Search results for: defense mechanism maturity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3708

Search results for: defense mechanism maturity

3558 Development of a Harvest Mechanism for the Kahramanmaraş Chili Pepper

Authors: O. E. Akay, E. Güzel, M. T. Özcan

Abstract:

The pepper has quite a rich variety. The development of a single harvesting machine for all kinds of peppers is a difficult research topic. By development of harvesting mechanisms, we could be able to facilitate the pepper harvesting problems. In this study, an experimental harvesting machine was designed for chili pepper. Four-bar mechanism was used for the design of the prototype harvesting machine. At the result of harvest trials, 80% of peppers were harvested and 8% foreign materials were collected. These results have provided some tips on how to apply to large-scale pepper Four-bar mechanism of the harvest machine.

Keywords: kinematic simulation, four bar linkage, harvest mechanization, pepper harvest

Procedia PDF Downloads 318
3557 Mechanism of Changing a Product Concept

Authors: Kiyohiro Yamazaki

Abstract:

The purpose of this paper is to examine the hypothesis explaining the mechanism in the case, where the product is deleted or reduced the fundamental function of the product through the product concept changes in the digital camera industry. This paper points out not owning the fundamental technology might cause the change of the product concept. Casio could create new competitive factor so that this paper discusses a possibility of the mechanism of changing the product concept.

Keywords: firm without fundamental technology, product development, product concept, digital camera industry, Casio

Procedia PDF Downloads 538
3556 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 307
3555 Explicable Enzymatic Mechanism of H-Ido to Oxidise Tryptophan by Employing Various Substrates

Authors: Ali Bahri Lubis

Abstract:

The study of dioxygenase enzymatic mechanism on tryptophan oxidation has been a wide interest since the reaction is rate-limiting step of kynurenine pathway. In this research, observation of tryptophan oxidation through h-IDO enzyme along with synthesis of enzyme products was conducted in order to comprehend how the enzyme works on distinct substrates. UV-vis spectrophotometry, LC-MS, H-NMR and HSQC measurement were carried out to characterise enzyme product. It is found that while tryptophan was oxidised to form Nformylkynurenine (NFK) as a major product and hydroxypyrroloindole amine carboxylic acid (HPIC) in cis and trans confirmed in HSQC, N-methyl tryptophan substrate was converted to NFK and trans HPIC only. Other intriguing results showed that 5-hydroxy- tryptophan and Stryptophan was degraded to become NFK and epoxide cyclic respectively. The formation of NFK was considered through dioxygenation pathway, however HPIC was formed via monooxygenation. The epoxide cyclic—considered as intermediate compound in the mechanism— from S-tryptophan was not able to cleave the epoxide ring since bond energy of epoxide was probably much stronger. This validates the enzymatic mechanism where the intermediate compound in the enzymatic mechanism is epoxide cyclic.

Keywords: tryptophan oxidation, heme-dioxygenases, N-formylkynurenine, hydroxypyrrroloindoleamine, monooxidation

Procedia PDF Downloads 52
3554 A Workable Mechanism to Support Students Who Are at Risk

Authors: Mohamed Chabi

Abstract:

The project of helping students at risk started at the Math department in the new foundation program at Qatar University in the fall 2012 semester. The purpose was to find ways to help students who were struggling with their math courses Elementary algebra or Precalculus course due to many factors. Department had formed the Committee “students at Risk” at the start of 12-13 to assist struggling students in our math courses to get their studies on track. A mechanism was developed to support students who are at risk using a developed E-Monitoring system. E-Monitoring system was developed to manage automatically all transactions relevant to the students’ attendance, Students ‘‘warning Students’’ grading, etc. E-Monitoring System produce various statistics such as, Overall course statistics, Performance, Students at Risk… to help department to develop a higher quality of education in the Foundation Program at Math department. The mechanism was studies and evaluated. Whatever the cause, the sooner we identify students who are not performing well academically, the sooner we can provide, or direct them to the resources that are available to them. In this paper, we outline the mechanism and its effect on students’ performance. The collected data from various exams shows that students had benefited from the mechanism.

Keywords: students at risk, e-monitoring system, warning students, performance

Procedia PDF Downloads 454
3553 Reproductive Biology and Lipid Content of Albacore Tuna (Thunnus alalunga) in the Western Indian Ocean

Authors: Zahirah Dhurmeea, Iker Zudaire, Heidi Pethybridge, Emmanuel Chassot, Maria Cedras, Natacha Nikolic, Jerome Bourjea, Wendy West, Chandani Appadoo, Nathalie Bodin

Abstract:

Scientific advice on the status of fish stocks relies on indicators that are based on strong assumptions on biological parameters such as condition, maturity and fecundity. Currently, information on the biology of albacore tuna, Thunnus alalunga, in the Indian Ocean is scarce. Consequently, many parameters used in stock assessment models for Indian Ocean albacore originate largely from other studied stocks or species of tuna. Inclusion of incorrect biological data in stock assessment models would lead to inappropriate estimates of stock status used by fisheries manager’s to establish future catch allowances. The reproductive biology of albacore tuna in the western Indian Ocean was examined through analysis of the sex ratio, spawning season, length-at-maturity (L50), spawning frequency, fecundity and fish condition. In addition, the total lipid content (TL) and lipid class composition in the gonads, liver and muscle tissues of female albacore during the reproductive cycle was investigated. A total of 923 female and 867 male albacore were sampled from 2013 to 2015. A bias in sex-ratio was found in favour of females with fork length (LF) <100 cm. Using histological analyses and gonadosomatic index, spawning was found to occur between 10°S and 30°S, mainly to the east of Madagascar from October to January. Large females contributed more to reproduction through their longer spawning period compared to small individuals. The L50 (mean ± standard error) of female albacore was estimated at 85.3 ± 0.7 cm LF at the vitellogenic 3 oocyte stage maturity threshold. Albacore spawn on average every 2.2 days within the spawning region and spawning months from November to January. Batch fecundity varied between 0.26 and 2.09 million eggs and the relative batch fecundity (mean  standard deviation) was estimated at 53.4 ± 23.2 oocytes g-1 of somatic-gutted weight. Depending on the maturity stage, TL in ovaries ranged from 7.5 to 577.8 mg g-1 of wet weight (ww) with different proportions of phospholipids (PL), wax esters (WE), triacylglycerol (TAG) and sterol (ST). The highest TL were observed in immature (mostly TAG and PL) and spawning capable ovaries (mostly PL, WE and TAG). Liver TL varied from 21.1 to 294.8 mg g-1 (ww) and acted as an energy (mainly TAG and PL) storage prior to reproduction when the lowest TL was observed. Muscle TL varied from 2.0 to 71.7 g-1 (ww) in mature females without a clear pattern between maturity stages, although higher values of up to 117.3 g-1 (ww) was found in immature females. TL results suggest that albacore could be viewed predominantly as a capital breeder relying mostly on lipids stored before the onset of reproduction and with little additional energy derived from feeding. This study is the first one to provide new information on the reproductive development and classification of albacore in the western Indian Ocean. The reproductive parameters will reduce uncertainty in current stock assessment models which will eventually promote sustainability of the fishery.

Keywords: condition, size-at-maturity, spawning behaviour, temperate tuna, total lipid content

Procedia PDF Downloads 229
3552 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 177
3551 Flocking Swarm of Robots Using Artificial Innate Immune System

Authors: Muneeb Ahmad, Ali Raza

Abstract:

A computational method inspired by the immune system (IS) is presented, leveraging its shared characteristics of robustness, fault tolerance, scalability, and adaptability with swarm intelligence. This method aims to showcase flocking behaviors in a swarm of robots (SR). The innate part of the IS offers a variety of reactive and probabilistic cell functions alongside its self-regulation mechanism which have been translated to enable swarming behaviors. Although, the research is specially focused on flocking behaviors in a variety of simulated environments using e-puck robots in a physics-based simulator (CoppeliaSim); the artificial innate immune system (AIIS) can exhibit other swarm behaviors as well. The effectiveness of the immuno-inspired approach has been established with extensive experimentations, for scalability and adaptability, using standard swarm benchmarks as well as the immunological regulatory functions (i.e., Dendritic Cells’ Maturity and Inflammation). The AIIS-based approach has proved to be a scalable and adaptive solution for emulating the flocking behavior of SR.

Keywords: artificial innate immune system, flocking swarm, immune system, swarm intelligence

Procedia PDF Downloads 66
3550 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 291
3549 The Effects of Yield and Yield Components of Some Quality Increase Applications on Razakı Grape Variety

Authors: Şehri Çınar, Aydın Akın

Abstract:

This study was conducted Razakı grape variety (Vitis vinifera L.) and its vine which was aged 19 was grown on 5 BB rootstock in a vegetation period of 2014 in Afyon province in Turkey. In this research, it was investigated whether the applications of Control (C), 1/3 Cluster Tip Reduction (1/3 CTR), Shoot Tip Reduction (STR), 1/3 CTR + STR, Boric Acid (BA), 1/3 CTR + BA, STR + BA, 1/3 CTR + STR + BA on yield and yield components of Razakı grape variety. The results were obtained as the highest fresh grape yield (7.74 kg/vine) with C application, as the highest cluster weight (244.62 g) with STR application, as the highest 100 berry weight (504.08 g) with C application, as the highest maturity index (36.89) with BA application, as the highest must yield (695.00 ml) with BA and (695.00 ml) with 1/3 CTR + STR + BA applications, as the highest intensity of L* color (46.93) with STR and (46.10) with 1/3 CTR + STR + BA applications, as the highest intensity of a* color (-5.37) with 1/3 CTR + STR and (-5.01) with STR, as the highest intensity of b* color (12.59) with STR application. The shoot tip reduction to increase cluster weight and boric acid application to increase maturity index of Razakı grape variety can be recommended.

Keywords: razakı, 1/3 cluster tip reduction, shoot tip reduction, boric acid, yield and yield components

Procedia PDF Downloads 439
3548 Learning Motivation Factors for Pre-Cadets in Armed Forces Academies Preparatory School, Ministry of Defense

Authors: Prachya Kamonphet

Abstract:

The purposes of this research were to study the learning motivation factors for Pre-cadets in Armed Forces Academies Preparatory School, Ministry of Defense. The subjects were 320 Pre-cadets (from all 3-year classes of Pre-cadets, the academic year 2015). The research instruments were questionnaires. The collected data were analyzed by means of Descriptive Statistic and One-Way Analysis of Variance. The results of this study were as follows: The relation between the Pre-cadets’ average grade and the motivation in studying was significance.In the aspect of the environment related to Pre-cadets’ families and the motivation in studying.In the aspect of the environment related to Pre-cadets’ studying, it was found that teaching method, learning place, educational media, relationship between teachers and Pre-cadets, relationship between Pre-cadets and their friends, and relationship between Pre-cadets and the commanders were significant.

Keywords: learning motivation factors, learning motivation, armed forces academies preparatory school, learning

Procedia PDF Downloads 217
3547 Mycorrhizal Autochthonous Consortium Induced Defense-Related Mechanisms of Olive Trees against Verticillium dahliae

Authors: Hanane Boutaj, Abdelilah Meddich, Said Wahbi, Zainab El Alaoui-Talibi, Allal Douira, Abdelkarim Filali-Maltouf, Cherkaoui El Modafar

Abstract:

The present work aims to investigate the effect of arbuscular mycorrhizal fungi (AMF) in improving the olive tree resistance to Verticillium wilt caused by Verticillium dahliae. Inoculated plants with a mycorrhizal autochthonous consortium 'Rhizolive consortium' and pure strain 'Glomus irregulare' were infected after three months with V. dahliae. The improving of olive tree resistance was determined through disease severity, incidence, and defoliation. On the other hand, the defense mechanisms of olive plants were evaluated through lignin content, phenylalanine ammonia lyase (PAL) activity, and polyphenol content. The results revealed that both AMF significantly (p < 0.05) reduced disease development and the rate of defoliation in infected olive plants. Moreover, the contents of lignin were boosted after mycorrhizal inoculation in both the roots and the stems of olive plants, which remained significantly (p < 0.001) higher after the 90th days of V. dahliae inoculation. PAL activity was increased after V. dahliae inoculation in the stems of 'Rhizolive consortium' treatment that were 17 times higher than those in the roots of olive plants. The polyphenol content in the stems was about twice higher than those in the roots. The reduction of disease severity was accompanied by increased levels of lignin content, PAL activity, and polyphenol content, particularly in the stems of olive plants, indicating the strengthening of the olive plant immune system against V. dahliae.

Keywords: olive tree, Mycorrhizal autochthonous consortium, Glomus irregulare, Verticillium dahliae, defense mechanisms

Procedia PDF Downloads 81
3546 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 158
3545 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 78
3544 Configuration Design and Optimization of the Movable Leg-Foot Lunar Soft-Landing Device

Authors: Shan Jia, Jinbao Chen, Jinhua Zhou, Jiacheng Qian

Abstract:

Lunar exploration is a necessary foundation for deep-space exploration. For the functional limitations of the fixed landers which are widely used currently and are to expand the detection range by the use of wheeled rovers with unavoidable path-repeatability, a movable lunar soft-landing device based on cantilever type buffer mechanism and leg-foot type walking mechanism is presented. Firstly, a 20 DoFs quadruped configuration based on pushrod is proposed. The configuration is of the bionic characteristics such as hip, knee and ankle joints, and can make the kinematics of the whole mechanism unchanged before and after buffering. Secondly, the multi-function main/auxiliary buffers based on crumple-energy absorption and screw-nut mechanism, as well as the telescopic device which could be used to protect the plantar force sensors during the buffer process are designed. Finally, the kinematic model of the whole mechanism is established, and the configuration optimization of the whole mechanism is completed based on the performance requirements of slope adaptation and obstacle crossing. This research can provide a technical solution integrating soft-landing, large-scale inspection and material-transfer for future lunar exploration and even mars exploration, and can also serve as the technical basis for developing the reusable landers.

Keywords: configuration design, lunar soft-landing device, movable, optimization

Procedia PDF Downloads 123
3543 Idea Expropriation, Incentives, and Governance within Organizations

Authors: Gulseren Mutlu, Gurupdesh Pandher

Abstract:

This paper studies the strategic interplay between innovation, incentives, expropriation threat and disputes arising from expropriation from an intra-organization perspective. We present a simple principal-agent model with hidden actions and hidden information in which two employees can choose how much (innovative) effort to exert, whether to expropriate the innovation of the other employee and whether to dispute if innovation is expropriated. The organization maximizes its expected payoff by choosing the optimal reward scheme for both employees as well as whether to encourage or discourage disputes. We analyze two mechanisms under which innovative ideas are not expropriated. First, we show that under a non-contestable mechanism (in which the organization discourages disputes among employees), the organization has to offer a “rent” to the potential expropriator. However, under a contestable mechanism (in which the organization encourages disputes), there is no need for such rent. If the cost of resolving the dispute is negligible, the organization’s expected payoff is higher under a contestable mechanism. Second, we develop a comparable team mechanism in which innovation takes place as a result of the joint efforts of employees and innovation payments are made based on the team outcome. We show that if the innovation value is low and employees have similar productivity, then the organization is better off under a contestable mechanism. On the other hand, if the innovation value is high, the organization is better off under a team mechanism. Our results have important practical implications for the design of innovation reward system for employees, hiring policy and governance for different companies.

Keywords: innovation, incentives, expropriation threat, dispute resolution

Procedia PDF Downloads 589
3542 Soot Formation in the Field of Combustion

Authors: Nacira Mecheri, N. Boussid

Abstract:

A new chemical mechanism designed to study the process of forming the first aromatic ring (benzene) and polycyclic aromatic hydrocarbons (PAH) from a flame of acetylene (C2H2) has been developed. The mechanism developed, contains 50 chemical species involved in 268 reversible elementary reactions. The comparison between the results from modelling and experimental measurements allowed us to test the validity of the postulated mechanism in specific experimental conditions. Kinetic analysis of the flame by calculating the maximum rates for each elementary reaction, allowed us to identify key reactions pathways of consumption and formation of main precursors of soot.

Keywords: benzene, PAH, acetylene, modeling, flame, soot

Procedia PDF Downloads 310
3541 “Double Layer” Theory of Hydrogenation

Authors: Vaclav Heral

Abstract:

Ideas about the mechanism of heterogeneous catalytic hydrogenation are diverse. The Horiuti-Polanyi mechanism is most often referred to, based on the idea of a semi-hydrogenated state. In our opinion, it does not represent a satisfactory explanation of the hydrogenation mechanism, because, for example: (1) It neglects the fact that the bond of atomic hydrogen to the metal surface is strongly polarized, (2) It does not explain why a surface deprived of atomic hydrogen (by thermal desorption or by alkyne) loses isomerization capabilities, but hydrogenation capabilities remain preserved, (3) It was observed that during the hydrogenation of 1-alkenes, the reaction can be of the 0th order to hydrogen and to the alkene at the same time, which is excluded during the competitive adsorption of both reactants on the catalyst surface. We offer an alternative mechanism that satisfactorily explains many of the ambiguities: It is the idea of an independent course of olefin isomerization, catalyzed by acidic atomic hydrogen bonded on the surface of the catalyst, in addition to the hydrogenation itself, in which a two-layer complex appears on the surface of the catalyst: olefin bound to the surface and molecular hydrogen bound to it in the second layer. The rate-determining step of hydrogenation is the conversion of this complex into the final product. We believe that the Horiuti-Polanyi mechanism is flawed and we naturally think that our two-layer theory better describes the experimental findings.

Keywords: acidity of hydrogenation catalyst, Horiuti-Polanyi, hydrogenation, two-layer hydrogenation

Procedia PDF Downloads 46
3540 Internal Product Management: The Key to Achieving Digital Maturity and Business Agility for Manufacturing IT Organizations

Authors: Frederick Johnson

Abstract:

Product management has a long and well-established history within the consumer goods industry, despite being one of the most obscure aspects of brand management. Many global manufacturing organizations are now opting for external cloud-based Manufacturing Execution Systems (MES) to replace costly and outdated monolithic MES solutions. Other global manufacturing leaders are restructuring their organizations to support human-centered values, agile methodologies, and fluid operating principles. Still, industry-leading organizations struggle to apply the appropriate framework for managing evolving external MES solutions as internal "digital products." Product management complements these current trends in technology and philosophical thinking in the market. This paper discusses the central problems associated with adopting product management processes by analyzing its traditional theories and characteristics. Considering these ideas, the article then constructs a translated internal digital product management framework by combining new and existing approaches and principles. The report concludes by demonstrating the framework's capabilities and potential effectiveness in achieving digital maturity and business agility within a manufacturing environment.

Keywords: internal product management, digital transformation, manufacturing information technology, manufacturing execution systems

Procedia PDF Downloads 108
3539 Conscription or Constriction: Perception of Students on the Reinforcement of Compulsory Military Service

Authors: Krista Mae F. Ramos, Lance Micaiah C. Dauz, Gylza Nicole D. Bautista, Rua R. Galang, Jeric Xyrus G. Karganilla

Abstract:

With the recent proclamation of the possible reinforcement of Compulsory Military Service in the Philippines, debates and societal talks rose and circulated as opinions and perceptions regarding the topic continue to clash. This study aims to determine the perception of the youth on its reimplementation and identify various advantages and disadvantages based on their perspective. The responses were gathered through a virtual call interview, underwent the process of thematization, and were categorized into different themes. Results reflect that the students perceive compulsory military service as a necessity for national defense but requires a long time that can hinder their education and needs a strong foundation to be implemented and sustained. The participants acknowledged that the practice would instill discipline, patriotism, and nationalism, develop an individual’s physical abilities, provide skills and knowledge and improve a person’s self-defense. However, there are also concerns regarding the prominent military shaping and abuse, their loss of freedom of choice, and the chances of health deterioration.

Keywords: compulsory, military, service, reinforcement, perception

Procedia PDF Downloads 127
3538 Sales-Based Dynamic Investment and Leverage Decisions: A Longitudinal Study

Authors: Rihab Belguith, Fathi Abid

Abstract:

The paper develops a system-based approach to investigate the dynamic adjustment of debt structure and investment policies of the Dow-Jones index. This approach enables the assessment of relations among sales, debt, and investment opportunities by considering the simultaneous effect of the market environmental change and future growth opportunities. We integrate the firm-specific sales variance to capture the industries' conditions in the model. Empirical results were obtained through a panel data set of firms with different sectors. The analysis support that environmental change does not affect equally the different industry since operating leverage differs among industries and so the sensitivity to sales variance. Including adjusted-specific variance, we find that there is no monotonic relation between leverage, sales, and investment. The firm may choose a low debt level in response to high sales variance but high leverage to attenuate the negative relation between sales variance and the current level of investment. We further find that while the overall effect of debt maturity on leverage is unaffected by the level of growth opportunities, the shorter the maturity of debt is, the smaller the direct effect of sales variance on investment.

Keywords: dynamic panel, investment, leverage decision, sales uncertainty

Procedia PDF Downloads 207
3537 4-DOFs Parallel Mechanism for Minimally Invasive Robotic Surgery

Authors: Khalil Ibrahim, Ahmed Ramadan, Mohamed Fanni, Yo Kobayashi, Ahmed Abo-Ismail, Masakatus G. Fujie

Abstract:

This paper deals with the design process and the dynamic control simulation of a new type of 4-DOFs parallel mechanism that can be used as an endoscopic surgical manipulator. The proposed mechanism, 2-PUU_2-PUS, is designed based on the screw theory and the parallel virtual chain type synthesis method. Based on the structure analysis of the 4-DOF parallel mechanism, the inverse position equation is studied using the inverse analysis theory of kinematics. The design and the stress analysis of the mechanism are investigated using SolidWorks software. The virtual prototype of the parallel mechanism is constructed, and the dynamic simulation is performed using ADAMS TM software. The system model utilizing PID and PI controllers has been built using MATLAB software. A more realistic simulation in accordance with a given bending angle and point to point control is implemented by the use of both ADAMS/MATLAB software. The simulation results showed that this control method has solved the coordinate control for the 4-DOF parallel manipulator so that each output is feedback to the four driving rods. From the results, the tracking performance is achieved. Other control techniques, such as intelligent ones, are recommended to improve the tracking performance and reduce the numerical truncation error.

Keywords: parallel mechanisms, medical robotics, tracjectory control, virtual chain type synthesis method

Procedia PDF Downloads 439
3536 In silico Model of Transamination Reaction Mechanism

Authors: Sang-Woo Han, Jong-Shik Shin

Abstract:

w-Transaminase (w-TA) is broadly used for synthesizing chiral amines with a high enantiopurity. However, the reaction mechanism of w-TA has been not well studied, contrary to a-transaminase (a-TA) such as AspTA. Here, we propose in silico model on the reaction mechanism of w-TA. Based on the modeling results which showed large free energy gaps between external aldimine and quinonoid on deamination (or ketimine and quinonoid on amination), withdrawal of Ca-H seemed as a critical step which determines the reaction rate on both amination and deamination reactions, which is consistent with previous researches. Hyperconjugation was also observed in both external aldimine and ketimine which weakens Ca-H bond to elevate Ca-H abstraction.

Keywords: computational modeling, reaction intermediates, w-transaminase, in silico model

Procedia PDF Downloads 508
3535 The Role of Business Process Management in Driving Digital Transformation: Insurance Company Case Study

Authors: Dalia Suša Vugec, Ana-Marija Stjepić, Darija Ivandić Vidović

Abstract:

Digital transformation is one of the latest trends on the global market. In order to maintain the competitive advantage and sustainability, increasing number of organizations are conducting digital transformation processes. Those organizations are changing their business processes and creating new business models with the help of digital technologies. In that sense, one should also observe the role of business process management (BPM) and its maturity in driving digital transformation. Therefore, the goal of this paper is to investigate the role of BPM in digital transformation process within one organization. Since experiences from practice show that organizations from financial sector could be observed as leaders in digital transformation, an insurance company has been selected to participate in the study. That company has been selected due to the high level of its BPM maturity and the fact that it has previously been through a digital transformation process. In order to fulfill the goals of the paper, several interviews, as well as questionnaires, have been conducted within the selected company. The results are presented in a form of a case study. Results indicate that digital transformation process within the observed company has been successful, with special focus on the development of digital strategy, BPM and change management. The role of BPM in the digital transformation of the observed company is further discussed in the paper.

Keywords: business process management, case study, Croatia, digital transformation, insurance company

Procedia PDF Downloads 162
3534 Modeling of a Small Unmanned Aerial Vehicle

Authors: Ahmed Elsayed Ahmed, Ashraf Hafez, A. N. Ouda, Hossam Eldin Hussein Ahmed, Hala Mohamed ABD-Elkader

Abstract:

Unmanned Aircraft Systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized,and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end, the model is checked by matching between the behavior of the states of the non-linear UAV and the resulted linear model with doublet at the control surfaces.

Keywords: UAV, equations of motion, modeling, linearization

Procedia PDF Downloads 702
3533 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 428
3532 Young’s Modulus Variability: Influence on Masonry Vault Behavior

Authors: Abdelmounaim Zanaz, Sylvie Yotte, Fazia Fouchal, Alaa Chateauneuf

Abstract:

This paper presents a methodology for probabilistic assessment of bearing capacity and prediction of failure mechanism of masonry vaults at the ultimate state with consideration of the natural variability of Young’s modulus of stones. First, the computation model is explained. The failure mode is the most reported mode, i.e. the four-hinge mechanism. Based on this assumption, the study of a vault composed of 16 segments is presented. The Young’s modulus of the segments is considered as random variable defined by a mean value and a coefficient of variation CV. A relationship linking the vault bearing capacity to the modulus variation of voussoirs is proposed. The failure mechanisms, in addition to that observed in the deterministic case, are identified for each CV value as well as their probability of occurrence. The results show that the mechanism observed in the deterministic case has decreasing probability of occurrence in terms of CV, while the number of other mechanisms and their probability of occurrence increase with the coefficient of variation of Young’s modulus. This means that if a significant change in the Young modulus of the segments is proven, taken it into account in computations becomes mandatory, both for determining the vault bearing capacity and for predicting its failure mechanism.

Keywords: masonry, mechanism, probability, variability, vault

Procedia PDF Downloads 415
3531 Sustainability of Widlife Community Based Natural Resource Management under Benefit Sharing Mechanism in Game Management Areas in Zambia

Authors: Darius Phiri, Moses Chibesa, Donald Zulu, Robby Kasubika

Abstract:

In Zambia, wildlife is co-managed by Zambia Wildlife Authority (ZAWA) and the local communities by sharing management responsibilities and benefits derived from harvesting wildlife resources under a benefit sharing mechanism. Although the benefit sharing mechanism has been formulated under good principles, it is still facing numerous challenges. In response to these challenges, a study on the sustainability of ZAWA benefit sharing mechanism was carried out in order to assess its potential and continuity in line with community empowerment and wildlife resources management. Systematic sampling was used with a sampling intensity of 4% to administer three types of questionnaires to community members in Mumbwa Game Management Area (GMA), ZAWA officers, and to the Ministry of Tourism, Environment and Natural Resources (MTENR) staffs. The collected data was then analysed using SPSS version 16.5. The findings indicated that many people in the GMA do not participate fully because of lacking satisfactory benefits. However, the mechanism contribute to the community well-being and can still remain sustainable especially if measures to address the current challenges are put in place.

Keywords: benefit sharing, concessions, licenses, poaching, local communities, sustainability

Procedia PDF Downloads 369
3530 Growth Mechanism, Structural and Compositional Properties of Cu₂ZnSnS₄ (CZTS) Thin Films Deposited by Sputtering Method from a Compound Target

Authors: Sanusi Abdullahi, Musa Momoh, Abubakar Umar Moreh, Aminu Muhammad Bayawa, Olubunmi Popoola

Abstract:

Kesterite-type Cu₂ZnSnS₄ (CZTS) thin films were deposited on corning glass from a single quaternary target. In this study, we investigated the growth mechanism and the influence of thin film thickness on the structural and compositional properties of CZTS films. All the four samples (as-deposited inclusive) show peaks corresponding to kesterite-type structure. The diffraction peaks of (112) are sharp and the small characteristics peaks of the kesterite structure such as (220)/ (204) and (312)/ (116) are also clearly observed in X-ray diffraction pattern. These results indicate that the quaternary CZTS would be a potential candidate for solar cell applications.

Keywords: RF sputtering, Cu2ZnSnS4 thin film, annealing, growth mechanism, annealing, growth mechanism, renewable energy

Procedia PDF Downloads 344
3529 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 242