Search results for: air defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 435

Search results for: air defense

255 Significance of the 2015 Comprehensive Strategic Partnership Agreement to the Foreign Policies of Australia and Singapore in the Indo-Pacific Region

Authors: Iraj Musa Dawaari

Abstract:

Australia and Singapore signed the Comprehensive Strategic Partnership (CSP) agreement on 29th June 2015. This agreement aims to strengthen security, defense, diplomatic, economic, education, and innovation cooperation, as well as people-to-people relations between the two states. The purpose of this study is to examine rationales underpinning the (2015 CSP) agreement in order to better understand the national and foreign policy priorities of both Australia and Singapore in the period leading up to the signing of the agreement and in the period since. This research project will seek to establish how both countries’ national and foreign policy priorities have developed in recent years in the light of growing tensions between China and the US in the Indo-Pacific region and how the CSP agreement has influenced these priorities. This project also seeks to better understand and analyse why both states signed the CSP agreement in 2015.

Keywords: Australia, Singapore, foreign policy, partnership, USA, China, Indo-Pacific Region

Procedia PDF Downloads 108
254 The AI Arena: A Framework for Distributed Multi-Agent Reinforcement Learning

Authors: Edward W. Staley, Corban G. Rivera, Ashley J. Llorens

Abstract:

Advances in reinforcement learning (RL) have resulted in recent breakthroughs in the application of artificial intelligence (AI) across many different domains. An emerging landscape of development environments is making powerful RL techniques more accessible for a growing community of researchers. However, most existing frameworks do not directly address the problem of learning in complex operating environments, such as dense urban settings or defense-related scenarios, that incorporate distributed, heterogeneous teams of agents. To help enable AI research for this important class of applications, we introduce the AI Arena: a scalable framework with flexible abstractions for distributed multi-agent reinforcement learning. The AI Arena extends the OpenAI Gym interface to allow greater flexibility in learning control policies across multiple agents with heterogeneous learning strategies and localized views of the environment. To illustrate the utility of our framework, we present experimental results that demonstrate performance gains due to a distributed multi-agent learning approach over commonly-used RL techniques in several different learning environments.

Keywords: reinforcement learning, multi-agent, deep learning, artificial intelligence

Procedia PDF Downloads 132
253 Martial Arts and Combative Program of the Philippine Military Academy Cadet Corps Armed Forces of the Philippines: An Assessment

Authors: Jayson Vicente

Abstract:

The young men and women of Philippine Military Academy Cadet Corps Armed Forces of the Philippines (PMA CCAFP) are bred to be front liners and last line of defense during war and times of peace; as such, they must be equipped with the most practical and most effective combat-ready Martial Arts and Combative skills to effectively fulfill their duty, as well as to protect and safeguard themselves to continue serving the people and their country. This study shall assess the current Martial Arts and Combative Program of the PMA CCAFP using descriptive methodology by interviews and floating questionnaires. The current Martial Arts and Combative Program of the PMA CCAFP with all of the subjects involved are more sports inclined rather than combat-equipped. Picking the best from each subject used in the program, this study seeks to recommend improvements or create a better Martial Arts and Combative Program that will satisfy the objective of producing Martial Arts combatant graduates. A good Martial Arts and Combative Program for PMA is essential to prepare them for what lies ahead, which is unforgiving and no rules to pacify threat.

Keywords: combative, martial arts, military, program

Procedia PDF Downloads 123
252 The Insecticidal Activity of Three Essential Oils on the Chickpea Weevil Callosobruchus Maculatus F (Coleoptera; Curculionidae)

Authors: Azzaz Siham

Abstract:

Essential oils are, by definition, secondary metabolites produced by plants as a means of defense against phytophagous pests. This work aims to study the insecticidal effect of the essential oil of three plants: Phoenician juniper Juniperus phoenicea; the Niaouli Melaleuca quinquenervia and the wild carrot Daucus carota L, on the chickpea weevil Callosobruchus maculatus F, which is known as a formidable pest of legumes. Essential oils are obtained by hydrodistillation. The study carried out in the laboratory concerning the insecticidal activity of these essential oils by contact and inhalation effect on C.maculatus gave important results, especially for the essential oil of Juniperus phoenicea for the contact test; and for the inhalation test, the essential oil of Melaleuca quinquenervia shows remarkable insecticidal activity compared to the other two oils. The results of these tests showed a very interesting action. The essential oils used very significantly describe the lifespan of adults.

Keywords: essential oils, juniperus phoenicea, melaleuca quinquenervia, daucus carota, Callosobruchus maculatus

Procedia PDF Downloads 116
251 Alternative Dispute Resolution Procedures for International Conflicts about Industrial Design

Authors: Moreno Liso Lourdes

Abstract:

The industrial design protects the appearance of part or all of a product resulting from the features of, in particular, the lines, contours, colors, shape, texture or materials of the product itself or its ornamentation. The industrial property offers a different answer depending on the characteristics of the shape object of protection possible, including the trademark and industrial design. There are certain cases where the trademark right invalidate the exclusive right of the industrial design. This can occur in the following situations: 1st) collected as a sign design and trademarked; and 2nd) you want to trademark and protected as a form design (either registered or unregistered). You can either get a trade mark or design right in the same sign or form, provided it meets the legal definition of brand and design and meets the requirements imposed for the protection of each of them, even able to produce an overlap of protection. However, this double protection does not have many advantages. It is, therefore, necessary to choose the best form of legal protection according to the most adequate ratios. The diversity of rights that can use the creator of an industrial design to protect your job requires you to make a proper selection to prevent others, especially their competitors, taking advantage of the exclusivity that guarantees the law. It is necessary to choose between defending the interests of the parties through a judicial or extrajudicial procedure when the conflict arises. In this paper, we opted for the defense through mediation.

Keywords: industrial design, ADR, Law, EUIPO

Procedia PDF Downloads 214
250 Understanding the Thermal Resistance of Active Dry Yeast by Differential Scanning Calorimetry Approach

Authors: Pauline Ribert, Gaelle Roudaut, Sebastien Dupont, Laurent Beney

Abstract:

Yeasts, anhydrobiotic organisms, can survive extreme water disturbances, thanks to the prolonged and reversible suspension of their cellular activity as well as the establishment of a defense arsenal. This property is exploited by many industrialists. One of the protection systems implemented by yeast is the vitrification of its cytoplasm by trehalose. The thermal resistance of dry yeasts is a crucial parameter for their use. However, studies on the thermal resistance of dry yeasts are often based on yeasts produced in laboratory conditions with non-optimal drying processes. We, therefore, propose a study on the thermal resistance of industrial dry yeasts in relation to their thermophysical properties. Heat stress was applied at three temperatures (50, 75, and 100°C) for 10, 30, or 60-minute treatments. The survival of yeasts to these treatments was estimated, and their thermophysical properties were studied by differential scanning calorimetry. The industrial dry yeasts resisted 60 minutes at 50°C and 75°C and 10 minutes at a temperature close to 100°C. At 100°C, yeast was above their glass transition temperature. Industrial dry yeasts are therefore capable of withstanding high thermal stress if maintained in a specific thermophysical state.

Keywords: dry yeast, glass transition, thermal resistance, vitrification

Procedia PDF Downloads 120
249 Design, Modeling and Analysis of 2×2 Microstrip Patch Antenna Array System for 5G Applications

Authors: Vinay Kumar K. S., Shravani V., Spoorthi G., Udith K. S., Divya T. M., Venkatesha M.

Abstract:

In this work, the mathematical modeling, design and analysis of a 2×2 microstrip patch antenna array (MSPA) antenna configuration is presented. Array utilizes a tiny strip antenna module with two vertical slots for 5G applications at an operating frequency of 5.3 GHz. The proposed array of antennas where the phased array antenna systems (PAAS) are used ubiquitously everywhere, from defense radar applications to commercial applications like 5G/6G. Microstrip patch antennae with slot arrays for linear polarisation parallel and perpendicular to the axis, respectively, are fed through transverse slots in the side wall of the circular waveguide and fed through longitudinal slots in the small wall of the rectangular waveguide. The microstrip patch antenna is developed using Ansys HFSS (High-Frequency Structure Simulator), this simulation tool. The maximum gain of 6.14 dB is achieved at 5.3 GHz for a single MSPA. For 2×2 array structure, a gain of 7.713 dB at 5.3 GHz is observed. Such antennas find many applications in 5G devices and technology.

Keywords: Ansys HFSS, gain, return loss, slot array, microstrip patch antenna, 5G antenna

Procedia PDF Downloads 82
248 Antimicrobial Activity of a Single Wap Domain (SWD)-Containing Protein from Litopenaeus vannamei against Vibrio parahaemolyticus Acute Hepatopancreatic Necrosis Disease (AHPND)

Authors: Suchao Donpudsa, Suwattana Visetnan, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

The Single Wap Domain (SWD) is a type III crustin antimicrobial peptide whose function is to defense the host animal against the bacterial infection by means of antimicrobial and antiproteinase activities. A study of LvSWD from Litopenaeus vannamei is reported herein about its activities and function against bacteria, particularly the Vibrio parahaemolyticus AHPND (VPAHPND) that causes acute hepatopancreatic necrosis disease. The over-expressed mature recombinant (r)LvSWD exhibits antimicrobial activity against both Gram-positive and Gram-negative bacteria, especially VPAHPND. With four times the MIC of rLvSWD, the treated post larval shrimp infected by VPAHPND is able to survive longer with the 50% survival rate as long as 78 h as compared to 36 h of the infected shrimp without rLvSWD. To a certain extent, we have demonstrated that the rLvSWD can be applied to protect the post larval shrimp.

Keywords: crustin, Litopenaeus vannamei, Vibrio parahaemolyticus AHPND, antimicrobial activity

Procedia PDF Downloads 189
247 The Modeling and Effectiveness Evaluation for Vessel Evasion to Acoustic Homing Torpedo

Authors: Li Minghui, Min Shaorong, Zhang Jun

Abstract:

This paper aims for studying the operational efficiency of surface warship’s motorized evasion to acoustic homing torpedo. It orderly developed trajectory model, self-guide detection model, vessel evasion model, as well as anti-torpedo error model in three-dimensional space to make up for the deficiency of precious researches analyzing two-dimensionally confrontational models. Then, making use of the Monte Carlo method, it carried out the simulation for the confrontation process of evasion in the environment of MATLAB. At last, it quantitatively analyzed the main factors which determine vessel’s survival probability. The results show that evasion relative bearing and speed will affect vessel’s survival probability significantly. Thus, choosing appropriate evasion relative bearing and speed according to alarming range and alarming relative bearing for torpedo, improving alarming range and positioning accuracy and reducing the response time against torpedo will improve the vessel’s survival probability significantly.

Keywords: acoustic homing torpedo, vessel evasion, monte carlo method, torpedo defense, vessel's survival probability

Procedia PDF Downloads 421
246 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 48
245 Protective Effect of the Standardized Extract of Holmskioldia sanguinea on Tumor Bearing Mice

Authors: Mahesh Pal, Tripti Mishra, Chandana Rao, Dalip Upreti

Abstract:

Cancer has been considered to be a very dreadful disease. Holmskioldia sanguinea is a large climbing shrub found in the Himalayas at an altitude of 5,000 ft and preliminary investigation showed the excellent yield of andrographolide and subjected for the anticancer activity. Protective effect of Holmskioldia sanguinea leaf ethanolic extract has been investigated against Ehrlich ascites carcinoma (EAC) and Daltons ascites lymphoma (DAL) in Swiss albino mice to evaluate the possible mechanism of action. The enzymatic antioxidant status was studied on tumor bearing mice, which shows the potential of the compound to possess significant free radical scavenging property and revealed significant tumor regression and prolonged survival time. The isolated bioactive molecule andrographolide from Holmskioldia sanguinea yields (2.5%) in subject to HPTLC/HPLC analysis. The cellular defense system constituting the superoxide dismutase, catalyses was enhanced whereby the lipid peroxidation content was restricted to a larger extent. The Holmskioldia sanguinea is a new source of andrographolide and demonstrated the potency in treatment of cancer.

Keywords: Holmskioldia sanguinea, tumor, mice, andrographolide

Procedia PDF Downloads 220
244 Studying the Anti-Cancer Effects of Thymoquinone on Tumor Cells Through Natural Killer Cells Activity

Authors: Nouf A. Aldarmahi, Nesrin I. Tarbiah, Nuha A. Alkhattabi, Huda F. Alshaibi

Abstract:

Nigella sativa which is known as dark cumin is a well-known example for a widely applicable herbal medicine. Nigella sativa can be effective in a variety of diseases such as hypertension, diabetes, bronchitis, gastrointestinal upset, and cancer. The anticancer effect of Nigella sativa appeared to be mediated by immune-modulatory effect through stimulating human natural killer (NK) cells. This is a type of lymphocytes which is part of the innate immunity, also known as the first line of defense in the body against pathogens. This study investigated the effect of thymoquinone as a major component of Nigella sativa on the molecular cytotoxic pathway of NK cell and the role of thymoquinone therapeutic effect on NK cells. NK cells were cultured with breast tumor cells in different ways and cultured media was collected and the concentration of perforin, granzyme B and interferon-α were measured by ELISA. The cytotoxic effect of NK cells on breast tumor cells was enhanced in the presence of thymoquinone, with increased activity of perforin in NK cells. This improved anticancer effect of thymoquinone on breast cancer cells.

Keywords: breast cancer, cancer cells, natural killer cells, thymoquinone

Procedia PDF Downloads 211
243 Effects of Starvation Stress on Antioxidant Defense System in Rainbow Trout (Oncorhynchus mykiss)

Authors: Metin Çenesi̇z, Büşra Şahi̇n

Abstract:

The sustainability of aquaculture is possible through the conscious use of resources and minimization of environmental impacts. These can be achieved through science-based planning, ecosystem-based management, strict observations and controls. The ideal water temperature for rainbow trout, which are intensively farmed in the Black Sea Region of Turkey, should be below 20 oC. In summer, the water temperature exceeds this value in some dams where production is carried out. For this reason, it has become obligatory to transfer to dams where the water temperature is low in order to provide suitable temperature conditions. There are many factors that may cause stress to trout during transportation. Some of these stress factors are starvation of the fish for a while to avoid contamination of the water, mobility and noise during transportation and loading, dissolved oxygen content and composition of the water in the transportation tanks, etc. The starvation stress caused by starvation/lack of food during transportation causes a certain amount of loss of macronutrients such as carbohydrates, proteins and fats in the tissues. This situation causes changes in metabolic activities and the energy balance of fish species. In this study, oxidant-antioxidant values and stress markers of rainbow trout starved before transplantation will be evaluated.

Keywords: oncorhynchus mykiss, starvation stress, TAS, TOS

Procedia PDF Downloads 44
242 Effect of Vesicular Arbuscular mycorrhiza on Phytoremedial Potential and Physiological Changes in Solanum melongena Plants Grown under Heavy Metal Stress

Authors: Ritu Chaturvedi, Mayank Varun, M. S. Paul

Abstract:

Heavy metal contamination of soil is a growing area of concern since the soil is the matrix that supports flora and impacts humans directly. Phytoremediation of contaminated sites is gaining popularity due to its cost effectiveness and solar driven nature. Some hyperaccumulators have been identified for their potential. Metal-accumulating plants have various mechanisms to cope up with stress and one of them is increasing antioxidative capacity. The aim of this research is to assess the effect of Vesicular arbuscular mycorrhiza (VAM) application on the phytoremedial potential of Solanum melongena (Eggplant) and level of photosynthetic pigments along with antioxidative enzymes. Results showed that VAM application increased shoot length, root proliferation pattern of plants. The level of photosynthetic pigments, proline, SOD, CAT, APX altered significantly in response to heavy metal treatment. In conclusion, VAM increased the uptake of heavy metals which lead to the activation of the defense system in plants for scavenging free radicals.

Keywords: heavy metal, phytoextraction, phytostabilization, reactive oxygen species

Procedia PDF Downloads 253
241 Antibacterial Potential from the Crude Extracts of Hemolymph and Hepatopancreas of Portunus segnis and Grapsus albolineatus

Authors: Mona Hajirasouli

Abstract:

Abstract: introduction: Antimicrobial compounds are important in the first line of the host defense system of many animal species. Material and methods: In the present study antibacterial activity of crude and proteins precipitate of hemolymph and crude hepatopancreas extracts from Portunus segnis and Grapsus albolineatus against a range of 6 different bacterial strains evaluated. Amoxicillin as a positive control were also used. Results: Maximum activity (15.9 mm) was recorded in male haemolymph of p.segnis against Entrobacter and minimum activity (7 mm) was recorded against Serratia marcescens, Enterobacter sp. and Proteus mirabilis from different extracts of Grapsus albolineatus. Data were analyzed using independent-t in SPSS version 16, and results indicate that there were not any significant differences between hemolymph and hepatopancreas extracts of 2 species. Discussion: Antimicrobial activity has been reported earlier in the hemolymph of some brachyuran crabs such as: blue crab Callinectes sapidus, mud crab Scylla serrata, Ocypode macrocera and Carcinus maenas. This study shows that hemolymph and hepatopancreas of Portunus segnis and Grapsus albolineatus may potential antibiotics.

Keywords: brachyuran, Portunus segnis, Grapsus albolineatus, hemolymph, hepatopancreas, antibacterial

Procedia PDF Downloads 143
240 Effect of Vinclozolin on Some Biochemical Parameters of Galleria mellonella (Lepidoptera: Pyralidae)

Authors: Rahile Ozturk, Esra Maltas

Abstract:

This study aimed to determine the effect of vinclozolin on some biochemical characteristics of Galleria mellonella (Lepidoptera: Pyralidae) which is an economically harmful species damaging the honeycomb in beekeeping. For experimental groups, the eggs obtained from stock were dropped into the mixed feed of vinclozolin at different doses (20, 40 and 60 ppm) and had the larvae fed with this feed. As result of the addition of vinclozolin at concentrations of 20, 40 and 60 ppm, glycogen contents of G. mellonella were determined and a significant reduction in the amount of glycogen was observed with increasing concentration of vinclozolin. In this study, activity of catalase enzyme, particularly effective in defense mechanism, activity of xanthine oxidase involved in nucleotide metabolism and activity of glucose oxidase in the metabolism of carbohydrates were measured. When compared with the results from control groups, the enzyme activities of the larvaes fed with the feed including 20, 40 and 60 ppm of vinclozolin were observed to vary or remain constant. Accordingly, glucose oxidase and catalase activities increased with the increase in amount of vinclozolin in the feed and the activity of xanthine oxidase remained stable.

Keywords: Catalase, Galleria mellonella, glucose oxidase, vinclozolin, xanthine oxidase.

Procedia PDF Downloads 275
239 Seismic Safety Evaluation of Weir Structures Using the Finite and Infinite Element Method

Authors: Ho Young Son, Bu Seog Ju, Woo Young Jung

Abstract:

This study presents the seismic safety evaluation of weir structure subjected to strong earthquake ground motions, as a flood defense structure in civil engineering structures. The seismic safety analysis procedure was illustrated through development of Finite Element (FE) and InFinite Element (IFE) method in ABAQUS platform. The IFE model was generated by CINPS4, 4-node linear one-way infinite model as a sold continuum infinite element in foundation areas of the weir structure and then nonlinear FE model using friction model for soil-structure interactions was applied in this study. In order to understand the complex behavior of weir structures, nonlinear time history analysis was carried out. Consequently, it was interesting to note that the compressive stress gave more vulnerability to the weir structure, in comparison to the tensile stress, during an earthquake. The stress concentration of the weir structure was shown at the connection area between the weir body and stilling basin area. The stress both tension and compression was reduced in IFE model rather than FE model of weir structures.

Keywords: seismic, numerical analysis, FEM, weir, boundary condition

Procedia PDF Downloads 421
238 The Role of the Injured Party's Fault in the Apportionment of Damages in Tort Law: A Comparative-Historical Study between Common Law and Islamic Law

Authors: Alireza Tavakoli Nia

Abstract:

In order to understand the role of the injured party's fault in dividing liability, we studied its historical background. In common law, the traditional contributory negligence rule was a complete defense. Then the legislature and judicial procedure modified that rule to one of apportionment. In Islamic law, too, the Action rule was at first used when the injured party was the sole cause, but jurists expanded the scope of this rule, so this rule was used in cases where both the injured party's fault and that of the other party are involved. There are some popular approaches for apportionment of damages. Some common law countries like Britain had chosen ‘the causal potency approach’ and ‘fixed apportionment’. Islamic countries like Iran have chosen both ‘the relative blameworthiness’ and ‘equal apportionment’ approaches. The article concludes that both common law and Islamic law believe in the division of responsibility between a wrongdoer claimant and the defendant. In contrast, in the apportionment of responsibility, Islamic law mostly believes in equal apportionment that is way easier and saves time and money, but common law legal systems have chosen the causal potency approach, which is more complicated than the rival approach but is fairer.

Keywords: contributory negligence, tort law, damage apportionment, common law, Islamic law

Procedia PDF Downloads 115
237 Impact of Dietary L-Threonine Supplementation on Performance and Health of Broiler Chickens, a Review

Authors: Mandana Hoseini

Abstract:

During last decades, intensive selection for higher growth rate in broiler chickens has accelerated daily body weight gain, which this has changed/increased the trends and amounts of nutrient requirements in the diet. As a result, considerable studies have been focused on the better determination of protein/amino acids requirements in modern broiler diets. One approach to minimize dietary crude protein inclusion levels is substitution of some of the dietary crude protein with synthetic amino acids. In addition, using synthetic forms of limiting essential amino acids in the diet could help better coincidence of dietary protein with ideal protein concept, which this in turn, minimizes nitrogen dissipation and environmental pollution. Threonine is usually considered as the third limiting amino acid in broiler diets. Recent studies have been demonstrated that dietary supplemental threonine would optimize growth performance, immune system, intestinal morphology, as well as oxidative defense in broiler chickens. In this review, threonine metabolism and its effects in relation with different aspects of broiler performance have been discussed.

Keywords: immune system, intestine, performance, requirement, threonine

Procedia PDF Downloads 67
236 Improvement of Cross Range Resolution in Through Wall Radar Imaging Using Bilateral Backprojection

Authors: Rashmi Yadawad, Disha Narayanan, Ravi Gautam

Abstract:

Through Wall Radar Imaging is gaining increasing importance now a days in the field of Defense and one of the most important criteria that forms the basis for the image quality obtained is the Cross-Range resolution of the image. In this research paper, the Bilateral Back projection algorithm has been implemented for Through Wall Radar Imaging. The sole purpose is to enhance the resolution in the cross range direction of the obtained Back projection image. Synthetic Data is generated for two targets which are placed at various locations in a room of dimensions 8 m by 6m. Two algorithms namely, simple back projection and Bilateral Back projection have been implemented, images are obtained and the obtained images are compared. Numerical simulations have been coded in MATLAB and experimental results of the two algorithms have been shown. Based on the comparison between the two images, it can be clearly seen that the ringing effect and chess board effect have been heavily reduced in the bilaterally back projected image and hence promising results are obtained giving a relatively sharper image with relatively well defined edges.

Keywords: through wall radar imaging, bilateral back projection, cross range resolution, synthetic data

Procedia PDF Downloads 314
235 An Analytical Method for Maintenance Cost Estimating Relationships of Helicopters Using Linear Programming

Authors: Meesun Sun, Yongmin Kim

Abstract:

Estimating maintenance cost is crucial in defense management because it affects military budgets and availability of equipment. When it comes to estimating maintenance cost of the deployed equipment, time series forecasting can be applied with the actual historical cost data. It is more difficult issue to estimate maintenance cost of new equipment for which the actual costs are not provided. In this underlying context, this study proposes an analytical method for maintenance cost estimating relationships (CERs) development of helicopters using linear programming. The CERs can be applied to a new helicopter because they use non-cost independent variables such as the number of engines, the empty weight and so on. In the Republic of Korea, the maintenance cost of new equipment has been usually estimated by reflecting maintenance cost to unit price ratio of the legacy equipment. This study confirms that the CERs perform well for the 10 types of airmobile helicopters in terms of mean absolute percentage error by applying leave-one-out cross-validation. The suggested method is very useful to estimate the maintenance cost of new equipment and can help in the affordability assessment of acquisition program portfolios for total life cycle systems management.

Keywords: affordability analysis, cost estimating relationship, helicopter, linear programming, maintenance cost

Procedia PDF Downloads 112
234 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 156
233 Investigation of Optimized Mechanical Properties on Friction Stir Welded Al6063 Alloy

Authors: Lingaraju Dumpala, Narasa Raju Gosangi

Abstract:

Friction Stir Welding (FSW) is relatively new, environmentally friendly, versatile, and widely used joining technique for soft materials such as aluminum. FSW has got a lot of attention as a solid-state joining method which avoids many common problems of fusion welding and provides an improved way of producing aluminum joints in a faster way. FSW can be used for various aerospace, defense, automotive and transportation applications. It is necessary to understand the friction stir welded joints and its characteristics to use this new joining technique in critical applications. This study investigated the mechanical properties of friction stir welded aluminum 6063 alloys. FSW is carried out based on the design of experiments using L16 mixed level array by considering tool rotational speeds, tool feed rate and tool tilt angles as process parameters. The optimization of process parameters is carried by Taguchi based regression analysis and the significance of process parameters is analyzed using ANOVA. It is observed that the considered process parameters are high influences the mechanical properties of Al6063.

Keywords: FSW, aluminum alloy, mechanical properties, optimization, Taguchi, ANOVA

Procedia PDF Downloads 106
232 The Politics of Identity and Retributive Genocidal Massacre against Chena Amhara under International Humanitarian Law

Authors: Gashaw Sisay Zenebe

Abstract:

Northern-Ethiopian conflict that broke out on 04 November 2020 between the central government and TPLF caused destruction beyond imagination in all aspects; millions of people have been killed, including civilians, mainly women, and children. Civilians have been indiscriminately attacked simply because of their ethnic or religious identity. Warrying parties committed serious crimes of international concern opposite to International Humanitarian Law (IHL). A House of People Representatives (HPR) declared that the terrorist Tigrean Defense Force (TDF), encompassing all segments of its people, waged war against North Gondar through human flooding. On Aug 30, 2021, after midnight, TDF launched a surprise attack against Chena People who had been drunk and deep slept due to the annual festivity. Unlike the lowlands, however, ENDF conjoined the local people to fight TDF in these Highland areas. This research examines identity politics and the consequential genocidal massacre of Chena, including its human and physical destructions that occurred as a result of the armed conflict. As such, the study could benefit international entities by helping them develop a better understanding of what happened in Chena and trigger interest in engaging in ensuring the accountability and enforcement of IHL in the future. Preserving fresh evidence will also serve as a starting point on the road to achieving justice either nationally or internationally. To study the Chena case evaluated against IHL rules, a combination of qualitative and doctrinal research methodology has been employed. The study basically follows a unique sampling case study which has used primary data tools such as observation, interview, key-informant interview, FGD, and battle-field notes. To supplement, however, secondary sources, including books, journal articles, domestic laws, international conventions, reports, and media broadcasts, were used to give meaning to what happened on the ground in light of international law. The study proved that the war was taking place to separate Tigray from Ethiopia. While undertaking military operations to achieve this goal, mass killings, genocidal acts, and war crimes were committed over Chena and approximate sites in the Dabat district of North Gondar. Thus, hundreds of people lost their lives to the brutalities of mass killings, hundreds of people were subjected to a forcible disappearance, and tens of thousands of people were forced into displacement. Furthermore, harsh beatings, forced labor, slavery, torture, rape, and gang rape have been reported, and generally, people are subjected to pass cruel, inhuman, and degrading treatment and punishment. Also, what is so unique is that animals were indiscriminately killed completely, making the environment unsafe for human survival because of pollution and bad smells and the consequent diseases such as Cholera, Flu, and Diarrhea. In addition to TDF, ENDF’s shelling has caused destruction to farmers’ houses & claimed lives. According to humanitarian principles, acts that can establish MACs and war crimes were perpetrated. Generally, the war in this direction has shown an absolute disrespect for international law norms.

Keywords: genocide, war crimes, Tigray Defense Force, Chena, IHL

Procedia PDF Downloads 28
231 The Role of Named Entity Recognition for Information Extraction

Authors: Girma Yohannis Bade, Olga Kolesnikova, Grigori Sidorov

Abstract:

Named entity recognition (NER) is a building block for information extraction. Though the information extraction process has been automated using a variety of techniques to find and extract a piece of relevant information from unstructured documents, the discovery of targeted knowledge still poses a number of research difficulties because of the variability and lack of structure in Web data. NER, a subtask of information extraction (IE), came to exist to smooth such difficulty. It deals with finding the proper names (named entities), such as the name of the person, country, location, organization, dates, and event in a document, and categorizing them as predetermined labels, which is an initial step in IE tasks. This survey paper presents the roles and importance of NER to IE from the perspective of different algorithms and application area domains. Thus, this paper well summarizes how researchers implemented NER in particular application areas like finance, medicine, defense, business, food science, archeology, and so on. It also outlines the three types of sequence labeling algorithms for NER such as feature-based, neural network-based, and rule-based. Finally, the state-of-the-art and evaluation metrics of NER were presented.

Keywords: the role of NER, named entity recognition, information extraction, sequence labeling algorithms, named entity application area

Procedia PDF Downloads 47
230 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 355
229 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 156
228 Indicators of Rapid Cybersecurity Development in Southeast Asia: A Study on Singapore and Malaysia's Approaches to Cybersecurity

Authors: Ryan Lindsey, Lora Pitman

Abstract:

Forecasts about the compound annual growth rate (CAGR) for the 2024–2029 timeframe show that the fastest developing cybersecurity market is the Asia-Pacific. Only two countries from this region – Singapore and Malaysia, ranked 4th and 5th by the latest International Telecommunications Union report from 2020, are present in the list of top 10 countries with highest global cybersecurity index scores. Therefore, this study seeks to take a closer look at the rapid progress of Singapore (CAGR of 16.14%) and Malaysia (CAGR of 16.84%) in the area of cybersecurity. More specifically, it aims to respond to the question what developments made these countries rank so high. The focus of the analysis is on a 10-year period (2013-2023) and the data for this qualitative study will be gathered from news and reports by NGOs, the two countries’ governments, and the private sector. Variables for this research include five categories: new policy and legislation related to cybersecurity, technical developments and capabilities that can be used for cyber defense, development of domestic units and organizations, efforts to cooperate with other entities. Results are then discussed and recommendations, based on them, are made so that a successful path toward notable improvement can be outlined for other countries as well.

Keywords: cybersecurity, development, Southeast Asia, Singapore, Malaysia

Procedia PDF Downloads 4
227 Characterization and Predictors of Paranoid Ideation in Youths

Authors: Marina Sousa, Célia Barreto Carvalho, Carolina da Motta, Joana Cabral, Vera Pereira, Suzana Nunes Caldeira, Ermelindo Peixoto

Abstract:

Paranoid ideation is a common thought process that constitutes a defense against perceived social threats. The current study aimed at the characterization of paranoid ideation in youths and to explore the possible predictors involved in the development of paranoid ideations. Paranoid ideation, shame, submission, early childhood memories and current depressive, anxious and stress symptomatology was assessed in a sample of 1516 Portuguese youths. Higher frequencies of paranoid ideation were observed, particularly in females and youths from lower socio-economic status. The main predictors identified relates to submissive behaviors and adverse childhood experiences, and especially to shame feelings. The current study emphasizes that the these predictors are similar to findings in adults and clinical populations, and future implications to research and clinical practice aiming at paranoid ideations are discussed, as well as the pertinence of the study of mediating factors that allow a wider understanding of this thought process in younger populations and the prevention of psychopathology in adulthood.

Keywords: adolescence, early memories, paranoid ideation, parenting styles, shame, submissiveness

Procedia PDF Downloads 472
226 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 177