Search results for: defence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 127

Search results for: defence

37 Level of Reactive Oxygen Species and Inflammatory Cytokines in Rheumatoid Arthritis Patients: Correlation with Disease Severity

Authors: Somaiya Mateen, Shagufta Moin, Mohammad Owais, Abdul Khan, Atif Zafar

Abstract:

In rheumatoid arthritis (RA), impaired oxidative metabolism and imbalance between pro-and anti-inflammatory cytokines are responsible for causing inflammation and the degradation of cartilage and bone. The present study was done to evaluate the level and hence the role of reactive oxygen species (ROS) and inflammatory cytokines in the pathogenesis of RA. The present study was performed in the blood of 80 RA patients and 55 age and sex-matched healthy controls. The level of ROS (in 5% hematocrit) and the plasma level of pro-inflammatory cytokines [TNF-α, interleukin-6 (IL-6), IL-22] and anti-inflammatory cytokines (IL-4 and IL-5) were monitored in healthy subjects and RA patients. For evaluating the role of rheumatoid factor (RF) in the pathogenesis of RA, patients were sub-divided on the basis of presence or absence of RF. Reactive species and inflammatory cytokines were correlated with disease activity measure-Disease Activity Score for 28 joints (DAS28). The level of ROS, TNF-α, IL-6 and IL-22 were found to be significantly higher in RA patients as compared to the healthy controls, with the increase being more significant in patients positive for rheumatoid factor and those having high disease severity. On the other hand, a significant decrease in the level of IL-4 and IL-10 were observed in RA patients compared with healthy controls, with the decrease being more prominent in severe cases of RA. Higher ROS (indicative of impaired anti-oxidant defence system) and pro-inflammatory cytokines level in RA patients may lead to the damage of biomolecules which in turn contributes to tissue damage and hence to the development of more severe RA. The imbalance between pro-and anti-inflammatory cytokines may lead to the development of multi-system immune complications. ROS and inflammatory cytokines may also serve as a potential biomarker for assessing the disease severity.

Keywords: rheumatoid arthritis, reactive oxygen species, pro-inflammatory cytokines, anti-inflammatory cytokines

Procedia PDF Downloads 283
36 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks

Authors: Gerhard Grebe, Johan Marx

Abstract:

The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are provided

Keywords: ghana, operational risk, risk culture, risk management

Procedia PDF Downloads 84
35 Implementation of Gender Policy in the Georgian National Defence: Key Issues and Challenges

Authors: Vephkhvia Grigalashvili

Abstract:

The defense of Georgia is every citizen’s duty. The present article reviews the principles and standards of gender policy in the Georgian national defense sector. In addition, it looks at mechanisms for ensuring gender equality, going through the relevant Georgian legislation. Furthermore, this work aims to conduct a comparative analysis of defense models of Georgia, Finland, and the Baltic States in order to identify core institutional challenges. The study produced the following findings:(a) The national defense planning is based on the Total Defense approach, which implies a wide involvement of the country`s population in state defense. (b) This political act does not specify gender equality aspects of the Total Defense strategy; (c) According to the Constitution of Georgia, irrespective of gender factors, every citizen of Georgia is legally obliged to participate in state security activities. However, the state has an authority (power of choice) to decide which gender group (male or/and female citizen) must fulfill above mentioned their constitutional commitment. For instance, completion of compulsory military and reserve military services is a male citizen’s duty, whereas professional military service is equally accessible to both genders. The study concludes that effective implementation of the Total Defense concept largely depends on how Georgia uses its capabilities and human resources. Based on the statistical fact that more than 50% of the country’s population are women, Georgia has to elaborate on relevant institutional mechanisms for implementation of gender equality in the national defense organization. In this regard, it would be advisable: (i) to give the legal opportunity to women to serve in compulsory military service, and (ii) to develop labor reserve service as a part of the anti-crisis management system of Georgia.

Keywords: gender in defense organisation, gender mechanisms, gender in defense policy, gender policy

Procedia PDF Downloads 127
34 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks

Authors: Chi-Hsuan Cheng

Abstract:

This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurity

Keywords: cybersecurity, cybercrime, public private partnerships, cyberattack

Procedia PDF Downloads 27
33 The Status of the Actio Popularis under International Environmental Law in Cases of Damage to Global Commons

Authors: Aimite Jorge, Leenekela Usebiu

Abstract:

In recent years the International Community has seen a rise of what can be termed as ‘actio popularis”;that is to say lawsuits brought by third parties in the interest of the public or the world community as a whole, such as in cases of genocide and terrorism prosecutions under international law. It is equally clear that under current globalized world the effect of multinational activities on the environment is often felt beyond the borders of the territories where they operate. Equally true is the fact that the correspondence of citizens self-determination with national government is increasingly upset by the increasing willingness of states to share some ‘sovereign powers’ in order to address new economic, environmental and security interdependencies. The ‘unbundling’ of functional governance from fixed territories sees continuously citizens give up their formal approval of key decisions in exchange for a more remote, indirect say in supra-national or international decision-making bodies. The efforts to address a growing transnational flow of ecological harm are at the forefront of such indirect transformations, as evidenced by a proliferation of multilateral environmental agreements (MEAs) over the past three decades. However, unlike the defence of the global commons in cases of terrorism and genocide, there is still to be a clear application of action popularis in the case of environment, despite acknowledgement that the effect of the activities of several multinationals on the environment is as destructive to the global commons as genocide or terrorism are. Thus, this paper looking at specific cases of harmful degradation of the environment by certain multinationals transcending national boundaries, argues that it is high-time for a serious consideration of the application of the actio-popularis to environmental concerns. Although it is acknowledged that in international environmental law the challenge to reach a “critical mass” of recognition and support for an ‘actio-popularis’ for environment damage is particularly demanding, it is worth the try.

Keywords: actio popularis in environment law, global commons, transnational environmental damage, law and environment

Procedia PDF Downloads 530
32 Vibration Analysis of FGM Sandwich Panel with Cut-Outs Using Refined Higher-Order Shear Deformation Theory (HSDT) Based on Isogeometric Analysis

Authors: Lokanath Barik, Abinash Kumar Swain

Abstract:

This paper presents vibration analysis of FGM sandwich structure with a complex profile governed by refined higher-order shear deformation theory (RHSDT) using isogeometric analysis (IGA). Functionally graded sandwich plates provide a wide range of applications in aerospace, defence, and aircraft industries due to their ability to distribute material functions to influence the thermo-mechanical properties as desired. In practical applications, these structures generally have intrinsic profiles, and their response to loads is significantly affected due to cut-outs. IGA is primarily a NURBS-based technique that is effective in solving higher-order differential equations due to its inherent C1 continuity imposition in solution space for a single patch. Complex structures generally require multiple patches to accurately represent the geometry, and hence, there is a loss of continuity at adjoining patch junctions. Therefore, patch coupling is desired to maintain continuity requirements throughout the domain. In this work, a novel strong coupling approach is provided that generates a well-defined NURBS-based model while achieving continuity. The methodology is validated by free vibration analysis of sandwich plates with present literature. The results are in good agreement with the analytical solution for different plate configurations and power law indexes. Numerical examples of rectangular and annular plates are discussed with variable boundary conditions. Additionally, parametric studies are provided by varying the aspect ratio, porosity ratio and their influence on the natural frequency of the plate.

Keywords: vibration analysis, FGM sandwich structure, multipatch geometry, patch coupling, IGA

Procedia PDF Downloads 42
31 In Exile but Not at Peace: An Ethnography among Rwandan Army Deserters in South Africa

Authors: Florence Ncube

Abstract:

This paper examines the military and post-military experiences of soldiers who deserted from the Rwanda Defence Force (RDF) and tried to make a living in South Africa. Because they are deserters, they try to hide their military identity, yet it is simultaneously somewhat coercively ascribed to them by the Rwandan state and can put them in potential danger. The paper attends to the constructions, experiences, practices, and subjective understanding of the deserters’ being in exile to examine how, under circumstances of perceived threat, these men navigate real or perceived state-sponsored surveillance and threat in non-military settings in South Africa where they have become potential political and disciplinary targets. To make sense of the deserters’ experiences in these circumstances, the paper stitches together a number of useful theoretical concepts, including Bourdieu’s (1992) theory of practice and Vigh’s (2009; 2018) concept of social navigation because no single approach can coherently analyze the specificity of this study. Conventional post-military literature privileges an understanding of army desertion as a malignancy and somewhat problematic. Little is known about the military and post-military experiences of deserters who believe that army desertion is in fact a building block towards achieving subjective peace, even in the context of exile. The paper argues that the presence of Rwandan state agents in South Africa strips the context of the exile of its capacity to provide the deserters with peace, safety, and security. This paper recenters army desertion in analyses of militarism, soldiering, and transition in African contexts and complicates commonsense understandings of army desertion which assume that it is entirely problematic. This paper is drawn from an ethnography conducted among 30 junior-rank Rwandan army deserters exiled in Johannesburg and Cape Town. The researcher employed life histories, in-depth interviews, and deep hangouts to collect data.

Keywords: army deserter, military, identity, exile, peacebuilding, South Africa

Procedia PDF Downloads 43
30 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 83
29 A Comparison of Sulfur Mustard Cytotoxic Effects on the Two Human Lung Origin Cell Lines

Authors: P. Jost, L. Muckova, M. Matula, J. Pejchal, D. Jun, R. Stetina

Abstract:

Sulfur mustard (bis(2-chlorethyl) sulfide) is highly toxic, chemical warfare agent that has been used in the past in several armed conflicts. Except for the skin, respiratory tract is one of the important routes of exposure. The elucidation and understanding of the mechanism of toxicity of SM have been effort intensive research. The multiple targets character of SM caused cellular damage resulted in activation of many different mechanisms which contribute to cellular response and participate in the final cytopathology effect. In our present work, we compared time-dependent changes in sulfur mustard exposed adult human lung fibroblasts NHLF and lung epithelial alveolar cell line A-549. Cell viability (MTT assay, Calcein-AM assay, and xCELLigence - real-time cell analysis), apoptosis (flow cytometry), mitochondrial membrane potential (Δψm, flow cytometry), reactive oxygen species induction (DC and cell cycle distribution (flow cytometry) were studied. We observed significantly decreased mitochondrial membrane potential and subsequent induction of apoptosis correlating with decreased cellular viability in the sulfur mustard exposed cells. In low concentrations, sulfur mustard-induced S-phase cell cycle arrest, on the other hand, high concentrations, cell cycle phase distribution of sulfur mustard exposed cells resembled cell cycle phase distribution of control group, which implies nonspecific cell cycle inhibition. Epithelial cells A-549 was found as more sensible to sulfur mustard toxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.

Keywords: apoptosis, cell cycle, cytotoxicity, sulfur mustard

Procedia PDF Downloads 160
28 Demonstration Operation of Distributed Power Generation System Based on Carbonized Biomass Gasification

Authors: Kunio Yoshikawa, Ding Lu

Abstract:

Small-scale, distributed and low-cost biomass power generation technologies are highly required in the modern society. There are big needs for these technologies in the disaster areas of developed countries and un-electrified rural areas of developing countries. This work aims to present a technical feasibility of the portable ultra-small power generation system based on the gasification of carbonized wood pellets/briquettes. Our project is designed for enabling independent energy production from various kinds of biomass resources in the open-field. The whole process mainly consists of two processes: biomass and waste pretreatment; gasification and power generation. The first process includes carbonization, densification (briquetting or pelletization), and the second includes updraft fixed bed gasification of carbonized pellets/briquettes, syngas purification, and power generation employing an internal combustion gas engine. A combined pretreatment processes including carbonization without external energy and densification were adopted to deal with various biomass. Carbonized pellets showed a better gasification performance than carbonized briquettes and their mixture. The 100-hour continuous operation results indicated that pelletization/briquetting of carbonized fuel realized the stable operation of an updraft gasifier if there were no blocking issues caused by the accumulation of tar. The cold gas efficiency and the carbon conversion during carbonized wood pellets gasification was about 49.2% and 70.5% with the air equivalence ratio value of around 0.32, and the corresponding overall efficiency of the gas engine was 20.3% during the stable stage. Moreover, the maximum output power was 21 kW at the air flow rate of 40 Nm³·h⁻¹. Therefore, the comprehensive system covering biomass carbonization, densification, gasification, syngas purification, and engine system is feasible for portable, ultra-small power generation. This work has been supported by Innovative Science and Technology Initiative for Security (Ministry of Defence, Japan).

Keywords: biomass carbonization, densification, distributed power generation, gasification

Procedia PDF Downloads 123
27 Criteria for Good Governance in Georgian Defense Sector:Standards and Principles

Authors: Vephkhvia Grigalashvili

Abstract:

This paper provides an overview of criteria for good governance in Georgian defense sector and scientific outcomes of comparative research. A respect for good governance and its realization into Georgian national defense sector represents a fundamental institutional necessity as well as country`s politico-legal obligation within the framework of the existing collaboration mechanisms with NATO (especially Building Integrity (BI) Programme) and the Association Agreement between the EU and Georgia. Furthermore good governance is considered as a democracy measuring criterion in country`s Euro-Atlantic integration process. Accordingly, integration and further development of the contemporary approaches of good governance into Georgian defense management model represents a burning issue of the country. The assessment of an existing model of the country, identification of defects and determination of course of institutional reforms in a mutual comparison format of good governance mechanisms of NATO or/and the EU member Eastern European or Baltic countries positively assessed by the international organizations is considered as a precondition for its effective realization. Scientific aims of this study are: (a) to conduct comparative analysis of Georgian national principles and generalized standards of NATO or/and the EU member Eastern European and Baltic countries in following segments of good governance: open governance; anticorruption policy; conflict of interests; integrity; internal and external control bodies; (b) to formulate theoretical and practical recommendations on reforms to be implemented in the country`s national defence sector. As research reveals, although, institutional / legal pillars of good governance in Georgian defense sector generally are in compliance with international principles, the quality of implementation of good government norms still remains as an area that needs further development by raising awareness of public servants and community.

Keywords: anti-corruption policy within Georgian defense governance, conflict of interests within Georgian defense governance, good governance in Georgian defense sector, principles of integrity in Georgian defense management

Procedia PDF Downloads 134
26 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 138
25 Binge Eating among Women Who Suffer from Psychological Abuse in Their Relationship: The Moderating Role of Defense Mechanisms

Authors: Orly Yona Drori, Shirley Ben Shlomo

Abstract:

Objectives: The participants will be able to recognize the predictors of binge eating addiction among women who suffer from psychological abuse in their relationships and will recognize the role of woman's defense mechanisms in moderating the association between psychological abuse and binge eating addiction. Methods: A convenience sample of 380 Israeli women in relationships were located via the Internet, and after consenting to participate in the study, they completed a series of structured questionnaires (The Yale Food Addiction Scale; The Defense Style Questionnaire; psychological maltreatment of women by their male partners; level of differentiation of self; sociodemographic questionnaire). Results: The higher the level of differentiation and mature defense mechanisms, the less addictive a woman is. However, the level of addiction among women who experience psychological abuse within their intimate relations is higher than women who do not experience psychological abuse in their relationship. Among women who experienced psychological abuse in their relations, the defense mechanisms moderate the association between psychological abuse within intimate relations and the extent of the addiction to binge eating. Conclusions: The study contributes to the therapy of women with binge eating addictions, as it raises awareness of therapeutic-related content that could strengthen women and help them to cope with situations in their lives without the need to binge. One of the significant variables for therapeutic work is the level of differentiation of the self. In addition, identifying the types of defense mechanisms might help to match treatment to the woman's emotional needs. The current study found also that it is important to identify the environmental systems by which the addict is surrounded, such as whether woman is in an abusive relationship. Finally the study leads to the recognition that binge eating, which is usually treated with an emphasis on nutritional behavior change, is an addiction, and as such, it requires a combination of mental, nutritional and behavioral therapy. In view of this approach, it is recommended that treating a woman who is addicted to binge eating should involve a multi-disciplinary team comprised of physicians, clinical dietitians, and clinical psychotherapists.

Keywords: binge eating, defence mechanism, food addiction, psychological abuse

Procedia PDF Downloads 141
24 Elucidating the Defensive Role of Silicon-Induced Biochemical Responses in Wheat Exposed to Drought and Diuraphis noxia Infestation

Authors: Lintle Mohase, Ninikoe Lebusa, Mpho Stephen Mafa

Abstract:

Wheat is an economically important cereal crop. However, the changing climatic conditions that intensify drought in production areas, and additional pest infestation, such as the Russian wheat aphid (RWA, Diuraphis noxia), severely hamper its production. Drought and pest management require an additional water supply through irrigation and applying inorganic nutrients (including silicon) as alternative strategies to mitigate the stress effects. Therefore, other approaches are needed to enhance wheat productivity during drought stress and aphid abundance. Two wheat cultivars were raised under greenhouse conditions, exposed to drought stress, and treated with silicon before infestation with the South African RWA biotype 2 (RWASA2). The morphological evaluations showed that severe drought or a combination of drought and infestation significantly reduced the plant height of wheat cultivars. Silicon treatment did not alleviate the growth reduction. The biochemical responses were measured using spectrophotometric assays with specific substrates. An evaluation of the enzyme activities associated with oxidative stress and defence responses indicated that drought stress increased NADPH oxidase activity, while silicon treatment significantly reduced it in drought-stressed and infested plants. At 48 and 72 hours sampling periods, a combination of silicon, drought and infestation treatment significantly increased peroxidase activity compared to drought and infestation treatment. The treatment also increased β-1,3-glucanase activity 72 hours after infestation. In addition, silicon and drought treatment increased glucose but reduced sucrose accumulation. Furthermore, silicon, drought, and infestation treatment combinations reduced the sucrose content. Finally, silicon significantly increased the trehalose content under severe drought and infestation, evident at 48 and 72-hour sampling periods. Our findings shed light on silicon’s ability to induce protective biochemical responses during drought and aphid infestation.

Keywords: drought, enzyme activity, silicon, soluble sugars, Russian wheat aphid, wheat

Procedia PDF Downloads 49
23 The Molecular Analysis of Effect of Phytohormones and Spermidine on Tomato Growth under Biotic Stress

Authors: Rumana Keyani, Haleema Sadia, Asia Nosheen, Rabia Naz, Humaira Yasmin, Sidra Zahoor

Abstract:

Tomato is a significant crop of the world and is one of the staple foods of Pakistan. A vast number of plant pathogens from simple viruses to complex parasites cause diseases in tomatoes but fungal infection in our country is quite high. Sometimes the symptoms are too harsh destroying the crop altogether. Countries like our own with continuously increasing massive population and limited resources cannot afford such an economic loss. There is an array of morphological, genetic, biochemical and molecular processes involved in plant resistance mechanisms to biotic stress. The study of different metabolic pathways like Jasmonic acid (JA) pathways and most importantly signaling molecules like ROS/RNS and their redoxin enzymes i.e. TRX and NRX is crucial to disease management, contributing to healthy plant growth. So, improving tolerance in crop plants against biotic stresses is a dire need of our country and world as whole. In the current study, fungal pathogenic strains Alternaria solani and Rhizoctonia solani were used to inoculate tomatoes to check the defense responses of tomato plant against these pathogens at molecular as well as phenotypic level with jasmonic acid and spermidine pretreatment. All the growth parameters (root and shoot length, dry and weight root, shoot weight measured 7 days post-inoculation, exhibited that infection drastically declined the growth of the plant whereas jasmonic acid and spermidine assisted the plants to cope up with the infection. Thus, JA and Spermidine treatments maintained comparatively better growth factors. Antioxidant assays and expression analysis through real time quantitative PCR following time course experiment at 24, 48 and 72 hours intervals also exhibited that activation of JA defense genes and a polyamine Spermidine helps in mediating tomato responses against fungal infection when used alone but the two treatments combined mask the effect of each other.

Keywords: fungal infection, jasmonic acid defence, tomato, spermidine

Procedia PDF Downloads 96
22 An Original and Suitable Induction Method of Repeated Hypoxic Stress by Hydralazine to Investigate the Integrity of an in Vitro Contact Co-Culture Blood Brain Barrier Model

Authors: Morgane Chatard, Clémentine Puech, Nathalie Perek, Frédéric Roche

Abstract:

Several neurological disorders are linked to repeated hypoxia. The impact of such repeated hypoxic stress, on endothelial cells function of the blood-brain barrier (BBB) is little studied in the literature. Indeed, the study of hypoxic stress in cellular pathways is complex using hypoxia exposure because HIF 1α (factor induced by hypoxia) has a short half life. Our study presents an innovative induction method of repeated hypoxic stress, more reproducible, which allows us to study its impacts on an in vitro contact co-culture BBB model. Repeated hypoxic stress was induced by hydralazine (a mimetic agent of hypoxia pathway) during two hours and repeated during 24 hours. Then, BBB integrity was assessed by permeability measurements (transendothelial electrical resistance and membrane permeability), tight junction protein expressions (cell-ELISA and confocal microscopy) and by studying expression and activity of efflux transporters. First, this study showed that repeated hypoxic stress leads to a BBB’s dysfunction illustrated by a significant increase in permeability. This loss of membrane integrity was linked to a significant decrease of tight junctions’ protein expressions, facilitating a possible transfer of potential cytotoxic compounds in the brain. Secondly, we demonstrated that brain microvascular endothelial cells had set-up defence mechanism. These endothelial cells significantly increased the activity of their efflux transporters which was associated with a significant increase in their expression. In conclusion, repeated hypoxic stress lead to a loss of BBB integrity with a decrease of tight junction proteins. In contrast, endothelial cells increased the expression of their efflux transporters to fight against cytotoxic compounds brain crossing. Unfortunately, enhanced efflux activity could also lead to reducing pharmacological drugs delivering to the brain in such hypoxic conditions.

Keywords: BBB model, efflux transporters, repeated hypoxic stress, tigh junction proteins

Procedia PDF Downloads 271
21 Developing Manufacturing Process for the Graphene Sensors

Authors: Abdullah Faqihi, John Hedley

Abstract:

Biosensors play a significant role in the healthcare sectors, scientific and technological progress. Developing electrodes that are easy to manufacture and deliver better electrochemical performance is advantageous for diagnostics and biosensing. They can be implemented extensively in various analytical tasks such as drug discovery, food safety, medical diagnostics, process controls, security and defence, in addition to environmental monitoring. Development of biosensors aims to create high-performance electrochemical electrodes for diagnostics and biosensing. A biosensor is a device that inspects the biological and chemical reactions generated by the biological sample. A biosensor carries out biological detection via a linked transducer and transmits the biological response into an electrical signal; stability, selectivity, and sensitivity are the dynamic and static characteristics that affect and dictate the quality and performance of biosensors. In this research, a developed experimental study for laser scribing technique for graphene oxide inside a vacuum chamber for processing of graphene oxide is presented. The processing of graphene oxide (GO) was achieved using the laser scribing technique. The effect of the laser scribing on the reduction of GO was investigated under two conditions: atmosphere and vacuum. GO solvent was coated onto a LightScribe DVD. The laser scribing technique was applied to reduce GO layers to generate rGO. The micro-details for the morphological structures of rGO and GO were visualised using scanning electron microscopy (SEM) and Raman spectroscopy so that they could be examined. The first electrode was a traditional graphene-based electrode model, made under normal atmospheric conditions, whereas the second model was a developed graphene electrode fabricated under a vacuum state using a vacuum chamber. The purpose was to control the vacuum conditions, such as the air pressure and the temperature during the fabrication process. The parameters to be assessed include the layer thickness and the continuous environment. Results presented show high accuracy and repeatability achieving low cost productivity.

Keywords: laser scribing, lightscribe DVD, graphene oxide, scanning electron microscopy

Procedia PDF Downloads 91
20 Hypolipidemic and Antioxidant Effects of Mycelial Polysaccharides from Calocybe indica in Hyperlipidemic Rats Induced by High-Fat Diet

Authors: Govindan Sudha, Mathumitha Subramaniam, Alamelu Govindasamy, Sasikala Gunasekaran

Abstract:

The aim of this study was to investigate the protective effect of Hypsizygus ulmarius polysaccharides (HUP) on reducing oxidative stress, cognitive impairment and neurotoxicity in D-galactose induced aging mice. Mice were subcutaneously injected with D-galactose (150 mg/kg per day) for 6 weeks and were administered HUP simultaneously. Aged mice receiving vitamin E (100 mg/kg) served as positive control. Chronic administration of D-galactose significantly impaired cognitive performance oxidative defence and mitochondrial enzymes activities as compared to control group. The results showed that HUP (200 and 400 mg/kg) treatment significantly improved the learning and memory ability in Morris water maze test. Biochemical examination revealed that HUP significantly increased the decreased activities of superoxide dismutase (SOD), catalase (CAT), glutathione peroxidase (GPx), glutathione reductase (GR), glutathione-S-transferase (GST), mitochondrial enzymes-NADH dehydrogenase, malate dehydrogenase (MDH), isocitrate dehydrogenase (ICDH), Na+K+, Ca2+, Mg2+ATPase activities, elevated the lowered total anti-oxidation capability (TAOC), glutathione (GSH), vitamin C and decreased the raised acetylcholinesterase (AChE) activities, malondialdehyde (MDA), hydroperoxide (HPO), protein carbonyls (PCO), advanced oxidation protein products (AOPP) levels in brain of aging mice induced by D-gal in a dose-dependent manner. In conclusion, present study highlights the potential role of HUP against D-galactose induced cognitive impairment, biochemical and mitochondrial dysfunction in mice. In vitro studies on the effect of HUP on scavenging DPPH, ABTS, DMPD, OH radicals, reducing power, B-carotene bleaching and lipid peroxidation inhibition confirmed the free radical scavenging and antioxidant activity of HUP. The results suggest that HUP possesses anti-aging efficacy and may have potential in treatment of neurodegenerative diseases.

Keywords: aging, antioxidants, mushroom, neurotoxicity

Procedia PDF Downloads 495
19 The Selectivities of Pharmaceutical Spending Containment: Social Profit, Incentivization Games and State Power

Authors: Ben Main Piotr Ozieranski

Abstract:

State government spending on pharmaceuticals stands at 1 trillion USD globally, promoting criticism of the pharmaceutical industry's monetization of drug efficacy, product cost overvaluation, and health injustice. This paper elucidates the mechanisms behind a state-institutional response to this problem through the sociological lens of the strategic relational approach to state power. To do so, 30 expert interviews, legal and policy documents are drawn on to explain how state elites in New Zealand have successfully contested a 30-year “pharmaceutical spending containment policy”. Proceeding from Jessop's notion of strategic “selectivity”, encompassing analyses of the enabling features of state actors' ability to harness state structures, a theoretical explanation is advanced. First, a strategic context is described that consists of dynamics around pharmaceutical dealmaking between the state bureaucracy, pharmaceutical pricing strategies (and their effects), and the industry. Centrally, the pricing strategy of "bundling" -deals for packages of drugs that combine older and newer patented products- reflect how state managers have instigated an “incentivization game” that is played by state and industry actors, including HTA professionals, over pharmaceutical products (both current and in development). Second, a protective context is described that is comprised of successive legislative-judicial responses to the strategic context and characterized by the regulation and the societalisation of commercial law. Third, within the policy, the achievement of increased pharmaceutical coverage (pharmaceutical “mix”) alongside contained spending is conceptualized as a state defence of a "social profit". As such, in contrast to scholarly expectations that political and economic cultures of neo-liberalism drive pharmaceutical policy-making processes, New Zealand's state elites' approach is shown to be antipathetic to neo-liberals within an overall capitalist economy. The paper contributes an analysis of state pricing strategies and how they are embedded in state regulatory structures. Additionally, through an analysis of the interconnections of state power and pharmaceutical value Abrahams's neo-liberal corporate bias model for pharmaceutical policy analysis is problematised.

Keywords: pharmaceutical governance, pharmaceutical bureaucracy, pricing strategies, state power, value theory

Procedia PDF Downloads 47
18 Chilled Books: Managing Defamatory Content in Non-fiction Trade Publishing

Authors: Katherine Day

Abstract:

Non-fiction genres (autobiographies and biographies, true stories and criticism, investigative journalism and narrative journalism) have enjoyed increasing sales in the English-language publishing territories over the last decade, but writing the tell-all or exposé is not without consequences: defamation laws cast a “chilling effect” by regarding reputation above publications with a public interest element. This is evident in the many publications that have been amended or pulped after publication. These communications, alterations and negotiations indicate that the threat of legal action forms part of the editorial decision-making around such publications, the presence of which could be attributed to strict defamation laws. In the UK and Australia, particularly, defamation law has proved notoriously biased in favour of plaintiffs. The legal obstacles have prompted law reform by way of section 4 of the UK Defamation Act, which allows for editorial assessment into whether the statement/s made are in the public interest; as of July 1st 2021, the NSW Government in Australia also implemented reforms to help steer the law towards more flexibility in the digital age – the most interesting of these developments for commercial publishing being the new ‘public interest’ defence (s 29A), which is modelled on the UK’s section 4 and which most states in Australia have now integrated into their respective state laws (Queensland, new South Wales, Victoria and South Australia, with the remaining states committing at a later date). This paper will outline and discuss the preliminary findings of a 1-year project that aims to explore how potentially litigious content is managed in unpublished non-fiction manuscripts in two countries identified as having strict defamation laws: Australia and the UK. Significantly, it expects to indicate the burden of current defamation laws on publishing practice and publishing outputs in these countries by interrogating in-house editorial processes and the likelihood of editorial management in a ‘post negotiation space’, where the activities and communication between authors and editors are reconstructed, if necessary, to correct the author/publisher power balance and affirm the business relationship. In doing so, the project asks: has the threat, explicit or implicit, of defamation action produced a significant chilling effect in trade non-fiction publishing in the UK and Australia?

Keywords: defamation, publishing, socio-legal, authorship, editing, literature

Procedia PDF Downloads 34
17 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 89
16 Wax Patterns for Integrally Cast Rotors/Stators of Aeroengine Gas Turbines

Authors: Pradyumna R., Sridhar S., A. Satyanarayana, Alok S. Chauhan, Baig M. A. H.

Abstract:

Modern turbine engines for aerospace applications need precision investment cast components such as integrally cast rotors and stators, for their hot end turbine stages. Traditionally, these turbines are used as starter engines. In recent times, such engines are also used for strategic missile applications. The rotor/stator castings consist of a central hub (shrouded in some designs) over which a number of aerofoil shaped blades are located. Since these components cannot be machined, investment casting is the only available route for manufacture and hence stringent dimensional aerospace quality has to be in-built in the casting process itself. In the process of investment casting, pattern generation by injection of wax into dedicated dies/moulds is the first critical step. Traditional approach deals in producing individual blades with hub/shroud features through wax injection and assembly of a set of such injected patterns onto a dedicated and precisely manufactured fixture to wax-weld and generate an integral wax pattern, a process known as the ‘segmental approach’. It is possible to design a single-injection die with retractable metallic inserts in the case of untwisted blades of stator patterns without the shroud. Such an approach is also possible for twisted blades of rotors with highly complex design of inter-blade inserts and retraction mechanisms. DMRL has for long established methods and procedures for the above to successfully supply precision castings for various defence related projects. In recent times, urea based soluble insert approach has also been successfully applied to overcome the need to design and manufacture a precision assembly fixture, leading to substantial reduction in component development times. Present paper deals in length various approaches tried and established at DMRL to generate precision wax patterns for aerospace quality turbine rotors and stators. In addition to this, the importance of simulation in solving issues related to wax injection is also touched upon.

Keywords: die/mold and fixtures, integral rotor/stator, investment casting, wax patterns, simulation

Procedia PDF Downloads 319
15 Development of an Implicit Coupled Partitioned Model for the Prediction of the Behavior of a Flexible Slender Shaped Membrane in Interaction with Free Surface Flow under the Influence of a Moving Flotsam

Authors: Mahtab Makaremi Masouleh, Günter Wozniak

Abstract:

This research is part of an interdisciplinary project, promoting the design of a light temporary installable textile defence system against flood. In case river water levels increase abruptly especially in winter time, one can expect massive extra load on a textile protective structure in term of impact as a result of floating debris and even tree trunks. Estimation of this impulsive force on such structures is of a great importance, as it can ensure the reliability of the design in critical cases. This fact provides the motivation for the numerical analysis of a fluid structure interaction application, comprising flexible slender shaped and free-surface water flow, where an accelerated heavy flotsam tends to approach the membrane. In this context, the analysis on both the behavior of the flexible membrane and its interaction with moving flotsam is conducted by finite elements based solvers of the explicit solver and implicit Abacus solver available as products of SIMULIA software. On the other hand, a study on how free surface water flow behaves in response to moving structures, has been investigated using the finite volume solver of Star CCM+ from Siemens PLM Software. An automatic communication tool (CSE, SIMULIA Co-Simulation Engine) and the implementation of an effective partitioned strategy in form of an implicit coupling algorithm makes it possible for partitioned domains to be interconnected powerfully. The applied procedure ensures stability and convergence in the solution of these complicated issues, albeit with high computational cost; however, the other complexity of this study stems from mesh criterion in the fluid domain, where the two structures approach each other. This contribution presents the approaches for the establishment of a convergent numerical solution and compares the results with experimental findings.

Keywords: co-simulation, flexible thin structure, fluid-structure interaction, implicit coupling algorithm, moving flotsam

Procedia PDF Downloads 359
14 Let-7 Mirnas Regulate Inflammatory Cytokine Production in Bovine Endometrial Cells after Lipopolysaccharide Challenge by Targeting TNFα

Authors: S. Ibrahim, D. Salilew-Wondim, M. Hoelker, C. Looft, E. Tholen, C. Grosse-Brinkhaus, K. Schellander, C. Neuhoff, D. Tesfaye

Abstract:

Bovine endometrial cells appear to have a key role in innate immune defense of the female genital tract. A better understanding of molecular changes in microRNAs (miRNAs) and their target genes expression may identify reliable prognostic indicators for cows that will resolve inflammation and resume cyclicity. In the current study, we hypothesized that let-7 miRNAs family has a primary role in the innate immune defence of the endometrium tissue against bacterial infection, which is partly achieved via regulating mRNA stability of pro-inflammatory cytokines at the post-transcriptional level. Therefore, we conducted two experiments. In the first experiment, primary bovine endometrial cells were challenged with clinical (3.0 μg/ml) and sub-clinical (0.5 μg/ml) doses of lipopolysaccharide (LPS) for 24h. In the 2nd experiment, we have investigated the potential role of let-7 miRNAs (let-7a and let-7f) using gain and loss of function approaches. Additionally, tumor necrosis factor alpha (TNFα), transforming growth factor beta 1 induced transcript 1 (TGFB1I1) and serum deprivation response (SDPR) genes were validated using reporter assay. Here we addressed for the first time that let-7 miRNAs have a precise role in bovine endometrium, where LPS dysregulated let-7 miRNAs family expression was associated with an increased pro-inflammatory cytokine level by directly/indirectly targeting the TNFα, interleukin 6 (IL6), nuclear factor kappa-light-chain enhancer of activated B cells (NFκB), TGFβ1I1 and SDPR genes. To our knowledge, this is the first study showing that TNFα, TGFβ1I1 and SDPR were identified and validated as novel let-7 miRNAs targets and could have a distinct role in inflammatory immune response of LPS challenged bovine endometrial cells. Our data represent a new finding by which uterine homeostasis is maintained through functional regulation of let-7a by down-regulation of pro-inflammatory cytokines expression (TNFα and IL6) at the mRNA and protein levels. These findings suggest that LPS serves as a negative regulator of let-7 miRNAs expression and provides a mechanism for the persistent pro-inflammatory phenotype, which is a hallmark of bovine subclinical endometritis.

Keywords: bovine endometrial cells, let-7, lipopolysaccharide, pro-inflammatory cytokines

Procedia PDF Downloads 347
13 Money Laundering Risk Assessment in the Banking Institutions: An Experimental Approach

Authors: Yusarina Mat-Isa, Zuraidah Mohd-Sanusi, Mohd-Nizal Haniff, Paul A. Barnes

Abstract:

In view that money laundering has become eminent for banking institutions, it is an obligation for the banking institutions to adopt a risk-based approach as the integral component of the accepted policies on anti-money laundering. In doing so, those involved with the banking operations are the most critical group of personnel as these are the people who deal with the day-to-day operations of the banking institutions and are obligated to form a judgement on the level of impending risk. This requirement is extended to all relevant banking institutions staff, such as tellers and customer account representatives for them to identify suspicious customers and escalate it to the relevant authorities. Banking institutions staffs, however, face enormous challenges in identifying and distinguishing money launderers from other legitimate customers seeking genuine banking transactions. Banking institutions staffs are mostly educated and trained with the business objective in mind to serve the customers and are not trained to be “detectives with a detective’s power of observation”. Despite increasing awareness as well as trainings conducted for the banking institutions staff, their competency in assessing money laundering risk is still insufficient. Several gaps have prompted this study including the lack of behavioural perspectives in the assessment of money laundering risk in the banking institutions. Utilizing experimental approach, respondents are randomly assigned within a controlled setting with manipulated situations upon which judgement of the respondents is solicited based on various observations related to the situations. The study suggests that it is imperative that informed judgement is exercised in arriving at the decision to proceed with the banking services required by the customers. Judgement forms a basis of opinion for the banking institution staff to decide if the customers posed money laundering risk. Failure to exercise good judgement could results in losses and absorption of unnecessary risk into the banking institutions. Although the banking institutions are exposed with choices of automated solutions in assessing money laundering risk, the human factor in assessing the risk is indispensable. Individual staff in the banking institutions is the first line of defence who are responsible for screening the impending risk of any customer soliciting for banking services. At the end of the spectrum, the individual role involvement on the subject of money laundering risk assessment is not a substitute for automated solutions as human judgement is inimitable.

Keywords: banking institutions, experimental approach, money laundering, risk assessment

Procedia PDF Downloads 228
12 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 158
11 An Analytical Systematic Design Approach to Evaluate Ballistic Performance of Armour Grade AA7075 Aluminium Alloy Using Friction Stir Processing

Authors: Lahari Ramya Pa, Sudhakar Ib, Madhu Vc, Madhusudhan Reddy Gd, Srinivasa Rao E.

Abstract:

Selection of suitable armor materials for defense applications is very crucial with respect to increasing mobility of the systems as well as maintaining safety. Therefore, determining the material with the lowest possible areal density that resists the predefined threat successfully is required in armor design studies. A number of light metal and alloys are come in to forefront especially to substitute the armour grade steels. AA5083 aluminium alloy which fit in to the military standards imposed by USA army is foremost nonferrous alloy to consider for possible replacement of steel to increase the mobility of armour vehicles and enhance fuel economy. Growing need of AA5083 aluminium alloy paves a way to develop supplement aluminium alloys maintaining the military standards. It has been witnessed that AA 2xxx aluminium alloy, AA6xxx aluminium alloy and AA7xxx aluminium alloy are the potential material to supplement AA5083 aluminium alloy. Among those cited aluminium series alloys AA7xxx aluminium alloy (heat treatable) possesses high strength and can compete with armour grade steels. Earlier investigations revealed that layering of AA7xxx aluminium alloy can prevent spalling of rear portion of armour during ballistic impacts. Hence, present investigation deals with fabrication of hard layer (made of boron carbide) i.e. layer on AA 7075 aluminium alloy using friction stir processing with an intention of blunting the projectile in the initial impact and backing tough portion(AA7xxx aluminium alloy) to dissipate residual kinetic energy. An analytical approach has been adopted to unfold the ballistic performance of projectile. Penetration of projectile inside the armour has been resolved by considering by strain energy model analysis. Perforation shearing areas i.e. interface of projectile and armour is taken in to account for evaluation of penetration inside the armour. Fabricated surface composites (targets) were tested as per the military standard (JIS.0108.01) in a ballistic testing tunnel at Defence Metallurgical Research Laboratory (DMRL), Hyderabad in standardized testing conditions. Analytical results were well validated with experimental obtained one.

Keywords: AA7075 aluminium alloy, friction stir processing, boron carbide, ballistic performance, target

Procedia PDF Downloads 296
10 The Clash of the Clans in the British Divorce

Authors: Samuel Gary Beckton

Abstract:

Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.

Keywords: identity, nationalism, Scotland, unionism

Procedia PDF Downloads 129
9 Determinants of Psychological Distress in Teenagers and Young Adults Affected by Cancer: A Systematic Review

Authors: Anna Bak-Klimek, Emily Spencer, Siew Lee, Karen Campbell, Wendy McInally

Abstract:

Background & Significance: Over half of Teenagers and Young Adults (TYAs) say that they experience psychological distress after cancer diagnosis and TYAs with cancer are at higher risk of developing distress compared to other age groups. Despite this there are no age-appropriate interventions to help TYAs manage distress and there is a lack of conceptual understanding of what causes distress in this population group. This makes it difficult to design a targeted, developmentally appropriate intervention. This review aims to identify the key determinants of distress in TYAs affected by cancer and to propose an integrative model of cancer-related distress for TYAs. Method: A literature search was performed in Cochrane Database of Systematic Reviews, MEDLINE, PsycINFO, CINAHL, EMBASE and PsycArticles in May-June, 2022. Quantitative literature was systematically reviewed on the relationship between psychological distress experienced by TYAs affected by cancer and a wide range of factors i.e. individual (demographic, psychological, developmental, and clinical factors) and contextual (social/environmental) factors. Evidence was synthesized and correlates were categorized using the Biopsychosocial Model. The full protocol is available from PROSPERO (CRD42022322069) Results: Thirty eligible quantitative studies met criteria for the review. A total of twenty-six studies were cross-sectional, three were longitudinal and one study was a case control study. The evidence on the relationship between the socio-demographic, illness and treatment-related factors and psychological distress is inconsistent and unclear. There is however consistent evidence on the link between psychological factors and psychological distress. For instance, the use of cognitive and defence coping, negative meta-cognitive beliefs, less optimism, a lack of sense of meaning and lower resilience levels were significantly associated with higher psychological distress. Furthermore, developmental factors such as poor self-image, identity issues and perceived conflict were strongly associated with higher distress levels. Conclusions: The current review suggests that psychological and developmental factors such as ineffective coping strategies, poor self-image and identity issues may play a key role in the development of psychological distress in TYAs affected by cancer. The review proposes a Positive Developmental Psychology Model of Distress for Teenagers and Young Adults affected by cancer. The review highlights that implementation of psychological interventions that foster optimism, improve resilience and address self-image may result in reduced distress in TYA’s with cancer.

Keywords: cancer, determinant, psychological distress, teenager and young adult, theoretical model

Procedia PDF Downloads 66
8 Active Victim Participation in the Criminal Justice System: The Indian Scenario

Authors: Narayani Sepaha

Abstract:

In earlier days, the sufferer was burdened to prove the offence as well as to put the offender to punishment. The adversary system of legal procedure was characterized simply by two parties: the prosecution and the defence. With the onset of this system, firstly the judge started acting as a neutral arbitrator, and secondly, the state inadvertently started assuming the lead role and thereby relegated the victims to the position of oblivion. In this process, with the increasing role of police forces and the government, the victims got systematically excluded from the key stages of the case proceedings and were reduced to the stature of a prosecution witness. This paper tries to emphasise the increasing control over the various stages of the trial, by other stakeholders, leading to the marginalization of victims in the trial process. This monopolization has signalled the onset of an era of gross neglect of victims in the whole criminal justice system. This consciousness led some reformists to raise their concerns over the issue, during the early part of the 20th century. They started supporting the efforts which advocated giving prominence to the participation of victims in the trial process. This paved the way for the evolution of the science of victimology. Markedly the innovativeness to work out facts, seek opinions and statements of the victims and reassure that their voice is also heard has ensured the revival of their rightful roles in the justice delivery system. Many countries, like the US, have set an example by acknowledging the advantages of participation of victims in trials like in the proceedings of the Ariel Castro Kidnappings of Cleveland, Ohio and enacting laws for protecting their rights within the framework of the legal system to ensure speedy and righteous delivery of justice in some of the most complicated cases. An attempt has been made to flag that the accused have several rights in contrast to the near absence of separate laws for victims of crime, in India. It is sad to note that, even in the initial process of registering a crime the victims are subjected to the mercy of the officers in charge and thus begins the silent suffering of these victims, which continues throughout the process of their trial. The paper further contends, that the degree of victim participation in trials and its impact on the outcomes, can be debated and evaluated, but its potential to alter their position and make them regain their lost status cannot be ignored. Victim participation in trial proceedings will help the court in perceiving the facts of the case in a better manner and in arriving at a balanced view of the case. This will not only serve to protect the overall interest of the victims but will act to reinforce the faith in the criminal justice delivery system. It is pertinent to mention that there is an urgent need to review the accused centric prosecution system and introduce appropriate amendments so that the marginalization of victims comes to an end.

Keywords: victim participation, criminal justice, India, trial, marginalised

Procedia PDF Downloads 130