Search results for: defense mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2738

Search results for: defense mechanisms

2648 Early Modern Controversies of Mobility within the Spanish Empire: Francisco De Vitoria and the Peaceful Right to Travel

Authors: Beatriz Salamanca

Abstract:

In his public lecture ‘On the American Indians’ given at the University of Salamanca in 1538-39, Francisco de Vitoria presented an unsettling defense of freedom of movement, arguing that the Spanish had the right to travel and dwell in the New World, since it was considered part of the law of nations [ius gentium] that men enjoyed free mutual intercourse anywhere they went. The principle of freedom of movement brought hopeful expectations, promising to bring mankind together and strengthen the ties of fraternity. However, it led to polemical situations when those whose mobility was in question represented a harmful threat or was for some reason undesired. In this context, Vitoria’s argument has been seen on multiple occasions as a justification of the expansion of the Spanish empire. In order to examine the meaning of Vitoria’s defense of free mobility, a more detailed look at Vitoria’s text is required, together with the study of some of his earliest works, among them, his commentaries on Thomas Aquinas’s Summa Theologiae, where he presented relevant insights on the idea of the law of nations. In addition, it is necessary to place Vitoria’s work in the context of the intellectual tradition he belonged to and the responses he obtained from some of his contemporaries who were concerned with similar issues. The claim of this research is that the Spanish right to travel advocated by Vitoria was not intended to be interpreted in absolute terms, for it had to serve the purpose of bringing peace and unity among men, and could not contradict natural law. In addition, Vitoria explicitly observed that the right to travel was only valid if the Spaniards caused no harm, a condition that has been underestimated by his critics. Therefore, Vitoria’s legacy is of enormous value as it initiated a long lasting discussion regarding the question of the grounds under which human mobility could be restricted. Again, under Vitoria’s argument it was clear that this freedom was not absolute, but the controversial nature of his defense of Spanish mobility demonstrates how difficult it was and still is to address the issue of the circulation of peoples across frontiers, and shows the significance of this discussion in today’s globalized world, where the rights and wrongs of notions like immigration, international trade or foreign intervention still lack sufficient consensus. This inquiry about Vitoria’s defense of the principle of freedom of movement is being placed here against the background of the history of political thought, political theory, international law, and international relations, following the methodological framework of contextual history of the ‘Cambridge School’.

Keywords: Francisco de Vitoria, freedom of movement, law of nations, ius gentium, Spanish empire

Procedia PDF Downloads 336
2647 Imidocloprid as a Systemic-Acquired Resistant (SAR) Inducer in Nicotiana tabacum Var. Samsun NN Infected with Tobacco Mild Green Mosaic Virus

Authors: Mohammad Reza Hossein Zadeh

Abstract:

Plants have different layers of defense responses against biotic and abiotic stresses. One of the well-defined defense mechanism in plants is systemic acquired resistance (SAR) against a broad-range of pathogens. Salicylic acid (SA) plays a crucial role in regulation of the SAR pathway. It has been proved that Chemically SA-like compounds can mimic the SA signaling role. Imidocloprid is an insecticide being used to control whiteflies on crop plants. In order to study the possible role of Imidocloprid as an elicitor of SAR in plants, experiments were conducted in a completely randomized design frame with three treatments and duplicates on the detached leaves and whole Nicotiana tabacum var. Samsun NN. plants inoculated with Tobacco mild green mosaic virus (TMGMV). Compared with the effect of other SAR-inducers such as SA, Imidoclorid conferred a robust SAR induction in the infected plants. The results suggested that Imidocloprid even more powerful than SA can be considered as strong SAR inducer in the infected plants with viruses, which develop the local lesion symptoms.

Keywords: imidocloprid, Nicotiana tabacum var. Samsun NN, SAR, tobacco mild green, mosaic virus

Procedia PDF Downloads 541
2646 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 273
2645 Shaking Force Balancing of Mechanisms: An Overview

Authors: Vigen Arakelian

Abstract:

The balancing of mechanisms is a well-known problem in the field of mechanical engineering because the variable dynamic loads cause vibrations, as well as noise, wear and fatigue of the machines. A mechanical system with unbalance shaking force and shaking moment transmits substantial vibration to the frame. Therefore, the objective of the balancing is to cancel or reduce the variable dynamic reactions transmitted to the frame. The resolution of this problem consists in the balancing of the shaking force and shaking moment. It can be fully or partially, by internal mass redistribution via adding counterweights or by modification of the mechanism's architecture via adding auxiliary structures. The balancing problems are of continue interest to researchers. Several laboratories around the world are very active in this area and new results are published regularly. However, despite its ancient history, mechanism balancing theory continues to be developed and new approaches and solutions are constantly being reported. Various surveys have been published that disclose particularities of balancing methods. The author believes that this is an appropriate moment to present a state of the art of the shaking force balancing studies completed by new research results. This paper presents an overview of methods devoted to the shaking force balancing of mechanisms, as well as the historical aspects of the origins and the evolution of the balancing theory of mechanisms.

Keywords: inertial forces, shaking forces, balancing, dynamics, mechanism design

Procedia PDF Downloads 97
2644 Growth and Yield Response of an Indian Wheat Cultivar (HD 2967) to Ozone and Water Stress in Open-Top Chambers with Emphasis on Its Antioxidant Status, Photosynthesis and Nutrient Allocation

Authors: Annesha Ghosh, S. B. Agrawal

Abstract:

Agricultural sector is facing a serious threat due to climate change and exacerbation of different atmospheric pollutants. Tropospheric ozone (O₃) is considered as a dynamic air pollutant imposing substantial phytotoxicity to natural vegetations and agriculture worldwide. Naturally, plants are exposed to different environmental factors and their interactions. Amongst such interactions, studies related to O₃ and water stress are still rare. In the present experiment, wheat cultivar HD2967 were grown in open top chambers (OTC) under two O₃ concentration; ambient O₃ level (A) and elevated O₃ (E) (ambient + 20 ppb O₃) along with two different water supply; well-watered (W) and 50% water stress conditions (WS), with an aim to assess the individual and interactive effect of two most prevailing stress factors in Indo-Gangetic Plains of India. Exposure to elevated O₃ dose caused early senescence symptoms and reduction in growth and biomass of the test cultivar. The adversity was more pronounced under the combined effect of EWS. Significant reduction of stomatal conductance (gs) and assimilation rate were observed under combined stress condition compared to the control (AW). However, plants grown under individual stress conditions displayed higher gs, biomass, and antioxidant defense mechanism compared to the plants grown under the presence of combined stresses. Higher induction in most of the enzyme activities of catalase (CAT), ascorbate peroxidase (APX), glutathione reductase (GR), peroxidase (POD) and superoxide dismutase (SOD) was displayed by HD 2967 under EW while, under the presence of combined stresses (EWS), a moderate increment of APX and CAT activity was observed only at its vegetative phase. Furthermore, variations in nutrient uptake and redistribution to different plants parts were also observed in the present study. Reduction in water availability has checked nutrient uptake (N, K, P, Ca, Cu, Mg, Zn) in above-ground parts (leaf) and below-ground parts (root). On the other hand, carbon (C) accumulation with subsequent C-N ratio was observed to be higher in the leaves under EWS. Such major nutrient check and limitation in carbon fixation due to lower gs under combined stress conditions might have weakened the defense mechanisms of the test cultivar. Grain yield was significantly reduced under EWS followed by AWS and EW as compared to their control, exhibiting an additive effect on the grain yield.

Keywords: antioxidants, open-top chambers, ozone, water stress, wheat, yield

Procedia PDF Downloads 86
2643 Power Efficiency Characteristics of Magnetohydrodynamic Thermodynamic Gas Cycle

Authors: Mahmoud Huleihil

Abstract:

In this study, the performance of a thermodynamic gas cycle of magnetohydrodynamic (MHD) power generation is considered and presented in terms of power efficiency curves. The dissipation mechanisms considered include: fluid friction modeled by means of the isentropic efficiency of the compressor, heat transfer leakage directly from the hot reservoir to the cold heat reservoir, and constant velocity of the MHD generator. The study demonstrates that power and efficiency vanish at the extremes of both slow and fast operating conditions. These points are demonstrated on power efficiency curves and the locus of efficiency at maximum power and the locus of maximum efficiency. Qualitatively, the considered loss mechanisms have a similar effect on the efficiency at maximum power operation and on maximum efficiency operation, thus these efficiencies are reduced, even for small values of the loss mechanisms.

Keywords: magnetohydrodynamic generator, electrical efficiency, maximum power, maximum efficiency, heat engine

Procedia PDF Downloads 212
2642 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 497
2641 On the Differentiation of Strategic Spatial Planning Mechanisms in New Era: Between Melbourne and Tianjin

Authors: Zhao Liu, Kang Cao

Abstract:

Strategic spatial planning, which is taken as an effective and competitive way for the governors of the city to improve the development and management level of a city, has been blooming in recent years all over the world. In the context of globalization and informatization, strategic spatial planning must transfer its focus on three different levels: global, regional and urban. Internal and external changes in environmental conditions lead to new advances in strategic planning both theoretically and practically. However, such advances or changes respond differently to cities on account of different dynamic mechanisms. This article aims at two cities of Tianjin in China and Melbourne in Australia, through a comparative study on strategic planning, to explore the differentiation of mechanisms in urban planning. By comparison and exploration, the purpose of this article is to exhibit two different planning worlds, western and Chinese, in a new way. The article can be divided into four parts. The first part outlines strategic planning transformations in the new era on three levels, generally analysing the internal and external environmental factors of today. The second part indicates the concepts of strategic planning theoretically, demonstrating briefly its development background and process in western and China, respectively. The third part takes Tianjin and Melbourne urban strategic spatial planning as examples to mainly carry on the contrast research from the aspects of strategic planning mode, competitive mechanism, contents, strategy implementation and management. It is expected to summarize the differences and similarities of the two plans, meanwhile, to explore the inherent factors or mechanisms probably spatial, material, political and etc., which affect cities in the course of urban planning. The final part is a summary of general mechanisms of planning from the perspective of strategic spatial planning.

Keywords: differentiation, strategic planning, Melbourne, Australia, Tianjin, China

Procedia PDF Downloads 491
2640 Minors and Terrorism: A Discussion about the Recruitment and Resilience

Authors: Marta Maria Aguilar Carceles

Abstract:

This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).

Keywords: criminality, minors, recruitment, resilience, terrorism

Procedia PDF Downloads 106
2639 Transcriptional Response of Honey Bee to Differential Nutritional Status and Nosema Infection

Authors: Farida Azzouz-Olden, Arthur G. Hunt, Gloria Degrandi-Hoffman

Abstract:

Bees are confronting several environmental challenges, including the intermingled effects of malnutrition and disease. Intuitively, pollen is the healthiest nutritional choice; however, commercial substitutes, such as BeePro and MegaBee, are widely used. Herein we examined how feeding natural and artificial diets shapes transcription in the abdomen of the honey bee, and how transcription shifts in combination with Nosema parasitism. Gene ontology enrichment revealed that, compared with poor diet (carbohydrates (C)), bees fed pollen (P > C), BeePro (B > C), and MegaBee (M > C) showed a broad upregulation of metabolic processes, especially lipids; however, pollen feeding promoted more functions and superior proteolysis. The superiority of the pollen diet was also evident through the remarkable overexpression of vitellogenin in bees fed pollen instead of MegaBee or BeePro. Upregulation of bioprocesses under carbohydrates feeding compared to pollen (C > P) provided a clear poor nutritional status, uncovering stark expression changes that were slight or absent relatively to BeePro (C > B) or MegaBee (C > M). Poor diet feeding (C > P) induced starvation response genes and hippo signaling pathway, while it repressed growth through different mechanisms. Carbohydrate feeding (C > P) also elicited ‘adult behavior’, and developmental processes suggesting transition to foraging. Finally, it altered the ‘circadian rhythm’, reflecting the role of this mechanism in the adaptation to nutritional stress in mammals. Nosema-infected bees fed pollen compared to carbohydrates (PN > CN) upheld certain bioprocesses of uninfected bees (P > C). Poor nutritional status was more apparent against pollen (CN > PN) than BeePro (CN > BN) or MegaBee (CN > MN). Nosema accentuated the effects of malnutrition since more starvation-response genes and stress response mechanisms were upregulated in CN > PN compared to C > P. The bioprocess ‘Macromolecular complex assembly’ was also enriched in CN > PN, and involved genes associated with human HIV and/or influenza, thus providing potential candidates for bee-Nosema interactions. Finally, the enzyme Duox emerged as essential for guts defense in bees, similarly to Drosophila. These results provide evidence of the superior nutritional status of bees fed pollen instead of artificial substitutes in terms of overall health, even in the presence of a pathogen.

Keywords: honeybee, immunity, Nosema, nutrition, RNA-seq

Procedia PDF Downloads 129
2638 Stability Analysis of Tumor-Immune Fractional Order Model

Authors: Sadia Arshad, Yifa Tang, Dumitru Baleanu

Abstract:

A fractional order mathematical model is proposed that incorporate CD8+ cells, natural killer cells, cytokines and tumor cells. The tumor cells growth in the absence of an immune response is modeled by logistic law as it was the simplest form for which predictions also agreed with the experimental data. Natural Killer Cells are our first line of defense. NK cells directly kill tumor cells through several mechanisms, including the release of cytoplasmic granules containing perforin and granzyme, expression of tumor necrosis factor (TNF) family members. The effect of the NK cells on the tumor cell population is expressed with the product term. Rational form is used to describe interaction between CD8+ cells and tumor cells. A number of cytokines are produced by NKs, including tumor necrosis factor TNF, IFN, and interleukin (IL-10). Source term for cytokines is modeled by Michaelis-Menten form to indicate the saturated effects of the immune response. Stability of the equilibrium points is discussed for biologically significant values of bifurcation parameters. We studied the treatment of fractional order system by investigating analytical conditions of tumor eradication. Numerical simulations are presented to illustrate the analytical results.

Keywords: cancer model, fractional calculus, numerical simulations, stability analysis

Procedia PDF Downloads 285
2637 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 24
2636 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 414
2635 Defence Industry in the Political Economy of State and Business Relations

Authors: Hatice Idil Gorgen

Abstract:

Turkey has been investing in its national defence industrial base since the 1980s. State’s role in defence industry showed differences in Turkey. Parallel with this, ruling group’s attitude toward companies in defence sector varied. These changes in policies and behaviors of the state have occurred throughout such milestones as political and economic turmoil in domestic and international level. Hence, it is argued that state’s role, relations with private companies in defense sector and its policies towards the defense industry has shown differences due to the international system, political institutions, ideas and political coalitions in Turkey since the 1980s. Therefore, in order to see changes in the role of the state in defence sector, this paper aims to indicate first, history of state’s role in production and defence industry in the post-1980s era. Secondly, to comprehend the changes in the state’s role in defence industry, Stephan Haggard’s sources of policy change will be provided in the theoretical ground. Thirdly, state cooperated, and joint venture defence firms, state’s actions toward them will be observed. The remaining part will explore the underlying reasons for the changes in the role of the state in defence industry, and it implicitly or explicitly impacts on state business relations. Major findings illustrate that targeted idea of self-sufficient or autarky Turkey to attract domestic audience and to raise the prestige through defence system; ruling elites can regard defence industry and involved business groups as a mean for their ends. State dominant value, sensitive perception which has been ever since Ottoman Empire, prioritizes business groups in defence industry compared to others and push the ruling elites to pursue hard power in defence sectors. Through the globally structural transformation in defence industry, integration of Turkey to liberal bloc deepened and widened interdependence among states. Although it is a qualitative study, it involves the numerated data and descriptive statistics. Data will be collected by searching secondary sources from the literature, examining official documents of ministry of defence, and other appropriate ministries.

Keywords: defense industry, state and business relations, public private relations, arm industry

Procedia PDF Downloads 282
2634 Experimental Verification and Finite Element Analysis of a Sliding Door System Used in Automotive Industry

Authors: C. Guven, M. Tufekci, E. Bayik, O. Gedik, M. Tas

Abstract:

A sliding door system is used in commercial vehicles and passenger cars to allow a larger unobstructed access to the interior for loading and unloading. The movement of a sliding door on vehicle body is ensured by mechanisms and tracks having special cross-section which is manufactured by roll forming and stretch bending process. There are three tracks and three mechanisms which are called upper, central and lower on a sliding door system. There are static requirements as strength on different directions, rigidity for mechanisms, and door drop off, door sag; dynamic requirements as high energy slam opening-closing and durability requirement to validate these products. In addition, there is a kinematic requirement to find out force values from door handle during manual operating. In this study, finite element analysis and physical test results which are realized for sliding door systems will be shared comparatively.

Keywords: finite element analysis, sliding door, experimental, verification, vehicle tests

Procedia PDF Downloads 303
2633 Enzymatic Activities of Two Iranian Wheat Cultivars Infected with Fusarium Culmorum

Authors: Parastoo Motallebi, Vahid Niknam, Hassan Ebrahimzadeh, Majid Hashemi

Abstract:

Wheat, the most strategically important worldwide crop, is widely grown in various countries. Based on international wheat production statistics (FAOSTAT database), the total production of wheat in 2012 was 13.8 in Iran. Fusarium culmorum is one of the principal causative agents of Fusarium crown rot (FCR), an overwhelming disease of wheat and barley which is in the early stages causing yield losses, stand reductions and rotting of root and lower stem tissues. In this study inoculation of two wheat seedlings of the susceptible cultivar Falat and the partially field-resistant cultivar Pishtaz were carried out in greenhouse conditions and root samples were taken for 6 days. The activity of peroxidase (POX) and polyphenoloxidase (PPO) enzymes were analyzed to identify possible relations between resistance and enzymatic activities. Although the POX and PPO activities in both geno types increased, this significant increase was more dominant in Pishtaz. The results showed an earlier elevation in the activity of these defense related enzymes in semi-resistant cv. Pishtaz after inoculation, suggested that the activities of POX and PPO in wheat geno types play an important role in the induction of resistance to this disease.

Keywords: Defense responses, Fusarium culmorum, Wheat

Procedia PDF Downloads 505
2632 Geometric Model to Study the Mechanism of Machining and Predict the Damage Occurring During Milling of Unidirectional CFRP

Authors: Faisal Islam, J. Ramkumar

Abstract:

The applications of composite materials in aerospace, sporting and automotive industries need high quality machined surfaces and dimensional accuracy. Some studies have been done to understand the fiber failure mechanisms encountered during milling machining of CFRP composites but none are capable of explaining the exact nature of the orientation-based fiber failure mechanisms encountered in the milling machining process. The objective of this work is to gain a better understanding of the orientation-based fiber failure mechanisms occurring on the slot edges during CFRP milling machining processes. The occurrence of damage is predicted by a schematic explanation based on the mechanisms of material removal which in turn depends upon fiber cutting angles. A geometric model based on fiber cutting angle and fiber orientation angle is proposed that defines the critical and safe zone during machining and predicts the occurrence of delamination. Milling machining experiments were performed on composite samples of varying fiber orientations to verify the proposed theory. Mean fiber pulled out length was measured from the microscopic images of the damaged area to quantify the amount of damage produced. By observing the damage occurring for different fiber orientation angles and fiber cutting angles for up-milling and down-milling edges and correlating it with the material removal mechanisms as described earlier, it can be concluded that the damage/delamination mainly depends on the portion of the fiber cutting angles that lies within the critical cutting angle zone.

Keywords: unidirectional composites, milling, machining damage, delamination, carbon fiber reinforced plastics (CFRPs)

Procedia PDF Downloads 485
2631 Relationship between Independence Directors and Performance of Firms During Financial Crisis

Authors: Gladie Lui

Abstract:

The global credit crisis of 2008 aroused renewed interest in the effectiveness of corporate governance mechanisms to safeguard investor interests. In this paper, we measure the effect of the crisis from 2008 to 2009 on the stock performance of 976 Hong Kong-listed companies and examine its link to corporate governance mechanisms. It is evident that the crisis and the economic downturn affected different industries. Empirical results show that firms with an independent board and a high concentration of ownership and management ownership had lower abnormal stock returns, but a lower price volatility during the global financial crisis. These results highlight that no single corporate governance mechanism is fit for all types of financial crises and time frames. To strengthen investors’ confidence in the ability of companies to deal with such swift financial catastrophes, companies should enhance the dynamism and responsiveness of their governance mechanisms in times of turbulence.

Keywords: board of directors, capital market, corporate governance, financial crisis

Procedia PDF Downloads 404
2630 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density

Authors: Jill Round

Abstract:

In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.

Keywords: risk management, structural equation model, supervisory practice, three lines of defense

Procedia PDF Downloads 192
2629 Design and Implementation Guidance System of Guided Rocket RKX-200 Using Optimal Guidance Law

Authors: Amalia Sholihati, Bambang Riyanto Trilaksono

Abstract:

As an island nation, is a necessity for the Republic of Indonesia to have a capable military defense on land, sea or air that the development of military weapons such as rockets for air defense becomes very important. RKX rocket-200 is one of the guided missiles which are developed by consortium Indonesia and coordinated by LAPAN that serve to intercept the target. RKX-200 is designed to have the speed of Mach 0.5-0.9. RKX rocket-200 belongs to the category two-stage rocket that control is carried out on the second stage when the rocket has separated from the booster. The requirement for better performance to intercept missiles with higher maneuverability continues to push optimal guidance law development, which is derived from non-linear equations. This research focused on the design and implementation of a guidance system based OGL on the rocket RKX-200 while considering the limitation of rockets such as aerodynamic rocket and actuator. Guided missile control system has three main parts, namely, guidance system, navigation system and autopilot systems. As for other parts such as navigation systems and other supporting simulated on MATLAB based on the results of previous studies. In addition to using the MATLAB simulation also conducted testing with hardware-based ARM TWR-K60D100M conjunction with a navigation system and nonlinear models in MATLAB using Hardware-in-the-Loop Simulation (HILS).

Keywords: RKX-200, guidance system, optimal guidance law, Hils

Procedia PDF Downloads 222
2628 Study of Relation between Corporate Governance Mechanism and Investment Decisions Made by Companies Listed in Tehran Stock Exchange- IRAN

Authors: Roohollah Jamshidpour, Elaheh Ahmadi, Farhad Shah Veisi

Abstract:

Present research seeks to answer this question: Is there any relationship between corporate governance mechanisms and decision on corporate investments? Percentages of institutional, board of director’s, and stockholder’s ownership are among internal mechanisms of corporate governance relationship of which with investment-based decisions are studied by this research. Information on 103 companies during 1388 (2009)- 1393 (2014). Initially, research variables are identified; next, Rah Avard-e Novin software is used to gather Information. SPSS software is employed to test hypotheses with respect to descriptive and inferential statistics like correlation analysis. Research results show that percentage of institutional stockholders’ ownership has a significant direct relationship with investment decisions. For other cases, no significant relationship is observed between corporate governance mechanisms and investment decisions.

Keywords: corporate governance, company size, free floating stock, institutional investors, major shareholders

Procedia PDF Downloads 259
2627 Evaluation of Monoterpenes Induction in Ugni molinae Ecotypes Subjected to a Red Grape Caterpillar (Lepidoptera: Arctiidae) Herbivory

Authors: Manuel Chacon-Fuentes, Leonardo Bardehle, Marcelo Lizama, Claudio Reyes, Andres Quiroz

Abstract:

The insect-plant interaction is a complex process in which the plant is able to release chemical signaling that modifies the behavior of insects. Insect herbivory can trigger mechanisms that allow the increase in the production of secondary metabolites that allow coping against the herbivores. Monoterpenes are a kind of secondary metabolites involved in direct defense acting as repellents of herbivorous or even in indirect defense acting as attractants for insect predators. In addition, an increase of the monoterpenes concentration is an effect commonly associated with the herbivory. Hence, plants subjected to damage by herbivory increase the monoterpenes production in comparison to plants without herbivory. In this framework, co-evolutionary aspects play a fundamental role in the adaptation of the herbivorous to their host and in the counter-adaptive strategies of the plants to avoid the herbivorous. In this context, Ugni molinae 'murtilla' is a native shrub from Chile characterized by its antioxidant activity mainly related to the phenolic compounds presents in its fruits. The larval stage of the red grape caterpillar Chilesia rudis Butler (Lepidoptera: Arctiidae) has been reported as an important defoliator of U. molinae. This insect is native from Chile and probably has been involved in a co-evolutionary process with murtilla. Therefore, we hypothesized that herbivory by the red grape caterpillar increases the emission of monoterpenes in Ugni molinae. Ecotypes 19-1 and 22-1 of murtilla were established and maintained at 25° C in the Laboratorio de Química Ecológica at Universidad de La Frontera. Red grape caterpillars of ⁓40 mm were collected near to Temuco (Chile) from grasses, and they were deprived of food for 24 h before performing the assays. Ten caterpillars were placed on the foliage of the ecotypes 19-1 and 22-1 and allowed to feed during 48 h. After this time, caterpillars were removed from the ecotypes and monoterpenes were collected. A glass chamber was used to enclose the ecotypes and a Porapak-Q column was used to trap the monoterpenes. After 24 h of capturing, columns were desorbed with hexane. Then, samples were injected in a gas chromatograph coupled to mass spectrometer and monoterpenes were determined according to the NIST library. All the experiments were performed in triplicate. Results showed that α-pinene, β-phellandrene, limonene, and 1,8 cineole were the main monoterpenes released by murtilla ecotypes. For the ecotype 19-1, the abundance of α-pinene was significantly higher in plants subjected to herbivory (100%) in relation to control plants (54.58%). Moreover, β-phellandrene and 1,8 cineole were observed only in control plants. For ecotype 22-1, there was no significant difference in monoterpenes abundance. In conclusion, the results suggest a trade-off of β-phellandrene and 1,8 cineole in response to herbivory damage by red grape caterpillar generating an increase in α-pinene abundance.

Keywords: Chilesia rudis, gas chromatography, monoterpenes, Ugni molinae

Procedia PDF Downloads 122
2626 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 331
2625 The Effect of Merger Transference on the Maintenance of a Narcissistic Patient with a History of Treatment Interruption with Previous Therapists

Authors: Mehravar Javid

Abstract:

This case study delves into the psychological complexities of a 33-year-old woman, the second of three children, whose upbringing under a critical mother and a high-expectation father has significantly shaped her psychological landscape. Exhibiting a blend of worthlessness and a grandiose self, her life is a constant struggle between idealizing her father and devaluing her mother and sisters, coupled with a fear of intimacy and a desire for merger. This internal conflict manifests in symptoms of depression, anxiety, and a pattern of forming and quitting multiple relationships, all driven by a deep-seated need for validation and approval. The therapeutic journey reveals her resistance to treatment, particularly when her defense mechanisms are challenged, reflecting a complex transference dynamic where she yearns for merger yet fears it. The treatment focuses on empathetically addressing her idealization and mirroring needs, allowing for autonomy while repairing communication gaps. This approach not only confronts her emotional deficits rooted in her family dynamics but also aids in her quest for self-identity, navigating through her feelings of emptiness, inferiority, and powerlessness. The study highlights the nuanced interplay of family influence on the development and maintenance of narcissistic traits, offering insights into the therapeutic strategies that can facilitate growth and self-awareness in similar cases.

Keywords: narcissistic personality disorder, merger transference, treatment interruption, case study, family dynamics

Procedia PDF Downloads 33
2624 A Study of Chaos Control Schemes for Plankton-Fish Dynamics

Authors: Rajinder Pal Kaur, Amit Sharma, Anuj Kumar Sharma, Govind Prasad Sahu

Abstract:

The existence of chaos in the marine ecosystems may cause planktonic blooms, disease outbreaks, extinction of some plankton species, or some complex dynamics in oceans, which can adversely affect the sustainable marine ecosystem. The control of the chaotic plankton-fish dynamics is one of the main motives of marine ecologists. In this paper, we have studied the impact of phytoplankton refuge, zooplankton refuge, and fear effect on the chaotic plankton-fish dynamics incorporating phytoplankton, zooplankton, and fish biomass. The fear of fish predation transfers the unpredictable(chaotic) behavior of the plankton system to a stable orbit. The defense mechanism developed by prey species due to fear of the predator population can also terminate chaos from the given dynamics. Moreover, the impact of external disturbances like seasonality, noise, periodic fluctuations, and time delay on the given chaotic plankton system has also been discussed. We have applied feedback mechanisms to control the complexity of the system through the parameter noise. The non-feedback schemes are implemented to observe the role of seasonal force, periodic fluctuations, and time delay in suppressing the given chaotic system. Analytical results are substantiated by numerical simulation.

Keywords: plankton, chaos, noise, seasonality, fluctuations, fear effect, prey refuge

Procedia PDF Downloads 54
2623 The Effect of Artesunate on Myeloperoxidase Activity of Human Polymorphonuclear Neutrophil

Authors: J. B. Minari, O. B. Oloyede, A. A. Odutuga

Abstract:

Myeloperoxidase is the most abundant enzyme found in the polymorphonuclear neutrophil and is known to play a central role in the host defense system of the leukocyte. The enzyme has been reported to interact with some drugs to generate free radical which inhibits its activity. This study investigated the effects of artesunate on the activity of the enzyme and the subsequent effect on the host immune system. In investigating the effects of the drugs on myeloperoxidase, the influence of concentration, pH, partition ratio estimation and kinetics of inhibition were studied. This study showed that artesunate is concentration-dependent inhibitor of myeloperoxidase with an IC50 of 0.078mM. Partition ratio estimation showed that 60 enzymatic turnover cycles are required for complete inhibition of myeloperoxidase in the presence of artesunate. The influence of pH on the effect of artesunate on the enzyme showed least activity of myeloperoxidase at physiological pH. The kinetic inhibition studies showed that artesunate caused a competitive inhibition with an increase in the Km value from 0.12mM to 0.26mM and no effect on the Vmax value. The Ki value was estimated to be 2.5mM. The results obtained from this study show that artesunate is a potent inhibitor of myeloperoxidase and it is capable of inactivating the enzyme. It is considered that the inhibition of myeloperoxidase in the presence of artesunate as revealed in this study may partly explain the impairment of polymorphonuclear neutrophil and consequent reduction of the strength of the host defense system against secondary infections.

Keywords: myeloperoxidase, artesunate, inhibition, nuetrophill

Procedia PDF Downloads 339
2622 National Standard of Canada for Psychological Health and Safety in the Workplace: A Critical Review

Authors: Lucie Cote, Isabelle Rodier

Abstract:

The main objective of the research was to identify demonstrated mechanisms promoting psychological well-being and psychological health in the workplace, and to take a critical look at the 'National Standard of Canada for Psychological Health and Safety in the Workplace - Prevention, Promotion and Guidance to Staged Implementation (Standard)' as a mechanism to promote the psychological well-being and psychological health in the workplace. A review of the scientific literature was conducted, and a case study was done using data from a Canadian federal department. The following six mechanisms with an efficiency supported by most of the studies reviewed were identified: improving psychological well-being in the workplace literacy; strengthening the resilience of employees; creating an environmentally friendly and healthy workplace; promoting a healthy lifestyle; taking into account psychological characteristics in the drafting of job descriptions and tasks during the hiring process; and offering psychological self-care tools. The Standard offers several mechanisms beyond those previously identified and their implementation can be demanding. Research based on objective data and addressing the magnitude of the effect would be required.

Keywords: critical review, national standard of Canada, psychological health, workplace

Procedia PDF Downloads 202
2621 Submarines Unmanned Vehicle for Underwater Exploration and Monitoring System in Indonesia

Authors: Nabila Dwi Agustin, Ria Septitis Mentari, Nugroho Adi Sasongko

Abstract:

Indonesia is experiencing a crisis in the development of defense equipment. Most of Indonesia's defense equipment must import its parts from other countries. Moreover, the area of Indonesia is 2/3 of its territory is the sea areas. For the protection of marine areas, Indonesia relies solely on submarines in monitoring conditions and whether or not intruders enter their territory. In fact, we know the submarine has a large size so that the expenses are getting bigger, the time it takes longer and needs a big maneuver to operate the submarine. Indeed, the submarine can only be operated for deeper seas. Many other countries enter the underwater world of Indonesia but Indonesia could not do anything due to the limitations of underwater monitoring system. At the same time, reconnaissance and monitor for shallow seas cannot be done by submarine. Equipment that can be used for surveillance of shallow underwater areas shall be made. This study reviewed the current research and development initiative of the submarine unmanned vehicle (SUV) or unmanned undersea vehicle (UUV) in Indonesia. This can explore underwater without the need for an operator to operate in it, but we can monitor it from a long distance. UUV has several advantages that size can be reduced as we desired, rechargeable ship batteries, has a detection sonar commonly found on a submarine and agile movement to detect at shallow sea depth. In the sonar sensors consisted of MEMS (Micro Electro Mechanical System), the sonar system runs more efficiently and effectively to monitor the target. UUV that has been developed will be very useful if the equipment is used around the outlying islands and outer from Indonesia especially the island frequented by foreign submarines without us know. The impact of this may not be felt now but it will allow foreign countries to attack Indonesia from within for the future. In addition, UUV needs to be equipped with a anti-radar system so that submarines of other countries crossing borders cannot detect it and Indonesia anti-submarine vessels can take further security measures. As the recommendation, Indonesia should take decisive steps in the state border rules, especially submarines of other countries that deliberately cross the borders of the state. This decisive action not only by word alone but also action as well. Indonesia government should show the strength and sovereignty as the entire society unites and applies the principle of universal peace.

Keywords: submarine unmanned vehicle, submarine, development of defense equipment, the border of Indonesia

Procedia PDF Downloads 119
2620 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 119
2619 Experimental Modelling Gear Contact with TE77 Energy Pulse Setup

Authors: Zainab Mohammed Shukur, Najlaa Ali Alboshmina, Ali Safa Alsaegh

Abstract:

The project was investigated tribological behavior of polyether ether ketone (PEEK1000) against PEEK1000 rolling sliding (non-conformal) configuration with slip ratio 83.3%, were tested applications using a TE77 wear mechanisms and friction coefficient test rig. Under marginal lubrication conditions and the absence of film thick conditions, load 100 N was used to simulate the torque in gears 7 N.m. The friction coefficient and wear mechanisms of PEEK were studied under reciprocating roll/slide conditions with water, ethylene glycol, silicone, and base oil. Tribological tests were conducted on a TE77 high-frequency tribometer, with a disc-on-plate slide/roll (the energy pulse criterion) configuration. An Alicona G5 optical 3D micro-coordinate measurement microscope was used to investigate the surface topography and wear mechanisms. The surface roughness had been a significant effect on the friction coefficient for the PEEK/PEEK the rolling sliding contact test ethylene glycol and on the wear mechanisms. When silicone, ethylene glycol, and oil were used as a lubricant, the steady state of friction coefficient was reached faster than the other lubricant. Results describe the effect of the film thick with slip ratio of 83.3% on the tribological performance.

Keywords: polymer, rolling- sliding, energy pulse, gear contact

Procedia PDF Downloads 109