Search results for: Eclipse Attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 637

Search results for: Eclipse Attack

457 Durability of Slurry Infiltrated Fiber Concrete to Corrosion in Chloride Environment: An Experimental Study, Part I

Authors: M. F. Alrubaie, S. A. Salih, W. A. Abbas

Abstract:

Slurry infiltrated fiber concrete (SIFCON) is considered as a special type of high strength high-performance fiber reinforced concrete, extremely strong, and ductile. The objective of this study is to investigate the durability of SIFCON to corrosion in chloride environments. Six different SIFCON mixes were made in addition to two refinance mixes with 0% and 1.5% steel fiber content. All mixes were exposed to 10% chloride solution for 180 days. Half of the specimens were partially immersed in chloride solution, and the others were exposed to weekly cycles of wetting and drying in 10% chloride solution. The effectiveness of using corrosion inhibitors, mineral admixture, and epoxy protective coating were also evaluated as protective measures to reduce the effect of chloride attack and to improve the corrosion resistance of SIFCON mixes. Corrosion rates, half-cell potential, electrical resistivity, total permeability tests had been monitored monthly. The results indicated a significant improvement in performance for SIFCON mixes exposed to chloride environment, when using corrosion inhibitor or epoxy protective coating, whereas SIFCON mix contained mineral admixture (metakaolin) did not improve the corrosion resistance at the same level. The cyclic wetting and drying exposure were more aggressive to the specimens than the partial immersion in chloride solution although the observed surface corrosion for the later was clearer.

Keywords: chloride attack, chloride environments, corrosion inhibitor, corrosion resistance, durability, SIFCON, slurry infiltrated fiber concrete

Procedia PDF Downloads 98
456 Evaluating the Impact of Marine Protected Areas on Human-Shark Interactions at a Global Scale

Authors: Delphine Duval, Morgan Mangeas, Charlie Huveneers, Adam Barnett, Laurent Vigliola

Abstract:

The global number of shark bites has increased over the past four decades with, however, high regional variability both in space and time. A systematic review, aligned with the 2020 PRISMA guidelines, explored the peer-reviewed literature published between 1960 and 2023 to identify factors potentially explaining trends in human-shark interactions. Results revealed that variations in the frequency of human-shark interactions could be explained by a plethora of factors, including changes in prey availability, environmental conditions, human and shark population density and behavior, as well as habitat destruction. However, to our best knowledge, only five studies have conducted statistical assessments of the relative contribution of these factors. The increased number in human-shark interactions and the frequent clusters of shark bites within short timeframes offer opportunities to test the causative factors that may explain trends in unprovoked shark bites. it study aims to evaluate the impact of marine protected areas (MPAs) on the number of human-shark interactions, using data from the Global Shark Attack File and the World Database on Protected Areas. Results indicate contrasting effects of MPAs at different spatial scales. Enhancing our understanding of the factors contributing to shark bites is essential for improving risk reduction policies for humans and conservation plans for shark populations.

Keywords: unprovoked shark interactions, marine protected areas, attack risk, human-wildlife interaction

Procedia PDF Downloads 17
455 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 373
454 The Role of the State in Creating a Cosmopolitan Canada

Authors: Scott Staring

Abstract:

This paper critically examines the claim that Canada represents a uniquely ‘postnational’ model of political existence. Canadian political thinkers and politicians alike have played a role in casting their country as the vanguard of an order wherein national sovereignty is gradually being eclipsed, while political authority is increasingly integrated at the international level. Proponents of this view frequently cite as evidence Canada’s high number of foreign-born citizens, its official policy of multiculturalism, its ready embrace of international institutions, and its enthusiasm for international trade deals like NAFTA, CETA and the TPP. This paper builds on historical research to show that the postnationalist thesis has precedents in a Whig-inspired view of Canada that has long challenged the role of a strong central state in the country. An alternative portrait of Canada will be put forward, one that contests both the historical evidence for the Whig view as well as its theoretical presuppositions. The claim will be made that Canada’s celebrated diversity and openness is not the product of a nation-state in retreat; instead, it is largely the product of a strong and sovereign state that has intervened to create a sense of a shared concern amongst its citizens. Canada does indeed offer the world a model of cosmopolitanism, but it is a model that is rooted in the nation-state rather than its eclipse.

Keywords: Canada, cosmopolitanism, postnationalism, statism

Procedia PDF Downloads 174
453 Fabrication of Powdery Composites Based Alumina and Its Consolidation by Hot Pressing Method in OXY-GON Furnace

Authors: T. Kuchukhidze, N. Jalagonia, T. Korkia, V. Gabunia, N. Jalabadze, R. Chedia

Abstract:

In this work, obtaining methods of ultrafine alumina powdery composites and high temperature pressing technology of matrix ceramic composites with different compositions have been discussed. Alumina was obtained by solution combustion synthesis and sol-gel methods. Metal carbides containing powdery composites were obtained by homogenization of finishing powders in nanomills, as well as by their single-step high temperature synthesis .Different types of matrix ceramics composites (α-Al2O3-ZrO2-Y2O3, α-Al2O3- Y2O3-MgO, α-Al2O3-SiC-Y2O3, α-Al2O3-WC-Co-Y2O3, α-Al2O3- B4C-Y2O3, α-Al2O3- B4C-TiB2 etc.) were obtained by using OXYGON furnace. Consolidation of powders were carried out at 1550- 1750°C (hold time - 1 h, pressure - 50 MPa). Corundum ceramics samples have been obtained and characterized by high hardness and fracture toughness, absence of open porosity, high corrosion resistance. Their density reaches 99.5-99.6% TD. During the work, the following devices have been used: High temperature vacuum furnace OXY-GON Industries Inc (USA), Electronic Scanning Microscopes Nikon Eclipse LV 150, Optical Microscope NMM- 800TRF, Planetary mill Pulverisette 7 premium line, Shimadzu Dynamic Ultra Micro Hardness Tester DUH-211S, Analysette 12 Dynasizer.

Keywords: α-alumina, consolidation, phase transformation, powdery composites

Procedia PDF Downloads 326
452 Association of Sensory Processing and Cognitive Deficits in Children with Autism Spectrum Disorders – Pioneer Study in Saudi Arabia

Authors: Rana Zeina

Abstract:

Objective: The association between Sensory problems and cognitive abilities has been studied in individuals with Autism Spectrum Disorders (ASDs). In this study, we used a neuropsychological test to evaluate memory and attention in ASDs children with sensory problems compared to the ASDs children without sensory problems. Methods: Four visual memory tests of Cambridge Neuropsychological Test Automated Battery (CANTAB) including Big/Little Circle (BLC), Simple Reaction Time (SRT), Intra/Extra Dimensional Set Shift (IED), Spatial Recognition Memory (SRM), were administered to 14 ASDs children with sensory problems compared to 13 ASDs without sensory problems aged 3 to 12 with IQ of above 70. Results: ASDs Individuals with sensory problems performed worse than the ASDs group without sensory problems on comprehension, learning, reversal and simple reaction time tasks, and no significant difference between the two groups was recorded in terms of the visual memory and visual comprehension tasks. Conclusion: The findings of this study suggest that ASDs children with sensory problems are facing deficits in learning, comprehension, reversal, and speed of response to stimuli.

Keywords: visual memory, attention, autism spectrum disorders, CANTAB eclipse

Procedia PDF Downloads 424
451 Applying the Regression Technique for ‎Prediction of the Acute Heart Attack ‎

Authors: Paria Soleimani, Arezoo Neshati

Abstract:

Myocardial infarction is one of the leading causes of ‎death in the world. Some of these deaths occur even before the patient ‎reaches the hospital. Myocardial infarction occurs as a result of ‎impaired blood supply. Because the most of these deaths are due to ‎coronary artery disease, hence the awareness of the warning signs of a ‎heart attack is essential. Some heart attacks are sudden and intense, but ‎most of them start slowly, with mild pain or discomfort, then early ‎detection and successful treatment of these symptoms is vital to save ‎them. Therefore, importance and usefulness of a system designing to ‎assist physicians in the early diagnosis of the acute heart attacks is ‎obvious.‎ The purpose of this study is to determine how well a predictive ‎model would perform based on the only patient-reportable clinical ‎history factors, without using diagnostic tests or physical exams. This ‎type of the prediction model might have application outside of the ‎hospital setting to give accurate advice to patients to influence them to ‎seek care in appropriate situations. For this purpose, the data were ‎collected on 711 heart patients in Iran hospitals. 28 attributes of clinical ‎factors can be reported by patients; were studied. Three logistic ‎regression models were made on the basis of the 28 features to predict ‎the risk of heart attacks. The best logistic regression model in terms of ‎performance had a C-index of 0.955 and with an accuracy of 94.9%. ‎The variables, severe chest pain, back pain, cold sweats, shortness of ‎breath, nausea, and vomiting were selected as the main features.‎

Keywords: Coronary heart disease, Acute heart attacks, Prediction, Logistic ‎regression‎

Procedia PDF Downloads 423
450 The Rise of Populist Right-Wing Parties in Western Europe: A Case Study of the Front National in France

Authors: Jessica Da Silva

Abstract:

This paper examines France as a microcosm of the rise of right-wing populism in the broader European context. The attack on the Charlie Hebdo newspaper is arguably, a reaction to the aggressive European secularism spreading throughout Europe that sees its true enemy in the growth of extremist and violent interpretations of Islam. With each terrorist attack, the popularity of anti-immigrant policies and ideologies increases. What ultimately drives movements like the French National Front are the concepts of monoculture and ethnic identity. This paper analyses the character of right-wing populist parties using the National Front as a case study. Such parties generate anxiety and resentment by fomenting an irrational fear of the ‘other’. In this way, populists promote their identity on the basis of xenophobia, Islamophobia, and practices of social exclusion against targeted out-groups. They position immigrants and foreigners as ‘others’, claiming they are a threat to native cultures and a source of social and economic strife. Ultimately, right-wing populism exerts a negative influence over the democratic framework in Europe and opposes the European Union’s integration project. Right-wing populism attacks this supranational model because of its alleged inefficiency and departure from what it considers to be 'authentic' European traditions and citizenship. In this context, understanding the rise of radical right-wing populist parties is extremely important for the future of Europe, democracy and multiculturalism.

Keywords: cultural identity, Europeanization, front national, immigration, integration, Islamophobia, multiculturalism, nationalism, right-wing populist parties, xenophobia

Procedia PDF Downloads 334
449 Mineral Slag Used as an Alternative of Cement in Concrete

Authors: Eskinder Desta Shumuye, Jun Zhao, Zike Wang

Abstract:

This paper summarizes the results of experimental studies carried out at Zhengzhou University, School of Mechanics and Engineering Science, research laboratory, on the performance of concrete produced by combining Ordinary Portland Cement (OPC) with Ground-Granulated Blast Furnace Slag (GGBS). Concrete specimens cast with OPC and various percentage of GGBS (0%, 30%, 50%, and 70%) were subjected to high temperature exposure and extensive experimental test reproducing basic freeze-thaw cycle and a chloride-ion attack to determine their combined effects within the concrete samples. From the experimental studies, comparisons were made on the physical, mechanical, and microstructural properties in compassion with ordinary Portland cement concrete (OPC). Further, durability of GGBS cement concrete, such as exposure to accelerated carbonation, chloride ion attack, and freeze-thaw action in compassion with various percentage of GGBS and ordinary Portland cement concrete of similar mixture composition was analyzed. The microstructure, mineralogical composition, and pore size distribution of concrete specimens were determined via Scanning Electron Microscopy (SEM) analysis and X-Ray Diffraction (XRD). The result demonstrated that when the exposure temperature increases from 200 ºC to 400 ºC, the residual compressive strength was fluctuating for all concrete group, and compressive strength and chloride ion exposure of the concrete decreased with the increasing of slag content. The SEM and EDS results showed an increase in carbonation rate with increasing in slag content.

Keywords: accelerated carbonation, chloride-ion, concrete, ground-granulated blast furnace slag, GGBS, high-temperature

Procedia PDF Downloads 106
448 Evaluating the Use of Manned and Unmanned Aerial Vehicles in Strategic Offensive Tasks

Authors: Yildiray Korkmaz, Mehmet Aksoy

Abstract:

In today's operations, countries want to reach their aims in the shortest way due to economical, political and humanitarian aspects. The most effective way of achieving this goal is to be able to penetrate strategic targets. Strategic targets are generally located deep inside of the countries and are defended by modern and efficient surface to air missiles (SAM) platforms which are operated as integrated with Intelligence, Surveillance and Reconnaissance (ISR) systems. On the other hand, these high valued targets are buried deep underground and hardened with strong materials against attacks. Therefore, to penetrate these targets requires very detailed intelligence. This intelligence process should include a wide range that is from weaponry to threat assessment. Accordingly, the framework of the attack package will be determined. This mission package has to execute missions in a high threat environment. The way to minimize the risk which depends on loss of life is to use packages which are formed by UAVs. However, some limitations arising from the characteristics of UAVs restricts the performance of the mission package consisted of UAVs. So, the mission package should be formed with UAVs under the leadership of a fifth generation manned aircraft. Thus, we can minimize the limitations, easily penetrate in the deep inside of the enemy territory with minimum risk, make a decision according to ever-changing conditions and finally destroy the strategic targets. In this article, the strengthens and weakness aspects of UAVs are examined by SWOT analysis. And also, it revealed features of a mission package and presented as an example what kind of a mission package we should form in order to get marginal benefit and penetrate into strategic targets with the development of autonomous mission execution capability in the near future.

Keywords: UAV, autonomy, mission package, strategic attack, mission planning

Procedia PDF Downloads 517
447 Structural Morphing on High Performance Composite Hydrofoil to Postpone Cavitation

Authors: Fatiha Mohammed Arab, Benoit Augier, Francois Deniset, Pascal Casari, Jacques Andre Astolfi

Abstract:

For the top high performance foiling yachts, cavitation is often a limiting factor for take-off and top speed. This work investigates solutions to delay the onset of cavitation thanks to structural morphing. The structural morphing is based on compliant leading and trailing edge, with effect similar to flaps. It is shown here that the commonly accepted effect of flaps regarding the control of lift and drag forces can also be used to postpone the inception of cavitation. A numerical and experimental study is conducted in order to assess the effect of the geometric parameters of hydrofoil on their hydrodynamic performances and in cavitation inception. The effect of a 70% trailing edge and a 30% leading edge of NACA 0012 is investigated using Xfoil software at a constant Reynolds number 106. The simulations carried out for a range flaps deflections and various angles of attack. So, the result showed that the lift coefficient increase with the increase of flap deflection, but also with the increase of angle of attack and enlarged the bucket cavitation. To evaluate the efficiency of the Xfoil software, a 2D analysis flow over a NACA 0012 with leading and trailing edge flap was studied using Fluent software. The results of the two methods are in a good agreement. To validate the numerical approach, a passive adaptive composite model is built and tested in the hydrodynamic tunnel at the Research Institute of French Naval Academy. The model shows the ability to simulate the effect of flap by a LE and TE structural morphing due to hydrodynamic loading.

Keywords: cavitation, flaps, hydrofoil, panel method, xfoil

Procedia PDF Downloads 146
446 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 495
445 EMS Providers' Ability and Willingness to Respond to Bioterrorism

Authors: Ryan Houser

Abstract:

Introduction: Previous studies have found that public health systems within the United States are inadequately prepared for an act of biological terrorism. As the COVID-19 pandemic continues, few studies have evaluated bioterrorism preparedness of Emergency Medical Services, even in the accelerating environment of biothreats. Methods: This study utilized an Internet-based survey to assess the level of preparedness and willingness to respond to a bioterrorism attack and identify factors that predict preparedness and willingness among Nebraska EMS (Emergency Medical Services ) providers. The survey was available for one month in 2021, during which 190 EMS providers responded to the survey. Results: Only 56.8% of providers were able to recognize an illness or injury as potentially resulting from exposure to a CBRN agent. The provider Clinical Competency levels range from a low of 13.6% (ability to initiate patient care within his/her professional scope of practice and arrange for prompt referral appropriate to the identified condition(s)) to a high of 74% (the ability to respond to an emergency within the emergency management system of his/her practice, institution and community). Only 10% of the respondents are both willing and able to effectively function in a bioterror environment. Discussion: In order to effectively prepare for and respond to a bioterrorist attack, all levels of the healthcare system need to have the clinical skills, knowledge, and abilities necessary to treat patients exposed. Policy changes and increased focus on training and drills are needed to ensure a prepared EMS system which is crucial to a resilient state. EMS entities need to be aware of the extent of their available workforce so that the country can be prepared for the increasing threat of bioterrorism or other novel emerging infectious disease outbreaks. A resilient nation relies on a prepared set of EMS providers who are willing to respond to biological terrorism events.

Keywords: bioterrorism, prehospital, EMS, disaster, emergency, medicine, preparedness, policy

Procedia PDF Downloads 125
444 Evaluation of Real Time PCR Methods for Food Safety

Authors: Ergun Sakalar, Kubra Bilgic

Abstract:

In the last decades, real-time PCR has become a reliable tool preferred to use in many laboratories for pathogen detection. This technique allows for monitoring target amplification via fluorescent molecules besides admit of quantitative analysis by enabling of convert outcomes of thermal cycling to digital data. Sensitivity and traceability of real-time PCR are based on measuring of fluorescence that appears only when fluorescent reporter dye bound to specific target DNA.The fluorescent reporter systems developed for this purpose are divided into two groups. The first group consists of intercalator fluorescence dyes such as SYBR Green, EvaGreen which binds to double-stranded DNA. On the other hand, the second group includes fluorophore-labeled oligonucleotide probes that are separated into three subgroups due to differences in mechanism of action; initial primer-probes such as Cyclicons, Angler®, Amplifluor®, LUX™, Scorpions, and the second one hydrolysis probes like TaqMan, Snake assay, finally hybridization probes, for instance, Molecular Beacons, Hybprobe/FRET, HyBeacon™, MGB-Eclipse, ResonSense®, Yin-Yang, MGB-Pleiades. In addition nucleic acid analogues, an increase of probe affinity to target site is also employed with fluorescence-labeled probes. Consequently, abundant real-time PCR detection chemistries are chosen by researcher according to the field of application, mechanism of action, advantages, and proper structures of primer/probes.

Keywords: fluorescent dye, food safety, molecular probes, nucleic acid analogues

Procedia PDF Downloads 217
443 Study of a Cross-Flow Membrane to a Kidney Encapsulation Engineering Structures for Immunosuppression Filter

Authors: Sihyun Chae, Ryoto Arai, Waldo Concepcion, Paula Popescu

Abstract:

The kidneys perform an important role in the human hormones that regulate the blood pressure, produce an active form of vitamin D and control the production of red blood cells. Kidney disease can cause health problems, such as heart disease. Also, increase the chance of having a stroke or heart attack. There are mainly to types of treatments for kidney disease, dialysis, and kidney transplant. For a better quality of life, the kidney transplant is desirable. However, kidney transplant can cause antibody reaction and patients’ body would be attacked by immune system of their own. For solving that issue, patients with transplanted kidney always take immunosuppressive drugs which can hurt kidney as side effects. Patients willing to do a kidney transplant have a waiting time of 3.6 years in average searching to find an appropriate kidney, considering there are almost 96,380 patients waiting for kidney transplant. There is a promising method to solve these issues: bioartificial kidney. Our membrane is specially designed with unique perforations capable to filter the blood cells separating the white blood cells from red blood cells. White blood cells will not pass through the encapsulated kidney preventing the immune system to attack the new organ and eliminating the need of a matching donor. It is possible to construct life-time long encapsulation without needing pumps or a power supply on the cell’s separation method preventing futures surgeries due the Cross-Channel Flow inside the device. This technology allows the possibility to use an animal kidney, prevent cancer cells to spread through the body, arm and leg transplants in the future. This project aims to improve the quality of life of patients with kidney disease.

Keywords: kidney encapsulation, immunosuppression filter, leukocyte filter, leukocyte

Procedia PDF Downloads 173
442 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 390
441 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 194
440 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 106
439 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 506
438 3D Numerical Studies and Design Optimization of a Swallowtail Butterfly with Twin Tail

Authors: Arunkumar Balamurugan, G. Soundharya Lakshmi, V. Thenmozhi, M. Jegannath, V. R. Sanal Kumar

Abstract:

Aerodynamics of insects is of topical interest in aeronautical industries due to its wide applications on various types of Micro Air Vehicles (MAVs). Note that the MAVs are having smaller geometric dimensions operate at significantly lower speeds on the order of 10 m/s and their Reynolds numbers range is approximately 1,50,000 or lower. In this paper, numerical study has been carried out to capture the flow physics of a biological inspired Swallowtail Butterfly with fixed wing having twin tail at a flight speed of 10 m/s. Comprehensive numerical simulations have been carried out on swallow butterfly with twin tail flying at a speed of 10 m/s with uniform upper and lower angles of attack in both lateral and longitudinal position for identifying the best wing orientation with better aerodynamic efficiency. Grid system in the computational domain is selected after a detailed grid refinement exercises. Parametric analytical studies have been carried out with different lateral and longitudinal angles of attack for finding the better aerodynamic efficiency at the same flight speed. The results reveal that lift coefficient significantly increases with marginal changes in the longitudinal angle and vice versa. But in the case of drag coefficient the conventional changes have been noticed, viz., drag increases at high longitudinal angles. We observed that the change of twin tail section has a significant impact on the formation of vortices and aerodynamic efficiency of the MAV’s. We concluded that for every lateral angle there is an exact longitudinal orientation for the existence of an aerodynamically efficient flying condition of any MAV. This numerical study is a pointer towards for the design optimization of Twin tail MAVs with flapping wings.

Keywords: aerodynamics of insects, MAV, swallowtail butterfly, twin tail MAV design

Procedia PDF Downloads 371
437 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 395
436 Laminar Separation Bubble Prediction over an Airfoil Using Transition SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine, Mohammed Sriti

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of a wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds numbers by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using the γ-Reθt turbulence model. A two-dimensional study was conducted for the chord Reynolds number of 1×10⁵ and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of the laminar separation bubble and the aerodynamic performances of wind turbines. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerated transition process, and the turbulent reattachment point moves closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase in the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase in the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to move upstream to the leading edge of the airfoil, that causes earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, S809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 38
435 Development and Validation of High-Performance Liquid Chromatography Method for the Determination and Pharmacokinetic Study of Linagliptin in Rat Plasma

Authors: Hoda Mahgoub, Abeer Hanafy

Abstract:

Linagliptin (LNG) belongs to dipeptidyl-peptidase-4 (DPP-4) inhibitor class. DPP-4 inhibitors represent a new therapeutic approach for the treatment of type 2 diabetes in adults. The aim of this work was to develop and validate an accurate and reproducible HPLC method for the determination of LNG with high sensitivity in rat plasma. The method involved separation of both LNG and pindolol (internal standard) at ambient temperature on a Zorbax Eclipse XDB C18 column and a mobile phase composed of 75% methanol: 25% formic acid 0.1% pH 4.1 at a flow rate of 1.0 mL.min-1. UV detection was performed at 254nm. The method was validated in compliance with ICH guidelines and found to be linear in the range of 5–1000ng.mL-1. The limit of quantification (LOQ) was found to be 5ng.mL-1 based on 100µL of plasma. The variations for intra- and inter-assay precision were less than 10%, and the accuracy values were ranged between 93.3% and 102.5%. The extraction recovery (R%) was more than 83%. The method involved a single extraction step of a very small plasma volume (100µL). The assay was successfully applied to an in-vivo pharmacokinetic study of LNG in rats that were administered a single oral dose of 10mg.kg-1 LNG. The maximum concentration (Cmax) was found to be 927.5 ± 23.9ng.mL-1. The area under the plasma concentration-time curve (AUC0-72) was 18285.02 ± 605.76h.ng.mL-1. In conclusion, the good accuracy and low LOQ of the bioanalytical HPLC method were suitable for monitoring the full pharmacokinetic profile of LNG in rats. The main advantages of the method were the sensitivity, small sample volume, single-step extraction procedure and the short time of analysis.

Keywords: HPLC, linagliptin, pharmacokinetic study, rat plasma

Procedia PDF Downloads 217
434 Catered Lunch Suspected Outbreak in a Garment Factory, Sleman District, Yogyakarta, Indonesia, 2017

Authors: Rieski Prihastuti, Meliana Depo, Trisno A. Wibowo, Misinem

Abstract:

On October 19, 2017, Yogyakarta Islamic Hospital reported 38 garment employees with nausea, vomiting, headache, abdominal pain, and diarrhea after they had lunch on October 18, 2017, to Sleman District Health Office. Objectives of this study were to ensure the outbreak and identify source and route of transmission. Case-control study was conducted to analyze food items that caused the outbreak. A case was defined as a person who got symptoms such as abdominal pain, diarrhea, nausea with/without vomiting, fever, and headache after they had lunch on October 18, 2017. Samples included leftover lunch box, vomit, tap water and drinking water had been sent to the laboratory. Data were analyzed descriptively as frequency table and analyzed by using chi-square in bivariate analysis. All of 196 garment employee was included in this study. The common symptoms of this outbreak were abdominal pain (84.4%), diarrhea (72.8%), nausea (61.6%), headache (52.8%), vomiting (12.8%), and fever (6.4%) with median incubation period 13 hours (range 1-34 hours). Highest attack rate and odds ratio was found in grilled chicken (Attack Rate 58,49%) with Odds Ratio 11,023 (Confidence Interval 95% 1.383 - 87.859; p value 0,005). Almost all samples showed mold, except drinking water. Based on its sign and symptoms, also incubation period, diarrheal Bacillus cereus and Clostridium perfringens were suspected to be the causative agent of the outbreak. Limitation of this study was improper sample handling and no sample of food handler and stools in the food caterer. Outbreak investigation training needed to be given to the hospital worker, and monitoring should be done to the food caterer to prevent another outbreak.

Keywords: disease outbreak, foodborne disease, food poisoning, outbreak

Procedia PDF Downloads 123
433 Numerical Study of Laminar Separation Bubble Over an Airfoil Using γ-ReθT SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of a wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds numbers by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using the γ-Reθt turbulence model. A two-dimensional study was conducted for the chord Reynolds number of 1×105 and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of the laminar separation bubble and the aerodynamic performances of wind turbines. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerated transition process, and the turbulent reattachment point moves closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase in the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase in the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to move upstream to the leading edge of the airfoil, causing earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, s809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 38
432 Thermal Hysteresis Activity of Ice Binding Proteins during Ice Crystal Growth in Sucrose Solution

Authors: Bercem Kiran-Yildirim, Volker Gaukel

Abstract:

Ice recrystallization (IR) which occurs especially during frozen storage is an undesired process due to the possible influence on the quality of products. As a result of recrystallization, the total volume of ice remains constant, but the size, number, and shape of ice crystals change. For instance, as indicated in the literature, the size of ice crystals in ice cream increases due to recrystallization. This results in texture deterioration. Therefore, the inhibition of ice recrystallization is of great importance, not only for food industry but also for several other areas where sensitive products are stored frozen, like pharmaceutical products or organs and blood in medicine. Ice-binding proteins (IBPs) have the unique ability to inhibit ice growth and in consequence inhibit recrystallization. This effect is based on their ice binding affinity. In the presence of IBP in a solution, ice crystal growth is inhibited during temperature decrease until a certain temperature is reached. The melting during temperature increase is not influenced. The gap between melting and freezing points is known as thermal hysteresis (TH). In literature, the TH activity is usually investigated under laboratory conditions in IBP buffer solutions. In product applications (e.g., food) there are many other solutes present which may influence the TH activity. In this study, a subset of IBPs, so-called antifreeze proteins (AFPs), is used for the investigation of the influence of sucrose solution concentration on the TH activity. For the investigation, a polarization microscope (Nikon Eclipse LV100ND) equipped with a digital camera (Nikon DS-Ri1) and a cold stage (Linkam LTS420) was used. In a first step, the equipment was established and validated concerning the accuracy of TH measurements based on literature data.

Keywords: ice binding proteins, ice crystals, sucrose solution, thermal hysteresis

Procedia PDF Downloads 152
431 Numerical Study of Laminar Separation Bubble Over an Airfoil Using γ-ReθT SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine, Mohammed Sriti

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds number by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using γ-Reθt turbulence model. Two-dimensional study was conducted for the chord Reynolds number of 1×105 and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of laminar separation bubble and aerodynamic performances of wind turbine. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerate transition process and the turbulent reattachment point move closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase of the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to moves upstream to leading edge of the airfoil that causes earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, S809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 43
430 Argumentation Frameworks and Theories of Judging

Authors: Sonia Anand Knowlton

Abstract:

With the rise of artificial intelligence, computer science is becoming increasingly integrated in virtually every area of life. Of course, the law is no exception. Through argumentation frameworks (AFs), computer scientists have used abstract algebra to structure the legal reasoning process in a way that allows conclusions to be drawn from a formalized system of arguments. In AFs, arguments compete against each other for logical success and are related to one another through the binary operation of the attack. The prevailing arguments make up the preferred extension of the given argumentation framework, telling us what set of arguments must be accepted from a logical standpoint. There have been several developments of AFs since its original conception in the early 90’s in efforts to make them more aligned with the human reasoning process. Generally, these developments have sought to add nuance to the factors that influence the logical success of competing arguments (e.g., giving an argument more logical strength based on the underlying value it promotes). The most cogent development was that of the Extended Argumentation Framework (EAF), in which attacks can themselves be attacked by other arguments, and the promotion of different competing values can be formalized within the system. This article applies the logical structure of EAFs to current theoretical understandings of judicial reasoning to contribute to theories of judging and to the evolution of AFs simultaneously. The argument is that the main limitation of EAFs, when applied to judicial reasoning, is that they require judges to themselves assign values to different arguments and then lexically order these values to determine the given framework’s preferred extension. Drawing on John Rawls’ Theory of Justice, the examination that follows is whether values are lexical and commensurable to this extent. The analysis that follows then suggests a potential extension of the EAF system with an approach that formalizes different “planes of attack” for competing arguments that promote lexically ordered values. This article concludes with a summary of how these insights contribute to theories of judging and of legal reasoning more broadly, specifically in indeterminate cases where judges must turn to value-based approaches.

Keywords: computer science, mathematics, law, legal theory, judging

Procedia PDF Downloads 35
429 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 163
428 Patterns of Libido, Sexual Activity and Sexual Performance in Female Migraineurs

Authors: John Farr Rothrock

Abstract:

Although migraine traditionally has been assumed to convey a relative decrease in libido, sexual activity and sexual performance, recent data have suggested that the female migraine population is far from homogenous in this regard. We sought to determine the levels of libido, sexual activity and sexual performance in the female migraine patient population both generally and according to clinical phenotype. In this single-blind study, a consecutive series of sexually active new female patients ages 25-55 initially presenting to a university-based headache clinic and having a >1 year history of migraine were asked to complete anonymously a survey assessing their sexual histories generally and as they related to their headache disorder and the 19-item Female Sexual Function Index (FSFI). To serve as 2 separate control groups, 100 sexually active females with no history of migraine and 100 female migraineurs from the general (non-clinic) population but matched for age, marital status, educational background and socioeconomic status completed a similar survey. Over a period of 3 months, 188 consecutive migraine patients were invited to participate. Twenty declined, and 28 of the remaining 160 potential subjects failed to meet the inclusion criterion utilized for “sexually active” (ie, heterosexual intercourse at a frequency of > once per month in each of the preceding 6 months). In all groups younger age (p<.005), higher educational level attained (p<.05) and higher socioeconomic status (p<.025) correlated with a higher monthly frequency of intercourse and a higher likelihood of intercourse resulting in orgasm. Relative to the 100 control subjects with no history of migraine, the two migraine groups (total n=232) reported a lower monthly frequency of intercourse and recorded a lower FSFI score (both p<.025), but the contribution to this difference came primarily from the chronic migraine (CM) subgroup (n=92). Patients with low frequency episodic migraine (LFEM) and mid frequency episodic migraine (MFEM) reported a higher FSFI score, higher monthly frequency of intercourse, higher likelihood of intercourse resulting in orgasm and higher likelihood of multiple active sex partners than controls. All migraine subgroups reported a decreased likelihood of engaging in intercourse during an active migraine attack, but relative to the CM subgroup (8/92=9%), a higher proportion of patients in the LFEM (12/49=25%), MFEM (14/67=21%) and high frequency episodic migraine (HFEM: 6/14=43%) subgroups reported utilizing intercourse - and orgasm specifically - as a means of potentially terminating a migraine attack. In the clinic vs no-clinic groups there were no significant differences in the dependent variables assessed. Research subjects with LFEM and MFEM may report a level of libido, frequency of intercourse and likelihood of orgasm-associated intercourse that exceeds what is reported by age-matched controls free of migraine. Many patients with LFEM, MFEM and HFEM appear to utilize intercourse/orgasm as a means to potentially terminate an acute migraine attack.

Keywords: migraine, female, libido, sexual activity, phenotype

Procedia PDF Downloads 52