Search results for: air and missile defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 459

Search results for: air and missile defense

249 Understanding the Thermal Resistance of Active Dry Yeast by Differential Scanning Calorimetry Approach

Authors: Pauline Ribert, Gaelle Roudaut, Sebastien Dupont, Laurent Beney

Abstract:

Yeasts, anhydrobiotic organisms, can survive extreme water disturbances, thanks to the prolonged and reversible suspension of their cellular activity as well as the establishment of a defense arsenal. This property is exploited by many industrialists. One of the protection systems implemented by yeast is the vitrification of its cytoplasm by trehalose. The thermal resistance of dry yeasts is a crucial parameter for their use. However, studies on the thermal resistance of dry yeasts are often based on yeasts produced in laboratory conditions with non-optimal drying processes. We, therefore, propose a study on the thermal resistance of industrial dry yeasts in relation to their thermophysical properties. Heat stress was applied at three temperatures (50, 75, and 100°C) for 10, 30, or 60-minute treatments. The survival of yeasts to these treatments was estimated, and their thermophysical properties were studied by differential scanning calorimetry. The industrial dry yeasts resisted 60 minutes at 50°C and 75°C and 10 minutes at a temperature close to 100°C. At 100°C, yeast was above their glass transition temperature. Industrial dry yeasts are therefore capable of withstanding high thermal stress if maintained in a specific thermophysical state.

Keywords: dry yeast, glass transition, thermal resistance, vitrification

Procedia PDF Downloads 120
248 Design, Modeling and Analysis of 2×2 Microstrip Patch Antenna Array System for 5G Applications

Authors: Vinay Kumar K. S., Shravani V., Spoorthi G., Udith K. S., Divya T. M., Venkatesha M.

Abstract:

In this work, the mathematical modeling, design and analysis of a 2×2 microstrip patch antenna array (MSPA) antenna configuration is presented. Array utilizes a tiny strip antenna module with two vertical slots for 5G applications at an operating frequency of 5.3 GHz. The proposed array of antennas where the phased array antenna systems (PAAS) are used ubiquitously everywhere, from defense radar applications to commercial applications like 5G/6G. Microstrip patch antennae with slot arrays for linear polarisation parallel and perpendicular to the axis, respectively, are fed through transverse slots in the side wall of the circular waveguide and fed through longitudinal slots in the small wall of the rectangular waveguide. The microstrip patch antenna is developed using Ansys HFSS (High-Frequency Structure Simulator), this simulation tool. The maximum gain of 6.14 dB is achieved at 5.3 GHz for a single MSPA. For 2×2 array structure, a gain of 7.713 dB at 5.3 GHz is observed. Such antennas find many applications in 5G devices and technology.

Keywords: Ansys HFSS, gain, return loss, slot array, microstrip patch antenna, 5G antenna

Procedia PDF Downloads 82
247 Antimicrobial Activity of a Single Wap Domain (SWD)-Containing Protein from Litopenaeus vannamei against Vibrio parahaemolyticus Acute Hepatopancreatic Necrosis Disease (AHPND)

Authors: Suchao Donpudsa, Suwattana Visetnan, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

The Single Wap Domain (SWD) is a type III crustin antimicrobial peptide whose function is to defense the host animal against the bacterial infection by means of antimicrobial and antiproteinase activities. A study of LvSWD from Litopenaeus vannamei is reported herein about its activities and function against bacteria, particularly the Vibrio parahaemolyticus AHPND (VPAHPND) that causes acute hepatopancreatic necrosis disease. The over-expressed mature recombinant (r)LvSWD exhibits antimicrobial activity against both Gram-positive and Gram-negative bacteria, especially VPAHPND. With four times the MIC of rLvSWD, the treated post larval shrimp infected by VPAHPND is able to survive longer with the 50% survival rate as long as 78 h as compared to 36 h of the infected shrimp without rLvSWD. To a certain extent, we have demonstrated that the rLvSWD can be applied to protect the post larval shrimp.

Keywords: crustin, Litopenaeus vannamei, Vibrio parahaemolyticus AHPND, antimicrobial activity

Procedia PDF Downloads 189
246 The Modeling and Effectiveness Evaluation for Vessel Evasion to Acoustic Homing Torpedo

Authors: Li Minghui, Min Shaorong, Zhang Jun

Abstract:

This paper aims for studying the operational efficiency of surface warship’s motorized evasion to acoustic homing torpedo. It orderly developed trajectory model, self-guide detection model, vessel evasion model, as well as anti-torpedo error model in three-dimensional space to make up for the deficiency of precious researches analyzing two-dimensionally confrontational models. Then, making use of the Monte Carlo method, it carried out the simulation for the confrontation process of evasion in the environment of MATLAB. At last, it quantitatively analyzed the main factors which determine vessel’s survival probability. The results show that evasion relative bearing and speed will affect vessel’s survival probability significantly. Thus, choosing appropriate evasion relative bearing and speed according to alarming range and alarming relative bearing for torpedo, improving alarming range and positioning accuracy and reducing the response time against torpedo will improve the vessel’s survival probability significantly.

Keywords: acoustic homing torpedo, vessel evasion, monte carlo method, torpedo defense, vessel's survival probability

Procedia PDF Downloads 421
245 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 48
244 Protective Effect of the Standardized Extract of Holmskioldia sanguinea on Tumor Bearing Mice

Authors: Mahesh Pal, Tripti Mishra, Chandana Rao, Dalip Upreti

Abstract:

Cancer has been considered to be a very dreadful disease. Holmskioldia sanguinea is a large climbing shrub found in the Himalayas at an altitude of 5,000 ft and preliminary investigation showed the excellent yield of andrographolide and subjected for the anticancer activity. Protective effect of Holmskioldia sanguinea leaf ethanolic extract has been investigated against Ehrlich ascites carcinoma (EAC) and Daltons ascites lymphoma (DAL) in Swiss albino mice to evaluate the possible mechanism of action. The enzymatic antioxidant status was studied on tumor bearing mice, which shows the potential of the compound to possess significant free radical scavenging property and revealed significant tumor regression and prolonged survival time. The isolated bioactive molecule andrographolide from Holmskioldia sanguinea yields (2.5%) in subject to HPTLC/HPLC analysis. The cellular defense system constituting the superoxide dismutase, catalyses was enhanced whereby the lipid peroxidation content was restricted to a larger extent. The Holmskioldia sanguinea is a new source of andrographolide and demonstrated the potency in treatment of cancer.

Keywords: Holmskioldia sanguinea, tumor, mice, andrographolide

Procedia PDF Downloads 221
243 Studying the Anti-Cancer Effects of Thymoquinone on Tumor Cells Through Natural Killer Cells Activity

Authors: Nouf A. Aldarmahi, Nesrin I. Tarbiah, Nuha A. Alkhattabi, Huda F. Alshaibi

Abstract:

Nigella sativa which is known as dark cumin is a well-known example for a widely applicable herbal medicine. Nigella sativa can be effective in a variety of diseases such as hypertension, diabetes, bronchitis, gastrointestinal upset, and cancer. The anticancer effect of Nigella sativa appeared to be mediated by immune-modulatory effect through stimulating human natural killer (NK) cells. This is a type of lymphocytes which is part of the innate immunity, also known as the first line of defense in the body against pathogens. This study investigated the effect of thymoquinone as a major component of Nigella sativa on the molecular cytotoxic pathway of NK cell and the role of thymoquinone therapeutic effect on NK cells. NK cells were cultured with breast tumor cells in different ways and cultured media was collected and the concentration of perforin, granzyme B and interferon-α were measured by ELISA. The cytotoxic effect of NK cells on breast tumor cells was enhanced in the presence of thymoquinone, with increased activity of perforin in NK cells. This improved anticancer effect of thymoquinone on breast cancer cells.

Keywords: breast cancer, cancer cells, natural killer cells, thymoquinone

Procedia PDF Downloads 211
242 Effects of Starvation Stress on Antioxidant Defense System in Rainbow Trout (Oncorhynchus mykiss)

Authors: Metin Çenesi̇z, Büşra Şahi̇n

Abstract:

The sustainability of aquaculture is possible through the conscious use of resources and minimization of environmental impacts. These can be achieved through science-based planning, ecosystem-based management, strict observations and controls. The ideal water temperature for rainbow trout, which are intensively farmed in the Black Sea Region of Turkey, should be below 20 oC. In summer, the water temperature exceeds this value in some dams where production is carried out. For this reason, it has become obligatory to transfer to dams where the water temperature is low in order to provide suitable temperature conditions. There are many factors that may cause stress to trout during transportation. Some of these stress factors are starvation of the fish for a while to avoid contamination of the water, mobility and noise during transportation and loading, dissolved oxygen content and composition of the water in the transportation tanks, etc. The starvation stress caused by starvation/lack of food during transportation causes a certain amount of loss of macronutrients such as carbohydrates, proteins and fats in the tissues. This situation causes changes in metabolic activities and the energy balance of fish species. In this study, oxidant-antioxidant values and stress markers of rainbow trout starved before transplantation will be evaluated.

Keywords: oncorhynchus mykiss, starvation stress, TAS, TOS

Procedia PDF Downloads 44
241 Effect of Vesicular Arbuscular mycorrhiza on Phytoremedial Potential and Physiological Changes in Solanum melongena Plants Grown under Heavy Metal Stress

Authors: Ritu Chaturvedi, Mayank Varun, M. S. Paul

Abstract:

Heavy metal contamination of soil is a growing area of concern since the soil is the matrix that supports flora and impacts humans directly. Phytoremediation of contaminated sites is gaining popularity due to its cost effectiveness and solar driven nature. Some hyperaccumulators have been identified for their potential. Metal-accumulating plants have various mechanisms to cope up with stress and one of them is increasing antioxidative capacity. The aim of this research is to assess the effect of Vesicular arbuscular mycorrhiza (VAM) application on the phytoremedial potential of Solanum melongena (Eggplant) and level of photosynthetic pigments along with antioxidative enzymes. Results showed that VAM application increased shoot length, root proliferation pattern of plants. The level of photosynthetic pigments, proline, SOD, CAT, APX altered significantly in response to heavy metal treatment. In conclusion, VAM increased the uptake of heavy metals which lead to the activation of the defense system in plants for scavenging free radicals.

Keywords: heavy metal, phytoextraction, phytostabilization, reactive oxygen species

Procedia PDF Downloads 253
240 Antibacterial Potential from the Crude Extracts of Hemolymph and Hepatopancreas of Portunus segnis and Grapsus albolineatus

Authors: Mona Hajirasouli

Abstract:

Abstract: introduction: Antimicrobial compounds are important in the first line of the host defense system of many animal species. Material and methods: In the present study antibacterial activity of crude and proteins precipitate of hemolymph and crude hepatopancreas extracts from Portunus segnis and Grapsus albolineatus against a range of 6 different bacterial strains evaluated. Amoxicillin as a positive control were also used. Results: Maximum activity (15.9 mm) was recorded in male haemolymph of p.segnis against Entrobacter and minimum activity (7 mm) was recorded against Serratia marcescens, Enterobacter sp. and Proteus mirabilis from different extracts of Grapsus albolineatus. Data were analyzed using independent-t in SPSS version 16, and results indicate that there were not any significant differences between hemolymph and hepatopancreas extracts of 2 species. Discussion: Antimicrobial activity has been reported earlier in the hemolymph of some brachyuran crabs such as: blue crab Callinectes sapidus, mud crab Scylla serrata, Ocypode macrocera and Carcinus maenas. This study shows that hemolymph and hepatopancreas of Portunus segnis and Grapsus albolineatus may potential antibiotics.

Keywords: brachyuran, Portunus segnis, Grapsus albolineatus, hemolymph, hepatopancreas, antibacterial

Procedia PDF Downloads 143
239 Effect of Vinclozolin on Some Biochemical Parameters of Galleria mellonella (Lepidoptera: Pyralidae)

Authors: Rahile Ozturk, Esra Maltas

Abstract:

This study aimed to determine the effect of vinclozolin on some biochemical characteristics of Galleria mellonella (Lepidoptera: Pyralidae) which is an economically harmful species damaging the honeycomb in beekeeping. For experimental groups, the eggs obtained from stock were dropped into the mixed feed of vinclozolin at different doses (20, 40 and 60 ppm) and had the larvae fed with this feed. As result of the addition of vinclozolin at concentrations of 20, 40 and 60 ppm, glycogen contents of G. mellonella were determined and a significant reduction in the amount of glycogen was observed with increasing concentration of vinclozolin. In this study, activity of catalase enzyme, particularly effective in defense mechanism, activity of xanthine oxidase involved in nucleotide metabolism and activity of glucose oxidase in the metabolism of carbohydrates were measured. When compared with the results from control groups, the enzyme activities of the larvaes fed with the feed including 20, 40 and 60 ppm of vinclozolin were observed to vary or remain constant. Accordingly, glucose oxidase and catalase activities increased with the increase in amount of vinclozolin in the feed and the activity of xanthine oxidase remained stable.

Keywords: Catalase, Galleria mellonella, glucose oxidase, vinclozolin, xanthine oxidase.

Procedia PDF Downloads 275
238 Seismic Safety Evaluation of Weir Structures Using the Finite and Infinite Element Method

Authors: Ho Young Son, Bu Seog Ju, Woo Young Jung

Abstract:

This study presents the seismic safety evaluation of weir structure subjected to strong earthquake ground motions, as a flood defense structure in civil engineering structures. The seismic safety analysis procedure was illustrated through development of Finite Element (FE) and InFinite Element (IFE) method in ABAQUS platform. The IFE model was generated by CINPS4, 4-node linear one-way infinite model as a sold continuum infinite element in foundation areas of the weir structure and then nonlinear FE model using friction model for soil-structure interactions was applied in this study. In order to understand the complex behavior of weir structures, nonlinear time history analysis was carried out. Consequently, it was interesting to note that the compressive stress gave more vulnerability to the weir structure, in comparison to the tensile stress, during an earthquake. The stress concentration of the weir structure was shown at the connection area between the weir body and stilling basin area. The stress both tension and compression was reduced in IFE model rather than FE model of weir structures.

Keywords: seismic, numerical analysis, FEM, weir, boundary condition

Procedia PDF Downloads 421
237 The Role of the Injured Party's Fault in the Apportionment of Damages in Tort Law: A Comparative-Historical Study between Common Law and Islamic Law

Authors: Alireza Tavakoli Nia

Abstract:

In order to understand the role of the injured party's fault in dividing liability, we studied its historical background. In common law, the traditional contributory negligence rule was a complete defense. Then the legislature and judicial procedure modified that rule to one of apportionment. In Islamic law, too, the Action rule was at first used when the injured party was the sole cause, but jurists expanded the scope of this rule, so this rule was used in cases where both the injured party's fault and that of the other party are involved. There are some popular approaches for apportionment of damages. Some common law countries like Britain had chosen ‘the causal potency approach’ and ‘fixed apportionment’. Islamic countries like Iran have chosen both ‘the relative blameworthiness’ and ‘equal apportionment’ approaches. The article concludes that both common law and Islamic law believe in the division of responsibility between a wrongdoer claimant and the defendant. In contrast, in the apportionment of responsibility, Islamic law mostly believes in equal apportionment that is way easier and saves time and money, but common law legal systems have chosen the causal potency approach, which is more complicated than the rival approach but is fairer.

Keywords: contributory negligence, tort law, damage apportionment, common law, Islamic law

Procedia PDF Downloads 115
236 Impact of Dietary L-Threonine Supplementation on Performance and Health of Broiler Chickens, a Review

Authors: Mandana Hoseini

Abstract:

During last decades, intensive selection for higher growth rate in broiler chickens has accelerated daily body weight gain, which this has changed/increased the trends and amounts of nutrient requirements in the diet. As a result, considerable studies have been focused on the better determination of protein/amino acids requirements in modern broiler diets. One approach to minimize dietary crude protein inclusion levels is substitution of some of the dietary crude protein with synthetic amino acids. In addition, using synthetic forms of limiting essential amino acids in the diet could help better coincidence of dietary protein with ideal protein concept, which this in turn, minimizes nitrogen dissipation and environmental pollution. Threonine is usually considered as the third limiting amino acid in broiler diets. Recent studies have been demonstrated that dietary supplemental threonine would optimize growth performance, immune system, intestinal morphology, as well as oxidative defense in broiler chickens. In this review, threonine metabolism and its effects in relation with different aspects of broiler performance have been discussed.

Keywords: immune system, intestine, performance, requirement, threonine

Procedia PDF Downloads 68
235 Improvement of Cross Range Resolution in Through Wall Radar Imaging Using Bilateral Backprojection

Authors: Rashmi Yadawad, Disha Narayanan, Ravi Gautam

Abstract:

Through Wall Radar Imaging is gaining increasing importance now a days in the field of Defense and one of the most important criteria that forms the basis for the image quality obtained is the Cross-Range resolution of the image. In this research paper, the Bilateral Back projection algorithm has been implemented for Through Wall Radar Imaging. The sole purpose is to enhance the resolution in the cross range direction of the obtained Back projection image. Synthetic Data is generated for two targets which are placed at various locations in a room of dimensions 8 m by 6m. Two algorithms namely, simple back projection and Bilateral Back projection have been implemented, images are obtained and the obtained images are compared. Numerical simulations have been coded in MATLAB and experimental results of the two algorithms have been shown. Based on the comparison between the two images, it can be clearly seen that the ringing effect and chess board effect have been heavily reduced in the bilaterally back projected image and hence promising results are obtained giving a relatively sharper image with relatively well defined edges.

Keywords: through wall radar imaging, bilateral back projection, cross range resolution, synthetic data

Procedia PDF Downloads 314
234 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming

Authors: Meesun Sun, Yongmin Kim

Abstract:

Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.

Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost

Procedia PDF Downloads 112
233 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 156
232 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy

Authors: Lingaraju Dumpala, Narasa Raju Gosangi

Abstract:

Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.

Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA

Procedia PDF Downloads 106
231 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law

Authors: Gashaw Sisay Zenebe

Abstract:

Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.

Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL

Procedia PDF Downloads 28
230 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 49
229 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 355
228 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 157
227 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 472
226 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 177
225 Prison Pipeline or College Pathways: Transforming the Urban Classroom

Authors: Marcia J. Watson

Abstract:

The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.

Keywords: college access, higher education, school-to-prison pipeline, urban education reform

Procedia PDF Downloads 504
224 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications

Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav

Abstract:

Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.

Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)

Procedia PDF Downloads 256
223 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm

Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap

Abstract:

The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.

Keywords: beta defensin 3, bos taurus, docking, homology modeling

Procedia PDF Downloads 264
222 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer

Authors: Chao Wu

Abstract:

Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.

Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS

Procedia PDF Downloads 85
221 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism

Authors: SanXi Wu

Abstract:

A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.

Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism

Procedia PDF Downloads 15
220 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company

Authors: Shanshan Zhou, Massimo Battaglia

Abstract:

Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.

Keywords: community identity, disaster, identity, organizational learning

Procedia PDF Downloads 696