting

Procedia PDF Downloads 62
1964 US Foreign Aids and Its Institutional and Non-Institutional Impacts in the Middle East, Africa, Southeast Asia, and Latin America (2000 - 2020)

Authors: Mahdi Fakheri, Mohammad Mohsen Mahdizadeh Naeini

Abstract:

This paper addresses an understudied aspect of U.S. foreign aids between the years 2000 and 2020. Despite a growing body of literature on the impacts of U.S. aids, the question about how the United States uses its foreign aids to change developing countries has remained unanswered. As foreign aid is a tool of the United States' foreign policy, answering this very question can reveal the future that the U.S. prefers for developing countries and that secures its national interest. This paper will explore USAID's official dataset, which includes the data of foreign aids to the Middle East, Africa, Latin America, and Southeast Asia from 2000 to 2020. Through an empirical analysis, this paper argues that the focus of U.S. foreign aid is evenly divided between institutional and non-institutional (i.e., slight enhancement of status quo) changes. The former is induced by training and education, funding the initiatives and projects, making capacity and increasing the efficiency of human, operational, and management sectors, and enhancing the living condition of the people. Moreover, it will be demonstrated that the political, military, cultural, economic, and judicial are some of the institutions that the U.S. has planned to change in the aforementioned period and regions.

Keywords: USAID, foreign aid, development, developing countries, Middle East, Africa, Southeast Asia, Latin America

Procedia PDF Downloads 189
1963 Life Table and Functional Response of Scolothrips takahashii (Thysanoptera: Thripidae) on Tetranychus urticae (Acari:Tetranychidae)

Authors: Kuang-Chi Pan, Shu-Jen Tuan

Abstract:

Scolothrips takahashii Priesner (Thysanoptera: Thripidae) is a common predatory thrips which feeds on spider mites; it is considered an important natural enemy and a potential biological control agent against spider mites. In order to evaluate the efficacy of S. takahashii against tetranychid mites, life table and functional response study were conducted at 25±1°C, with Tetranychus urticae Priesner as prey. The intrinsic rate of increase (r), finite rate of increase (λ), net reproduction rate (R₀), mean generation time (T) were 0.1674 d⁻¹, 1.1822d⁻¹, 62.26 offspring/individual, and 24.68d. The net consumption rate (C₀) was 846.15, mean daily consumption rate was 51.92 eggs for females and 19.28 eggs for males. S. takahashii exhibited type III functional response when offered T. urticae deutonymphs. Based on the random predator equation, the estimated maximum attack rate (a) and handling time (Th) were 0.1376h⁻¹ and 0.7883h. In addition, a life table experiment was conducted to evaluate the offspring sex allocation and population dynamic of Tetranychus ludeni Zacher under group-rearing conditions with different sex ratios. All bisexual groups produced offspring with similar sex allocation patterns, which started with the majority of females, then transited during the middle of the oviposition period and turned male-biased at the end of the oviposition period.

Keywords: Scolothrips takahashii, Tetranychus urticae, Tetranychus ludeni, two-sex life table, functional response, sex allocation

Procedia PDF Downloads 90
1962 Trajectories of PTSD from 2-3 Years to 5-6 Years among Asian Americans after the World Trade Center Attack

Authors: Winnie Kung, Xinhua Liu, Debbie Huang, Patricia Kim, Keon Kim, Xiaoran Wang, Lawrence Yang

Abstract:

Considerable Asian Americans were exposed to the World Trade Center attack due to the proximity of the site to Chinatown and a sizeable number of South Asians working in the collapsed and damaged buildings nearby. Few studies focused on Asians in examining the disaster’s mental health impact, and even less longitudinal studies were reported beyond the first couple of years after the event. Based on the World Trade Center Health Registry, this study examined the trajectory of PTSD of individuals directly exposed to the attack from 2-3 to 5-6 years after the attack, comparing Asians against the non-Hispanic White group. Participants included 2,431 Asians and 31,455 Whites. Trajectories were delineated into the resilient, chronic, delayed-onset and remitted groups using PTSD checklist cut-off score at 44 at the 2 waves. Logistic regression analyses were conducted to compare the poorer trajectories against the resilient as a reference group, using predictors of baseline sociodemographic, exposure to the disaster, lower respiratory symptoms and previous depression/anxiety disorder diagnosis, and recruitment source as the control variable. Asians had significant lower socioeconomic status in terms of income, education and employment status compared to Whites. Over 3/4 of participants from both races were resilient, though slightly less for Asians than Whites (76.5% vs 79.8%). Asians had a higher proportion with chronic PTSD (8.6% vs 7.4%) and remission (5.9% vs 3.4%) than Whites. A considerable proportion of participants had delayed-onset in both races (9.1% Asians vs 9.4% Whites). The distribution of trajectories differed significantly by race (p<0.0001) with Asians faring poorer. For Asians, in the chronic vs resilient group, significant protective factors included age >65, annual household income >$50,000, and never married vs married/cohabiting; risk factors were direct disaster exposure, job loss due to 9/11, lost someone, and tangible loss; lower respiratory symptoms and previous mental disorder diagnoses. Similar protective and risk factors were noted for the delayed-onset group, except education being protective; and being an immigrant a risk. Between the 2 comparisons, the chronic group was more vulnerable than the delayed-onset as expected. It should also be noted that in both comparisons, Asians’ current employment status had no significant impact on their PTSD trajectory. Comparing between Asians against Whites, the direction of the relationships between the predictors and the PTSD trajectories were mostly the same, although more factors were significant for Whites than for Asians. A few factors showed significant racial difference: Higher risk for lower respiratory symptoms for Whites than Asians, higher risk for pre-9/11 mental disorder diagnosis for Asians than Whites, and immigrant a risk factor for the remitted vs resilient groups for Whites but not for Asians. Over 17% Asians still suffered from PTSD 5-6 years after the WTC attack signified its persistent impact which incurred substantial human, social and economic costs. The more disadvantaged socioeconomic status of Asians rendered them more vulnerable in their mental health trajectories relative to Whites. Together with their well-documented low tendency to seek mental health help, outreach effort to this population is needed to ensure follow-up treatment and prevention.

Keywords: PTSD, Asian Americans, World Trade Center Attack, racial differences

Procedia PDF Downloads 264
1961 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register

Authors: K. K. Soundra Pandian, Bhupendra Gupta

Abstract:

In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.

Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher

Procedia PDF Downloads 250
1960 Silent Myocardial Infarction Presented with Homonymous Hemianopia in a Non-Diabetic Middle Aged Man

Authors: Seyed Fakhroddin Hejazi, Mohammad Saleh Sadeghi, Leili Iranirad

Abstract:

Silent myocardial infarction is defined as the appearance of pathological Q waves in the electrocardiogram, without objective signs of myocardial infarction and any minimal or atypical symptoms. Although this condition has been known for a long time, but little is known about its phenomenon and the mechanisms of it remain unclear. Its coincidence with stroke is also still controversial. This case report introduces a middle-aged man with silent myocardial infarction presented with homonymous hemianopia, which except stage 1 hypertension, had no other major cardiovascular risk factors including diabetes mellitus, hypercholesterolemia, family history of cardiac diseases and smoking. In conclusion, this case report indicated that existence of only one cardiovascular risk factor would lead to the development of MI or stroke.

Keywords: silent myocardial infarction, homonymous hemianopia, stroke, hypertension

Procedia PDF Downloads 288
1959 Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations

Authors: Marisa Galiza Filipe

Abstract:

In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war.

Keywords: espionage, Azores, WWI, neutrality

Procedia PDF Downloads 66
1958 Studies on Race Car Aerodynamics at Wing in Ground Effect

Authors: Dharni Vasudhevan Venkatesan, K. E. Shanjay, H. Sujith Kumar, N. A. Abhilash, D. Aswin Ram, V. R. Sanal Kumar

Abstract:

Numerical studies on race car aerodynamics at wing in ground effect have been carried out using a steady 3d, double precision, pressure-based, and standard k-epsilon turbulence model. Through various parametric analytical studies we have observed that at a particular speed and ground clearance of the wings a favorable negative lift was found high at a particular angle of attack for all the physical models considered in this paper. The fact is that if the ground clearance height to chord length (h/c) is too small, the developing boundary layers from either side (the ground and the lower surface of the wing) can interact, leading to an altered variation of the aerodynamic characteristics at wing in ground effect. Therefore a suitable ground clearance must be predicted throughout the racing for a better performance of the race car, which obviously depends upon the coupled effects of the topography, wing orientation with respect to the ground, the incoming flow features and/or the race car speed. We have concluded that for the design of high performance and high speed race cars the adjustable wings capable to alter the ground clearance and the angles of attack is the best design option for any race car for racing safely with variable speeds.

Keywords: external aerodynamics, external flow choking, race car aerodynamics, wing in ground effect

Procedia PDF Downloads 356
1957 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 108
1956 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 408
1955 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"

Authors: Hossam Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: conservation, heritage, identity, urban conservation methodology,

Procedia PDF Downloads 393
1954 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 73
1953 Design and Emotion: The Value of 1970s French Children’s Books in the Middle East

Authors: Tina Sleiman

Abstract:

In the early 1970s, a graphics revolution - in quantity and quality - marked the youth publications sector in France. The increased interest in youth publications was supported with the emergence of youth libraries and major publishing houses. In parallel, the 'Agence de Cooperation Culturelle et Technique' (currently the International Organization of the Francophonie) was created, and several Arab countries had joined as members. In spite of political turmoil in the Middle East, French schools in Arab countries were still functioning and some even flourishing. This is a testament that French culture was, and still is, a major export to the region. This study focuses on the aesthetic value of the graphic styles that characterize French children’s books from the 1970s, and their personal value to Francophone people who have consumed these artifacts, in the Middle East. The first part of the study looks at the artifact itself: starting from the context of creation and consumption of these books, and continuing to the preservation and remaining collections. The aesthetic value is studied and compared to similar types of visuals of juxtaposed time periods. The second part examines the audience’s response to the visuals in terms of style recognition or identification, along with emotional significance or associations, and the personal value the artifacts might hold to their consumers. The methods of investigation consist of a literature review, a survey of book collections, and a visual questionnaire, supported by personal interviews. As an outcome, visual patterns will be identified: elements from 1970s children’s books reborn in contemporary youth-based publications. Results of the study shall inform us directly on the aesthetic and personal value of illustrated French children’s books in the Middle East, and indirectly on the capacity of youth-targeted design to create a long-term emotional response from its audience.

Keywords: children’s books, French visual culture, graphic style, publication design, revival

Procedia PDF Downloads 170
1952 Understanding the Life Experience of Middle Class Married Women Betrayal

Authors: Sara Sharifi Yazdi

Abstract:

The main purpose of this study is to find out about the reasons and the ways of middle-class married women betrayal via their living world. This is qualitative research, so deep semi-structured, episodic interview techniques and observation techniques were used to collect data; meanwhile, the basic theory method was used to analyze the data. The sample in this research includes 34 women with emotional and sexual relationships out of marriage. The results indicate that some set of conditions created the first spark of change in their opinions. These changes are empowered through both experiences of tolerance and exclusion, so strategies such as distance, compulsive tolerance, counteract, etc. have been used for reacting by the people in this study; besides some of the other consequences of betrayal which can be named are lack of comfort, feeling of deprivation, violence, labeling, guilty feelings of grief, and so on.

Keywords: living world, rejection, admission, betrayal, sexual relationship, marriage

Procedia PDF Downloads 144
1951 A Study on Relationship of Lifestyle and Socio-Economic Status with Obesity in Indian Children

Authors: Sushma Ghildyal, Sanjay Kumar Singh

Abstract:

The present study was undertaken with the purpose to understand the relationship of lifestyle and Socio-Economic status with child obesity among 1000 boys aged from 16 to 18 years of Varanasi District of Uttar Pradesh State in India. The study was conducted in both urban and rural area of the District. Ten schools i.e. five from urban area and five from rural area were selected by using purposive sampling. Healthy boys of class 10th, 11th and 12th were taken as subjects for the study. Prior consent was obtained from school authority. Anthropometric measurements were taken from each subject. Anthropometric measurements were Standing Height, Weight, Biceps skin folds, Triceps skin folds, Sub-scapular skin folds and Supra-iliac skin folds taken by Lange’s skin fold caliper. Lifestyle and Socio-Economic Status were obtained by questionnaires. In order to assess the BMI, Body fat %, Lifestyle and Socio-Economic Status; descriptive analyses were done. To find out the significant association of obesity with lifestyle and Socio-Economic Status Chi-square test was used. To find out significant difference between obesity of Urban and Rural children t-test was applied. Level of significance was set at 0.05 level. The conclusions drawn were: (1) The result showed that in urban area Varanasi District of Uttar Pradesh 0.6% children were in very high level adaptive lifestyle, 6.2% were in high level adaptive lifestyle, 25.4% above average level adaptive lifestyle, 47.8% moderately adaptive lifestyle, 3.6% and 0.4% low and very low level adaptive lifestyle. (2) In rural area Varanasi District of Uttar Pradesh 0.00% children were in very high level adaptive lifestyle, 9.4% were in high level adaptive lifestyle, 24.8% average level adaptive lifestyle, 47.0% moderately adaptive lifestyle, 15.2% below average and 3.0% very low level adaptive lifestyle.(3) In urban area 12.8% were in upper class Socio-Economic Status, 56.6% in upper middle class Socio-Economic Status, 30.2% in middle class Socio-Economic Status and 0.2% in lower middle class Socio-Economic Status. (4) In rural area 1.4% were in upper class Socio-Economic Status, 15.2% in upper middle class Socio-Economic Status, 51.6% in middle class Socio-Economic Status and 0.8% in lower middle class Socio-Economic Status. (5) In urban area 21.2% children of 16-18 years were obese. (6) In rural area 0.2% children of 16-18 years were obese. (7) In overall Varanasi District of Uttar Pradesh 10.7% children of 16-18 years were obese. (8) There was no significant relationship of obesity with Lifestyle of urban area children of 16-18 years. (9) There was significant relationship of obesity with Socio-Economic Status of urban area children of 16-18 years (10) There was no significant relationship of obesity with Lifestyle of rural area children of 16-18 years of Varanasi District Uttar Pradesh. (11) There was significant relationship of obesity with Socio-Economic Status of rural area children of 16-18 years. (12) Results showed significant difference between urban and rural area children of 16-18 years in respect to obesity of Varanasi District of Uttar Pradesh.

Keywords: lifestyle, obesity, rural area, socio-economic status, urban area

Procedia PDF Downloads 480
1950 Urban Conservation Methodology for Heritage Areas: A Case Study in Qabel Street, Old Jeddah

Authors: Hossam Hassan Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: rehabilitation, socioeconomic, urban conservation, urban strategy

Procedia PDF Downloads 545