Search results for: air defense
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 435

Search results for: air defense

225 Prison Pipeline or College Pathways: Transforming the Urban Classroom

Authors: Marcia J. Watson

Abstract:

The “school-to-prison pipeline” is a widely known phenomenon within education. Although data surrounding this epidemic is daunting, we coin the term “school-to-postsecondary pipeline” to explore proactive strategies that are currently working in K-12 education for African American students. The assumption that high school graduation, postsecondary matriculation, and social success are not the assumed norms for African American youth, positions the term “school-to-postsecondary pipeline” as the newly casted advocacy term for African American educational success. Using secondary data from the Children’s Defense Fund and the U.S. Department of Education’s Office of Civil Rights, we examine current conditions of educational accessibility and attainment for African American students, and provide effective strategies for classroom teachers, administrators, and parents to use for the immediate implementation in schools. These strategies include: (a) engaging instruction, (b) relevant curriculum, and (c) utilizing useful enrichment and community resources. By providing proactive steps towards the school-to-postsecondary pipeline, we hope to counter the docility of the school-to-prison pipeline as the assumed reality for African American youth.

Keywords: college access, higher education, school-to-prison pipeline, urban education reform

Procedia PDF Downloads 504
224 Study of Mechanical Properties of Aluminium Alloys on Normal Friction Stir Welding and Underwater Friction Stir Welding for Structural Applications

Authors: Lingaraju Dumpala, Laxmi Mohan Kumar Chintada, Devadas Deepu, Pravin Kumar Yadav

Abstract:

Friction stir welding is the new-fangled and cutting-edge technique in welding applications; it is widely used in the fields of transportation, aerospace, defense, etc. For thriving significant welding joints and properties of friction stir welded components, it is essential to carry out this advanced process in a prescribed systematic procedure. At this moment, Underwater Friction Stir Welding (UFSW) Process is the field of interest to do research work. In the continuous assessment, the study of UFSW process is to comprehend problems occurred in the past and the structure through which the mechanical properties of the welded joints can be value-added and contributes to conclude results an acceptable and resourceful joint. A meticulous criticism is given on how to modify the experimental setup from NFSW to UFSW. It can discern the influence of tool materials, feeds, spindle angle, load, rotational speeds and mechanical properties. By expending the DEFORM-3D simulation software, the achieved outcomes are validated.

Keywords: Underwater Friction Stir Welding(UFSW), Al alloys, mechanical properties, Normal Friction Stir Welding(NFSW)

Procedia PDF Downloads 256
223 Homology Modelling of Beta Defensin 3 of Bos taurus and Its Docking Studies with Molecules Responsible for Formation of Biofilm

Authors: Ravinder Singh, Ankita Gurao, Saroj Bandhan, Sudhir Kumar Kashyap

Abstract:

The Bos taurus Beta defensin 3 is a defensin peptide secreted by neutrophils and epithelial that exhibits anti-microbial activity. It is one of the crucial components forming an innate defense against intra mammary infections in livestock. The beta defensin 3 by virtue of its anti-microbial activity inhibits major mastitis pathogens including Staphylococcus aureus and Pseudomonas aeruginosa etc, which are also responsible for biofilm formation leading to antibiotic resistance phenomenon. Therefore, the defensin may prove as a non-conventional option to treat mastitis. In this study, computational analysis has been performed including sequence comparison among species and homology modeling of Bos taurus beta defensin 3 protein. The assessments of protein structure were done using the protein structure and model assessment tools integrated in Swiss Model server, which employs various local and global quality evaluation parameters. Further, molecular docking was also carried out between the defensin peptide and the components of biofilm to gain insight into various interactions and structural differences crucial for functionality of this protein.

Keywords: beta defensin 3, bos taurus, docking, homology modeling

Procedia PDF Downloads 264
222 The Role of Txnrd2 Deficiency in Epithelial-to-Mesenchymal-Transition (EMT) and Tumor Formation in Pancreatic Cancer

Authors: Chao Wu

Abstract:

Thioredoxin reductase 2 is a mitochondrial enzyme that belongs to the cellular defense against oxidative stress. We deleted mitochondrial Txnrd2 in a KrasG12D-driven pancreatic tumor model. Despite an initial increase in precursor lesions, tumor incidence decreased significantly. We isolated cancer cell lines from these genetically engineered mice and observed an impaired proliferation and colony formation. Reactive Oxygen Species, as determined by DCF fluorescence, were increased. We detected a higher mitochondrial copy number in Txnrd2-deficient cells (KTP). However, measurement of mitochondrial bioenergetics showed no impairment of mitochondrial function and comparable O₂-consumption and extracellular acidification rates. In addition, the mitochondrial complex composition was affected in Txnrd2 deleted cell lines. To gain better insight into the role of Txnrd2, we deleted Txnrd2 in clones from parental KrasG12D cell lines using Crispr/Cas9 technology. The deletion was confirmed by western blot and activity assay. Interestingly, and in line with previous RNA expression analysis, we saw changes in EMT markers in Txnrd2 deleted cell lines and control cell lines. This might help us explain the reduced tumor incidence in KrasG12D; Txnrd2∆panc mice.

Keywords: PDAC, TXNRD2, epithelial-to-mesenchymal-transition, ROS

Procedia PDF Downloads 85
221 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism

Authors: SanXi Wu

Abstract:

A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.

Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism

Procedia PDF Downloads 15
220 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company

Authors: Shanshan Zhou, Massimo Battaglia

Abstract:

Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.

Keywords: community identity, disaster, identity, organizational learning

Procedia PDF Downloads 696
219 Computational Analysis of Variation in Thrust of Oblique Detonation Ramjet Engine With Adaptive Inlet

Authors: Aditya, Ganapati Joshi, Vinod Kumar

Abstract:

IN THE MODERN-WARFARE ERA, THE PRIME REQUIREMENT IS A HIGH SPEED AND MACH NUMBER. WHEN THE MISSILES STRIKE IN THE HYPERSONIC REGIME THE OPPONENT CAN DETECT IT WITH THE ANTI-DEFENSE SYSTEM BUT CAN NOT STOP IT FROM CAUSING DAMAGE. SO, TO ACHIEVE THE SPEEDS OF THIS LEVEL THERE ARE TWO ENGINES THAT ARE AVAILABLE WHICH CAN WORK IN THIS REGION ARE RAMJET AND SCRAMJET. THE PROBLEM WITH RAMJET STARTS TO OCCUR WHEN MACH NUMBER EXCEEDS 4 AS THE STATIC PRESSURE AT THE INLET BECOMES EQUAL TO THE EXIT PRESSURE. SO, SCRAMJET ENGINE DEALS WITH THIS PROBLEM AS IT NEARLY HAS THE SAME WORKING BUT HERE THE FLOW IS NOT MUCH SLOWED DOWN AS COMPARED TO RAMJET IN THE DIFFUSER BUT IT SUFFERS FROM THE PROBLEMS SUCH AS INLET BUZZ, THERMAL CHOCKING, MIXING OF FUEL AND OXIDIZER, THERMAL HEATING, AND MANY MORE. HERE THE NEW ENGINE IS DEVELOPED ON THE SAME PRINCIPLE AS THE SCRAMJET ENGINE BUT BURNING HAPPENS DUE TO DETONATION INSTEAD OF DEFLAGRATION. THE PROBLEM WITH THE ENGINE STARTS WHEN THE MACH NUMBER BECOMES VARIABLE AND THE INLET GEOMETRY IS FIXED AND THIS LEADS TO INLET SPILLAGE WHICH WILL AFFECT THE THRUST ADVERSELY. SO, HERE ADAPTIVE INLET IS MADE OF SHAPE MEMORY ALLOYS WHICH WILL ENHANCE THE INLET MASS FLOW RATE AS WELL AS THRUST.

Keywords: detonation, ramjet engine, shape memory alloy, ignition delay, shock-boundary layer interaction, eddy dissipation, asymmetric nozzle

Procedia PDF Downloads 72
218 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 107
217 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 62
216 Stage-Gate Based Integrated Project Management Methodology for New Product Development

Authors: Mert Kıranç, Ekrem Duman, Murat Özbilen

Abstract:

In order to achieve new product development (NPD) activities on time and within budgetary constraints, the NPD managers need a well-designed methodology. This study intends to create an integrated project management methodology for the ones who focus on new product development projects. In the scope of the study, four different management systems are combined. These systems are called as 'Schedule-oriented Stage-Gate Method, Risk Management, Change Management and Earned Value Management'. New product development term is quite common in many different industries such as defense industry, construction, health care/dental, higher education, fast moving consumer goods, white goods, electronic devices, marketing and advertising and software development. All product manufacturers run against each other’s for introducing a new product to the market. In order to achieve to produce a more competitive product in the market, an optimum project management methodology is chosen, and this methodology is adapted to company culture. The right methodology helps the company to present perfect product to the customers at the right time. The benefits of proposed methodology are discussed as an application by a company. As a result, how the integrated methodology improves the efficiency and how it achieves the success of the project are unfolded.

Keywords: project, project management, management methodology, new product development, risk management, change management, earned value, stage-gate

Procedia PDF Downloads 291
215 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling

Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar

Abstract:

Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.

Keywords: toolpath, part program, optimization, pocket

Procedia PDF Downloads 265
214 Stability Analysis of Tumor-Immune Fractional Order Model

Authors: Sadia Arshad, Yifa Tang, Dumitru Baleanu

Abstract:

A fractional order mathematical model is proposed that incorporate CD8+ cells, natural killer cells, cytokines and tumor cells. The tumor cells growth in the absence of an immune response is modeled by logistic law as it was the simplest form for which predictions also agreed with the experimental data. Natural Killer Cells are our first line of defense. NK cells directly kill tumor cells through several mechanisms, including the release of cytoplasmic granules containing perforin and granzyme, expression of tumor necrosis factor (TNF) family members. The effect of the NK cells on the tumor cell population is expressed with the product term. Rational form is used to describe interaction between CD8+ cells and tumor cells. A number of cytokines are produced by NKs, including tumor necrosis factor TNF, IFN, and interleukin (IL-10). Source term for cytokines is modeled by Michaelis-Menten form to indicate the saturated effects of the immune response. Stability of the equilibrium points is discussed for biologically significant values of bifurcation parameters. We studied the treatment of fractional order system by investigating analytical conditions of tumor eradication. Numerical simulations are presented to illustrate the analytical results.

Keywords: cancer model, fractional calculus, numerical simulations, stability analysis

Procedia PDF Downloads 286
213 Impact of Cytokines Alone and Primed with Macrophages on Balamuthia mandrillaris Interactions with Human Brain Microvascular Endothelial Cells in vitro

Authors: Abdul Matin, Salik Nawaz, Suk-Yul Jung

Abstract:

Balamuthia mandrillaris is well known to cause fatal Balamuthia amoebic encephalitis (BAE). Amoebic transmission into the central nervous system (CNS), haematogenous spread is thought to be the prime step, followed by blood-brain barrier (BBB) dissemination. Macrophages are considered to be the foremost line of defense and present in excessive numbers during amoebic infections. The aim of the present investigation was to evaluate the effects of macrophages alone or primed with cytokines on the biological characteristics of Balamuthia in vitro. Using human brain microvascular endothelial cells (HBMEC), which constitutes the BBB, we have shown that Balamuthia demonstrated > 90% binding and > 70% cytotoxicity to host cells. However, macrophages further increased amoebic binding and Balamuthia-mediated cell cytotoxicity. Furthermore, macrophages exhibited no amoebicidal effect against Balamuthia. Zymography assay demonstrated that macrophages exhibited no inhibitory effect on proteolytic activity of Balamuthia. Overall, to our best knowledge, we have shown for the first time macrophages has no inhibitory effects on the biological properties of Balamuthia in vitro. This also strengthened the concept that how and why Balamuthia can cause infections in both immuno-competent and immuno-compromised individuals.

Keywords: Balamuthia mandrillaris, macrophages, cytokines, human brain microvascular endothelial cells, Balamuthia amoebic encephalitis

Procedia PDF Downloads 127
212 Iranian Intellectuals, Localism, Globalization and the Challenge of Rebuilding National Identity

Authors: Mohammad Afghari

Abstract:

Since the inception of intellectual movements in Iran, Iranian thinkers have perennially found themselves at the crossroads of indigenous traditionalism and Western orientation. On the one hand, supporters of indigenous thinking have emphasized the defense of cultural, national, and religious values. On the other hand, Western-leaning intellectuals, often derogatorily labeled as ‘Westoxication’ by their indigenous counterparts, have been inclined towards embracing non-indigenous ideas and ideologies, primarily of Western origin. In this historical context, the dualistic nature of Iranian intellectuals, evolving amidst the era of globalization and its swift advancements in communication, has not only retained its inherent character but has evolved into a broader duality that can identified as ‘Iranian-Cosmopolitan’. In this duality, both in its classical form of indigenous-Western and its contemporary manifestation as Iranian-Cosmopolitan, the Iranian national identity has consistently been a significant part of intellectual discussions. While critically examining this dualism through a historical lens and drawing upon the theories of Anthony Smith, a historical sociologist and British theorist of nationalism, this article delves into the importance of aligning national identity with the prevailing societal transformations, especially globalization. It underscores that Iranian intellectuals, to national identity reconstruction in the present age, will find no solution other than discarding this dualism and reconstructing national identity within a global framework.

Keywords: Iran, Iranian intellectuals, globalization, localism, national identity, cosmopolitan

Procedia PDF Downloads 11
211 The Aminoguanidine Reduced NO Synthase Activity and Infiltration of Macrophages in Inflammation Induced by LPS in Rats

Authors: Hakim Chayeb

Abstract:

Macrophages (Mo) play an essential role in host defense against pathogens. These inflammatory cells contain a large group of inducible enzymes such as NO synthase (NOS). This study was conducted to characterize experimentally induced inflammation in vivo by lipopolysaccharides (LPS). LPS is an essential component of the outer membrane of Gram-negative bacteria and a potent inducer of macrophage. Except control rats, all rats received different doses of LPS intra-peritoneally. The involvement of inducible NO synthase (iNOS) and constitutive (cNOS ) in the modulation of the inflammatory response was studied by treating the rats with L-NAME (non-selective NOS inhibitor) or aminoguanidine (AG inhibitor of iNOS). Inhibitors were injected 24 hours before LPS administration. The results showed that esterase activity (a marker of macrophage infiltration) which is induced by LPS is reduced by AG, was potentiated by treatment with L-NAME in tissue homogenates of the liver, kidney and spleen. Meanwhile, the concentrations of nitric oxide (NO) induced by LPS were reduced with AG and are completely inhibited with L-NAME in the tissues studied. NO concentrations and plasma transaminase levels have undergone remarkable increases in rats treated with LPS alone. However, the AG significantly reduced these rates. Our results highlighted the role of NO synthase inhibitors in reducing of inflammatory responses that characterize many infectious diseases.

Keywords: aminoguanidine, esterase, LPS, L-NAME, macrophage, nitric oxide

Procedia PDF Downloads 236
210 The South Looking East: The New Geopolitics of Latin America

Authors: Heike Pintor Pirzkall

Abstract:

The positive economic evolution of many countries in the Latin American Continent, mainly in South America, has changed the geopolitical position of the region in the world. It is no longer the Hinterland or backyard of the United States, now it has become the Heartland for Europe and Asia. This position has favored the interest of countries like China or India, who are combining trade agreements with special assistance and aid agreements in many fields like agriculture, alternative energy resources, defense and mining. As many countries in the region are no longer low income countries, a more equal relationship in development aid has been created were the donor and the recipient have become partners and where new actors intervene in a triangular relationship that promotes new alternative aid structures. Triangular co-operation brings together the best of different actors who are providers of development co-operation, partners in SouthSouth co-operation and international organizations. The objective is to share knowledge and implement projects that support the common goal of reducing poverty and promoting development. The intention of this paper is to explain the reasons for Latin America´s “virage” to the east and to give examples of projects and agreements between Latin American countries, China and India which will help to understand the intensification of south-east relations in recent years.

Keywords: development cooperation, China, Latin America, triangular cooperation, natural resources, partnership

Procedia PDF Downloads 353
209 Dynamic Shear Energy Absorption of Ultra-High Performance Concrete

Authors: Robert J. Thomas, Colton Bedke, Andrew Sorensen

Abstract:

The exemplary mechanical performance and durability of ultra-high performance concrete (UHPC) has led to its rapid emergence as an advanced cementitious material. The uncharacteristically high mechanical strength and ductility of UHPC makes it a promising potential material for defense structures which may be subject to highly dynamic loads like impact or blast. However, the mechanical response of UHPC under dynamic loading has not been fully characterized. In particular, there is a need to characterize the energy absorption of UHPC under high-frequency shear loading. This paper presents preliminary results from a parametric study of the dynamic shear energy absorption of UHPC using the Charpy impact test. UHPC mixtures with compressive strengths in the range of 100-150 MPa exhibited dynamic shear energy absorption in the range of 0.9-1.5 kJ/m. Energy absorption is shown to be sensitive to the water/cement ratio, silica fume content, and aggregate gradation. Energy absorption was weakly correlated to compressive strength. Results are highly sensitive to specimen preparation methods, and there is a demonstrated need for a standardized test method for high frequency shear in cementitious composites.

Keywords: Charpy impact test, dynamic shear, impact loading, ultra-high performance concrete

Procedia PDF Downloads 269
208 Comparative Analysis of Photosynthetic and Antioxidative Responses of Two Species of Anabaena under Ni and As(III) Stress

Authors: Shivam Yadav, Neelam Atri

Abstract:

Cyanobacteria, the photosynthetic prokaryotes are indispensable components of paddy soil contribute substantially to the nitrogen economy however often appended with metal load. They are well known to play crucial roles in maintenance of soil fertility and rice productivity. Nickel is one such metal that plays a vital role in the cellular physiology, however at higher concentrations it exerts adverse effects. Arsenic is another toxic metalloid that negatively affects the cyanobacterial proliferation. However species-specific comparative responses under As and Ni is largely unknown. The present study focuses on the comparative effects of nickel (Ni2+) and arsenite (As(III)) on two diazotrophic cyanobacterial species (Anabaena doliolum and Anabaena sp. PCC7120) in terms of antioxidative aspects. Oxidative damage measured in terms of lipid peroxidation and peroxide content was significantly higher after As(III) than Ni treatment as compared to control. Similarly, all the studied enzymatic and non-enzymatic parameters of antioxidative defense system except glutathione reductase (GR) showed greater induction against As(III) than Ni. Moreover, integrating comparative analysis of all studied parameters also demonstrated interspecies variation in terms of stress adaptive strategies reflected through higher sensitivity of Anabaena doliolum over Anabaena PCC7120.

Keywords: antioxidative system, arsenic, cyanobacteria, nickel

Procedia PDF Downloads 120
207 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 298
206 Characterization Study of Aluminium 6061 Hybrid Composite

Authors: U. Achutha Kini, S. S. Sharma, K. Jagannath, P. R. Prabhu, M. C. Gowri Shankar

Abstract:

Aluminium matrix composites with alumina reinforcements give superior mechanical & physical properties. Their applications in several fields like automobile, aerospace, defense, sports, electronics, bio-medical and other industrial purposes are becoming essential for the last several decades. In the present work, fabrication of hybrid composite was done by Stir casting technique using Al 6061 as a matrix with alumina and silicon carbide (SiC) as reinforcement materials. The weight percentage of alumina is varied from 2 to 4% and the silicon carbide weight percentage is maintained constant at 2%. Hardness and wear tests are performed in the as cast and heat treated conditions. Age hardening treatment was performed on the specimen with solutionizing at 550°C, aging at two temperatures (150 and 200°C) for different time durations. Hardness distribution curves are drawn and peak hardness values are recorded. Hardness increase was very sensitive with respect to the decrease in aging temperature. There was an improvement in wear resistance of the peak aged material when aged at lower temperature. Also increase in weight percent of alumina, increases wear resistance at lower temperature but opposite behavior was seen when aged at higher temperature.

Keywords: hybrid composite, hardness test, wear test, heat treatment, pin on disc wear testing machine

Procedia PDF Downloads 300
205 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination

Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan

Abstract:

The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.

Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility

Procedia PDF Downloads 94
204 The Client-Supplier Relationship in Managing Innovation: Delineating Defence Industry First Mover Challenges within the Government Contract Competition

Authors: Edward Pol

Abstract:

All companies are confronted with the need to innovate in order to meet market demands. In so doing they are challenged with the dilemma of whether to aim to be first into the market with a new innovative product or to deliberately wait and learn from a pioneers’ mistakes; potentially avoiding higher risks. It is therefore important to critically understand from a first-mover advantage and disadvantage perspective the decision-making implications of defence industry transformation onset by an innovative paradigm shift. This paper will argue that the type of industry characteristics matter, especially when considering what role the clients play in the innovation process and what is their level of influence. Through investigation of qualitative case study research, this inquiry will focus on first mover advantages and first mover disadvantages with a view to establish practical and value-added academic findings by focusing on specific industries where the clients play an active role in cooperation with the supplier innovation. The resulting findings will help managers to mitigate risk in innovative technology introduction. A selection from several defense industry innovations is specifically chosen because of the client-supplier relationship typically differing from traditional first-mover research. In this instance, case studies will be used referencing vertical-takeoff-and-landing defence equipment innovations.

Keywords: innovation, pioneer, first-mover advantage, first-mover disadvantage, risk

Procedia PDF Downloads 160
203 Rejuvenation of Peanut Seedling from Collar Rot Disease by Azotobacter sp. RA2

Authors: Ravi R. Patel, Vasudev R. Thakkar

Abstract:

Use of plant growth-promoting rhizobacteria (PGPR) to increase the production and decrees disease occurrence is a recent method in agriculture. An RA2 rhizospheric culture was isolated from peanut rhizosphere from Junagadh region of Gujarat, India and showed different direct and indirect plant growth promoting activity like indole acetic acid, gibberellic acid, siderophore, hydrogen cyanide, Ammonia and (1-Aminocyclopropane-1-Carboxylate) deaminase production, N2 fixation, phosphate and potassium solubilization in vitro. RA2 was able to protect peanut germinating seedling from A. niger infection and reduce collar rot disease incidence 60-35% to 72-41% and increase germination percentage from 70-82% to 75-97% in two varieties GG20 and GG2 of peanut. RA2 was found to induce resistance in A. hypogaea L. seedlings via induction of different defense-related enzymes like phenylalanine ammonia lyase, peroxidase, polyphenol oxidase, lipoxygenase and pathogenesis related protein like chitinase, ß – 1,3- glucanase. Jasmonic acid one of the major signaling molecules of inducing systemic resistance was also found to induced due to RA2 treatments. RA2 bacterium was also promoting peanut growth and reduce A. niger infection in pot studies. 16S rDNA sequence of RA2 showed 99 % homology to Azotobacter species.

Keywords: plant growth promoting rhizobacteria, peanut, aspergillus niger, induce systemic resistance

Procedia PDF Downloads 215
202 Field-Programmable Gate Array Based Tester for Protective Relay

Authors: H. Bentarzi, A. Zitouni

Abstract:

The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.

Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester

Procedia PDF Downloads 184
201 Cognition and Communication Disorders Effect on Death Penalty Cases

Authors: Shameka Stanford

Abstract:

This presentation will discuss how cognitive and communication disorders in the areas of executive functioning, receptive and expressive language can impact the problem-solving and decision making of individuals with such impairments. More specifically, this presentation will discuss approaches the legal defense team of capital case lawyers can add to their experience when servicing individuals who have a history of educational decline, special education, and limited intervention and treatment. The objective of the research is to explore and identify the correlations between impaired executive function skills and decision making and competency for individuals facing death penalty charges. To conduct this research, experimental design, randomized sampling, qualitative analysis was employed. This research contributes to the legal and criminal justice system related to how they view, defend, and characterize, and judge individuals with documented cognitive and communication disorders who are eligible for capital case charges. More importantly, this research contributes to the increased ability of death penalty lawyers to successfully defend clients with a history of academic difficulty, special education, and documented disorders that impact educational progress and academic success.

Keywords: cognitive impairments, communication disorders, death penalty, executive function

Procedia PDF Downloads 131
200 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 125
199 A 1.57ghz Mixer Design for GPS Receiver

Authors: Hamd Ahmed

Abstract:

During the Persian Gulf War in 1991s, The confederation forces were surprised when they were being shot at by friendly forces in Iraqi desert. As obvious was the fact that they were mislead due to the lack of proper guidance and technology resulting in unnecessary loss of life and bloodshed. This unforeseen incident along with many others led the US department of defense to open the doors of GPS. In the very beginning, this technology was for military use, but now it is being widely used and increasingly popular among the public due to its high accuracy and immeasurable significance. The GPS system simply consists of three segments, the space segment (the satellite), the control segment (ground control) and the user segment (receiver). This project work is about designing a 1.57GHZ mixer for triple conversion GPS receiver .The GPS Front-End receiver based on super heterodyne receiver which improves selectivity and image frequency. However the main principle of the super heterodyne receiver depends on the mixer. Many different types of mixers (single balanced mixer, Single Ended mixer, Double balanced mixer) can be used with GPS receiver, it depends on the required specifications. This research project will provide an overview of the GPS system and details about the basic architecture of the GPS receiver. The basic emphasis of this report in on investigating general concept of the mixer circuit some terms related to the mixer along with their definitions and present the types of mixer, then gives some advantages of using singly balanced mixer and its application. The focus of this report is on how to design mixer for GPS receiver and discussing the simulation results.

Keywords: GPS , RF filter, heterodyne, mixer

Procedia PDF Downloads 278
198 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 379
197 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 125
196 Ethylene Response Factor BnERF from Brassica napus L. Enhances Submergence Tolerance and Alleviates the Oxidative Damage Caused by Submergence in Arabidopsis thaliana

Authors: Sanxiong Fu, Yanyan Lv, Song Chen, Wei Zhang, Cunkou Qi

Abstract:

Ethylene response factor proteins are known to play an important role in regulating a variety of stress responses in plants, but their exact functions in submergence stress are not completely understood. In this study, we isolated BnERF from Brassica napus L. to study the function of BnERF in submergence tolerance. The expression of BnERF gene in Brassica napus L. and the expression of antioxidant enzyme genes in transgenic Arabidopsis were analyzed by Quantitative RT-PCR. It was found that expression of BnERF is apparently induced by submergence in Brassica napus L. and overexpression of BnERF in Arabidopsis increases the tolerance level to submergence and oxidative stress. Histochemical method detected lower level of H2O2, O2•− and malondialdehyde (MDA) in the transgenic Arabidopsis. Compared to wild type, transgenic lines also have higher soluble sugar content and higher activity of antioxidant enzymes, which helps protect the plants against the oxidative damage caused by submergence. It was concluded that BnERF can increase the tolerance of plants to submergence stress and BnERF might be involved in regulating soluble sugar content and the antioxidant system in the defense against submergence stress.

Keywords: antioxidant enzyme, Arabidopsis, ethylene response factor, submergence

Procedia PDF Downloads 275