Search results for: attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 603

Search results for: attack

243 Investigation of the Inhibition Effect of 2,3-Diaminopyridine on Mild Steel Corrosion in Solution Simulating Water of Pores Concrete in Absence and Presence of Chloride Ions

Authors: Fatiha Benghanem, Mokhtar Berarma, Saida Keraghel, Ali Ourari

Abstract:

Corrosion is the result of the reaction between a material and its environment. Steel in concrete is protected from corrosion by a passive film promoted by concrete alkalinity. For the initiation of corrosion, this protective film must be destroyed and this can be mainly done in two ways: by the attack of chlorides on the steel or by carbonation of the cover concrete due the reaction with carbon dioxide, which causes reduction in the alkalinity of concrete. The literature reports several ways to decrease or to prevent reinforcement corrosion. Among them, the use of corrosion inhibitors has been an envisaged solution. Two approaches are generally used to evaluate the efficiency of inhibitors for concrete application; one uses simulated pore solution testing , and the other uses actual concrete or mortar specimens. Both methods are some times used in conjunction. The aim of this study is to investigate the use of 2,3-diaminopyridine as a corrosion inhibitors of steel in alkaline media which simulate the electrolyte in the concrete pores. The effectiveness of this compound as corrosion inhibitor was investigated by measuring the corrosion potentials, the polarization curves and the corrosion current densities of steel with and without chlorides. The study of corrosion inhibition by this compound led to the conclusion that he has low rates of inhibition in the absence of aggressive ions and high rates in their presence. This type of organic compounds are promoting for the protection of armatures in concrete.

Keywords: corrosion, inhibitors, mild steel, conjunction

Procedia PDF Downloads 409
242 Surface Pressure Distribution of a Flapped-Airfoil for Different Momentum Injection at the Leading Edge

Authors: Mohammad Mashud, S. M. Nahid Hasan

Abstract:

The aim of the research work is to modify the NACA 4215 airfoil with flap and rotary cylinder at the leading edge of the airfoil and experimentally study the static pressure distribution over the airfoil completed with flap and leading-edge vortex generator. In this research, NACA 4215 wing model has been constructed by generating the profile geometry using the standard equations and design software such as AutoCAD and SolidWorks. To perform the experiment, three wooden models are prepared and tested in subsonic wind tunnel. The experiments were carried out in various angles of attack. Flap angle and momentum injection rate are changed to observe the characteristics of pressure distribution. In this research, a new concept of flow separation control mechanism has been introduced to improve the aerodynamic characteristics of airfoil. Control of flow separation over airfoil which experiences a vortex generator (rotating cylinder) at the leading edge of airfoil is experimentally simulated under the effects of momentum injection. The experimental results show that the flow separation control is possible by the proposed mechanism, and benefits can be achieved by momentum injection technique. The wing performance is significantly improved due to control of flow separation by momentum injection method.

Keywords: airfoil, momentum injection, flap, pressure distribution

Procedia PDF Downloads 117
241 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse

Authors: Maryam Vaezi

Abstract:

In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.

Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party

Procedia PDF Downloads 300
240 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications

Authors: Assem M. F. Sallam, Ah. El-S. Makled

Abstract:

This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.

Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink

Procedia PDF Downloads 255
239 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 97
238 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 81
237 Behavioral Responses of Coccinella septempunctata and Diaeretiella rapae toward Semiochemicals and Plant Extract

Authors: Muhammad Tariq, Bushra Siddique, Muhammad Naeem, Asim Gulzar

Abstract:

The chemical ecology of natural enemies can play a pivotal role in any Integrated Pest Management (IPM) program. Different chemical cues help to correspond in the diversity of associations between prey and host plant species. Coccinellaseptempunctata and Diaeretiellarapae have the abilities to explore several chemical cues released by plants under herbivore attack that may enhance their efficiency of foraging. In this study, the behavioral responses of Coccinellaseptempunctata and Diaeretiellarapae were examined under the application of two semiochemicals and a plant extract and their combinations using four-arm olfactometer. The bioassay was consists of a pairwise treatment comparison. Data pertaining to the preference of C. septempunctata and D. rapae after treatment application were recorded and analyzed statistically. The mean number of entries and time spent of Coccinellaseptempunctata and D. rapaewere greater in arms treated with E-β-Farnesene. However, the efficacy of E-β-Farnesene was enhanced when combined with β-pinene. Thus, the mean number of entries and time spent of C. septempunctata and D. rapaewere highest in arms treated with the combination of E-β-Farnesene x β-pinene as compared with other treatments. The current work has demonstrated that the insect-derived semiochemicals may enhance the efficacy of natural enemies when applied in combination.

Keywords: olfectometer, parasitoid, predator, preference

Procedia PDF Downloads 110
236 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 123
235 Synthesis and Characterization of Some New Diamines and Their Thermally Stable Polyimides

Authors: Zill-E-Huma, Humaira Siddiqi

Abstract:

This paper comprises of synthesis of thermally stable, mechanically strong polyimides. The polyimides were considered as most diverse class of polymers having unlimited applications. They were widely used as optical wave guides, in aerospace, for gas separation, as biomaterials and in electronics. Here the focus was to increase thermal stability and mechanical strength of polyimides. For this purpose two monomers were synthesized and were further polymerized via anhydrides to polyimides. The monomer diamines were synthesized by nucleophilic attack of aniline/2-fluoro aniline on hydroxy benzaldehydes. The two diamines synthesized were 3-(bis(4-aminophenyl) methyl) phenol (3OHDA) and 4-(bis(4-amino-3-fluorophenyl) methyl) phenol (2F4OHDA). These diamines were then reacted with dianhydrides to get polyimides. Two neat polyimides of both diamines with pyromellitic dianhydride (PMDA) and one neat polyimide of 4'-(Hexafluoroisopropylidene) diphthalic dianhydride (6FDA) with 3OHDA were synthesized. To compare the properties of synthesized polyimides like thermal stability, rigidity, flexibility, toughness etc. a commercial diamine oxydianiline (ODA) was used. Polyimides from oxydianiline were basically rigid. Nine different polyimide blends were synthesized from 3OHDA and commercial diamines ODA to have a better comparison of properties. TGA and mechanical testing results showed that with the increase in the percentage of 3OHDA in comparison to ODA the flexibility, toughness, strength of polyimide, thermal stability goes on increasing. So, synthesized diamines were responsible for improvement of properties of polyimides.

Keywords: diamines, dianhydrides, oxydianiline, polyimides

Procedia PDF Downloads 269
234 Durability of a Cementitious Matrix Based on Treated Sediments

Authors: Mahfoud Benzerzour, Mouhamadou Amar, Amine Safhi, Nor-Edine Abriak

Abstract:

Significant volumes of sediment are annually dredged in France and all over the world. These materials may, in fact, be used beneficially as supplementary cementitious material. This paper studies the durability of a new cement matrix based on marine dredged sediment of Dunkirk-Harbor (north of France). Several techniques are used to characterize the raw sediment such as physical properties, chemical analyses, and mineralogy. The XRD analysis revealed quartz, calcite, kaolinite as main mineral phases. In order to eliminate organic matter and activate some of those minerals, the sediment is calcined at a temperature of 850°C for 1h. Moreover, four blended mortars were formulated by mixing a portland cement (CEM I 52,5 N) and the calcined sediment as partial cement substitute (0%, 10%, 20% and 30%). Reference mortars, based on the blended cement, were then prepared. This re-use cannot be substantiating and efficient without a durability study. In this purpose, the following tests, mercury porosity, accessible water porosity, chloride permeability, freezing and thawing, external sulfate attack, alkali aggregates reaction, compressive and bending strength tests were conducted on those mortars. The results of most of those tests evidenced the fact that the mortar that contains 10% of the treated sediment is efficient and durable as the reference mortar itself. That would infer that the presence of these calcined sediment improves mortar general behavior.

Keywords: sediment, characterization, calcination, substitution, durability

Procedia PDF Downloads 227
233 Value-Based Argumentation Frameworks and Judicial Moral Reasoning

Authors: Sonia Anand Knowlton

Abstract:

As the use of Artificial Intelligence is becoming increasingly integrated in virtually every area of life, the need and interest to logically formalize the law and judicial reasoning is growing tremendously. The study of argumentation frameworks (AFs) provides promise in this respect. AF’s provide a way of structuring human reasoning using a formal system of non-monotonic logic. P.M. Dung first introduced this framework and demonstrated that certain arguments must prevail and certain arguments must perish based on whether they are logically “attacked” by other arguments. Dung labelled the set of prevailing arguments as the “preferred extension” of the given argumentation framework. Trevor Bench-Capon’s Value-based Argumentation Frameworks extended Dung’s AF system by allowing arguments to derive their force from the promotion of “preferred” values. In VAF systems, the success of an attack from argument A to argument B (i.e., the triumph of argument A) requires that argument B does not promote a value that is preferred to argument A. There has been thorough discussion of the application of VAFs to the law within the computer science literature, mainly demonstrating that legal cases can be effectively mapped out using VAFs. This article analyses VAFs from a jurisprudential standpoint to provide a philosophical and theoretical analysis of what VAFs tell the legal community about the judicial reasoning, specifically distinguishing between legal and moral reasoning. It highlights the limitations of using VAFs to account for judicial moral reasoning in theory and in practice.

Keywords: nonmonotonic logic, legal formalization, computer science, artificial intelligence, morality

Procedia PDF Downloads 44
232 Outbreak of Pulmonary Tuberculosis in Cojutepeque Military Brigade, El Salvador, July 2013

Authors: Juan Santos Garcia

Abstract:

Introduction: Tuberculosis is a chronic granulomatous disease caused by a microorganism called Mycobacterium tuberculosis, it has the capacity to spread from the lungs to other parts of the body. Globally, the rate per 100 thousand inhabitants has varied from 136 in 2007 to 122 in 2012; while in the region of the Americas has been much lower: 32 cases per 100,000 in 2007, to 29 in 2012. In El Salvador have also varied incidence rates from 2007 to 2012, from 27.4 cases per 100 000 population to 32 in the period indicated. Methods: Screening was performed with smear and chest X-ray at 80 military personnel from Military Brigade # 5 of El Salvador. Besides HIV tests were taken at the positive cases, which are also made interview, investigating demographic, clinical, laboratory and risk factors data. Frequencies, percentages and rates were calculated using Excel page. The rates were calculated for each of the 5 military bedrooms (called A, B, C, D, and E). Results: Attack rate was 18.75% in the bedroom C. the index case was identified and two secondary cases, with an exposure period of 59 days. Only the index case presented symptoms: cough, fever and weight loss. The other two cases had no symptoms. Discussion: We found a rate of tuberculosis 526 times higher than the national rate. He was also 12.5 times higher than that found in other studies in closed populations such as school facilities. It was not possible to make association analysis.

Keywords: tuberculosis, outbreak, military brigade, chronic granulomatous disease

Procedia PDF Downloads 240
231 Aerodynamics and Aeroelastics Studies of Hanger Bridge with H-Beam Profile Using Wind Tunnel

Authors: Matza Gusto Andika, Malinda Sabrina, Syarie Fatunnisa

Abstract:

Aerodynamic and aeroelastics studies on the hanger bridge profile are important to analyze the aerodynamic phenomenon and Aeroelastics stability of hanger. Wind tunnel tests were conducted on a model of H-beam profile from hanger bridge. The purpose of this study is to investigate steady aerodynamic characteristics such as lift coefficient (Cl), drag coefficient (Cd), and moment coefficient (Cm) under the different angle of attack for preliminary prediction of aeroelastics stability problems. After investigation the steady aerodynamics characteristics from the model, dynamic testing is also conducted in wind tunnel to know the aeroelastics phenomenon which occurs at the H-beam hanger bridge profile. The studies show that the torsional vortex induced vibration occur when the wind speed is 7.32 m/s until 9.19 m/s with maximum amplitude occur when the wind speed is 8.41 m/s. The result of wind tunnel testing is matching to hanger vibration where occur in the field, so wind tunnel studies has successful to model the problem. In order that the H-beam profile is not good enough for the hanger bridge and need to be modified to minimize the Aeroelastics problem. The modification can be done with structure dynamics modification or aerodynamics modification.

Keywords: aerodynamics, aeroelastic, hanger bridge, h-beam profile, vortex induced vibration, wind tunnel

Procedia PDF Downloads 320
230 Influence of Pulverized Granite on the Mechanical and Durability Properties of Concrete

Authors: Kwabena A. Boakye, Eugene Atiemo, Trinity A. Tagbor, Delali Adjei

Abstract:

The use of mineral admixtures such as metakaolin, GGBS, fly ash, etc., in concrete is a common practice in the world. However, the only admixture available for use in the Ghanaian construction industry is calcined clay pozzolan. This research, therefore, studies the alternate use of granite dust, a by-product from stone quarrying, as a mineral admixture in concrete. Granite dust, which is usually damped as waste or as an erosion control material, was collected and pulverized to about 75µm. Some physical, chemical, and mineralogical tests were conducted on the granite dust. 5%-25% ordinary Portland cement of Class 42.5N was replaced with granite dust which was used as the main binder in the preparation of 150mm×150mm×150mm concrete cubes according to methods prescribed by BS EN 12390-2:2000. Properties such as workability, compressive strength, flexural strength, water absorption, and durability were determined. Compressive and flexural strength results indicate that granite dust could be used to replace ordinary Portland cement up to an optimum of 15% to achieve C25. Water permeability increased as the granite dust admixture content increased from 5% - 25%. Durability studies after 90 days proved that even though strength decreased as granite dust content increased, the concrete containing granite dust had better resistance to sulphate attack comparable to the reference cement. Pulverized granite can be used to partially replace ordinary Portland cement in concrete.

Keywords: admixture, granite dust, permeability, pozzolans

Procedia PDF Downloads 128
229 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 131
228 Effects of High Intensity Interval vs. Low Intensity Continuous Training on LXRβ, ABCG5 and ABCG8 Genes Expression in Male Wistar Rats

Authors: Sdiqeh Jalali, M. R. Khazdair

Abstract:

Liver X receptors (LXR) have an essential role in the regulation of cholesterol metabolism, and their activation increase ABCG5 and ABCG8 genes expression for the improvement of cholesterol excretion from the body during reverse cholesterol transport (RCT). The aim of this study was to investigate the effects of high-intensity interval (HIT) and low intensity continuous (LIT) trainings on gene expression of these substances after a high-fat diet in Wistar rats. Materials and Methods: Fifteen male Wistar rats were divided into 3 groups: control group (n = 5), HIT exercise group (n = 5) and LIT exercise group (n = 5). All groups used a high-fat diet for 13 weeks, and the HIT and LIT groups performed the specific training program. The expression of LXRβ, ABCG5, and ABCG8 genes was measured after the training period. Findings: Data analysis showed significantly higher levels of LXRβ, ABCG5, and ABCG8 gene expression in HIT and LIT groups compared to the control group (P ≤ 0.05). Conclusion: HIT and LIT trainings after a high-fat diet have beneficial effects on RCT that prevent heart attack. Also, HIT training may have a greater effect on cholesterol excretion during the reverse cholesterol transport mechanism than LIT.

Keywords: liver X receptor, atherosclerosis, interval training, endurance training

Procedia PDF Downloads 91
227 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 94
226 Modernization from Above: The (re-)Creation of National Identity through Westernization in Mubarak-era Cairo

Authors: Mariam Aref Mahmoud

Abstract:

A myth surrounding the development of Cairo bases itself in the Fatimid era when the city, as we know it today, was built. Surrounding the city was a wall meant to protect the main center from any possible attack. The effects of global hierarchies of power extend further than labor regulations and trade statistics. Beyond that, they form dialectical oppositions between local and global identities within urban space. As such, those in power often aim to claim national identity as what they perceive to be the most nationally beneficial strategy. These claims over perceptions of national identity take over the streets, the advertisements, and the parks and eventually make their way into the different forms of media. Often, these claims take over the main planning goals of the city. Whether it is through the control over which sounds are allowed to be produced in public space, what type of people are encouraged to enter which spaces, or other forms of performing local and national identity, public space, property, and land have often been used as a method to present to both the public and the global population what people in power wish for these spaces to represent. In Egypt, these developments have been changing since the end of colonial rule. In particular, this paper will analyze how Hosni Mubarak, and to a certain extent Anwar el-Sadat, enacted neoliberal designs dedicated towards modernization in order to present an image of a Cairo that is not uniquely Egyptian but essentially Western cosmopolitan - a Cairo that belongs to a globalized world.

Keywords: Egypt, imperialism, westernization, housing

Procedia PDF Downloads 41
225 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun

Authors: Ndje Ndje Mireille

Abstract:

The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.

Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun

Procedia PDF Downloads 134
224 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 127
223 Enhancement Method of Network Traffic Anomaly Detection Model Based on Adversarial Training With Category Tags

Authors: Zhang Shuqi, Liu Dan

Abstract:

For the problems in intelligent network anomaly traffic detection models, such as low detection accuracy caused by the lack of training samples, poor effect with small sample attack detection, a classification model enhancement method, F-ACGAN(Flow Auxiliary Classifier Generative Adversarial Network) which introduces generative adversarial network and adversarial training, is proposed to solve these problems. Generating adversarial data with category labels could enhance the training effect and improve classification accuracy and model robustness. FACGAN consists of three steps: feature preprocess, which includes data type conversion, dimensionality reduction and normalization, etc.; A generative adversarial network model with feature learning ability is designed, and the sample generation effect of the model is improved through adversarial iterations between generator and discriminator. The adversarial disturbance factor of the gradient direction of the classification model is added to improve the diversity and antagonism of generated data and to promote the model to learn from adversarial classification features. The experiment of constructing a classification model with the UNSW-NB15 dataset shows that with the enhancement of FACGAN on the basic model, the classification accuracy has improved by 8.09%, and the score of F1 has improved by 6.94%.

Keywords: data imbalance, GAN, ACGAN, anomaly detection, adversarial training, data augmentation

Procedia PDF Downloads 76
222 Half Model Testing for Canard of a Hybrid Buoyant Aircraft

Authors: Anwar U. Haque, Waqar Asrar, Ashraf Ali Omar, Erwin Sulaeman, Jaffer Sayed Mohamed Ali

Abstract:

Due to the interference effects, the intrinsic aerodynamic parameters obtained from the individual component testing are always fundamentally different than those obtained for complete model testing. Consideration and limitation for such testing need to be taken into account in any design work related to the component buildup method. In this paper, the scaled model of a straight rectangular canard of a hybrid buoyant aircraft is tested at 50 m/s in IIUM-LSWT (Low-Speed Wind Tunnel). Model and its attachment with the balance are kept rigid to have results free from the aeroelastic distortion. Based on the velocity profile of the test section’s floor; the height of the model is kept equal to the corresponding boundary layer displacement. Balance measurements provide valuable but limited information of the overall aerodynamic behavior of the model. Zero lift coefficient is obtained at -2.2o and the corresponding drag coefficient was found to be less than that at zero angles of attack. As a part of the validation of low fidelity tool, the plot of lift coefficient plot was verified by the experimental data and except the value of zero lift coefficient, the overall trend has under-predicted the lift coefficient. Based on this comparative study, a correction factor of 1.36 is proposed for lift curve slope obtained from the panel method.

Keywords: wind tunnel testing, boundary layer displacement, lift curve slope, canard, aerodynamics

Procedia PDF Downloads 440
221 Variation of Airfoil Pressure Profile Due to Confined Air Streams: Application in Gas-Oil Separators

Authors: Amir Hossein Haji, Nabeel Al-Rawahi, Gholamreza Vakili-Nezhaad

Abstract:

An innovative design has been examined for a gas-oil separator based on pressure reduction over an airfoil surface. The primary motivations are to shorten the release trajectory of the bubbles by minimizing the thickness of the oil layer as well as improving uniform pressure reduction zones. Restricted airflow over an airfoil is investigated for its effect on the pressure drop enhancement and the maximum attainable attack angle prior to the stall condition. Aerodynamic separation is delayed based on numerical simulation of Wortmann FX 63137 Airfoil in a confined domain using FLUENT 6.3.26. The proposed set up results in higher pressure drop compared with the free stream case. With the aim of optimum power consumption we have pursued further restriction to an air jet case over the airfoil. Then, a curved strip model is suggested for the air jet which can be applied as an analysis/design tool for the best performance conditions. Pressure reduction is shown to be inversely proportional to the curvature of the upper airfoil profile. This reduction occurs within the tracking zones where the air jet is effectively attached to the airfoil surface. The zero slope condition is suggested to estimate the onset of these zones after which the minimum curvature should be searched. The corresponding zero slope curvature is applied for estimation of the maximum pressure drop which shows satisfactory agreement with the simulation results.

Keywords: airfoil, air jet, curved fluid flow, gas-oil separator

Procedia PDF Downloads 435
220 Coarse Grid Computational Fluid Dynamics Fire Simulations

Authors: Wolfram Jahn, Jose Manuel Munita

Abstract:

While computational fluid dynamics (CFD) simulations of fire scenarios are commonly used in the design of buildings, less attention has been given to the use of CFD simulations as an operational tool for the fire services. The reason of this lack of attention lies mainly in the fact that CFD simulations typically take large periods of time to complete, and their results would thus not be available in time to be of use during an emergency. Firefighters often face uncertain conditions when entering a building to attack a fire. They would greatly benefit from a technology based on predictive fire simulations, able to assist their decision-making process. The principal constraint to faster CFD simulations is the fine grid necessary to solve accurately the physical processes that govern a fire. This paper explores the possibility of overcoming this constraint and using coarse grid CFD simulations for fire scenarios, and proposes a methodology to use the simulation results in a meaningful way that can be used by the fire fighters during an emergency. Data from real scale compartment fire tests were used to compare CFD fire models with different grid arrangements, and empirical correlations were obtained to interpolate data points into the grids. The results show that the strongly predominant effect of the heat release rate of the fire on the fluid dynamics allows for the use of coarse grids with relatively low overall impact of simulation results. Simulations with an acceptable level of accuracy could be run in real time, thus making them useful as a forecasting tool for emergency response purposes.

Keywords: CFD, fire simulations, emergency response, forecast

Procedia PDF Downloads 288
219 A Computational Study on Flow Separation Control of Humpback Whale Inspired Sinusoidal Hydrofoils

Authors: J. Joy, T. H. New, I. H. Ibrahim

Abstract:

A computational study on bio-inspired NACA634-021 hydrofoils with leading-edge protuberances has been carried out to investigate their hydrodynamic flow control characteristics at a Reynolds number of 14,000 and different angles-of-attack. The numerical simulations were performed using ANSYS FLUENT and based on Reynolds-Averaged Navier-Stokes (RANS) solver mode incorporated with k-ω Shear Stress Transport (SST) turbulence model. The results obtained indicate varying flow phenomenon along the peaks and troughs over the span of the hydrofoils. Compared to the baseline hydrofoil with no leading-edge protuberances, the leading-edge modified hydrofoils tend to reduce flow separation extents along the peak regions. In contrast, there are increased flow separations in the trough regions of the hydrofoil with leading-edge protuberances. Interestingly, it was observed that dissimilar flow separation behaviour is produced along different peak- or trough-planes along the hydrofoil span, even though the troughs or peaks are physically similar at each interval for a particular hydrofoil. Significant interactions between adjacent flow structures produced by the leading-edge protuberances have also been observed. These flow interactions are believed to be responsible for the dissimilar flow separation behaviour along physically similar peak- or trough-planes.

Keywords: computational fluid dynamics, flow separation control, hydrofoils, leading-edge protuberances

Procedia PDF Downloads 296
218 Resistance to Sulfuric Acid Attacks of Self-Consolidating Concrete: Effect Metakaolin and Various Cements Types

Authors: Kianoosh Samimi, Farhad Estakhr, Mahdi Mahdikhani, Faramaz Moodi

Abstract:

Due to their fluidity and simplicity of use, self-compacting concretes (SCCs) have undeniable advantages. In recent years, the role of metakaolin as a one of pozzolanic materials in concrete has been considered by researchers. It can modify various properties of concrete, due to high pozzolanic reactions and also makes a denser microstructure. The objective of this paper is to examine the influence of three type of Portland cement and metakaolin on fresh state, compressive strength and sulfuric acid attacks in self- consolidating concrete at early age up to 90 days of curing in lime water. Six concrete mixtures were prepared with three types of different cement as Portland cement type II, Portland Slag Cement (PSC), Pozzolanic Portland Cement (PPC) and 15% substitution of metakaolin by every cement. The results show that the metakaolin admixture increases the viscosity and the demand amount of superplasticizer. According to the compressive strength results, the highest value of compressive strength was achieved for PSC and without any metakaolin at age of 90 days. Conversely, the lowest level of compressive strength at all ages of conservation was obtained for PPC and containing 15% metakaolin. According to this study, the total substitution of PSC and PPC by Portland cement type II is beneficial to the increasing in the chemical resistance of the SCC with respect to the sulfuric acid attack. On the other hand, this increase is more noticeable by the use of 15% of metakaolin. Therefore, it can be concluded that metakaolin has a positive effect on the chemical resistance of SCC containing of Portland cement type II, PSC, and PPC.

Keywords: SCC, metakaolin, cement type, durability, compressive strength, sulfuric acid attacks

Procedia PDF Downloads 158
217 Ground Effect on Marine Midge Water Surface Locomotion

Authors: Chih-Hua Wu, Bang-Fuh Chen, Keryea Soong

Abstract:

Midges can move on the surface of the water at speeds of approximately 340 body-lengths/s and can move continuously for >90 min. Their wings periodically scull the sea surface to push water backward and thus generate thrust; their other body parts, including their three pairs of legs, touch the water only occasionally. The aim of this study was to investigate the locomotion mechanism of marine midges with a size of 2 mm and living in shallow reefs in Wanliton, southern Taiwan. We assumed that midges generate lift through two mechanisms: by sculling the surface of seawater to leverage the generated tension for thrust and by retracting their wings to generate aerodynamic lift at a suitable angle of attack. We performed computational fluid dynamic simulations to determine the mechanism of midge locomotion above the surface of the water. The simulations indicated that ground effects are essential and that both the midge trunk and wing tips must be very close to the water surface to produce sufficient lift to keep the midge airborne. Furthermore, a high wing-beat frequency is crucial for the midge to produce sufficient lift during wing retraction. Accordingly, ground effects, forward speed, and high wing-beat frequency are major factors influencing the ability of midges to generate sufficient lift and remain airborne above the water surface.

Keywords: ground effect, water locomotion, CFD, aerodynamic lift

Procedia PDF Downloads 50
216 Optimization of Hate Speech and Abusive Language Detection on Indonesian-language Twitter using Genetic Algorithms

Authors: Rikson Gultom

Abstract:

Hate Speech and Abusive language on social media is difficult to detect, usually, it is detected after it becomes viral in cyberspace, of course, it is too late for prevention. An early detection system that has a fairly good accuracy is needed so that it can reduce conflicts that occur in society caused by postings on social media that attack individuals, groups, and governments in Indonesia. The purpose of this study is to find an early detection model on Twitter social media using machine learning that has high accuracy from several machine learning methods studied. In this study, the support vector machine (SVM), Naïve Bayes (NB), and Random Forest Decision Tree (RFDT) methods were compared with the Support Vector machine with genetic algorithm (SVM-GA), Nave Bayes with genetic algorithm (NB-GA), and Random Forest Decision Tree with Genetic Algorithm (RFDT-GA). The study produced a comparison table for the accuracy of the hate speech and abusive language detection model, and presented it in the form of a graph of the accuracy of the six algorithms developed based on the Indonesian-language Twitter dataset, and concluded the best model with the highest accuracy.

Keywords: abusive language, hate speech, machine learning, optimization, social media

Procedia PDF Downloads 104
215 A Review Of Blended Wing Body And Slender Delta Wing Performance Utilizing Experimental Techniques And Computational Fluid Dynamics

Authors: Abhiyan Paudel, Maheshwaran M Pillai

Abstract:

This paper deals with the optimization and comparison of slender delta wing and blended wing body. The objective is to study the difference between the two wing types and analyze the various aerodynamic characteristics of both of these types.The blended-wing body is an aircraft configuration that has the potential to be more efficient than conventional large transport aircraft configurations with the same capability. The purported advantages of the BWB approach are efficient high-lift wings and a wide airfoil-shaped body. Similarly, symmetric separation vortices over slender delta wing may become asymmetric as the angle of attack is increased beyond a certain value, causing asymmetric forces even at symmetric flight conditions. The transition of the vortex pattern from being symmetric to asymmetric over symmetric bodies under symmetric flow conditions is a fascinating fluid dynamics problem and of major importance for the performance and control of high-maneuverability flight vehicles that favor the use of slender bodies. With the use of Star CCM, we analyze both the fluid properties. The CL, CD and CM were investigated in steady state CFD of BWB at Mach 0.3 and through wind tunnel experiments on 1/6th model of BWB at Mach 0.1. From CFD analysis pressure variation, Mach number contours and turbulence area was observed.

Keywords: Coefficient of Lift, Coefficient of Drag, CFD=Computational Fluid Dynamics, BWB=Blended Wing Body, slender delta wing

Procedia PDF Downloads 502
214 Factors Affecting Customer Loyalty in the Independent Surveyor Service Industry in Indonesia

Authors: Sufrin Hannan, Budi Suharjo, Rita Nurmalina, Kirbrandoko

Abstract:

The challenge for independent surveyor service companies now is growing with increasing uncertainty in business. Protection from the government for domestic independent surveyor industry from competitor attack, such as entering the global surveyors to Indonesia also no longer exists. Therefore, building customer loyalty becomes very important to create a long-term relationship between an independent surveyor with its customers. This study aims to develop a model that can be used to build customer loyalty by looking at various factors that determine customer loyalty, especially on independent surveyors for coal inspection in Indonesia. The development of this model uses the relationship marketing approach. Testing of the hypothesis is done by testing the variables that determine customer loyalty, either directly or indirectly, which amounted to 10 variables. The data were collected from 200 questionnaires filled by independent surveyor company decision makers from 51 exporting companies and coal trading companies in Indonesia and analyzed using Structural Equation Model (SEM). The results show that customer loyalty of independent surveyors is influenced by customer satisfaction, trust, switching-barrier, and relationship-bond. Research on customer satisfaction shows that customer satisfaction is influenced by the perceived quality and perceived value, while perceived quality is influenced by reliability, assurance, responsiveness, and empathy.

Keywords: relationship marketing, customer loyalty, customer satisfaction, switching barriers, relationship bonds

Procedia PDF Downloads 144