Search results for: air and missile defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 459

Search results for: air and missile defense

399 Learning Motivation Factors for Pre-Cadets in Armed Forces Academies Preparatory School, Ministry of Defense

Authors: Prachya Kamonphet

Abstract:

The purposes of this research were to study the learning motivation factors for Pre-cadets in Armed Forces Academies Preparatory School, Ministry of Defense. The subjects were 320 Pre-cadets (from all 3-year classes of Pre-cadets, the academic year 2015). The research instruments were questionnaires. The collected data were analyzed by means of Descriptive Statistic and One-Way Analysis of Variance. The results of this study were as follows: The relation between the Pre-cadets’ average grade and the motivation in studying was significance.In the aspect of the environment related to Pre-cadets’ families and the motivation in studying.In the aspect of the environment related to Pre-cadets’ studying, it was found that teaching method, learning place, educational media, relationship between teachers and Pre-cadets, relationship between Pre-cadets and their friends, and relationship between Pre-cadets and the commanders were significant.

Keywords: learning motivation factors, learning motivation, armed forces academies preparatory school, learning

Procedia PDF Downloads 217
398 Mycorrhizal Autochthonous Consortium Induced Defense-Related Mechanisms of Olive Trees against Verticillium dahliae

Authors: Hanane Boutaj, Abdelilah Meddich, Said Wahbi, Zainab El Alaoui-Talibi, Allal Douira, Abdelkarim Filali-Maltouf, Cherkaoui El Modafar

Abstract:

The present work aims to investigate the effect of arbuscular mycorrhizal fungi (AMF) in improving the olive tree resistance to Verticillium wilt caused by Verticillium dahliae. Inoculated plants with a mycorrhizal autochthonous consortium 'Rhizolive consortium' and pure strain 'Glomus irregulare' were infected after three months with V. dahliae. The improving of olive tree resistance was determined through disease severity, incidence, and defoliation. On the other hand, the defense mechanisms of olive plants were evaluated through lignin content, phenylalanine ammonia lyase (PAL) activity, and polyphenol content. The results revealed that both AMF significantly (p < 0.05) reduced disease development and the rate of defoliation in infected olive plants. Moreover, the contents of lignin were boosted after mycorrhizal inoculation in both the roots and the stems of olive plants, which remained significantly (p < 0.001) higher after the 90th days of V. dahliae inoculation. PAL activity was increased after V. dahliae inoculation in the stems of 'Rhizolive consortium' treatment that were 17 times higher than those in the roots of olive plants. The polyphenol content in the stems was about twice higher than those in the roots. The reduction of disease severity was accompanied by increased levels of lignin content, PAL activity, and polyphenol content, particularly in the stems of olive plants, indicating the strengthening of the olive plant immune system against V. dahliae.

Keywords: olive tree, Mycorrhizal autochthonous consortium, Glomus irregulare, Verticillium dahliae, defense mechanisms

Procedia PDF Downloads 81
397 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 158
396 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 78
395 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service

Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla

Abstract:

With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.

Keywords: compulsory, military, service, reinforcement, perception

Procedia PDF Downloads 127
394 Modeling of a Small Unmanned Aerial Vehicle

Authors: Ahmed Elsayed Ahmed, Ashraf Hafez, A. N. Ouda, Hossam Eldin Hussein Ahmed, Hala Mohamed ABD-Elkader

Abstract:

Unmanned Aircraft Systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized,and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end, the model is checked by matching between the behavior of the states of the non-linear UAV and the resulted linear model with doublet at the control surfaces.

Keywords: UAV, equations of motion, modeling, linearization

Procedia PDF Downloads 702
393 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 428
392 Early Modern Controversies of Mobility within the Spanish Empire: Francisco De Vitoria and the Peaceful Right to Travel

Authors: Beatriz Salamanca

Abstract:

In his public lecture ‘On the American Indians’ given at the University of Salamanca in 1538-39, Francisco de Vitoria presented an unsettling defense of freedom of movement, arguing that the Spanish had the right to travel and dwell in the New World, since it was considered part of the law of nations [ius gentium] that men enjoyed free mutual intercourse anywhere they went. The principle of freedom of movement brought hopeful expectations, promising to bring mankind together and strengthen the ties of fraternity. However, it led to polemical situations when those whose mobility was in question represented a harmful threat or was for some reason undesired. In this context, Vitoria’s argument has been seen on multiple occasions as a justification of the expansion of the Spanish empire. In order to examine the meaning of Vitoria’s defense of free mobility, a more detailed look at Vitoria’s text is required, together with the study of some of his earliest works, among them, his commentaries on Thomas Aquinas’s Summa Theologiae, where he presented relevant insights on the idea of the law of nations. In addition, it is necessary to place Vitoria’s work in the context of the intellectual tradition he belonged to and the responses he obtained from some of his contemporaries who were concerned with similar issues. The claim of this research is that the Spanish right to travel advocated by Vitoria was not intended to be interpreted in absolute terms, for it had to serve the purpose of bringing peace and unity among men, and could not contradict natural law. In addition, Vitoria explicitly observed that the right to travel was only valid if the Spaniards caused no harm, a condition that has been underestimated by his critics. Therefore, Vitoria’s legacy is of enormous value as it initiated a long lasting discussion regarding the question of the grounds under which human mobility could be restricted. Again, under Vitoria’s argument it was clear that this freedom was not absolute, but the controversial nature of his defense of Spanish mobility demonstrates how difficult it was and still is to address the issue of the circulation of peoples across frontiers, and shows the significance of this discussion in today’s globalized world, where the rights and wrongs of notions like immigration, international trade or foreign intervention still lack sufficient consensus. This inquiry about Vitoria’s defense of the principle of freedom of movement is being placed here against the background of the history of political thought, political theory, international law, and international relations, following the methodological framework of contextual history of the ‘Cambridge School’.

Keywords: Francisco de Vitoria, freedom of movement, law of nations, ius gentium, Spanish empire

Procedia PDF Downloads 337
391 Imidocloprid as a Systemic-Acquired Resistant (SAR) Inducer in Nicotiana tabacum Var. Samsun NN Infected with Tobacco Mild Green Mosaic Virus

Authors: Mohammad Reza Hossein Zadeh

Abstract:

Plants have different layers of defense responses against biotic and abiotic stresses. One of the well-defined defense mechanism in plants is systemic acquired resistance (SAR) against a broad-range of pathogens. Salicylic acid (SA) plays a crucial role in regulation of the SAR pathway. It has been proved that Chemically SA-like compounds can mimic the SA signaling role. Imidocloprid is an insecticide being used to control whiteflies on crop plants. In order to study the possible role of Imidocloprid as an elicitor of SAR in plants, experiments were conducted in a completely randomized design frame with three treatments and duplicates on the detached leaves and whole Nicotiana tabacum var. Samsun NN. plants inoculated with Tobacco mild green mosaic virus (TMGMV). Compared with the effect of other SAR-inducers such as SA, Imidoclorid conferred a robust SAR induction in the infected plants. The results suggested that Imidocloprid even more powerful than SA can be considered as strong SAR inducer in the infected plants with viruses, which develop the local lesion symptoms.

Keywords: imidocloprid, Nicotiana tabacum var. Samsun NN, SAR, tobacco mild green, mosaic virus

Procedia PDF Downloads 542
390 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 275
389 Design and Analysis of Active Rocket Control Systems

Authors: Piotr Jerzy Rugor, Julia Wajoras

Abstract:

The presented work regards a single-stage aerodynamically controlled solid propulsion rocket. Steering a rocket to fly along a predetermined trajectory can be beneficial for minimizing aerodynamic losses and achieved by implementing an active control system on board. In this particular case, a canard configuration has been chosen, although other methods of control have been considered and preemptively analyzed, including non-aerodynamic ones. The objective of this work is to create a system capable of guiding the rocket, focusing on roll stabilization. The paper describes initial analysis of the problem, covers the main challenges of missile guidance and presents data acquired during the experimental study.

Keywords: active canard control system, rocket design, numerical simulations, flight optimization

Procedia PDF Downloads 171
388 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 498
387 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 416
386 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 283
385 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 507
384 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density

Authors: Jill Round

Abstract:

In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.

Keywords: risk management, structural equation model, supervisory practice, three lines of defense

Procedia PDF Downloads 195
383 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 332
382 Detection of Viral-Plant Interaction Using Some Pathogenesis Related Protein Genes to Identify Resistant Genes against Potato LeafRoll Virus and Potato Virus Y in Egyptian Isolates

Authors: Dalia. G. Aseel, E. E. Hafez, S. M. Hammad

Abstract:

Viral RNAs of both potato leaf roll virus (PLRV) and potato virus Y (PVY) were extracted from infected potato leaves collected from different Egyptian regions. Differential Display Polymerase Chain Reaction (DD-PCR) using (Endogluconase, β-1,3-glucanases, Chitinase, Peroxidase and Polyphenol oxidase) primers (forward strand) for was performed. The obtained data revealed different banding patterns depending on the viral type and the region of infection. Regarding PLRV, a 58 up regulated and 19 down regulated genes were detected, while, 31 up regulated and 14 down regulated genes were observed in case of PVY. Based on the nucleotide sequencing, variable phylogenetic relationships were reported for the three sequenced genes coding for: Induced stolen tip protein, Disease resistance RPP-like protein and non-specific lipid-transfer protein. In a complementary approach, using the quantitative Real-time PCR, the expressions of PRs genes understudy were estimated in the infected leaves by PLRV and PVY of three potato cultivars (Spunta, Diamont and Cara). The infection with both viruses inhibited the expressions of the five PRs genes. On the contrary, infected leaves by PLRV or PVY elevated the expression of some defense genes. This interaction also may be enhanced and/or inhibited the expression of some genes responsible for the plant defense mechanisms.

Keywords: PLRV, PVY, PR genes, DD-PCR, qRT-PCR, sequencing

Procedia PDF Downloads 309
381 The Effect of Artesunate on Myeloperoxidase Activity of Human Polymorphonuclear Neutrophil

Authors: J. B. Minari, O. B. Oloyede, A. A. Odutuga

Abstract:

Myeloperoxidase is the most abundant enzyme found in the polymorphonuclear neutrophil and is known to play a central role in the host defense system of the leukocyte. The enzyme has been reported to interact with some drugs to generate free radical which inhibits its activity. This study investigated the effects of artesunate on the activity of the enzyme and the subsequent effect on the host immune system. In investigating the effects of the drugs on myeloperoxidase, the influence of concentration, pH, partition ratio estimation and kinetics of inhibition were studied. This study showed that artesunate is concentration-dependent inhibitor of myeloperoxidase with an IC50 of 0.078mM. Partition ratio estimation showed that 60 enzymatic turnover cycles are required for complete inhibition of myeloperoxidase in the presence of artesunate. The influence of pH on the effect of artesunate on the enzyme showed least activity of myeloperoxidase at physiological pH. The kinetic inhibition studies showed that artesunate caused a competitive inhibition with an increase in the Km value from 0.12mM to 0.26mM and no effect on the Vmax value. The Ki value was estimated to be 2.5mM. The results obtained from this study show that artesunate is a potent inhibitor of myeloperoxidase and it is capable of inactivating the enzyme. It is considered that the inhibition of myeloperoxidase in the presence of artesunate as revealed in this study may partly explain the impairment of polymorphonuclear neutrophil and consequent reduction of the strength of the host defense system against secondary infections.

Keywords: myeloperoxidase, artesunate, inhibition, nuetrophill

Procedia PDF Downloads 340
380 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia

Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko

Abstract:

Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.

Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia

Procedia PDF Downloads 121
379 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 120
378 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 101
377 The Impact of Cognition and Communication on the Defense of Capital Murder Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: communication disorders, cognitive disorders, capital murder, death penalty, executive function

Procedia PDF Downloads 141
376 A Novel Protein Elicitor Extracted From Lecanicillium lecanii Induced Resistance Against Whitefly, Bemisia tabaci in Cotton

Authors: Yusuf Ali Abdulle, Azhar Uddin Keerio

Abstract:

Background: Protein elicitors play a key role in signaling or displaying plant defense mechanisms and emerging as vital tools for bio-control of insects. This study was aimed at the characterization of the novel protein elicitor isolated from entomopathogenic fungi Lecanicillium lecanii (V3) strain and its activity against Whitefly, Bemisia tabaci in cotton. The sequence of purified elicitor protein showed 100% similarity with hypothetical protein LEL_00878 [Cordyceps confragosa RCEF 1005], GenBank no (OAA81333.1). This novel protein elicitor has 253 amino acid residues and 762bp with a molecular mass of 29 kDa. The protein recombinant was expressed in Escherichia coli using pET‐28a (+) plasmid. Effects of purified novel protein elicitor on Bemisia tabaci were determined at three concentrations of protein (i.e., 58.32, 41.22, 35.41 μg mL⁻¹) on cotton plants and were exposed to newly molted adult B.tabaci. Bioassay results showed a significant effect of the exogenous application of novel protein elicitor on B. tabaci in cotton. In addition, the gene expression analysis found a significant up-regulation of the major genes associated with salicylic acid (SA) and jasmonic acid (JA) linked plant defense pathways in elicitor protein-treated plants. Our results suggested the potential application of a novel protein elicitor derived from Lecanicillium lecanii as a future bio-intensive controlling approach against the whitefly, Bemisia tabaci.

Keywords: resistance, Lecanicillium lecanii, secondary metabolites, whitefly

Procedia PDF Downloads 145
375 Effect of Aerobic Training with Coriandrum sativum Extract on Selection of Oxidative Stress Markers in Diabetic Rats

Authors: M. Golzade Gangraj, A. Abdi, N. ganji

Abstract:

Aim: The aim of this study was to evaluate the Effect of aerobic training with Coriandrum sativum extract on selection of oxidative stress markers in diabetic rats. Methods: The population of male Wistar rats is the Pasteur Institute. Forty rats were randomly selected as subjects. After moving the mouse in vitro and stay for a week in a cage for sustainability, were diabetic. Diabetes induced by injection STZ (55 mg per kg of body weight of mice) was performed. According blood glucose was randomly divided into four experimental groups (control, training, extract and training-extract). Extract group consumed 150 mg per kg of body weight per day coriander juice. Training group performed aerobic training (50-55% VO2max). Result: The results showed that aerobic exercise training and coriander seed extract caused a significant increase in total antioxidant; superoxide dismutase and catalase were significantly decreased malondialdehyde. Conclusion: the research findings can be stated that the exercise with coriander seed extract has the ability to inhibit free radicals and can have beneficial effects on the body's antioxidant defense system and reduce oxidative stress in diabetic rats with STZ. Because it improves the body's antioxidant defense by increasing serum levels of antioxidant enzymes.

Keywords: aerobic training, coriandrum sativum, antioxidant, diabetes

Procedia PDF Downloads 486
374 The Ocean at the Center of Geopolitics: Between an Overflowing Land and an Under-Exploited Sea

Authors: Ana Maria De Azevedo

Abstract:

We are living a remarkable period, responsible for the thriving of the human population to unprecedented levels. Still, it is empirically obvious that sustaining such a huge population puts a tremendous pressure on our planet. Once Land resources grow scarcer, there is a mounting pressure to find alternatives to support basic human needs elsewhere. Occupying most of our planet, it’s therefore natural that, is not a so distant future, humankind look for such basic subsistence means at the Ocean. Thus, once the Ocean becomes essential to Human subsistence, it is predictable it's moving to the foreground of Geopolitics. Both future technologies and uses of the Ocean, as bidding for the exploration of its resources away from the natural territory of influence of a Country, are susceptible of raising the risk of conflict between traditional political adversaries and/or the dilemma of having to balance economic interests, with various security and defense concerns. Those empirical observations suggest the need to further research on this perspective shift of the main Geopolitical axis to the Ocean, the new sources of conflict that can result thereon, and how to address them. The author suggests a systematic analysis of this problematic, to attain a political and legal international consensus, namely on what concerns updating of the 'United Nations Convention on the Law of the Sea' of 10 December 1982, and/or its annexes. To proceed with the present research, the primary analysis was based on a quantitative observation, but reasoning thereon relied essentially on a qualitative process of prospective scenarios assessment.

Keywords: marine resources, ocean geopolitics, security and defense, sustainable development

Procedia PDF Downloads 132
373 Research Methods and Design Strategies to Improve Resilience in Coastal and Estuary Cities

Authors: Irene Perez Lopez

Abstract:

Delta and estuary cities are spaces constantly evolving, incessantly altered by the ever-changing actions of water transformation. Strategies that incorporate comprehensive and integrated approaches to planning and design with water will play a powerful role in defining new types of flood defense. These strategies will encourage more resilient and active urban environments, allowing for new spatial and functional programs. This abstract presents the undergoing research in Newcastle, the first urbanized delta in New South Wales (Australia), and the region's second-biggest catchment and estuary. The research methodology is organized in three phases: 1) a projective cartography that analyses maps and data across the region's recorded history, identifying past and present constraints, and predicting future conditions. The cartography aids to identify worst-case scenarios, revealing the implications of land reclamation that have not considered the confronting evolution of climate change and its conflicts with inhabitation; 2) the cartographic studies identify the areas under threat and form the basis for further interdisciplinary research, complimented by community consultation, to reduce flood risk and increase urban resilience and livability; 3) a speculative or prospective phase of design with water to generate evidence-based guidelines that strengthen urban resilience of shorelines and flood prone areas.

Keywords: coastal defense, design, urban resilience, mapping

Procedia PDF Downloads 97
372 The Impact of a Five-Day Basic Disaster Management Training on Disaster Risk Reduction: Case Study of Indonesia Defense University

Authors: Jazmi Adlan Bohari, I. Dewa Ketut Kerta Widana

Abstract:

Education on disaster management has been made as a mainstream focus of many countries. In Indonesia, this has been emphasized with the direct order of the President of Indonesia to implement disaster education at all levels in both formal and informal education. Indonesia Defense University (IDU) executes this order through Three Pillars of Higher Education, which consists of research, education, and community service. One of them is a five-day disaster management training for 105 participants divided into three batches that consist of faculty members and graduate students. This training uses the 2018 Basic Disaster Management Training Modul issued by the Indonesia National Disaster Management Agency (BNPB). This research aims to analyze the impact of this short training on the trainee’s knowledge and understanding of basic disaster management. This study is a qualitative research with case study approach. The research shows that after five days of training, there as a significant increase in knowledge and understanding of basic disaster management experienced by the trainees with a 61,73% overall increase. The post-training data shows that 61% of the trainees have a very good understanding, 24% with good understanding, 13% with adequate understanding, and 2% with poor understanding. The result suggests that a short-time education with a structured curriculum can successfully increase the knowledge and understanding of disaster management on a basic level and can hypothetically contribute to the effort to reduce disaster risks.

Keywords: disaster education, basic disaster management training, three Pillars of Higher Education, disaster risk reduction

Procedia PDF Downloads 101
371 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 56
370 Numerical Investigation of Tsunami Flow Characteristics and Energy Reduction through Flexible Vegetation

Authors: Abhishek Mukherjee, Juan C. Cajas, Jenny Suckale, Guillaume Houzeaux, Oriol Lehmkuhl, Simone Marras

Abstract:

The investigation of tsunami flow characteristics and the quantification of tsunami energy reduction through the coastal vegetation is important to understand the protective benefits of nature-based mitigation parks. In the present study, a three-dimensional non-hydrostatic incompressible Computational Fluid Dynamics model with a two-way coupling enabled fluid-structure interaction approach (FSI) is used. After validating the numerical model against experimental data, tsunami flow characteristics have been investigated by varying vegetation density, modulus of elasticity, the gap between stems, and arrangement or distribution of vegetation patches. Streamwise depth average velocity profiles, turbulent kinetic energy, energy flux reflection, and dissipation extracted by the numerical study will be presented in this study. These diagnostics are essential to assess the importance of different parameters to design the proper coastal defense systems. When a tsunami wave reaches the shore, it transforms into undular bores, which induce scour around offshore structures and sediment transport. The bed shear stress, instantaneous turbulent kinetic energy, and the vorticity near-bed will be presented to estimate the importance of vegetation to prevent tsunami-induced scour and sediment transport.

Keywords: coastal defense, energy flux, fluid-structure interaction, natural hazards, sediment transport, tsunami mitigation

Procedia PDF Downloads 117