Search results for: cyber- physical attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6485

Search results for: cyber- physical attack

6245 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 35
6244 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being

Authors: Jeyaseelan Maria Michael

Abstract:

This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.

Keywords: college students, cyberbullying, cyber victimization, psychological well-being

Procedia PDF Downloads 97
6243 Applying the Regression Technique for ‎Prediction of the Acute Heart Attack ‎

Authors: Paria Soleimani, Arezoo Neshati

Abstract:

Myocardial infarction is one of the leading causes of ‎death in the world. Some of these deaths occur even before the patient ‎reaches the hospital. Myocardial infarction occurs as a result of ‎impaired blood supply. Because the most of these deaths are due to ‎coronary artery disease, hence the awareness of the warning signs of a ‎heart attack is essential. Some heart attacks are sudden and intense, but ‎most of them start slowly, with mild pain or discomfort, then early ‎detection and successful treatment of these symptoms is vital to save ‎them. Therefore, importance and usefulness of a system designing to ‎assist physicians in the early diagnosis of the acute heart attacks is ‎obvious.‎ The purpose of this study is to determine how well a predictive ‎model would perform based on the only patient-reportable clinical ‎history factors, without using diagnostic tests or physical exams. This ‎type of the prediction model might have application outside of the ‎hospital setting to give accurate advice to patients to influence them to ‎seek care in appropriate situations. For this purpose, the data were ‎collected on 711 heart patients in Iran hospitals. 28 attributes of clinical ‎factors can be reported by patients; were studied. Three logistic ‎regression models were made on the basis of the 28 features to predict ‎the risk of heart attacks. The best logistic regression model in terms of ‎performance had a C-index of 0.955 and with an accuracy of 94.9%. ‎The variables, severe chest pain, back pain, cold sweats, shortness of ‎breath, nausea, and vomiting were selected as the main features.‎

Keywords: Coronary heart disease, Acute heart attacks, Prediction, Logistic ‎regression‎

Procedia PDF Downloads 425
6242 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 25
6241 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 52
6240 Joint Physical Custody: Lessons from the European Union

Authors: Katarzyna Kamińska

Abstract:

When thinking about custodial arrangements after divorce or separation, there has been a shift from sole custody, particularly maternal preference, to joint physical custody. In many Western countries, an increasing of children with separated parents have joint physical custody, which is believed to be in the best interests of the child, as children can maintain personal relations and direct contact with both parents on a regular basis. The aim of the article is to examine joint physical custody, both from the perspective of the binding legal instruments that are relevant to joint physical custody, the Principles of European Family Law drafted by the CEFL, as well as the international research on this matter. The thesis underlying this paper is that joint physical custody is in itself neither good nor bad, and it depends on how the arrangements are managed by the parents. The paper includes a reflection on joint physical custody in the face of the COVID-19 crisis. The results indicate that in normal circumstances, joint physical custody demands broad communication, and now it times of crisis, we need over-communication about children and plans. Only a very tight and coordinated co-parenting plan make the whole family safer.

Keywords: joint physical custody, co-parenting, child welfare, COVID-19

Procedia PDF Downloads 202
6239 The Effect of Physical Biorhythm Cycle on Health-Related Fitness Factors

Authors: Leyli Khavari, Javad Yousefian

Abstract:

The aim of this study was to investigate the effect of physical biorhythm cycle on health-related fitness factors. For this purpose, 120 athlete and non-athlete male and female students were selected randomly and based on the level of physical activity divided into athletic and non-athletic groups. The exact date of birth and also when the subjects were in the positive, negative and critical physical biorhythm cycle was determined by calculation software biorhythm. The physical fitness factors tests, including Queens College Step Test, AAHPERD sit-ups; Wells stretch test and hand dynamometer. Students in three stages in positive, negative and critical physical cycle were tested. Data processing using SPSS software and statistical tests ANOVA with repeated measures and student t test was used for dependent. The results of this study showed that changes in physical fitness and physical biorhythm were not affected by changes in the 23-day physical cycle.

Keywords: AAHPERD test, biorhythm, physical cycle, Queens College Step Test

Procedia PDF Downloads 150
6238 Associations Between Executive Function and Physical Fitness in Preschool Children

Authors: Aleksander Veraksa, Alla Tvardovskaya, Margarita Gavrilova, Vera Yakupova, Martin Musálek

Abstract:

Considering the current agreement on the significance of executive functions, there is growing interest in determining factors that contribute to the development of these skills, especially during the preschool period. Although multiple studies have been focusing on links between physical activity, physical fitness and executive functions, this topic was more investigated in schoolchildren and adults than in preschoolers. The aim of the current study was to identify different levels of physical fitness among pre-schoolers, followed by an analysis of differences in their executive functions. Participants were 261 5-6-years old children. Inhibitory control and working memory were positively linked with physical fitness. Cognitive flexibility was not associated with physical fitness. The research findings are considered from neuropsychological grounds, Jean Piaget's theory of cognitive development, and the cultural-historical approach.

Keywords: cognitive flexibility, inhibitory control, physical activity, physical fitness, working memory.

Procedia PDF Downloads 68
6237 Mineral Slag Used as an Alternative of Cement in Concrete

Authors: Eskinder Desta Shumuye, Jun Zhao, Zike Wang

Abstract:

This paper summarizes the results of experimental studies carried out at Zhengzhou University, School of Mechanics and Engineering Science, research laboratory, on the performance of concrete produced by combining Ordinary Portland Cement (OPC) with Ground-Granulated Blast Furnace Slag (GGBS). Concrete specimens cast with OPC and various percentage of GGBS (0%, 30%, 50%, and 70%) were subjected to high temperature exposure and extensive experimental test reproducing basic freeze-thaw cycle and a chloride-ion attack to determine their combined effects within the concrete samples. From the experimental studies, comparisons were made on the physical, mechanical, and microstructural properties in compassion with ordinary Portland cement concrete (OPC). Further, durability of GGBS cement concrete, such as exposure to accelerated carbonation, chloride ion attack, and freeze-thaw action in compassion with various percentage of GGBS and ordinary Portland cement concrete of similar mixture composition was analyzed. The microstructure, mineralogical composition, and pore size distribution of concrete specimens were determined via Scanning Electron Microscopy (SEM) analysis and X-Ray Diffraction (XRD). The result demonstrated that when the exposure temperature increases from 200 ºC to 400 ºC, the residual compressive strength was fluctuating for all concrete group, and compressive strength and chloride ion exposure of the concrete decreased with the increasing of slag content. The SEM and EDS results showed an increase in carbonation rate with increasing in slag content.

Keywords: accelerated carbonation, chloride-ion, concrete, ground-granulated blast furnace slag, GGBS, high-temperature

Procedia PDF Downloads 107
6236 Investigation on Corrosion Behavior of Copper Brazed Joints

Authors: A. M. Aminazad, A. M. Hadian, F. Ghasimakbari

Abstract:

DHP (Deoxidized High Phosphorus )copper is widely used in various heat transfer units such as, air conditioners refrigerators, evaporators and condensers. Copper sheets and tubes (ISODHP) were brazed with four different brazing alloys. Corrosion resistances of the joints were examined by polarization and salt spray tests. The selected fillers consisted of three silver-based brazing alloys (hard solder); AWS-BCu5 BAg8, DINLAg30, and a copper-based filler AWS BCuP2. All the joints were brazed utilizing four different brazing processes including furnace brazing under argon, vacuum, air atmosphere and torch brazing. All of the fillers were used with and without flux. The microstructure of the brazed sheets was examined using both optical and scanning electron microscope (SEM). Hardness and leak tests were carried out on all the brazed tubes. In all three silver brazing alloys selective and galvanic corrosion were observed in filler metals, but in copper phosphor alloys the copper adjacent to the joints were noticeably corroded by pitting method. Microstructure of damaged area showed selective attack of copper lamellae as well. Interfacial attack was observed along boundaries as well as copper attack within the filler metal itself. It was found that the samples brazed with BAg5 filler metal using vacuum furnace show a higher resistance to corrosion. They also have a good ductility in the brazed zone.

Keywords: copper, brazing, corrosion, filler metal

Procedia PDF Downloads 436
6235 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 455
6234 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 349
6233 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area

Authors: Niyi Adegoke, Saanumi Jimmy Omolou

Abstract:

The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.

Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology

Procedia PDF Downloads 189
6232 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 73
6231 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 92
6230 A CFD Study of the Performance Characteristics of Vented Cylinders as Vortex Generators

Authors: R. Kishan, R. M. Sumant, S. Suhas, Arun Mahalingam

Abstract:

This paper mainly researched on influence of vortex generator on lift coefficient and drag coefficient, when vortex generator is mounted on a flat plate. Vented cylinders were used as vortex generators which intensify vortex shedding in the wake of the vented cylinder as compared to base line circular cylinder which ensures more attached flow and increases lift force of the system. Firstly vented cylinders were analyzed in commercial CFD software which is compared with baseline cylinders for different angles of attack and further variation of lift and drag forces were studied by varying Reynolds number to account for influence of turbulence and boundary layer in the flow. Later vented cylinders were mounted on a flat plate and variation of lift and drag coefficients was studied by varying angles of attack and studying the dependence of Reynolds number and dimensions of vortex generator on the coefficients. Mesh grid sensitivity is studied to check the convergence of the results obtained It was found that usage of vented cylinders as vortex generators increased lift forces with small variation in drag forces by varying angle of attack.

Keywords: CFD analysis, drag coefficient, FVM, lift coefficient, modeling, Reynolds number, simulation, vortex generators, vortex shedding

Procedia PDF Downloads 406
6229 The Investigation of Correlation between Body Composition and Physical Activity in University Students

Authors: Ferruh Taspinar, Gulce K. Seyyar, Gamze Kurt, Eda O. Okur, Emrah Afsar, Ismail Saracoglu, Betul Taspinar

Abstract:

Alterations of physical activity can effect body composition (especially body fat ratio); however body mass index may not sufficient to indicate these minimal differences. The aim of this study was to evaluate the relationship between body composition and physical activity in university students. In this study, 132 university students (mean age; 21.21±1.51) were included. Tanita BC-418 and International Physical Activity Questionnaire (IPAQ) were used to evaluate participants. The correlation between the parameters was analysed via Spearman correlation analysis. Significance level in statistical analyses was accepted is 0.05. The results showed that there was no correlation between body mass index and physical activity (p>0.05). There was a positive correlation between body muscle ratio and physical activity, whereas a negative correlation between body fat ratio and physical activity (p<0.05). This study showed that body fat and muscle ratio affects the level of physical activity in healthy university students. Therefore, we thought that physical activity might reduce effects of the diseases caused by disturbed body composition. Further studies are required to support this idea.

Keywords: body composition, body mass index, physical activity, university student

Procedia PDF Downloads 329
6228 Mobile Device Applications in Physical Education: Investigating New Pedagogical Possibilities

Authors: Danica Vidotto

Abstract:

Digital technology is continuing to disrupt and challenge local conventions of teaching and education. As mobile devices continue to make their way into contemporary classrooms, educators need new pedagogies incorporating information communication technology to help reform the learning environment. In physical education, however, this can seem controversial as physical inactivity is often related to an excess of screen-time. This qualitative research project is an investigation on how physical educators use mobile device applications (apps) in their pedagogy and to what end. A comprehensive literature review is included to examine and engage current academic research of new pedagogies and technology, and their relevance to physical activity. Data were collected through five semi-structured interviews resulting in three overarching themes; i) changing pedagogies in physical education; ii) the perceived benefits and experienced challenges of using apps; and iii) apps, physical activity, and physical education. This study concludes with a discussion of the findings engaging the literature, discussing the implications of findings, and recommendations for future research.

Keywords: applications (apps), mobile devices, new pedagogies, physical education

Procedia PDF Downloads 171
6227 Physical Fitness Activities for Elementary School Pupils of Matacon Elementary School

Authors: Ariel B. Domagsang

Abstract:

This study dealt with the physical fitness activities for elementary school pupils of Matacon Elementary School, Polangui South District, Albay Division are presented in this chapter. Specifically, it looked into the pre-post test performance based on the Physical Fitness Test which were subjected to statistical significant test of difference including health- and skill-related improvement. Finally, it came up with physical fitness activities to improve the physical fitness performance of the pupils. The descriptive method through survey using questionnaire-checklist, unstructured interview and document(ary) analysis were utilized in this research. There were 171 grades five and six pupil participants in this undertaking.

Keywords: Matakon, fitness acitivities, elementary schools, physical fitness of pupils

Procedia PDF Downloads 504
6226 Physical Activity, Exercise and Physical Fitness in Different Generation

Authors: Carl J. Caspersen, Kenneth E. Powell, Gregory M. Christenson, Kirupa V. Patel

Abstract:

‘Physical activity’, ‘exercise’, and ‘physical fitness’ are terms that describe different concepts. However, they are often confused with one another, and the terms are sometimes used interchangeably. This paper proposes definitions to distinguish them. Physical activity is defined as any bodily movement produced by skeletal muscles that result in energy expenditure. The energy expenditure can be measured in kilocalories. Physical activity in daily life can be categorized into occupational, sports, Conditioning, household, or other activities. Exercise is a subset of physical activity that is planned, structured, and repetitive and has as a final or an intermediate objective the improvement or maintenance of physical fitness. Physical fitness is a set of attributes that are either health- or skill-related. The degree to which people have these attributes can be measured with specific tests. These definitions are offered as an interpretational framework for comparing studies that relate physical activity, exercise, and physical fitness to health. Physical activity is defined as any bodily movement produced by skeletal muscles that require energy expenditure. Physical inactivity has been identified as the fourth leading risk factor for global mortality causing an estimated 3.2 million deaths globally. Regular moderate intensity physical activity – such as walking, cycling, or participating in sports – has significant benefits for health. For instance, it can reduce the risk of cardiovascular diseases, diabetes, colon and breast cancer, and depression. Moreover, adequate levels of physical activity will decrease the risk of a hip or vertebral fracture and help control weight. Any bodily movement produced by the contraction of skeletal muscle that increases energy expenditure above a basal level. In these guidelines, physical activity generally refers to the subset of physical activity that enhances health.

Keywords: physical activity, exercise, physical fitness, sports

Procedia PDF Downloads 329
6225 A Simulation for Behaviors of Preys to Avoid Pursuit of Predator

Authors: Jae Moon Lee

Abstract:

Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey.

Keywords: predator, prey, energy, safe distance, simulation

Procedia PDF Downloads 234
6224 Performance of Autoclaved Aerated Concrete Containing Recycled Ceramic and Gypsum Waste as Partial Replacement for Sand

Authors: Efil Yusrianto, Noraini Marsi, Noraniah Kassim, Izzati Abdul Manaf, Hafizuddin Hakim Shariff

Abstract:

Today, municipal solid waste (MSW), noise pollution, and attack fire are three ongoing issues for inhabitants of urban including in Malaysia. To solve these issues, eco-friendly autoclaved aerated concrete (AAC) containing recycled ceramic and gypsum waste (CGW) as a partial replacement for sand with different ratios (0%, 5%, 10%, 15%, 20%, and 25% wt) has been prepared. The performance of samples, such as the physical, mechanical, sound absorption coefficient, and direct fire resistance, has been investigated. All samples showed normal color behavior, i.e., grey and free crack. The compressive strength was increased in the range of 6.10% to 29.88%. The maximum value of compressive strength was 2.13MPa for 15% wt of CGW. The positive effect of CGW on the compressive strength of AAC has also been confirmed by crystalline phase and microstructure analysis. The acoustic performances, such as sound absorption coefficients of samples at low frequencies (500Hz), are higher than the reference sample (RS). AAC-CGW samples are categorized as AAC material classes B and C. The fire resistance results showed the physical surface of the samples had a free crack and was not burned during the direct fire at 950ºC for 300s. The results showed that CGW succeeded in enhancing the performance of fresh AAC, such as compressive strength, crystalline phase, sound absorption coefficient, and fire resistance of samples.

Keywords: physical, mechanical, acoustic, direct fire resistance performance, autoclaved aerated concrete, recycled ceramic-gypsum waste

Procedia PDF Downloads 93
6223 Experimental Study on Strength and Durability Properties of Bio-Self-Cured Fly Ash Based Concrete under Aggressive Environments

Authors: R. Malathy

Abstract:

High performance concrete is not only characterized by its high strength, workability, and durability but also by its smartness in performance without human care since the first day. If the concrete can cure on its own without external curing without compromising its strength and durability, then it is said to be high performance self-curing concrete. In this paper, an attempt is made on the performance study of internally cured concrete using biomaterials, namely Spinacea pleracea and Calatropis gigantea as self-curing agents, and it is compared with the performance of concrete with existing self-cure chemical, namely polyethylene glycol. The present paper focuses on workability, strength, and durability study on M20, M30, and M40 grade concretes replacing 30% of fly ash for cement. The optimum dosage of Spinacea pleracea, Calatropis gigantea, and polyethylene glycol was taken as 0.6%, 0.24%, and 0.3% by weight of cement from the earlier research studies. From the slump tests performed, it was found that there is a minimum variation between conventional concrete and self-cured concrete. The strength activity index is determined by keeping compressive strength of conventionally cured concrete for 28 days as unity and observed that, for self-cured concrete, it is more than 1 after 28 days and more than 1.15 after 56 days because of secondary reaction of fly ash. The performance study of concretes in aggressive environment like acid attack, sea water attack, and chloride attack was made, and the results are positive and encouraging in bio-self-cured concretes which are ecofriendly, cost effective, and high performance materials.

Keywords: bio materials, Calatropis gigantea, self curing concrete, Spinacea oleracea

Procedia PDF Downloads 323
6222 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 306
6221 Analysis of Stall Angle Delay in Airfoil Coupled with Spinning Cylinder

Authors: N. Kiran, S. A. Vikas, Yatish Chandra, S. Srinivasan

Abstract:

Several Centuries ago, the aerodynamic studies on rotating cylinders and spheres have started. From the observation, the rotation of a cylinder has a remarkable effect on the aerodynamic characteristics is noticed. In case of airfoils as the angle of attack increases, the drag increases with reduction in lift i.e at the critical angle of attack. If at this point a strong impulse is imparted to the boundary layer by means of a spinning cylinder, the re-energisation of boundary layer is achieved and hence delaying the boundary layer separation and stalling characteristics. Analysis of aerodynamic effects spinning cylinder either at leading edge or at trailing edge of the airfoil is carried in the past, the positioning of cylinder close to trailing edge and its effects in delaying the stall are yet to be analyzed in depth. This paper aim is to understand the combined aerodynamic effects of coupling the spinning cylinder with the airfoil closer to the Trailing edge, by considering different spin ratio of the cylinder, its location and geometrical parameters in relation to the chord of the airfoil. From the analysis, it was observed that the spinning cylinder speed of rotation and location had a impact on stalling characteristics for a prescribed free stream condition. The results predicted through CFD analysis and experimental analysis showed a raise in aerodynamic efficiency and as the spin ratio increases, increase in stalling angle of attack is noticed when compared to the airfoil without spinning cylinder.

Keywords: aerodynamics, airfoil, spinning cylinder, stalling

Procedia PDF Downloads 409
6220 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 170
6219 Physical Fitness Evaluation of Physical Education Teachers in Maktab Rendah Sains MARA (MRSM)

Authors: Mohamad Nizam Asmuni, Ahmad Naszeri Salleh, Yunus Adam, Azhar Yaacob, Mohd Hafiz Rosli, Muhamad Nazrul Hakim Abdullah

Abstract:

Physical Education teacher at the school should have good physical fitness to educate and guide students in the school. Currently, there are no standards for the level of physical fitness for teachers who teaches physical education at the school. Therefore, this research is to determine the level of physical fitness of teacher of Physical Education at Maktab Rendah Sains MARA (MRSM). A total of 28 samples (18 men and 10 women, age 33 ± 4.91), teachers of physical education at MRSM, were randomly selected to participate in this study. Height, weight, body fat percentage, body mass index (BMI) and other physical testing are measured and recorded. The results showed that the average of body mass index (BMI) for teachers of Physical Education is 25.9 ± 4:57. Body mass index (BMI) of teachers can be categorized as pre-obese based on World Health Organization (WHO) guidelines. Body fat percentage for male (age; 34.3 ± 5.13) and female (age; 30.9 ± 3.81) teachers is 24.7% ± 6.54 and 30.6% ± 6.28, respectively. Male teachers were categorized as overfat, however, female teachers were categorized as healthy based on body fat ranges for standard adults at NY Obesity Research Center. Bleep test results show that the average Bleep test is level 4 and shuttle 2; average VO2max was 27.5 ± 5.94 L/min. Physical fitness and performance of physical education teachers at MRSM is much lower compared to the rugby junior athlete in University Putra Malaysia (UPM). Therefore, physical fitness of teachers must be improved to ensure the physical education classes at MRSM could be done better.

Keywords: physical fitness, BMI, bleep test, obesity

Procedia PDF Downloads 341
6218 Enhancement of Aircraft Longitudinal Stability Using Tubercles

Authors: Muhammad Umer, Aishwariya Giri, Umaiyma Rakha

Abstract:

Mimicked from the humpback whale flippers, the application of tubercle technology is seen to be particularly advantageous at high angles of attack. This particular advantage is of paramount importance when it comes to structures producing lift at high angles of attack. This characteristic of the technology makes it ideal for horizontal stabilizers and selecting the same as the subject of study to identify and exploit the advantage highlighted by researchers on airfoils, this project aims in establishing a foundation for the application of the bio-mimicked technology on an existing aircraft. Using a baseline and 2 tubercle configuration integrated models, the project targets to achieve the twin aim of highlighting the possibility and merits over the base model and also choosing the right configuration in providing the best characteristic suitable for high angles of attack. To facilitate this study, the required models are generated using Solidworks followed by trials in a virtual aerodynamic environment using Fluent in Ansys for resolving the project objectives. Following a structured plan, the aim is to initially identify the advantages mathematically and then selecting the optimal configuration, simulate the end configuration at angles mimicking the actual operation envelope for the particular structure. Upon simulating the baseline configuration at various angles of attack, the stall angle was determined to be 22 degrees. Thus, the tubercle configurations will be simulated and compared at 4 different angles of attacks: 0, 10, 20, and 24. Further, after providing the optimum configuration of horizontal stabilizers, this study aims at the integration of aircraft structure so that the results better imply the end deliverables of real life application. This draws the project scope closer at this point into longitudinal static stability considerations and improvements in the manoeuvrability characteristics. The objective of the study is to achieve a complete overview ready for real life application with marked benefits obtainable from bio morphing of the tubercle technology.

Keywords: flow simulation, horizontal stabilizer, stability enhancement, tubercle

Procedia PDF Downloads 298
6217 Competition as an Appropriate Instructional Practice in the Physical Education Environment: Reflective Experiences

Authors: David Barney, Francis Pleban, Muna Muday

Abstract:

The purpose of this study was to explore gender differences of former physical education students related to reflective experiences of competition in physical education learning environment. In the school environment, students are positioned in competitive situations, including in the physical education context. Therefore it is important to prepare future physical educators to address the role of competition in physical education. Participants for this study were 304 college-aged students and young adults (M = 1.53, SD = .500), from a private university and local community located in the western United States. When comparing gender, significant differences (p < .05) were reported for four (questions 5, 7, 12, and 14) of the nine scaling questions. Follow-up quantitative findings reported that males (41%) more than females (27%) witnessed fights in physical education environment during competitive games. Qualitative findings reported fighting were along the lines of verbal confrontation. Female participants tended to experience being excluded from games, when compared to male participants. Both male and female participants (total population; 95%, males; 98%; and females 92%) were in favor of including competition in physical education for students. Findings suggest that physical education teachers and physical education teacher education programs have a responsibility to develop gender neutral learning experiences that help students better appreciate the role competition plays, both in and out of the physical education classroom.

Keywords: competition, physical education, physical education teacher education, gender

Procedia PDF Downloads 464
6216 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 421