Search results for: World Trade Center Attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10385

Search results for: World Trade Center Attack

10265 Numerical Study of Flow Characteristics and Performance of 14-X B Inlet with Blunted Cowl-Lip

Authors: Sergio N. P. Laitón, Paulo G. P. Toro, João F. Martos

Abstract:

A numerical study has been carried out to investigate the flow characteristics and performance of the 14-X B inlet with blunted cowl-lip. The Brazilian aerospace hypersonic vehicle 14-X B is a technology demonstrator of a hypersonic air-breathing propulsion system, based on supersonic combustion ramjet (scramjet). It is designed for Earth's atmospheric flight at Mach number of 6 and an altitude of 30 km. Currently, it is under development in the aerothermodynamics and hypersonic Professor Henry T. Nagamatsu laboratory at Advanced Studies Institute (IEAv). Numerical simulations were conducted at nominal freestream Mach number and altitude for two cowl-lip blunting radius and several angles of attack close to horizontal flight. The results show that the shock interference behavior on the blunted cowl-lip change with the angle of attack and blunted radius. The type VI or V together with III shock interferences are more likely to occur simultaneously at small negative angles of attack. When the inlet operates in positive angles of attack higher to 1, no shock interference occurs, only the bow shock conditions. The results indicate a high air pressure at beginning of the combustor and higher pressure recovery with 2 mm radius and positives angles of attack.

Keywords: blunted cowl-lip, hypersonic inlet, inlet unstart, shock interference

Procedia PDF Downloads 291
10264 Diagnostic Investigation of Aircraft Performance at Different Winglet Cant Angles

Authors: M. Dinesh, V. Kenny Mark, Dharni Vasudhevan Venkatesan, B. Santhosh Kumar, R. Sree Radesh, V. R. Sanal Kumar

Abstract:

Comprehensive numerical studies have been carried out to examine the best aerodynamic performance of subsonic aircraft at different winglet cant angles using a validated 3D k-ω SST model. In the parametric analytical studies, NACA series of airfoils are selected. Basic design of the winglet is selected from the literature and flow features of the entire wing including the winglet tip effects have been examined with different cant angles varying from 150 to 600 at different angles of attack up to 140. We have observed, among the cases considered in this study that a case with 150 cant angle the aerodynamics performance of the subsonic aircraft during takeoff was found better up to an angle of attack of 2.80 and further its performance got diminished at higher angles of attack. Analyses further revealed that increasing the winglet cant angle from 150 to 600 at higher angles of attack could negate the performance deterioration and additionally it could enhance the peak CL/CD on the order of 3.5%. The investigated concept of variable-cant-angle winglets appears to be a promising alternative for improving the aerodynamic efficiency of aircraft.

Keywords: aerodynamic efficiency, cant angle, drag reduction, flexible winglets

Procedia PDF Downloads 491
10263 Durability of Cement Bonded Particleboards Produced from Terminalia superba and Gmelina arborea against Subterranean Termite Attack

Authors: Amos Olajide Oluyege, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape

Abstract:

This study was conducted to determine the durability of wood-cement particleboards when exposed to attack by subterranean termites, Macrotermes subhylinus. The boards were made from Terminalia superba and Gmelina arborea wood sawdust at nominal board densities (BD) of 1000, 900, and 800 kg/m³ using wood-cement mixing ratios (MR) of 3:1, 2.5:1, 2:1, and 1:1. Above ground durability tests against termite attack were carried out according to ASTM D 2017 for 14 weeks. Results of visual assessment of the wood cement particleboards show that all the board samples had a visual rating that was not less than 7 (i.e., moderate attack) for both species irrespective of the MR and BD. T. superba boards were found to have higher resistance to termite attack compared to their G. arborea counterparts. The mean values for weight loss following exposure ranged from 1.93 to 6.13% and 3.24 to 12.44%. Analysis of variance (ANOVA) results of the weight loss assessment revealed a significant (p < 0.05) effect of species and mixing ratio on the weight loss of the boards due to termite attack with F(₁,₇₂) = 92.890 and P = 0.000 and F(₃,₇₂) = 8.318 and p = 0.000, while board density did not have any significant effect (p > 0.05) with F (₂,₇₂) = 1.307 and p = 0.277. Thus, boards made from a higher mixing ratio had better resistance against termite attacks. Thus, it can be concluded that the durability of cement-bonded particleboards when exposed to subterranean termite attack is not only dependent on the quality of the wood raw material (species) but also on the enhanced protection imparted by the cement matrix; the protection increased with increase in cement/wood mixing ratio.

Keywords: cement-bonded particleboard, mixing ratio, board density, Gmelina arborea, Terminalia superba

Procedia PDF Downloads 177
10262 The Interplay between Technology and Culture in Inbound Call Center Industry

Authors: Joseph Reylan Viray, Kriztine R. Viray

Abstract:

Call center conversations, more than the business dimensions that they normally manifest, are interactions between human beings. These are communication exchanges that are packed with psychological, cultural and social dimensions that affect the specific experience of the parties. The increasing development of information and communication technology over the past decades brought about important advantages and corresponding disadvantages in the process of communicational transactions in call center industry. It has been established that the technology is so powerful that it strongly affects, among others, call center business. In the present study, the author explores the interplay between the technology being utilized by the industry and the cultural orientations of both the call center agents and their customers in the process of communication exchanges. Specifically, the paper seeks to (1) describe the interplay between culture and technology in inbound call center industry as it affects the communication exchange of the agents and customers; (2) understand the nature and the dynamics of the call center industry as regards the cultural dimensions of Hofstede; and (3) come up with a simple study where the cross-cultural aspect of the call center industry could be highlighted and could provide necessary knowledge to the stakeholders. Cognizant of the complexity of the topic, the researchers employed Hofstede's cultural dimensions. Likewise, another theory that was used in this study is the Computer Mediated Communication Theory.

Keywords: call center industry, culture, Hofstede, CMT, technology

Procedia PDF Downloads 312
10261 Machine Learning in Gravity Models: An Application to International Recycling Trade Flow

Authors: Shan Zhang, Peter Suechting

Abstract:

Predicting trade patterns is critical to decision-making in public and private domains, especially in the current context of trade disputes among major economies. In the past, U.S. recycling has relied heavily on strong demand for recyclable materials overseas. However, starting in 2017, a series of new recycling policies (bans and higher inspection standards) was enacted by multiple countries that were the primary importers of recyclables from the U.S. prior to that point. As the global trade flow of recycling shifts, some new importers, mostly developing countries in South and Southeast Asia, have been overwhelmed by the sheer quantities of scrap materials they have received. As the leading exporter of recyclable materials, the U.S. now has a pressing need to build its recycling industry domestically. With respect to the global trade in scrap materials used for recycling, the interest in this paper is (1) predicting how the export of recyclable materials from the U.S. might vary over time, and (2) predicting how international trade flows for recyclables might change in the future. Focusing on three major recyclable materials with a history of trade, this study uses data-driven and machine learning (ML) algorithms---supervised (shrinkage and tree methods) and unsupervised (neural network method)---to decipher the international trade pattern of recycling. Forecasting the potential trade values of recyclables in the future could help importing countries, to which those materials will shift next, to prepare related trade policies. Such policies can assist policymakers in minimizing negative environmental externalities and in finding the optimal amount of recyclables needed by each country. Such forecasts can also help exporting countries, like the U.S understand the importance of healthy domestic recycling industry. The preliminary result suggests that gravity models---in addition to particular selection macroeconomic predictor variables--are appropriate predictors of the total export value of recyclables. With the inclusion of variables measuring aspects of the political conditions (trade tariffs and bans), predictions show that recyclable materials are shifting from more policy-restricted countries to less policy-restricted countries in international recycling trade. Those countries also tend to have high manufacturing activities as a percentage of their GDP.

Keywords: environmental economics, machine learning, recycling, international trade

Procedia PDF Downloads 136
10260 An Analysis of the Wheat Export Performance of Ukraine in Europe

Authors: Kiran Bala Das

Abstract:

This paper examines the Ukraine wheat export condition after Russian-Ukrainian military confrontation. The political conflict in Ukraine and the recent military intervention of Russia in Crimea is raising concern full effect of the events there is still uncertain, but some hints can be seen in the wheat market by analyzing the trend and pattern of Ukraine wheat export. Crimea is extremely important as it is where most of Ukraine grain exported by ship from its ports of the black sea. Ukraine is again seeking to establish itself a significant exporter of agricultural product with its rich black soil, it is chornozem the top soil layer that makes the country soil so fertile and become one of the major exporter of wheat in the world, its generous supplier of wheat make Ukraine 'Bread basket of Europe'. Ukraine possesses 30% of the world’s richest black soil; its agricultural industry has huge potential especially in grains. European Union (EU) is a significant trading partner of Ukraine but geopolitical tension adversely affects the wheat trade from black sea, which threatens Europe breadbasket. This study also highlights an index of export intensity to analyze the intensity of existing trade for the period 2011-2014 between Ukraine and EU countries. The result show export has intensified over the years, but this year low trade intensity. The overall consequence is hard to determine but if the situation deteriorates and Ukraine cutoff export, international wheat price will hike and grain prices (wheat) also come under the current circumstances and the recent development indicates how the grain market get affected and Agri future now in danger in Ukraine, and its forecast that Ukraine harvest low wheat crop this year and projected decline in export of wheat.

Keywords: breadbasket of Europe, export intensity index, growth rate, wheat export

Procedia PDF Downloads 312
10259 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks

Authors: Van Trieu, Shouhuai Xu, Yusheng Feng

Abstract:

Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.

Keywords: causality, multilevel graph, cyber-attacks, prediction

Procedia PDF Downloads 129
10258 Information Technology: Assessing Indian Realities Vis-à-Vis World Trade Organisation Disciplines

Authors: Saloni Khanderia

Abstract:

The World Trade Organisation’s (WTO) Information Technology Agreement (ITA), was concluded at the Singapore Ministerial Conference in 1996. The ITA is considered to be one of the biggest tariff-cutting deals because it eliminates all customs-related duties on the exportation of specific categories of information technology products to the territory of any other signatory to the Agreement. Over time, innovations in the information and communication technology (ICT) sector mandated the consideration of expanding the list of products covered by the ITA, which took place in the form of ITA-II negotiations during the WTO’s Nairobi Ministerial Conference. India, which was an original Member of the ITA-I, however, decided to opt-out of the negotiations to expand the list of products covered by the agreement. Instead, it preferred to give priority to its national policy initiative, namely the ‘Make-in-India’ programme [the MiI programme], which embarks upon fostering the domestic production of, inter alia, the ICT sector. India claims to have abstained from the ITA-II negotiations by stating that the zero-tariff regime created by the ITA-I debilitated its electronics-manufacturing sectors and on the contrary resulted in an over-reliance on imported electronic inputs. The author undertakes doctrinal research to examine India’s decision to opt-out of ITA-II negotiations, against the backdrop of the MiI Programme, which endeavours to improve productivity across-the-board. This paper accordingly scrutinises the tariff-cutting strategies of India to weigh the better alternative for India. Apropos, it examines whether initiatives like the MiI programme could plausibly resuscitate the ailing domestic electronics-manufacturing sector. The author opines that the country’s present decision to opt-out of ITA-II negotiations should be perceived as a welcome step. Thus, market-oriented reforms such as the MiI Programme, which focuses on indigenous innovation to improve domestic manufacturing in the ICT sector, should instead, in the present circumstances gain priority. Consequently, the MiI Programme would aid in moulding the country’s current tariff policy in a manner that will concurrently assist the promotion and sustenance of domestic manufacturing in the IT sector.

Keywords: electronics-manufacturing sector, information technology agreement, make in india programme, world trade organisation

Procedia PDF Downloads 205
10257 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 304
10256 Trends in Domestic Terms of Trade of Agricultural Sector of Pakistan

Authors: Anwar Hussain, Muhammad Iqbal

Abstract:

The changes in the prices of the agriculture commodities combined with changes in population and agriculture productivity affect farmers’ profitability and standard of living. This study intends to estimate various domestic terms of trade for agriculture sector and also to assess the volatility in the standard of living and profitability of farmers. The terms of trade has been estimated for Pakistan and its provinces using producer prices indices, consumer price indices, input prices indices and quantity indices using the data for the period 1990-91 to 2008-09. The domestic terms of trade of agriculture sector has been improved in terms of both approaches i.e. the ratio of producer prices indices to consumer prices indices and the real per capita income approach. However, the cross province estimates indicated that the terms of trade also improved for Khyber Pakhtunkhwa, Sindh and Punjab while Balochistan’s domestic terms of trade deteriorated drastically. In other words the standard of living of the farmers in Pakistan and its provinces except Balochistan improved. Using the input prices, the domestic terms of trade deteriorated for Pakistan as a whole and its provinces as well. This also explores that as a whole the profitability of the farmers reduced during the study period. The farmers pay more prices for inputs as compared to they receive for their produce. This further indicates that the poverty at the gross root level has been increased. Further, summing, the standard of living of the farmers improved but their profitability reduced, which indicates that the farmers do not completely rely on the farm income but also utilize some other sources of income for their livelihood. The study supports to give subsidies on farm inputs so as to improve the profitability of the farmers.

Keywords: agricultural terms of trade, farmers’ profitability, farmers’ standard of living, consumer and producer price indices, quantity indices

Procedia PDF Downloads 433
10255 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 240
10254 The impact of International Trade on Maritime Ecosystems: Evidence from the California Emission Control Area and the Kelp Forests

Authors: Fabien Candau, Florian Lafferrere

Abstract:

This article analyses how an emission policy for vessels (named California’s Ocean-Going Vessel Fuel Rule) was implemented in 2009 in California impacts trade and marine biodiversity. By studying the decrease in emission levels anticipated by the policy, we measure not only the consequences for port activities but also for one of the most important marine ecosystems of the California Coast: the Kelp forests. Using the Difference in Difference (DiD) approach at the Californian ports level, we find that this policy has led to a significant decrease in trade volume during this period. Therefore, we find a positive and significant effect of shipping policy on kelp canopy and biomass growth by controlling the specific climatic and environmental characteristics of California coastal areas.

Keywords: international trade, shipping, marine biodiversity, emission control area

Procedia PDF Downloads 36
10253 Geographical Indication (Gi) as a Means of Protecting Traditional Right of Muga Silk (Antheria Assamensis) of Assam-India

Authors: Niranjan Das

Abstract:

‘Geographical indication’ is a sign which is used on products that have a specific geographical origin and possess qualities or a reputation that are due to that origin. Geographical Indication is primarily granted to agricultural, natural, manufactured, handicrafts originating from a definite geographical territory. It is defined in Article 22(1) of the World Trade Organization's (WTO) 1995 Agreement on ‘Trade-Related Aspects of Intellectual Property Rights (TRIPS)’. Assam is literally a ‘Silk country’ where silk culture is rooted in the rural life and culture of Assamese people. This is the only state in India and the world where Muga silk (Antheraea assamensis) is grown. Out of the total production of India’s Muga silk, Assam has the credit of being the sole producer of this 100 percent output, and thus occupies a unique position in the sericulture map of the world. Muga production has been an effective means for generating gainful employment in rural Assam and it has enormous potential in the context of building the rural economy and generating livelihood of this region. Muga, the unique golden-yellow silk of Assam was granted the ‘Geographical Indication (GI)’ registration in 2007. It is the first item from the state of Assam to obtain the GI tag. Besides manufacturing of Muga Silk cloths, the industry is also giving employment to thousands of people, and the silk industry is playing a leading role in the economy of the state. As Brahmaputra Valley is also known for tourist destination, tourists are visiting the valley every year and now the Muga Silk has reached each corner of the country and also in the other parts of the world. This paper tries to emphasizes how the Geographical Indication tag is protecting the traditional right of the Muga Silk of Assam as it has been practised by the Assamese people since times immemorial.

Keywords: Geographical Indication, environment, Muga silk, traditional right and livelihood

Procedia PDF Downloads 237
10252 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 439
10251 Temperature Distribution Enhancement in a Conical Diffuser Fitted with Helical Screw-Tape with and without Center-Rod

Authors: Ehan Sabah Shukri, Wirachman Wisnoe

Abstract:

Temperature distribution investigation in a conical diffuser fitted with helical screw-tape with and without center-rod is studied numerically. A helical screw-tape is inserted in the diffuser to create swirl flow that helps to enhance the temperature distribution rate with inlet Reynolds number 4.3 x 104. Three pitch lengths ratios (Y/L = 0.153, 0.23 and 0.307) for the helical screw-tape with and without center-rod are simulated and compared. The geometry of the conical diffuser and the inlet condition for both arrangements are kept constant. Numerical findings show that the helical screw-tape inserts without center-rod perform significantly better than the helical tape inserts with center-rod in the conical diffuser.

Keywords: diffuser, temperature distribution, CFD, pitch ratio

Procedia PDF Downloads 381
10250 Analysis of the Brazilian Trade Balance in Relation to Mercosur: A Comparison between the Period 1989-1994 and 1994-2012

Authors: Luciana Aparecida Bastos, Tatiana Diair L. F. Rosa, Jesus Creapldi

Abstract:

The idea of Latin American integration occurred from the ideals of Simón Bolívar that, in 1824, called the Ibero-American nations to Amphictyonic Congress of Panama, on June 22, 1826, where he would defend the importance of Latin American unity. However, this congress was frustrating and the idea of Bolívar went no further. It was only after the European Union to start the process, driven by the end of World War II that the subject returned to emerge in Latin America. Thus, in 1960, supported by the European integration process, started in 1957 with the excellent result of the ECSC - European Coal and Steel Community, a result of the Customs Union of the BENELUX (integration between Belgium, the Netherlands and Luxembourg) in 1948, was created in Latin America, LAFTA - Latin American Free Trade Association, in 1960. In 1980, LAFTA was replaced by LAAI- Latin American Association, both with the same goal: to integrate Latin America, it´s economy and its trade. Most researchers in this period agree that the regional market would be expanded through the integration. The creation of one or more economic blocs in the region would provide the union of Latin American countries through a fusion of common interests and by their geographical proximity, which would try to develop common projects to promote mutual growth and economic development, tariff reductions, promotion of increased trade between, among many other goals set together. Thus, taking into account Mercosur, the main Latin-American block, created in 1994, the aim of this paper is to make a brief analysis of the trade balance performance of Brazil (larger economy of the block) in Mercosur in the periods: 1989-1994 and 1994-2012. The choice of this period was because the objective is to compare the period before and after the integration of Brazil in Mercosur. The methodologies used were the literature review and descriptive statistics. The results showed that after the integration of Brazil in Mercosur, the exports and imports grew within the bloc and the country turned out to become the leading importer of other economies of Mercosur after integration, that is, Brazil, after integration to Mercosur, was largely responsible for promoting the expansion of regional trade through the import of products from other members of the block.

Keywords: Brazil, mercosur, integration, trade balance, comparison

Procedia PDF Downloads 292
10249 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method

Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson

Abstract:

Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 156
10248 Trade Liberalization and Domestic Private Investment in Nigeria

Authors: George-Anokwuru Chioma Chidinma Bernadette

Abstract:

This paper investigated the effect of trade liberalization on domestic private investment in Nigeria from 1981 to 2020. To achieve this objective, secondary data on domestic private investment, trade openness, exchange rate and interest rate were sourced from the statistical bulletin of Nigeria’s apex bank. The Autoregressive Distributed Lag (ARDL) technique was used as the main analytical tool. The ARDL Bounds test revealed the existence of long run association among the variables. The results revealed that trade openness and exchange rate have positive and insignificant relationship with domestic private investment both in the long and short runs. At the same time, interest rate has negative relationship with domestic private investment both in the long and short runs. Therefore, it was concluded that there is no significant relationship between trade openness, exchange rate, interest rate and domestic private investment in Nigeria during the period of study. Based on the findings, the study recommended that government should formulate trade policies that will encourage the growth of domestic private investment in Nigeria. To achieve this, government should ensure consistency in trade policies and at the same time strengthen the existing policies to build investors’ confidence. Also, government should make available an investment-friendly environment, as well as monitor real sector operators to ensure that foreign exchange allocations are not diverted. Government should increase capital investment in education, housing, transportation, agriculture, health, power, road construction, national defense, among others that will help the various sectors of the economy to function very well thereby making the business environment friendly thereby enhancing the growth and development of the country.

Keywords: trade openness, domestic private investment, ARDL, exchange rate

Procedia PDF Downloads 32
10247 Solution of Logistics Center Selection Problem Using the Axiomatic Design Method

Authors: Fulya Zaralı, Harun Resit Yazgan

Abstract:

Logistics centers represent areas that all national and international logistics and activities related to logistics can be implemented by the various businesses. Logistics centers have a key importance in joining the transport stream and the transport system operations. Therefore, it is important where these centers are positioned to be effective and efficient and to show the expected performance of the centers. In this study, the location selection problem to position the logistics center is discussed. Alternative centers are evaluated according certain criteria. The most appropriate center is identified using the axiomatic design method.

Keywords: axiomatic design, logistic center, facility location, information systems

Procedia PDF Downloads 320
10246 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 252
10245 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 263
10244 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 153
10243 Readiness Analysis of Indonesian Accountants

Authors: Lisa Listiana

Abstract:

ASEAN leader agreed to accelerate ASEAN Economic Community (AEC) implementation by 2015. The AEC Blueprint has set up obligations for its members to follow which include the establishment of (a) free trade in goods, according to ASEAN Free Trade Area: AFTA, (b) free trade in services, according to ASEAN Framework Agreement on Services: AFAS, (c) free trade in investment, according to ASEAN Comprehensive Investment Agreement: ACIA, (d) free capital flow, and (e) free flow of skilled labors. Consequently, these obligations bring both challenges and opportunities for its members. As accountant is included in the coverage of 8 skilled labors, the readiness of accounting profession to embrace AEC 2015 is pivotal. If Indonesian accountants do not accelerate their learning effort, the knowledge gap between Indonesian accountants and their international colleagues will only be worsened. This paper aims to analyze the current progress of AEC preparation and its challenges and opportunities for Indonesian accountants, and also to propose recommendation as necessary.

Keywords: AEC, ASEAN, readiness, Indonesian accountants

Procedia PDF Downloads 410
10242 Trade and Economic Relations between Georgia and Germany – the Impediments Caused by the Pandemic and Future Prospects

Authors: Tamar Lazariashvili

Abstract:

There are a number of factors that determine the growth and development of the country's economy; however, trade and economic relations with other countries are the most important of all these factors. The paper analyzes the trade and economic relations between Georgia and Germany, identifies the impediments caused by the Covid pandemic, and substantiates the need for further economic cooperation between the countries. Research objectives. The objective of the research is to develop recommendations and reveal the prospects of further cooperation between Georgia and Germany based on identifying the problems in the field of trade and economy in the post-crisis situation. The research object is Georgian German economic relations. Germany is Georgia's largest trading partner in the European Union. Georgia and Germany actively cooperate within the framework of international organizations as well. The paper analyzes the multilateral and intensive economic relations between Germany and Georgia; evaluates the investments of German companies in Georgia and the activities of Georgian companies in Germany. Research methods. The paper uses general and specific research methods; in particular, analysis, synthesis, induction, deduction, comparison, statistical (selection, grouping, observation, trend), and other research methods.SWOT analysis is used to determine development opportunities between countries. As a result of the research economic ranking of Georgia and Germany are determined according to the above criteria, the causes of the impediments due to the pandemic are studied; the main problems in the field of trade and economy are identified. The paper provides conclusions on the problems in the trade relations between Georgia and Germany and suggests recommendations regarding the prospects for improving these relations.

Keywords: georgia-germany, trade and economic relations, economic ranking, perspective directions

Procedia PDF Downloads 117
10241 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province

Authors: Sakapas Saengchai, Pichamon Chansuchai

Abstract:

Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .

Keywords: Border, Trade, Policy, Promote

Procedia PDF Downloads 126
10240 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study

Authors: Nahian Salsabeel, Faria Leera

Abstract:

—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.

Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia

Procedia PDF Downloads 131
10239 Effect of Non-Tariff Measures to Indonesian Shrimp Export in International Market: Case of Sanitary and Phytosanitary and Technical Barriers to Trade

Authors: Muhammad Khaliqi, Amzul Rifin, Andriyono Kilat Adhi

Abstract:

The non-tariff policy could make Indonesian shrimp exports decrease in the international market. This research was aimed to analyze factors affecting Indonesia's exports of shrimp and the impact of SPS and TBT policy on Indonesian shrimp. Factors affecting the exports of Indonesian shrimp were estimated using gravity model. The results showed the GDP of exporters and exchange rate, have a negative influence against the export of Indonesia’s shrimp exports. The GDP of the importers and trade cost have a positive influence against the export of shrimp Indonesia while the SPS policy and TBT don’t affect Indonesia's exports of shrimp in the international market.

Keywords: gravity model, international trade, non-tariff measure, sanitary and phytosanitary, shrimp, technical barriers to trade

Procedia PDF Downloads 165
10238 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 376
10237 Aerodynamic Modeling Using Flight Data at High Angle of Attack

Authors: Rakesh Kumar, A. K. Ghosh

Abstract:

The paper presents the modeling of linear and nonlinear longitudinal aerodynamics using real flight data of Hansa-3 aircraft gathered at low and high angles of attack. The Neural-Gauss-Newton (NGN) method has been applied to model the linear and nonlinear longitudinal dynamics and estimate parameters from flight data. Unsteady aerodynamics due to flow separation at high angles of attack near stall has been included in the aerodynamic model using Kirchhoff’s quasi-steady stall model. NGN method is an algorithm that utilizes Feed Forward Neural Network (FFNN) and Gauss-Newton optimization to estimate the parameters and it does not require any a priori postulation of mathematical model or solving of equations of motion. NGN method was validated on real flight data generated at moderate angles of attack before application to the data at high angles of attack. The estimates obtained from compatible flight data using NGN method were validated by comparing with wind tunnel values and the maximum likelihood estimates. Validation was also carried out by comparing the response of measured motion variables with the response generated by using estimates a different control input. Next, NGN method was applied to real flight data generated by executing a well-designed quasi-steady stall maneuver. The results obtained in terms of stall characteristics and aerodynamic parameters were encouraging and reasonably accurate to establish NGN as a method for modeling nonlinear aerodynamics from real flight data at high angles of attack.

Keywords: parameter estimation, NGN method, linear and nonlinear, aerodynamic modeling

Procedia PDF Downloads 409
10236 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 247