Search results for: chemical warfare agents
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5746

Search results for: chemical warfare agents

5746 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 105
5745 Implementing Bioremediation Technologies to Degrade Chemical Warfare Agents and Explosives from War Affected Regions in Sri Lanka

Authors: Elackiya Sithamparanathan

Abstract:

Chemical agents used during the Sri Lankan civil war continue to threaten human and environmental health as affected areas are re-settled. Bioremediation is a cost-effective and eco-friendly approach to degrading chemical agents, and has greater public acceptance than chemical degradation. Baseline data on contaminant distribution, environmental parameters, and indigenous microbes are required before bioremediation can commence. The culture and isolate of suitable microbes and enzymes should be followed by laboratory trials, before field application and long-term monitoring of contaminant concentration, soil parameters, microbial ecology, and public health to monitor environmental and public health. As local people are not aware of the persistence of warfare chemicals and do not understand the potential impacts on human health, community awareness programs are required. Active community participation, and collaboration with international and local agencies, would contribute to the success of bioremediation and the effective removal of chemical agents in war affected areas of Sri Lanka.

Keywords: bioremediation, environmental protection, human health, war affected regions in Sri Lanka

Procedia PDF Downloads 349
5744 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 77
5743 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 442
5742 Contemporary Technological Developments in Urban Warfare

Authors: Mehmet Ozturk, Serdal Akyuz, Halit Turan

Abstract:

By the evolving technology, the nature of the war has been changed since the beginning of the history. In the first generation war, the bayonet came to the fore in battlefields; successively; in the second-generation firepower; in the third generation maneuver. Today, in the fourth-generation, fighters, sides, and even fighters’ borders are unclear; consequently, lines of the battles have lost their significance. Furthermore, the actors in the battles can be state or non-state, military, paramilitary or civilian. In order to change the balance according to their interests, parties have utilized the urban areas as warfare. The main reason for using urban areas as a battlefield is the imbalance between parties. To balance the power strength, exploiting technological developments has utmost importance. There are many newly developed technologies for urban warfare such as change in the size of the unmanned aerial vehicle, increased usage of unmanned ground vehicles (especially in supply and evacuation purposes), systems showing the behind of the wall, simulations used for educational purposes. This study will focus on the technological equipment being used for urban warfare.

Keywords: urban warfare, unmanned ground vehicles, technological developments, nature of the war

Procedia PDF Downloads 392
5741 Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People's Republic of China in 2012-2016

Authors: María Victoria Alvarez Magañini, Lautaro Nahuel Rubbi

Abstract:

According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out.

Keywords: asymmetric warfare, China, United States, hegemonic warfare

Procedia PDF Downloads 233
5740 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 336
5739 Comparing and Contrasting Western and Eastern Ways of War: Building a Universal Strategic Theory

Authors: Adam Kok Wey Leong

Abstract:

The comparison between the Western ways of war and Eastern ways of war has raised contemporary debates on the validity of these arguments. The Western way of war is popularly propounded by Victor Davis Hanson as originating from the Greek hoplite tactics, direct military maneuvers, democratic principles and social freedom and cohesion that has continued to yield military success for the Western powers for centuries. On the other hand, the Eastern way of war has been deemed as relying on indirect tactics, deception, and ruses. This often accepted notion of the divide between Western and Eastern style does not sustain in view of the available classical strategic texts from both sides from the same period that has proposed similar principles of warfare. This paper analyses the similarities between classical strategic texts on war from the Eastern perspective namely Sun Tzu’s Art of War with a similar temporal strategic text from the West which is Sextus Iuluis Frontinus’s Stratagematon, and deduces answers to this core research question - Does the hypothesis of the existence of distinctive Western and Eastern ways of warfare stands? The main thesis advanced by this research is that ways of warfare share universal principles, and it transcends cultural and spatial boundaries. Warfare is a human endeavour, and the same moral actions guide humans from different geo-cultural spheres in warfare’s objectives, which are winning over an enemy in the most economical way and serve as a mean to an end.

Keywords: ways of warfare, strategic culture, strategy, Sun Tzu, frontinus

Procedia PDF Downloads 393
5738 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 112
5737 International Humanitarian Law and the Challenges of New Technologies of Warfare

Authors: Uche A. Nnawulezi

Abstract:

Undoubtedly, despite all efforts made to achieve overall peace through the application of the principles of international humanitarian law, crimes against mankind which are of unprecedented concern to the whole world have remained unabated. The fall back on war as a technique for settling disputes between nations, individuals, countries and ethnic groups with accompanying toll of deaths and destruction of properties have remained a conspicuous component of human history. Indeed, to control this conduct of warfare and the dehumanization of individuals, a body of law aimed at regulating the impacts of conflicts and hostilities in the theater of war has become necessary. Thus, it is to examine the conditions in which international humanitarian law will apply and also to determine the extent of the challenges of new progressions of warfare that this study is undertaken. All through this examination, we grasped doctrinal approach wherein we used text books, journals, international materials and supposition of law specialists in the field of international humanitarian law. This paper shall examine the distinctive factors responsible for the rebelliousness to the rules of International Humanitarian Law and furthermore, shall proffer possible courses of action that will address the challenges of new technologies of warfare all over the world. Essentially, the basic proposals made in this paper if totally utilized may go far in ensuring a sufficient standard in the application of the rules of international humanitarian law as it relates to an increasingly frequent phenomenon of contemporary developments in technologies of warfare which has in recent past, made it more difficult for the most ideal application of the rules of international humanitarian law. This paper deduces that for a sustainable global peace to be achieved, the rules of International Humanitarian Law as it relates to the utilization of new technologies of warfare should be completely clung to and should be made a strict liability offense. Likewise, this paper further recommends the introduction of domestic criminal law punishment of serious contraventions of the rules of international humanitarian law.

Keywords: international, humanitarian law, new technologies, warfare

Procedia PDF Downloads 268
5736 Unmanned Systems in Urban Areas

Authors: Abdullah Beyazkurk, Onur Ozdemir

Abstract:

The evolution of warfare has been affected from technological developments to a large extent. Another important factor that affected the evolution of warfare is the space. Technological developments became cornerstones for the organization of the forces on the field, while space of the battlefield gained importance with the introduction of urban areas as 'battlefields'. The use of urban areas as battlefields increased the casualty, while technological developments began to play a remedial role. Thus, the unmanned systems drew attention as the remedy. Today's widely used unmanned aerial vehicles have great effects on the operations. On the other hand, with the increasing urbanization, and the wide use of urban areas as battlefields make it a necessity to benefit from unmanned systems on the ground as well. This study focuses on the use of unmanned aerial systems as well as unmanned ground systems in urban warfare, with regards to their performance and cost affectivity. The study defends that the use of unmanned vehicles will be remedial for increasing casualty rates, while their precision and superhuman capacity will manifest the performance advantage. The findings of this study will help modern armies focus on unmanned systems, especially for the urban, anti-terror, or counter insurgency operations.

Keywords: technology, warfare, urban warfare, unmanned systems, unmanned ground vehicles, unmanned aerial vehicles

Procedia PDF Downloads 320
5735 Reactive Fabrics for Chemical Warfare Agent Decomposition Using Particle Crystallization

Authors: Myungkyu Park, Minkun Kim, Sunghoon Kim, Samgon Ryu

Abstract:

Recently, research for reactive fabrics which have the characteristics of CWA (Chemical Warfare Agent) decomposition is being performed actively. The performance level of decomposition for CWA decomposition in various environmental condition is one of the critical factors in applicability as protective materials for NBC (Nuclear, Biological, and Chemical) protective clothing. In this study, results of performance test for CWA decomposition by reactive fabric made of electrospinning web and reactive particle are presented. Currently, the MOF (metal organic framework) type of UiO-66-NH₂ is frequently being studied as material for decomposing CWA especially blister agent HD [Bis(2-chloroethyl) sulfide]. When we test decomposition rate with electrospinning web made of PVB (Polyvinyl Butiral) polymer and UiO-66-NH₂ particle, we can get very high protective performance than the case other particles are applied. Furthermore, if the repellant surface fabric is added on reactive material as the component of protective fabric, the performance of layer by layered reactive fabric could be approached to the level of current NBC protective fabric for HD decomposition rate. Reactive fabric we used in this study is manufactured by electrospinning process of polymer which contains the reactive particle of UiO-66-NH₂, and we performed crystalizing process once again on that polymer fiber web in solvent systems as a second step for manufacturing reactive fabric. Three kinds of polymer materials are used in this process, but PVB was most suitable as an electrospinning fiber polymer considering the shape of product. The density of particle on fiber web and HD decomposition rate is enhanced by secondary crystallization compared with the results which are not processed. The amount of HD penetration by 24hr AVLAG (Aerosol Vapor Liquid Assessment Group) swatch test through the reactive fabrics with secondary crystallization and without crystallization is 24 and 146μg/cm² respectively. Even though all of the reactive fiber webs for this test are combined with repellant surface layer at outer side of swatch, the effects of secondary crystallization of particle for the reactive fiber web are remarkable.

Keywords: CWA, Chemical Warfare Agent, gas decomposition, particle growth, protective clothing, reactive fabric, swatch test

Procedia PDF Downloads 253
5734 Warfare Ships at Ancient Egypt: Since Pre-Historic Era (3700 B.C.) Uptill the End of the 2nd Intermediate Period (1550 B.C.)

Authors: Mohsen Negmeddin

Abstract:

Throughout their history, ancient Egyptians had known several kinds and types of boats, which were made from two main kinds of materials, the local one, as the dried papyrus reeds and the local tree trunks, the imported one, as the boats which were made from Lebanon cedar tree trunks. A varied using of these boats, as the fish hunting small boats, the transportation and trade boats "Cargo Boats", as well as the ceremonial boats, and the warfare boats. The research is intending for the last one, the warfare boats and the river/maritime battles since the beginning of ancient Egyptian civilization at the pre-historic era up till the end of the second intermediate period, to reveal the kinds and types of those fighting ships before establishing the Egyptian navy at the beginning of the New Kingdome (1550-1770 B.C). Two methods will follow at this research, the mention of names and titles of these ships through the texts (ancient Egyptian language) resources, and the depiction of it at the scenes.

Keywords: the warfare boats, the maritime battles, the pre-historic era, the second intermediate period

Procedia PDF Downloads 246
5733 Western and Eastern Ways of Special Warfare: The Strategic History of Special Operations from Western and Eastern Sources

Authors: Adam Kok Wey Leong

Abstract:

Special operations were supposedly a new way of irregular warfare that was officially formed during World War 2. For example, the famous British Special Operations Executive (SOE) and the Americans’ Office for Strategic Services (OSS) – the forerunners of modern day CIA were born in World War 2. These special operations units were tasked with the conduct of sabotage and subversion activities behind enemy lines, placing great importance in forming Fifth Column activities and supporting resistance movements. This pointed to a paradoxical argument that modern day special operations is a product of Western modern military innovation but utilizing Eastern ways of ‘ungentlemanly’ warfare. This thesis is superfluous as special operations had been well practised by both ancient Western empires such as the Greeks and Romans, and around the same time in the East, such as in China, and Japan. This paper will describe the practice of special operations, first from the Western military history of the Greeks during the Peloponnesian war. It will then highlight the similar practice of special operations by the Near Eastern Assassins and Eastern militaries by using examples from the Chinese and the Japanese. This paper propounds that special operations, or ways of warfare as a whole, has no cultural and geographical divide, but rather very similarly practiced by men from all over the world. Ideas of fighting, killing and ultimately winning a war have similar undertones – attempts to find ways to win economically and at the least time.

Keywords: special operations, strategic culture, ways of warfare, Sun Tzu, Frontinus

Procedia PDF Downloads 437
5732 Training as a Service for Electronic Warfare

Authors: Toan Vo

Abstract:

Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied.

Keywords: training, electronic warfare, economics, law enforcement

Procedia PDF Downloads 70
5731 Chemical Modification of Jute Fibers with Oxidative Agents for Usability as Reinforcement in Polymeric Composites

Authors: Yasemin Seki, Aysun Akşit

Abstract:

The goal of this research is to modify the surface characterization of jute yarns with different chemical agents to improve the compatibility with a non-polar polymer, polypropylene, when used as reinforcement. A literature review provided no knowledge on surface treatment of jute fibers with sodium perborate trihydrate. This study also aims to compare the efficiency of sodium perborate trihydrate on jute fiber treatment with other commonly used chemical agents. Accordingly, jute yarns were treated with 0.02% potassium dichromate (PD), potassium permanganate (PM) and sodium perborate trihydrate (SP) aqueous solutions in order to enhance interfacial compatibility with polypropylene in this study. The effect of treatments on surface topography, surface chemistry and interfacial shear strength of jute yarns with polypropylene were investigated. XPS results revealed that surface treatments enhanced surface hydrophobicity by increasing C/O ratios of fiber surface. Surface roughness values increased with the treatments. The highest interfacial adhesion with polypropylene was achieved after SP treatment by providing the highest surface roughness values and hydrophobic character of jute fiber.

Keywords: jute, chemical modification, sodium perborate, polypropylene

Procedia PDF Downloads 484
5730 Rule of Natural Synthetic Chemical on Lead Immobilization in Polluted Sandy Soils

Authors: Saud S. AL Oud

Abstract:

Soil contamination can have dire consequences, such as loss of ecosystem and agricultural productivity, diminished food chain quality, tainted water resources, economic loss, and human and animal illness. In recent years, attention has focused on the development of in situ immobilization methods that are generally less expensive and disruptive to the natural landscape, hydrology, and ecosystems than are conventional excavation treatments, and disposal methods. Soft, inexpensive, and efficient agents were used in the present research to immobilize Pb in polluted sandy soil. Five agents, either naturally occurring or chemically prepared, were used for this purpose. These agents include; iron ore (72% Fe2O3), cement, a mixture of calcite and shale rich in aluminum (CASH), and two chemically prepared amorphous materials of Al- and Fe-gel. These agents were selected due to their ability to specifically adsorb heavy metals onto their surface OH functional groups, which provide permanent immobilization of metal pollutants and reduce the fraction that is potentially mobile or bioavailable. The efficiency of these agents in immobilizing Pb were examined in a laboratory experiment, in which two rates (0.5 and 1.0 %) of tested agents were added to the polluted soils containing total contents of Pb ranging from 17.4-49.8 mg/kg. The results show that all immobilizing agents were succeed in minimizing the mobile form of Pb as extracted by 0.5 N HNO3. The extracted Pb decreased with increasing addition rate of immobilizing agents. At addition rate of 0.5%, HNO3 extractable-Pb varied widely depending on the agents type and were found to represent 21-67% of the initial values. All agents were able to reduce mobile Pb to levels lower than that (2.0 mg/kg) reported for non polluted soil, particularly for soils had initials of mobile Pb less than 10 mg/kg. Both iron oxide and CASH had the highest efficiency in immobilizing Pb, followed by cement, then amorphous materials of Fe and Al hydroxides.

Keywords: soil, synthetic chemical, lead, immobilization, polluted

Procedia PDF Downloads 213
5729 Dewatering Agents for Granular Bauxite

Authors: Bruno Diniz Fecchio

Abstract:

Operations have been demanding increasingly challenging operational targets for the dewatering process, requiring lower humidity for concentrates. Chemical dewatering agents are able to improve solid/liquid separation processes, allowing operations to deal with increased complexity caused by either mineralogical changes or seasonal events that present operations with challenging moisture requirements for transportation and downstream steps. These chemicals reduce water retention by reducing the capillary pressure of the mineral and contributing to improved water drainage. This current study addresses the reagent effects on pile dewatering for Bauxite. Such chemicals were able to decrease the moisture of granulated Bauxite (particle size of 5 – 50 mm). The results of the laboratory scale tests and industrial trials presented the obtention of up to 11% relative moisture reduction, which reinforced the strong interaction between dewatering agents and the particle surface of granulated Bauxite. The evaluated dewatering agents, however, did not present any negative impact on these operations.

Keywords: bauxite, dewatering agents, pile dewatering, moisture reduction

Procedia PDF Downloads 57
5728 Understanding Tacit Knowledge and Its Role in Military Organizations: Methods of Managing Tacit Knowledge

Authors: M. Erhan Orhan, Onur Ozdemir

Abstract:

Expansion of area of operation and increasing diversity of threats forced the military organizations to change in many ways. However, tacit knowledge still is the most fundamental component of organizational knowledge. Since it is human oriented and in warfare human stands at the core of the organization. Therefore, military organizations should find effective ways of systematically utilizing tacit knowledge. In this context, this article suggest some methods for turning tacit knowledge into explicit in military organizations.

Keywords: tacit knowledge, military, knowledge management, warfare, technology

Procedia PDF Downloads 461
5727 Antimicrobial Agents Produced by Yeasts

Authors: T. Büyüksırıt, H. Kuleaşan

Abstract:

Natural antimicrobials are used to preserve foods that can be found in plants, animals, and microorganisms. Antimicrobial substances are natural or artificial agents that produced by microorganisms or obtained semi/total chemical synthesis are used at low concentrations to inhibit the growth of other microorganisms. Food borne pathogens and spoilage microorganisms are inactivated by the use of antagonistic microorganisms and their metabolites. Yeasts can produce toxic proteins or glycoproteins (toxins) that cause inhibition of sensitive bacteria and yeast species. Antimicrobial substance producing phenotypes belonging different yeast genus were isolated from different sources. Toxins secreted by many yeast strains inhibiting the growth of other yeast strains. These strains show antimicrobial activity, inhibiting the growth of mold and bacteria. The effect of antimicrobial agents produced by yeasts can be extremely fast, and therefore may be used in various treatment procedures. Rapid inhibition of microorganisms is possibly caused by microbial cell membrane lipopolysaccharide binding and in activation (neutralization) effect. Antimicrobial agents inhibit the target cells via different mechanisms of action.

Keywords: antimicrobial agents, yeast, toxic protein, glycoprotein

Procedia PDF Downloads 323
5726 Natural Preservatives: An Alternative for Chemical Preservative Used in Foods

Authors: Zerrin Erginkaya, Gözde Konuray

Abstract:

Microbial degradation of foods is defined as a decrease of food safety due to microorganism activity. Organic acids, sulfur dioxide, sulfide, nitrate, nitrite, dimethyl dicarbonate and several preservative gases have been used as chemical preservatives in foods as well as natural preservatives which are indigenous in foods. It is determined that usage of herbal preservatives such as blueberry, dried grape, prune, garlic, mustard, spices inhibited several microorganisms. Moreover, it is determined that animal origin preservatives such as whey, honey, lysosomes of duck egg and chicken egg, chitosan have antimicrobial effect. Other than indigenous antimicrobials in foods, antimicrobial agents produced by microorganisms could be used as natural preservatives. The antimicrobial feature of preservatives depends on the antimicrobial spectrum, chemical and physical features of material, concentration, mode of action, components of food, process conditions, and pH and storage temperature. In this review, studies about antimicrobial components which are indigenous in food (such as herbal and animal origin antimicrobial agents), antimicrobial materials synthesized by microorganisms, and their usage as an antimicrobial agent to preserve foods are discussed.

Keywords: animal origin preservatives, antimicrobial, chemical preservatives, herbal preservatives

Procedia PDF Downloads 344
5725 Catalytic Synthesis and Characterization of N-(4-(Tert-Butyl) Benzyl)-1-(4-Tert-Butyl) Phenyl)-N-Methyl Methanaminium Chloride from Tert-Butyl Benzyl Derivatives

Authors: Muhammad A. Muhammad

Abstract:

Butenafine (N-4-tert-butyl benzyl-N-methyl-1-naphthylene methylamine hydrochloride) is a benzylamine antimycotic (antifungal) agent that has a broad spectrum of action. The quest for improved antimycotic action brought about many research on the structure-activity properties of butenafine in relation to other antifungal agents. Of all those research, only little or no effort was recorded on the substituents attached to the aromatic systems in butenafine. In this research, N-(4-(tert-butyl) benzyl)-1-(4-tert-butyl) phenyl)-N-methyl methanaminium chloride, which is a butenafine analogue was synthesised from tert-butyl benzyl derivatives, by reductive amination using various solvents through a direct approach, where 1,2-dichloroethane gave the best solvent action at 40 °C (Yield: 75%) and of all the reducing agents used, sodium borohydride was found to give the best reducing action in the presence of silica chloride at room temperature (Yield: 50%). Characterization of the compound by 1H NMR showed a singlet peak of 18 hydrogen atoms with a chemical shift at 1.3-1.5 ppm for the presence of 6 methyl groups in the two tert-butyl substituents, the 13C NMR also indicated the presence of the two tert-butyl substituents by the peak with a chemical shift at 31-32 ppm for the six methyl carbon atoms, the IR indicated the presence of a tertiary ammonium ion by a strong band at 2460 cm-1 and finally the EIS-MS confirmed the molar mass of the compound by a mass to charge ratio of 324.2693. These results suggested that the target molecule was actually synthesised and therefore, 1,2-dichloroethane is a good solvent for this synthesis, and the most suitable reducing agent is sodium borohydride.

Keywords: antimicrobial agents, antimycotic agents, butenafine, chemotherapeutic agents, semisynthetic agents

Procedia PDF Downloads 272
5724 Virucidal, Bactericidal and Fungicidal Efficiency of Dry Microfine Steam on Innate Surfaces

Authors: C. Recchia, M. Bourel, B. Recchia

Abstract:

Microorganisms (viruses, bacteria, fungi) are responsible for most communicable diseases, threatening human health. For domestic use, chemical agents are often criticized because of their potential dangerousness, and natural solutions are needed. Application of the “dry microfine steam” (DMS) technology was tested on a selection of common pathogens (SARS-CoV-2, enterovirus EV-71, human coronavirus 229E, E. coli, S. aureus, C. albicans), on different innate surfaces, for 5 to 10 seconds. Quantification of the remaining pathogens was performed, and the reduction rates ranged from 99.8% (S. aureus on plastic) to over 99.999%. DMS showed high efficacy in the elimination of common microorganisms and could be seen as a natural alternative to chemical agents to improve domestic hygiene.

Keywords: steam, SARS-CoV-2, bactericidal, virucidal, fungicidal, sterilization

Procedia PDF Downloads 141
5723 The Social Psychology of Illegal Game Room Addiction in the Historic Chinatown District of Honolulu, Hawaii: Illegal Compulsive Gambling, Chinese-Polynesian Organized Crime Syndicates, Police Corruption, and Loan Sharking Rings

Authors: Gordon James Knowles

Abstract:

Historically the Chinatown district in Sandwich Islands has been plagued with the traditional vice crimes of illegal drugs, gambling, and prostitution since the early 1800s. However, a new form of psychologically addictive arcade style table gambling machines has become the dominant form of illegal revenue made in Honolulu, Hawaii. This study attempts to document the drive, desire, or will to play and wager with arcade style video gaming and understand the role of illegal game rooms in facilitating pathological gambling addiction. Indicators of police corruption by Chinese organized crime syndicates related to protection rackets, bribery, and pay-offs were revealed. Information fusion from a police science and sociological intelligence perspective indicates insurgent warfare is being waged on the streets of Honolulu by the People’s Republic of China. This state-sponsored communist terrorism in the Hawaiian Islands used “contactless” irregular warfare entailing: (1) the deployment of psychologically addictive gambling machines, (2) the distribution of the physically addictive fentanyl drug as a lethal chemical weapon, and (3) psychological warfare by circulating pro-China anti-American propaganda newspapers targeted at the small island populace.

Keywords: Chinese and Polynesian organized crime, china daily newspaper, electronic arcade style table games, gaming technology addiction, illegal compulsive gambling, and police intelligence

Procedia PDF Downloads 33
5722 Optical Analysis of the Plasmon Resonances of Gold Nano-Ring

Authors: Mehrnaz Mostafavi

Abstract:

The current research aims to explore a method for creating nano-ring structures through chemical reduction. By employing a direct reduction process at a controlled, slow pace, and concurrently introducing specific reduction agents, the goal is to fabricate these unique nano-ring formations. The deliberate slow reduction of nanoparticles within this process helps prevent spatial hindrances caused by the reduction agents. The timing of the reduction of metal atoms, facilitated by these agents, emerges as a crucial factor influencing the creation of nano-ring structures. In investigation involves a chemical approach utilizing bovine serum albumin and human serum albumin as organic reducing agents to produce gold nano-rings. The controlled reduction of metal atoms at a slow pace and under specific pH conditions plays a pivotal role in the successful fabrication of these nanostructures. Optical spectroscopic analyses revealed distinctive plasmonic behavior in both visible and infrared spectra, owing to the collective movement of electrons along the inner and outer walls of the gold nano-rings. Importantly, these ring-shaped nanoparticles exhibit customizable plasmon resonances in the near-infrared spectrum, a characteristic absent in solid particles of similar sizes. This unique attribute makes the generated samples valuable for applications in Nanomedicine and Nanobiotechnology, leveraging the distinct optical properties of these nanostructures.

Keywords: nano-ring structure, nano-particles, reductant agents, plasmon resonace

Procedia PDF Downloads 46
5721 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 36
5720 Passengers’ Behavior Analysis under the Public Transport Disruption: An Agent-Based Simulation

Authors: M. Rahimi, F. Corman

Abstract:

This paper study the travel behavior of passengers in a public transport disruption under information provision strategies. We develop a within-day approach for multi-agent simulation to evaluate the behavior of the agents, under comprehensive scenarios through various information exposure, equilibrium, and non-equilibrium scenarios. In particular, we quantify the effects of information strategies in disruption situation on passengers’ satisfaction, number of involved agents, and the caused delay. An agent-based micro-simulation model (MATSim) is applied for the city of Zürich, Switzerland, for the purpose of activity-based simulation in a multimodal network. Statistic outcome is analysed for all the agents who may be involved in the disruption. Agents’ movement in the public transport network illustrates agents’ adaptations to available information about the disruption. Agents’ delays and utility reveal that information significantly affects agents’ satisfaction and delay in public transport disruption. Besides, while the earlier availability of the information causes the fewer consequent delay for the involved agents, however, it also leads to more amount of affected agents.

Keywords: agent-based simulation, disruption management, passengers’ behavior simulation, public transport

Procedia PDF Downloads 100
5719 Society-Centric Warfare: Lessons from Afghanistan

Authors: Amin Tarzi

Abstract:

The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.

Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy

Procedia PDF Downloads 75
5718 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 357
5717 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 115