Search results for: defense/attack strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5967

Search results for: defense/attack strategies

5817 Sensory-Based Strategies in the School Setting: A Survey of K-12 Educators

Authors: Hoda Hashemi

Abstract:

This study aimed to explore K-12 educators’ perceptions of using sensory-based strategies (SBS) with students on the autism spectrum in classroom settings. One hundred and ninety-three educators, including 107 special education teachers, 48 general education teachers, and 38 paraprofessionals, participated in this study. They answered 44 questions about using SBS in classroom settings, the degree to which they use the strategies on a 5-point Likert scale, the outcomes they targeted, and their perception of the strategies' effectiveness. The survey results indicated that most educators rated only one sensory-based strategy, which was alternated seating options, as highly effective in addressing the targeted behaviors of students on the autism spectrum. However, in some instances, educators' perceptions of the effectiveness of some strategies did not align with other research findings, highlighting the need for further evidence to confidently implement them.

Keywords: sensory-based strategies, K-12, educators, autism, survey

Procedia PDF Downloads 38
5816 An Efficient Clustering Technique for Copy-Paste Attack Detection

Authors: N. Chaitawittanun, M. Munlin

Abstract:

Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.

Keywords: image detection, forgery image, copy-paste, attack detection

Procedia PDF Downloads 307
5815 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 567
5814 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 252
5813 The Impact of Undisturbed Flow Speed on the Correlation of Aerodynamic Coefficients as a Function of the Angle of Attack for the Gyroplane Body

Authors: Zbigniew Czyz, Krzysztof Skiba, Miroslaw Wendeker

Abstract:

This paper discusses the results of aerodynamic investigation of the Tajfun gyroplane body designed by a Polish company, Aviation Artur Trendak. This gyroplane has been studied as a 1:8 scale model. Scaling objects for aerodynamic investigation is an inherent procedure in any kind of designing. If scaling, the criteria of similarity need to be satisfied. The basic criteria of similarity are geometric, kinematic and dynamic. Despite the results of aerodynamic research are often reduced to aerodynamic coefficients, one should pay attention to how values of coefficients behave if certain criteria are to be satisfied. To satisfy the dynamic criterion, for example, the Reynolds number should be focused on. This is the correlation of inertial to viscous forces. With the multiplied flow speed by the specific dimension as a numerator (with a constant kinematic viscosity coefficient), flow speed in a wind tunnel research should be increased as many times as an object is decreased. The aerodynamic coefficients specified in this research depend on the real forces that act on an object, its specific dimension, medium speed and variations in its density. Rapid prototyping with a 3D printer was applied to create the research object. The research was performed with a T-1 low-speed wind tunnel (its diameter of the measurement volume is 1.5 m) and a six-element aerodynamic internal scales, WDP1, at the Institute of Aviation in Warsaw. This T-1 wind tunnel is low-speed continuous operation with open space measurement. The research covered a number of the selected speeds of undisturbed flow, i.e. V = 20, 30 and 40 m/s, corresponding to the Reynolds numbers (as referred to 1 m) Re = 1.31∙106, 1.96∙106, 2.62∙106 for the angles of attack ranging -15° ≤ α ≤ 20°. Our research resulted in basic aerodynamic characteristics and observing the impact of undisturbed flow speed on the correlation of aerodynamic coefficients as a function of the angle of attack of the gyroplane body. If the speed of undisturbed flow in the wind tunnel changes, the aerodynamic coefficients are significantly impacted. At speed from 20 m/s to 30 m/s, drag coefficient, Cx, changes by 2.4% up to 9.9%, whereas lift coefficient, Cz, changes by -25.5% up to 15.7% if the angle of attack of 0° excluded or by -25.5% up to 236.9% if the angle of attack of 0° included. Within the same speed range, the coefficient of a pitching moment, Cmy, changes by -21.1% up to 7.3% if the angles of attack -15° and -10° excluded or by -142.8% up to 618.4% if the angle of attack -15° and -10° included. These discrepancies in the coefficients of aerodynamic forces definitely need to consider while designing the aircraft. For example, if load of certain aircraft surfaces is calculated, additional correction factors definitely need to be applied. This study allows us to estimate the discrepancies in the aerodynamic forces while scaling the aircraft. This work has been financed by the Polish Ministry of Science and Higher Education.

Keywords: aerodynamics, criteria of similarity, gyroplane, research tunnel

Procedia PDF Downloads 366
5812 Intelligent Prediction System for Diagnosis of Heart Attack

Authors: Oluwaponmile David Alao

Abstract:

Due to an increase in the death rate as a result of heart attack. There is need to develop a system that can be useful in the diagnosis of the disease at the medical centre. This system will help in preventing misdiagnosis that may occur from the medical practitioner or the physicians. In this research work, heart disease dataset obtained from UCI repository has been used to develop an intelligent prediction diagnosis system. The system is modeled on a feedforwad neural network and trained with back propagation neural network. A recognition rate of 86% is obtained from the testing of the network.

Keywords: heart disease, artificial neural network, diagnosis, prediction system

Procedia PDF Downloads 421
5811 The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link

Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito

Abstract:

Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.

Keywords: arms control, arms race, global security, GMD, ICBM, missile defense, proliferation

Procedia PDF Downloads 118
5810 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 430
5809 Microbial Bioagent Triggered Biochemical Response in Tea (Camellia sinensis) Inducing Resistance against Grey Blight Disease and Yield Enhancement

Authors: Popy Bora, L. C. Bora, A. Bhattacharya, Sehnaz S. Ahmed

Abstract:

Microbial bioagents, viz., Pseudomonas fluorescens, Bacillus subtilis, and Trichoderma viride were assessed for their ability to suppress grey blight caused by Pestalotiopsis theae, a major disease of tea crop in Assam. The expression of defense-related phytochemicals due to the application of these bioagents was also evaluated. The individual bioagents, as well as their combinations, were screened for their bioefficacy against P. theae in vitro using nutrient agar (NA) as basal medium. The treatment comprising a combination of the three bioagents, P. fluorescens, B. subtilis, and T. viride showed significantly the highest inhibition against the pathogen. Bioformulation of effective bioagent combinations was further evaluated under field condition, where significantly highest reduction of grey blight (90.30%), as well as the highest increase in the green leaf yield (10.52q/ha), was recorded due to application of the bioformulation containing the three bioagents. The application of the three bioformulation also recorded an enhanced level of caffeine (4.15%) and polyphenols (22.87%). A significant increase in the enzymatic activity of phenylalanine ammonia-lyase, peroxidase and polyphenol oxidase were recorded in the plants treated with the microbial bioformulation of the three bioagents. The present investigation indicates the role of microbial agents in suppressing disease, inducing plant defense response, as well as improving the quality of tea.

Keywords: enzymatic activity, grey blight, microbial bioagents, Pestalotiopsis theae, phytochemicals, plant defense, tea

Procedia PDF Downloads 114
5808 Biochemical Characterization of Meat Goat in Algeria

Authors: Hafid Nadia, Meziane Toufik

Abstract:

The aim of this study was the characterization of the goat meat by the determination of quantity and the quality in Batna region. The first part was the evaluation of production and consumption. The investigations show that the goat meat third after mutton and beef, it’s especially consumed by the indigenous population located in the Mountain and steep area. The second part of this review treats nutritional quality of this meat by the quantification of the chemical composition, including fat profile, and establishes a link between animal age and the values of these parameters. Moisture, fat contents, and cholesterol levels varied with age. Because of the decreasing level of cholesterol in the Chevon meat, it is more recommended for consumption to prevent or reduce the incidence of coronary disease and heart attack.

Keywords: biochemical composition, cholesterol, goat meat, heart attack

Procedia PDF Downloads 637
5807 A Study on the Influence of Internal Sulfate on the Properties of Self-Compacting Concrete

Authors: Abbas S. Al-Ameeri Rawaa H. Issa

Abstract:

The internal sulfate attack is considered as a very important problem of concrete manufacture in Iraq and Middle East countries. Sulfate drastically influences the properties of concrete. This experimental study is aimed at investigating the effect of internal sulfates on fresh and some of the hardened properties of self compacting concrete (SCC) made from locally available materials. Tests were conducted on five mixes, with five SO3 levels (3.9, 5, 6, 7 and 8) (% by wt. of cement). The last four SO3 levels are outside the limits of the Iraqi specifications (IQS NO.45/1984). The results indicated that sulfate passively influenced the fresh properties such as decreased workability, and effect on hardened properties of the self compacting concrete. Also, the result indicated the optimum SO3 content which gives maximum strength and little tendency to expanding, which showed up at a content equal to 5% (by wt of cement), is more than acceptable limits of Iraqi specifications. Further increase in sulfates content in concrete after this optimum value showed a considerable reduction in mechanical properties of self-compacting concrete, and increment in expansion of concrete. The percentages of reduction in compressive strength, splitting tensile strength, flexural strength, static modulus of elasticity and ultrasonic pulse velocity at their later age were ranged between 10.89-36.14%, 12.90-33.33%, 7.98-36.35%, 16.36 -38.37% and 1.03-10.88% respectively.

Keywords: self-compacting concrete, sulfate attack, internal sulfate attack, fresh properties, harden properties, optimum SO3 content

Procedia PDF Downloads 242
5806 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 385
5805 A Failure Investigations of High-Temperature Hydrogen Attack at Plat Forming Unit Furnace Elbow

Authors: Altoumi Alndalusi

Abstract:

High-temperature hydrogen attack (HTHA) failure is the common phenomena at elevated temperature in hydrogen environment in oil and gas field. The failure occurred once after four years at the internal surface of Platforming elbow. Both visual and microscopic examinations revealed that the failure was initiated due to blistering forming followed by large cracking at the inner surface. Crack morphology showed that the crack depth was about 50% of material wall thickness and its behavior generally was intergranular. This study concluded that the main reason led to failure due to incorrect material selection comparing to the platforming conditions.

Keywords: decarburization, failure, heat affected zone, morphology, partial pressure, plate form

Procedia PDF Downloads 127
5804 Technology Roadmapping in Defense Industry

Authors: Sevgi Özlem Bulu, Arif Furkan Mendi, Tolga Erol, İzzet Gökhan Özbilgin

Abstract:

The rapid progress of technology in today's competitive conditions has also accelerated companies' technology development activities. As a result, companies are paying more attention to R&D studies and are beginning to allocate a larger share to R&D projects. A more systematic, comprehensive, target-oriented implementation of R&D studies is crucial for the company to achieve successful results. As a consequence, Technology Roadmap (TRM) is gaining importance as a management tool. It has critical prospects for achieving medium and long term success as it contains decisions about past business, future plans, technological infrastructure. When studies on TRM are examined, projects to be placed on the roadmap are selected by many different methods. Generally preferred methods are based on multi-criteria decision making methods. Management of selected projects becomes an important point after the selection phase of the projects. At this stage, TRM are used. TRM can be created in many different ways so that each institution can prepare its own Technology Roadmap according to their strategic plan. Depending on the intended use, there can be TRM with different layers at different sizes. In the evaluation phase of the R&D projects and in the creation of the TRM, HAVELSAN, Turkey's largest defense company in the software field, carries out this process with great care and diligence. At the beginning, suggested R&D projects are evaluated by the Technology Management Board (TMB) of HAVELSAN in accordance with the company's resources, objectives, and targets. These projects are presented to the TMB periodically for evaluation within the framework of certain criteria by board members. After the necessary steps have been passed, the approved projects are added to the time-based TRM, which is composed of four layers as market, product, project and technology. The use of a four-layered roadmap provides a clearer understanding and visualization of company strategy and objectives. This study demonstrates the benefits of using TRM, four-layered Technology Roadmapping and the possibilities for the institutions in the defense industry.

Keywords: technology roadmap, research and development project, project selection, research development in defense industry

Procedia PDF Downloads 149
5803 Performance of a Sailing Vessel with a Solid Wing Sail Compared to a Traditional Sail

Authors: William Waddington, M. Jahir Rizvi

Abstract:

Sail used to propel a vessel functions in a similar way to an aircraft wing. Traditionally, cloth and ropes were used to produce sails. However, there is one major problem with traditional sail design, the increase in turbulence and flow separation when compared to that of an aircraft wing with the same camber. This has led to the development of the solid wing sail focusing mainly on the sail shape. Traditional cloth sails are manufactured as a single element whereas solid wing sail is made of two segments. To the authors’ best knowledge, the phenomena behind the performances of this type of sail at various angles of wind direction with respect to a sailing vessel’s direction (known as the angle of attack) is still an area of mystery. Hence, in this study, the thrusts of a sailing vessel produced by wing sails constructed with various angles (22°, 24°, 26° and 28°) between the two segments have been compared to that of a traditional cloth sail made of carbon-fiber material. The reason for using carbon-fiber material is to achieve the correct and the exact shape of a commercially available mainsail. NACA 0024 and NACA 0016 foils have been used to generate two-segment wing sail shape which incorporates a flap between the first and the second segments. Both the two-dimensional and the three-dimensional sail models designed in commercial CAD software Solidworks have been analyzed through Computational Fluid Dynamics (CFD) techniques using Ansys CFX considering an apparent wind speed of 20.55 knots with an apparent wind angle of 31°. The results indicate that the thrust from traditional sail increases from 8.18 N to 8.26 N when the angle of attack is increased from 5° to 7°. However, the thrust value decreases if the angle of attack is further increased. A solid wing sail which possesses 20° angle between its two segments, produces thrusts from 7.61 N to 7.74 N with an increase in the angle of attack from 7° to 8°. The thrust remains steady up to 9° angle of attack and drops dramatically beyond 9°. The highest thrust values that can be obtained for the solid wing sails with 22°, 24°, 26° and 28° angle respectively between the two segments are 8.75 N, 9.10 N, 9.29 N and 9.19 N respectively. The optimum angle of attack for each of the solid wing sails is identified as 7° at which these thrust values are obtained. Therefore, it can be concluded that all the thrust values predicted for the solid wing sails of angles between the two segments above 20° are higher compared to the thrust predicted for the traditional sail. However, the best performance from a solid wing sail is expected when the sail is created with an angle between the two segments above 20° but below or equal to 26°. In addition, 1/29th scale models in the wind tunnel have been tested to observe the flow behaviors around the sails. The experimental results support the numerical observations as the flow behaviors are exactly the same.

Keywords: CFD, drag, sailing vessel, thrust, traditional sail, wing sail

Procedia PDF Downloads 248
5802 Ghana’s Human Sexual Rights and Family Values Bill, 2021, and the Experiences of the LGBTQ+ Community

Authors: Michael Augustus Akagbor

Abstract:

Same-sex relationships have always existed in Ghana. In coastal towns such as James Town in the heart of the country’s capital, persons who were sexually different and attracted to members of their own sex were able to live their lives openly as queer persons without any fear for their lives. Since 2006, this idyllic existence has been under attack, with LGBTQ+ communities suffering violence and discrimination. This paper highlights the lived experiences of the LGBTIQ+ community in Ghana against the backdrop of the anti-gay bill - The Promotion of Proper Human Sexual Rights and Ghanaian Family Values Bill, 2021 (now renamed the Human Sexual Rights and Family Values Bill, 2021), currently before Parliament, introduced by eight members of Parliament as a Private Members’ Bill, and its implications for the LGBTQ+ community. The paper makes recommendations to key stakeholders on strategies to counter the cultural and religious arguments/strategies and activism of the anti-LGBTQ+ movement in Ghana. It relied on secondary data from a variety of sources, including the Bill before Parliament, media reports, and baseline surveys and studies conducted by LGBTQ organizations and other Civil Society Organizations (CSOs) in Ghana and elsewhere.

Keywords: sexual rights, promotion, family values, lgbtq+, ghana, discrimination

Procedia PDF Downloads 53
5801 Communicative Strategies in Colombian Political Speech: On the Example of the Speeches of Francia Marquez

Authors: Danila Arbuzov

Abstract:

In this article the author examines the communicative strategies used in the Colombian political discourse, following the example of the speeches of the Vice President of Colombia Francia Marquez, who took office in 2022 and marked a new development vector for the Colombian nation. The lexical and syntactic means are analyzed to achieve the communicative objectives. The material presented may be useful for those who are interested in investigating various aspects of discursive linguistics, particularly political discourse, as well as the implementation of communicative strategies in certain types of discourse.

Keywords: political discourse, communication strategies, Colombian political discourse, Colombia, manipulation

Procedia PDF Downloads 79
5800 A Conceptual Framework of Strategies for Managing Intellectual Property Rights at Different Stages of Product Life Cycle

Authors: Nithyananda K. V.

Abstract:

Organizations follow various strategies for managing their intellectual property rights, either in the form of securing IP rights or using such IP rights through leveraging, monetizing, and commercializing them. It is well known that organizations adopt different intellectual property strategies in response to other organizations within the industry. But within an organization, and within the products that are being manufactured and sold by it, the strategies for managing its intellectual property rights keep changing at different stages of the product life cycle. Organizations could adopt not only different strategies for managing its intellectual property rights, but could also adopt different kinds of business models to leverage, monetize, and commercial the IP rights. This paper analyzes the various strategies that can be adopted by organizations to manage its IP rights at different stages of the product life cycle and the rationale for adopting such strategies. This would be a secondary research, based solely on the literature of strategic management, new product development, resource-based management, and the intellectual property management. This paper synthesizes the literature from these streams to propose a conceptual framework of strategies that can be adopted by organizations for managing its IP rights in conjunction with the life cycle of the products that it manufactures and sells in the market. This framework could be adopted by organizations in implementing strategies for effectively managing their IP rights.

Keywords: intellectual property strategy, management of intellectual property rights, New product development, product life cycle

Procedia PDF Downloads 271
5799 Investigation of the Technological Demonstrator 14x B in Different Angle of Attack in Hypersonic Velocity

Authors: Victor Alves Barros Galvão, Israel Da Silveira Rego, Antonio Carlos Oliveira, Paulo Gilberto De Paula Toro

Abstract:

The Brazilian hypersonic aerospace vehicle 14-X B, VHA 14-X B, is a vehicle integrated with the hypersonic airbreathing propulsion system based on supersonic combustion (scramjet), developing in Aerothermodynamics and hypersonic Prof. Henry T. Nagamatsu Laboratory, to conduct demonstration in atmospheric flight at the speed corresponding to Mach number 7 at an altitude of 30km. In the experimental procedure the hypersonic shock tunnel T3 was used, installed in that laboratory. This device simulates the flow over a model is fixed in the test section and can also simulate different atmospheric conditions. The scramjet technology offers substantial advantages to improve aerospace vehicle performance which flies at a hypersonic speed through the Earth's atmosphere by reducing fuel consumption on board. Basically, the scramjet is an aspirated aircraft engine fully integrated that uses oblique/conic shock waves generated during hypersonic flight, to promote the deceleration and compression of atmospheric air in scramjet inlet. During the hypersonic flight, the vehicle VHA 14-X will suffer atmospheric influences, promoting changes in the vehicle's angles of attack (angle that the mean line of vehicle makes with respect to the direction of the flow). Based on this information, a study is conducted to analyze the influences of changes in the vehicle's angle of attack during the atmospheric flight. Analytical theoretical analysis, simulation computational fluid dynamics and experimental investigation are the methodologies used to design a technological demonstrator prior to the flight in the atmosphere. This paper considers analysis of the thermodynamic properties (pressure, temperature, density, sound velocity) in lower surface of the VHA 14-X B. Also, it considers air as an ideal gas and chemical equilibrium, with and without boundary layer, considering changes in the vehicle's angle of attack (positive and negative in relation to the flow) and bi-dimensional expansion wave theory at the expansion section (Theory of Prandtl-Meyer).

Keywords: angle of attack, experimental hypersonic, hypersonic airbreathing propulsion, Scramjet

Procedia PDF Downloads 380
5798 Trajectory Optimization of Re-Entry Vehicle Using Evolutionary Algorithm

Authors: Muhammad Umar Kiani, Muhammad Shahbaz

Abstract:

Performance of any vehicle can be predicted by its design/modeling and optimization. Design optimization leads to efficient performance. Followed by horizontal launch, the air launch re-entry vehicle undergoes a launch maneuver by introducing a carefully selected angle of attack profile. This angle of attack profile is the basic element to complete a specified mission. Flight program of said vehicle is optimized under the constraints of the maximum allowed angle of attack, lateral and axial loads and with the objective of reaching maximum altitude. The main focus of this study is the endo-atmospheric phase of the ascent trajectory. A three degrees of freedom trajectory model is simulated in MATLAB. The optimization process uses evolutionary algorithm, because of its robustness and efficient capacity to explore the design space in search of the global optimum. Evolutionary Algorithm based trajectory optimization also offers the added benefit of being a generalized method that may work with continuous, discontinuous, linear, and non-linear performance matrix. It also eliminates the requirement of a starting solution. Optimization is particularly beneficial to achieve maximum advantage without increasing the computational cost and affecting the output of the system. For the case of launch vehicles we are immensely anxious to achieve maximum performance and efficiency under different constraints. In a launch vehicle, flight program means the prescribed variation of vehicle pitching angle during the flight which has substantial influence reachable altitude and accuracy of orbit insertion and aerodynamic loading. Results reveal that the angle of attack profile significantly affects the performance of the vehicle.

Keywords: endo-atmospheric, evolutionary algorithm, efficient performance, optimization process

Procedia PDF Downloads 383
5797 Aerodynamic Investigation of Baseline-IV Bird-Inspired BWB Aircraft Design: Improvements over Baseline-III BWB

Authors: C. M. Nur Syazwani, M. K. Ahmad Imran, Rizal E. M. Nasir

Abstract:

The study on BWB UV begins in UiTM since 2005 and three designs have been studied and published. The latest designs are Baseline-III and inspired by birds that have features and aerodynamics behaviour of cruising birds without flapping capability. The aircraft featuring planform and configuration are similar to the bird. Baseline-III has major flaws particularly in its low lift-to-drag ratio, stability and issues regarding limited controllability. New design known as Baseline-IV replaces straight, swept wing to delta wing and have a broader tail compares to the Baseline-III’s. The objective of the study is to investigate aerodynamics of Baseline-IV bird-inspired BWB aircraft. This will be achieved by theoretical calculation and wind tunnel experiments. The result shows that both theoretical and wind tunnel experiments of Baseline-IV graph of CL and CD versus alpha are quite similar to each other in term of pattern of graph slopes and values. Baseline-IV has higher lift coefficient values at wide range of angle of attack compares to Baseline-III. Baseline-IV also has higher maximum lift coefficient, higher maximum lift-to-drag and lower parasite drag. It has stable pitch moment versus lift slope but negative moment at zero lift for zero angle-of-attack tail setting. At high angle of attack, Baseline-IV does not have stability reversal as shown in Baseline-III. Baseline-IV is proven to have improvements over Baseline-III in terms of lift, lift-to-drag ratio and pitch moment stability at high angle-of-attack.

Keywords: blended wing-body, bird-inspired blended wing-body, aerodynamic, stability

Procedia PDF Downloads 481
5796 Aligning Organizational Culture and Compensation Strategies

Authors: Giuseppe Maria Russo, Patrícia Amélia Tomei, Antônio Linhares, André Moreira Santos

Abstract:

Alignment between management strategies, policies and practices with organizational cultures holds great potential to meet the challenges of retaining professionals and maintaining their commitment. In this article, authors consider that when it is aligned with company strategy, compensation acts as an incentive for developing common visions within the organizational culture. This article verified the correlation between types of culture and compensation’s strategic components and provided inputs for the definition of strategies aligned with cultural typologies. We conclude that the impact of compensation variables varies according to the type of organizational culture. This result reinforces the theory that different cultures define different organizational strategies. Thus, compensation strategies may explain types of organizational culture.

Keywords: compensation, Handy’s cultural typology, organizational culture, rewards

Procedia PDF Downloads 624
5795 Consumers’ Responses to Non-Traditional Marketing Communication Strategies for Advertising Herbal Products

Authors: Chioma Ifeoma Agbasimelo, Stephen Afam Kenechukwu

Abstract:

The study examined consumers’ responses to non-traditional marketing communication strategies in advertising herbal products. The study identified the following non-traditional marketing communication strategies: (a) trado-instrumental marketing strategy, (b) trado-demonstrative marketing strategy, and (c) trado-iconographic marketing strategy. Anchored on the Black Box Theory, it adopted the survey design of three metropolises (Awka, Onitsha, and Nnewi) in Anambra State, Nigeria. Major findings indicated that among the identified strategies, the trado-instrumental marketing strategy is the most dominant strategy. Other strategies: (b) trado-demonstrative marketing strategy and (c) trado-iconographic marketing strategy are sparingly used in semi-urban cities. It also found that consumers’ preferences and adoption of non-traditional marketing communication were minimal. Based on the findings, there is a need to create a unified system of integration of both traditional and non-traditional marketing communication strategies due to technology interfaces.

Keywords: advertising, consumers’ responses, herbal products, non-traditional marketing communication strategies

Procedia PDF Downloads 63
5794 Gender Difference in the Use of Request Strategies by Urdu/Punjabi Native Speakers

Authors: Muzaffar Hussain

Abstract:

Requests strategies are considered as a part of the speech acts, which are frequently used in everyday communication. Each language provides speech acts to the speakers; therefore, the selection of appropriate form seems more culture-specific rather than language. The present paper investigates the gender-based difference in the use of request strategies by native speakers of Urdu/Punjabi male and female who are learning English as a second language. The data for the present study were collected from 68 graduate students, who are learning English as an L2 in Pakistan. They were given an online close-ended questionnaire, based on Discourse Completion Test (DCT). After analyzing the data, it was found that the L1 male Urdu/Punjabi speakers were inclined to use more direct request strategies while the female Urdu/Punjabi speakers used indirect request strategies. This paper also found that in some situations female participants used more direct strategies than male participants. The present study concludes that the use of request strategies is influenced by culture, social status, and power distribution in a society.

Keywords: gender variation, request strategies, face-threatening, second language pragmatics, language competence

Procedia PDF Downloads 159
5793 The Mechanical Strength and Durability of High Performance Concrete Using Local Materials

Authors: I. Guemidi, Y. Abdelaziz, T. Rikioui

Abstract:

In this work, an experimental investigation was carried out to evaluate the mechanical and durability properties of high performance concretes (HPC) containing local southwest Algerian materials. The mechanical properties were assessed from the compressive strength and the flexural strength, whilst the durability characteristics were investigated in terms of sulphate attack. The results obtained allow us to conclude that it is possible to make a high performance concrete (HPC) based on existing materials in the local market, if these are carefully selected and properly mixed in such away to optimize grain size distribution.

Keywords: durability, high performance concrete, high strength, local materials, Southwest Algerian, sulphate attack

Procedia PDF Downloads 355
5792 The Effects of Aging on the Cost of Operating and Support: An Empirical Study Applied to Weapon Systems

Authors: Byungchae Kim, Jiwoo Nam

Abstract:

Aging of weapon systems can cause the failure and degeneration of components which results in increase of operating and support costs. However, whether this aging effect is significantly strong and it influences a lot on national defense spending due to the rapid increase in operating and support (O&S) costs is questionable. To figure out this, we conduct a literature review analyzing the aging effect of US weapon systems. We also conduct an empirical research using a maintenance database of Korean weapon systems, Defense Logistics Integrated Information System (DAIIS). We run regression of various types of O&S cost on weapon system age to investigate the statistical significance of aging effect and use generalized linear model to find relations between the failure of different priced components and the age. Our major finding is although aging effect exists, its impacts on weapon system cost seem to be not too large considering several characteristics of O&S cost elements not relying on the age.

Keywords: O&S cost, aging effect, weapon system, GLM

Procedia PDF Downloads 109
5791 Role of Obama's Administration Counter-Terrorism Strategies towards Pakistan

Authors: Ahmed Bux Jamali

Abstract:

The purpose of this study is to examine and evaluate the overall counterterrorism cooperation during Obama Administration towards Pakistan. It aims and focuses on the performances and measures taken by United States of America during President Obama in office in order to eradicate terrorism from Pakistan. Being a grave national security threat, terrorism played a disastrous role in the domestic peace and stability of both countries. For the sake of curbing this menace in South Asia in general and Pakistan in particular, the role of Obama Administration is viable and results-oriented despite major ups and downs in Pakistan U.S Relations during that period of time. Obama administration formulated policies when he comes to office in 2009 by looking at the already efforts done by Bush Administration to counterterrorism from Pakistan. Obama’s foreign policy was revolving around defense and diplomacy when it comes to dealing with Pakistan. The concept of smart power was indeed a core principle of Obama’s administration to gain the strategic objectives in Pakistan. Obama’s strategies in terms of providing military aid packages and various assistance programs, working on institutional building and strengthening the economy helped Pakistan in strengthening the military capabilities to go for militant operation in the safe havens area in the tribal areas of Pakistan. It further helped building institutional mechanism in the governmental policies to counter terrorism and militancy. The training of combat forces, artillery, and equipment provided by US proved fatal for the militant terrorist organizations seeking hideouts in the tribal areas of Pakistan. Resultantly, many top leaders of al Qaeda and many affiliated militant groups were captured and given to US as well. Despite many ups and downs in the bilateral relations on various domestic and international issues, both countries didn’t compromise the elimination of terrorist phenomena from Pakistan which was indeed a great success of the Obama administration’s counterterrorism and counterinsurgency strategies in the long run.

Keywords: counterterrorism cooperation, national security strategy, Obama administration, Pakistan-US relations

Procedia PDF Downloads 148
5790 Entrepreneurship in Nigeria-Funding and Financing Strategies

Authors: Yusuf Abdullahi

Abstract:

The contribution of entrepreneurship in the economic development cannot be over-emphasized neither it should be underestimated for any reason as this is already a known fact that it plays an important role as a change agent and as a prime mover of economy. In developed or underdeveloped economy, the essence of entrepreneurship is highly significant as this exist in both private as well as public sectors of any economy. The roles of entrepreneurship are worldly acclaimed but yet as laudable as these roles there can be no significant success by any entrepreneur except with availability of finance. Nonetheless, mere availability of finance also cannot guarantee the success of an enterprise but there must be in place appropriate financial strategies for the funding/investment needs of an enterprise. Thus, little has been said when it comes to strategies needed to access various sources of finance. This paper, therefore, establishes appropriate strategies to obtain funds sources of finance by both small and as well as medium enterprises.

Keywords: entrepreneurship, Nigeria, financial strategies, economic development

Procedia PDF Downloads 449
5789 Framework for Aligning Supply Chain Strategies and Organizational Strategies in an SOE Environment

Authors: R. Setino, I. M. Ambe, J. A Badenhorst-Weiss

Abstract:

The South African government supply chain management system is not adequately implemented in State Owned Enterprises (SOEs). There are weaknesses in the SOEs SCM enablers, strategies and policies. In addition, top management of SOEs still do not see SCM as strategic enough to deserve their attention, and therefore, there is very little support from top management, thus making it even difficult for SCM practitioners to execute their day to day functions, let alone delivering the letter and spirit of the relevant legislations. Supply chain strategies lack buy in from the top, and as a result senior SCM practitioners has not been involved in the corporate strategy. This has resulted in supply chain and corporate strategies being misaligned. Due to service delivery backlog, high level of corruption and continuous strikes across the country for better services it is inevitable that government leaders be more strategic about how South Africa can use SCM as a tool to improve service delivery. Consequently, there is a need to close the gap between the strategic level dealt by top management and the application of operational SCM concepts: the use of SCM concepts and, therefore, supply chain strategies – should be aligned with the corporate and business strategies in order to ensure the achievement of top level business objectives. This paper aims to explore supply chain practices in State Owned Enterprises (SOEs). The paper based on a conceptual review provides the status, trends and development and suggests a framework for aligning supply chain strategies and organizational strategies in an SOE environment.

Keywords: alignment, strategies, state owned enterprises, supply chain management, South Africa

Procedia PDF Downloads 379
5788 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 33