Search results for: en-echelon flaws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 88

Search results for: en-echelon flaws

88 Failure to Replicate the Unconscious Thought Advantages

Authors: Vladimíra Čavojová, Eva Ballová Mikušková

Abstract:

In this study we tried to replicate the unconscious thought advantage (UTA), which states that complex decisions are better handled by unconscious thinking. We designed an experiment in e-prime using similar material as the original study (choosing between four different apartments, each described by 12 attributes). A total of 73 participants (52 women (71.2%); 18 to 62 age: M=24.63; SD=8.7) took part in the experiment. We did not replicate the results suggested by UTT. However, from the present study we cannot conclude whether this was the case of flaws in the theory or flaws in our experiment and we discuss several ways in which the issue of UTA could be examined further.

Keywords: decision making, unconscious thoughts, UTT, complex decisions

Procedia PDF Downloads 281
87 The Failure and Energy Mechanism of Rock-Like Material with Single Flaw

Authors: Yu Chen

Abstract:

This paper investigates the influence of flaw on failure process of rock-like material under uniaxial compression. In laboratory, the uniaxial compression tests of intact specimens and a series of specimens within single flaw were conducted. The inclination angle of flaws includes 0°, 15°, 30°, 45°, 60°, 75° and 90°. Based on the laboratory tests, the corresponding models of numerical simulation were built and loaded in PFC2D. After analysing the crack initiation and failure modes, deformation field, and energy mechanism for both laboratory tests and numerical simulation, it can be concluded that the influence of flaws on the failure process is determined by its inclination. The characteristic stresses increase as flaw angle rising basically. The tensile cracks develop from gentle flaws (α ≤ 30°) and the shear cracks develop from other flaws. The propagation of cracks changes during failure process and the failure mode of a specimen corresponds to the orientation of the flaw. A flaw has significant influence on the transverse deformation field at the middle of the specimen, except the 75° and 90° flaw sample. The input energy, strain energy and dissipation energy of specimens show approximate increase trends with flaw angle rising and it presents large difference on the energy distribution.

Keywords: failure pattern, particle deformation field, energy mechanism, PFC

Procedia PDF Downloads 187
86 Experimental and Numerical Studies on Earthquake Shear Rupture Generation

Authors: Louis N. Y. Wong

Abstract:

En-echelon fractures are commonly found in rocks, which appear as a special set of regularly oriented and spaced fractures. By using both experimental and numerical approaches, this study investigates the interaction among them, and how this interaction finally contributes to the development of a shear rupture (fault), especially in brittle natural rocks. Firstly, uniaxial compression tests are conducted on marble specimens containing en-echelon flaws. The latter is cut by using the water abrasive jet into the rock specimens. The fracturing processes of these specimens leading to the formation of a fault are observed in detail by the use of a high speed camera. The influences of the flaw geometry on the production of tensile cracks and shear cracks, which in turn dictate the coalescence patterns of the entire set of en-echelon flaws are comprehensively studied. Secondly, a numerical study based on a recently developed contact model, flat-joint contact model using the discrete element method (DEM) is carried out to model the present laboratory experiments. The numerical results provide a quantitative assessment of the interaction of en-echelon flaws. Particularly, the evolution of the stress field, as well as the characteristics of new crack initiation, propagation and coalescence associated with the generation of an eventual shear rupture are studied in detail. The numerical results are found to agree well with the experimental results obtained in both microscopic and macroscopic observations.

Keywords: discrete element method, en-echelon flaws, fault, marble

Procedia PDF Downloads 236
85 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 371
84 Development of Children through the Prism of Pending Bills in India: An Analytical Study

Authors: S. Sunaina, Neha Saini

Abstract:

Children are considered as future of a country. In order to have a better future, better laws are required in the present, especially for the children. Their development primarily revolves around physical, mental, psychological, emotional and financial facets. Hence the holistic development of a child in the contemporary society is a must in order to secure a better future. The present paper is an endeavour to analyse the development of children in India vis-a-vis The Child Development Bill 2016 and Child Labour (Abolition) Bill 2016 pending before the Indian Parliament. The findings of the study will attempt to highlight the flaws of the Bills and their probable repercussions, supporting the same with Constitutional provisions, judicial precedents, and the international perspective. Finally, the paper will conclude with concrete suggestions to overcome the flaws of the Bills so that the Bills, when passed, can be sincerely implemented.

Keywords: bill, children, development, repercussion

Procedia PDF Downloads 244
83 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 105
82 Study of Slum Redevelopment Initiatives for Dharavi Slum, Mumbai and Its Effectiveness in Implementation in Other Cities

Authors: Anurag Jha

Abstract:

Dharavi is the largest slum in Asia, for which many redevelopment projects have been put forth, to improve the housing conditions of the locals. And yet, these projects are met with much-unexpected resistance from the locals. The research analyses the why and the how of the resistances these projects face and analyses these programs and points out the flaws and benefits of such projects, by predicting its impact on the regulars of Dharavi. The research aims to analyze various aspects of Dharavi, which affect its socio-cultural backdrops, such as its history, and eventual growth into a mega slum. Through various surveys, the research aims to analyze the life of a slum dweller, the street life, and the effect of such settlement on the urban fabric. Various development projects such as Dharavi Museum Movement, are analyzed, and a feasibility and efficiency analysis of the proposals for redevelopment of Dharavi Slums has been theorized. Flaws and benefits of such projects, by predicting its impact on the regulars of Dharavi has been the major approach to the research. Also, prediction the implementation of these projects in another prominent slum area, Anand Nagar, Bhopal, with the use of generated hypothetical model has been done. The research provides a basic framework for a comparative analysis of various redevelopment projects and the effect of implementation of such projects on the general populace. Secondly, it proposes a hypothetical model for feasibility of such projects in certain slum areas.

Keywords: Anand Nagar, Bhopal slums, Dharavi, slum redevelopment programmes

Procedia PDF Downloads 303
81 A Convolutional Neural Network-Based Model for Lassa fever Virus Prediction Using Patient Blood Smear Image

Authors: A. M. John-Otumu, M. M. Rahman, M. C. Onuoha, E. P. Ojonugwa

Abstract:

A Convolutional Neural Network (CNN) model for predicting Lassa fever was built using Python 3.8.0 programming language, alongside Keras 2.2.4 and TensorFlow 2.6.1 libraries as the development environment in order to reduce the current high risk of Lassa fever in West Africa, particularly in Nigeria. The study was prompted by some major flaws in existing conventional laboratory equipment for diagnosing Lassa fever (RT-PCR), as well as flaws in AI-based techniques that have been used for probing and prognosis of Lassa fever based on literature. There were 15,679 blood smear microscopic image datasets collected in total. The proposed model was trained on 70% of the dataset and tested on 30% of the microscopic images in avoid overfitting. A 3x3x3 convolution filter was also used in the proposed system to extract features from microscopic images. The proposed CNN-based model had a recall value of 96%, a precision value of 93%, an F1 score of 95%, and an accuracy of 94% in predicting and accurately classifying the images into clean or infected samples. Based on empirical evidence from the results of the literature consulted, the proposed model outperformed other existing AI-based techniques evaluated. If properly deployed, the model will assist physicians, medical laboratory scientists, and patients in making accurate diagnoses for Lassa fever cases, allowing the mortality rate due to the Lassa fever virus to be reduced through sound decision-making.

Keywords: artificial intelligence, ANN, blood smear, CNN, deep learning, Lassa fever

Procedia PDF Downloads 83
80 Methodologies for Crack Initiation in Welded Joints Applied to Inspection Planning

Authors: Guang Zou, Kian Banisoleiman, Arturo González

Abstract:

Crack initiation and propagation threatens structural integrity of welded joints and normally inspections are assigned based on crack propagation models. However, the approach based on crack propagation models may not be applicable for some high-quality welded joints, because the initial flaws in them may be so small that it may take long time for the flaws to develop into a detectable size. This raises a concern regarding the inspection planning of high-quality welded joins, as there is no generally acceptable approach for modeling the whole fatigue process that includes the crack initiation period. In order to address the issue, this paper reviews treatment methods for crack initiation period and initial crack size in crack propagation models applied to inspection planning. Generally, there are four approaches, by: 1) Neglecting the crack initiation period and fitting a probabilistic distribution for initial crack size based on statistical data; 2) Extrapolating the crack propagation stage to a very small fictitious initial crack size, so that the whole fatigue process can be modeled by crack propagation models; 3) Assuming a fixed detectable initial crack size and fitting a probabilistic distribution for crack initiation time based on specimen tests; and, 4) Modeling the crack initiation and propagation stage separately using small crack growth theories and Paris law or similar models. The conclusion is that in view of trade-off between accuracy and computation efforts, calibration of a small fictitious initial crack size to S-N curves is the most efficient approach.

Keywords: crack initiation, fatigue reliability, inspection planning, welded joints

Procedia PDF Downloads 331
79 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 46
78 Preventing Corruption in Dubai: Governance, Contemporary Strategies and Systemic Flaws

Authors: Graham Brooks, Belaisha Bin Belaisha, Hakkyong Kim

Abstract:

The problem of preventing and/or reducing corruption is a major international problem. This paper, however, specifically focuses on how organisations in Dubai are tackling the problem of money laundering. This research establishes that Dubai has a clear international anti-money laundering framework but suffers from some national weaknesses such as diverse anti-money laundering working practice, lack of communication, sharing information and disparate organisational vested self-interest.

Keywords: corruption, governance, money laundering, prevention, strategies

Procedia PDF Downloads 250
77 The Two-Lane Rural Analysis and Comparison of Police Statistics and Results with the Help IHSDM

Authors: S. Amanpour, F. Mohamadian, S. A. Tabatabai

Abstract:

With the number of accidents and fatalities in recent years can be concluded that Iran is the status of road accidents, remains in a crisis. Investigate the causes of such incidents in all countries is a necessity. By doing this research, the results of the number and type of accidents and the location of the crash will be available. It is possible to prioritize economic and rational solutions to fix the flaws in the way of short-term the results are all the more strict rules about the desire to have black spots and cursory glance at the change of but results in long-term are desired to change the system or increase the width of the path or add extra track. In general, the relationship between the analysis of the accidents and near police statistics is the number of accidents in one year. This could prove the accuracy of the analysis done.

Keywords: traffic, IHSDM, crash, modeling, Khuzestan

Procedia PDF Downloads 253
76 JREM: An Approach for Formalising Models in the Requirements Phase with JSON and NoSQL Databases

Authors: Aitana Alonso-Nogueira, Helia Estévez-Fernández, Isaías García

Abstract:

This paper presents an approach to reduce some of its current flaws in the requirements phase inside the software development process. It takes the software requirements of an application, makes a conceptual modeling about it and formalizes it within JSON documents. This formal model is lodged in a NoSQL database which is document-oriented, that is, MongoDB, because of its advantages in flexibility and efficiency. In addition, this paper underlines the contributions of the detailed approach and shows some applications and benefits for the future work in the field of automatic code generation using model-driven engineering tools.

Keywords: conceptual modelling, JSON, NoSQL databases, requirements engineering, software development

Procedia PDF Downloads 355
75 Residual Evaluation by Thresholding and Neuro-Fuzzy System: Application to Actuator

Authors: Y. Kourd, D. Lefebvre, N. Guersi

Abstract:

The monitoring of industrial processes is required to ensure operating conditions of industrial systems through automatic detection and isolation of faults. In this paper we propose a method of fault diagnosis based on neuro-fuzzy technique and the choice of a threshold. The validation of this method on a test bench "Actuator Electro DAMADICS Benchmark". In the first phase of the method, we construct a model represents the normal state of the system to fault detection. With residuals analysis generated and the choice of thresholds for signatures table. These signatures provide us with groups of non-detectable faults. In the second phase, we build faulty models to see the flaws in the system that are not located in the first phase.

Keywords: residuals analysis, threshold, neuro-fuzzy system, residual evaluation

Procedia PDF Downloads 417
74 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 157
73 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 236
72 Faults Diagnosis by Thresholding and Decision tree with Neuro-Fuzzy System

Authors: Y. Kourd, D. Lefebvre

Abstract:

The monitoring of industrial processes is required to ensure operating conditions of industrial systems through automatic detection and isolation of faults. This paper proposes a method of fault diagnosis based on a neuro-fuzzy hybrid structure. This hybrid structure combines the selection of threshold and decision tree. The validation of this method is obtained with the DAMADICS benchmark. In the first phase of the method, a model will be constructed that represents the normal state of the system to fault detection. Signatures of the faults are obtained with residuals analysis and selection of appropriate thresholds. These signatures provide groups of non-separable faults. In the second phase, we build faulty models to see the flaws in the system that cannot be isolated in the first phase. In the latest phase we construct the tree that isolates these faults.

Keywords: decision tree, residuals analysis, ANFIS, fault diagnosis

Procedia PDF Downloads 593
71 Peculiar Implications of Self Perceived Identity as Policy Tool for Transgender Recognition in Pakistan

Authors: Hamza Iftikhar

Abstract:

The research study focuses on the transgender community's gender recognition challenges. It is one of the issues for the transgender community, interacting directly with the difficulties of gender identity and the lives of these people who are facing gender disapproval from society. This study investigates the major flaws of the transgender act. The study's goal is to look into the strange implications of self-perceived identity as a policy tool for transgender recognition. This policy tool jeopardises the rights of Pakistan's indigenous gender-variant people as well as the country's legal and social framework. Qualitative research using semi structured interviews will be carried out. This study proposes developing a scheme for mainstreaming gender-variant people on the basis of the Pakistani Constitution, Supreme Court guidelines, and internationally recognised principles of law. This would necessitate a thorough review of current law using a new approach and reference point.

Keywords: transgender act, self perceived identity, gender variant, policy tool

Procedia PDF Downloads 84
70 The Effects of Modern Materials on the Moisture Resistance Performance of Architectural Buildings

Authors: Leyli Hashemi Rafsanjani, Hoda Mortazavi Alavi, Amirhossein Habibzadeh

Abstract:

At present, the atmospheric and environmental factors impose massive damages to buildings. Thus, to reduce these damages, researchers pay more attention on qualitative and quantitative characteristic of buildings materials. Condensation is one of the problems in Contemporary Sustecture Design. It could cause serious damages to the frontage, interior and structural elements of buildings. As a result, taking preventative steps to avoid condensation from occurring in buildings will help prevent avoidable and costly problems in the future. Hence, the aim of this paper is to answer the question: “Does the use of advanced materials cause the reduction of condensation formed on the walls?" In response to those flaws, this paper considered similar articles and selected 20 buildings randomly from contemporary architecture of developing countries which have been built in recent decade from 2002 to 2012, to find out the mutual relation between the usage of advanced materials and level of condensation damages. This consideration shows that by using advanced materials, we will have fewer damages.

Keywords: condensation, advanced materials, contemporary sustecture, moisture

Procedia PDF Downloads 280
69 Microstructure Study of NanoCrystalline Cellulose Obtained from Cotton Linter

Authors: Farid Amidi-Fazli

Abstract:

Problems and disadvantages of using conventional plastics are more apparent in recent years and have attracted researchers' attention. Polymers from natural resources or bio polymers represent a suitable replacement to overcome to the disadvantages of plastics. But due to the some flaws of bio polymers, using suitable filler almost seems necessary. Nanocrystalline cellulose with low cost and availability can be applied as appropriate filler. In this study nanocrystalline cellulose was produced from cotton Linter and was characterized. The cotton Linter was hydrolyzed in sulfuric acid then neutralized by the two different concentrations of NaOH. The resulted suspension was treated by ultrasound waves. Process efficiency was determined as 90%. The final product was studied using scanning electron microscopy and x-ray diffraction technique. The obtained diagram of XRD experiment confirmed that the produced material was nanocrystalline cellulose. Also percentage of crystallinity was calculated as 84% in the obtained material as well as the size of crystals. It can be said that the applied method is a rapid and easy method for the production of nanocrystalline cellulose.

Keywords: nanocrystalline cellulose, crystallinity, XRD, cotton linter

Procedia PDF Downloads 480
68 The Exploration of Psychosocial Risk and the Handling of Unsafe Acts and Misconduct

Authors: Jacquelene Swanepoel, J. C. Visagie, H. M. Linde

Abstract:

Purpose: The aim of this article is to investigate the psychosocial risk environment influencing employee behaviour, and subsequently the trust relationship between employer and employee. Design/methodology/approach: The unique nature and commonness of negative acts, such as unsafe behaviour, human errors, poor performance and negligence, also referred to as unsafe practice, are explored. A literature review is formulated to investigate the nature of negative acts or unsafe behaviour. The findings of this study are used to draw comparisons between unsafe behaviour/misconduct and accidents in the workplace and finally conclude how it should be addressed from a labour relations point of view. Findings: The results indicate comparisons between unsafe practice/misconduct and occupational injuries and accidents, as a result of system flaws, human error or psychosocial risk.

Keywords: occupational risks, unsafe practice, misconduct, organisational safety culture, ergonomics, management commitment and leadership, labour relations

Procedia PDF Downloads 334
67 Predicting Seoul Bus Ridership Using Artificial Neural Network Algorithm with Smartcard Data

Authors: Hosuk Shin, Young-Hyun Seo, Eunhak Lee, Seung-Young Kho

Abstract:

Currently, in Seoul, users have the privilege to avoid riding crowded buses with the installation of Bus Information System (BIS). BIS has three levels of on-board bus ridership level information (spacious, normal, and crowded). However, there are flaws in the system due to it being real time which could provide incomplete information to the user. For example, a bus comes to the station, and on the BIS it shows that the bus is crowded, but on the stop that the user is waiting many people get off, which would mean that this station the information should show as normal or spacious. To fix this problem, this study predicts the bus ridership level using smart card data to provide more accurate information about the passenger ridership level on the bus. An Artificial Neural Network (ANN) is an interconnected group of nodes, that was created based on the human brain. Forecasting has been one of the major applications of ANN due to the data-driven self-adaptive methods of the algorithm itself. According to the results, the ANN algorithm was stable and robust with somewhat small error ratio, so the results were rational and reasonable.

Keywords: smartcard data, ANN, bus, ridership

Procedia PDF Downloads 142
66 Exploring the Possibility of Islamic Banking as a Viable Alternative to the Conventional Banking Model

Authors: Lavan Vickneson

Abstract:

In today’s modern economy, the conventional banking model is the primary banking system used around the world. A significant problem faced by the conventional banking model is the recurring nature of banking crises. History’s record of the various banking crises, ranging from the Great Depression to the 2008 subprime mortgage crisis, is testament to the fact that banking crises continue to strike despite the preventive measures in place, such as bank’s minimum capital requirements and deposit guarantee schemes. If banking crises continue to occur despite these preventive measures, it necessarily follows that there are inherent flaws with the conventional banking model itself. In light of this, a possible alternative banking model to the conventional banking model is Islamic banking. To date, Islamic banking has been a niche market, predominantly serving Muslim investors. This paper seeks to explore the possibility of Islamic banking being more than just a niche market and playing a greater role in banking sectors around the world, by being a viable alternative to the conventional banking model.

Keywords: bank crises, conventional banking model, Islamic banking, niche market

Procedia PDF Downloads 251
65 Improvement in Properties of Ni-Cr-Mo-V Steel through Process Control

Authors: Arnab Majumdar, Sanjoy Sadhukhan

Abstract:

Although gun barrel steels are an important variety from defense view point, available literatures are very limited. In the present work, an IF grade Ni-Cr-Mo-V high strength low alloy steel is produced in Electric Earth Furnace-ESR Route. Ingot was hot forged to desired dimension with a reduction ratio of 70-75% followed by homogenization, hardening and tempering treatment. Sample chemistry, NMIR, macro and micro structural analyses were done. Mechanical properties which include tensile, impact, and fracture toughness were studied. Ultrasonic testing was done to identify internal flaws. The existing high strength low alloy Ni-Cr-Mo-V steel shows improved properties in modified processing route and heat treatment schedule in comparison to properties noted earlier for manufacturing of gun barrels. The improvement in properties seems to withstand higher explosive loads with the same amount of steel in gun barrel application.

Keywords: gun barrel steels, IF grade, chemistry, physical properties, thermal and mechanical processing, mechanical properties, ultrasonic testing

Procedia PDF Downloads 340
64 Measuring Hazard Analysis and Critical Control Points Implementation in Riyadh Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Daily provision of high quality food and hygiene to patients is a challenging goal of the healthcare. In Saudi Arabia, matters related to food safety and hygiene are regulated by the Ministry of Health (MOH) and the Saudi Food and Drugs Authority (SFDA). The purpose of this research is to discuss the food safety management inconsistencies and flaws, in particular the ones related to Hazard Analysis and Critical Control Points (HACCP) in Riyadh’s MOH hospitals. As required by law, written HACCP regulations must be implemented, and food handlers need to receive the training accordingly. However, in Saudi hospitals, this is not a requirement, and the food handlers do not need to hold training certificates in food safety or HACCP. Nowadays, the matter of food safety and hygiene have become increasingly important since the decision makers want to align these regulations with the majority of the world and to implement HACCP fully and for this purpose, the SFDA was established. 

Keywords: food safety, patients, hospitals, HACCP, Saudi Arabia

Procedia PDF Downloads 243
63 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 123
62 Maintaining a Motivated Workforce in the Malaysian Armed Forces

Authors: Gerard Lawrence

Abstract:

This paper gives an in-depth discussion on Motivation in the Malaysian Armed Forces; highlighting it as a powerful and important tool upon which the well-being of an entire (or any) organization rests. It starts with the literal definition of the word and then the psychological aspects of it detailing the intricate mechanics and fundamentals in order to accurately and systematically harness it to create a motivated workforce. It then describes the types of motivation; positive and negative, its many facets and manifestation, clearly identifying each one point by point as well as drawing examples. The paper also deals with certain controversial practices like favoritism; nepotism and provides examples of military motivation both in historic and contemporary context. It strips the current system (and its flaws) to build, nurture and maintain motivation in the future. It shows how “past practice” may not necessarily be “best practice”, by providing the building blocks necessary to move forward and cautions on the inter-relation and differences between morale and motivation. As a conclusion the paper coins a theory of working in shifts for the military and urges careful research and planning as to IF this can raise if not maintain motivation in the new era.

Keywords: armed forces, Malaysia, motivation, military psychology

Procedia PDF Downloads 411
61 LGBTQ+ Visibility: An Analysis of the Mechanisms for Safeguarding Sexual Minorities within the Common European Asylum System

Authors: Alessandra Tosi, Teia M. Rogers

Abstract:

The Common European Asylum System (CEAS) is the framework that standardises the treatment of applicants for international protection and harmonises asylum systems throughout the European Union. This paper interrogates the rules applied within the CEAS, specifically Directive 2013/33/EU of the European Parliament and of the Council of 26 June 2013, which puts forth the standards for the reception of vulnerable people applying for asylum. Absent from the definition of ‘vulnerable people’ are sexual minorities who routinely experience discrimination in reception centres and emergency accommodations. This paper undertakes an analysis of policies and legalisation of reception centres within the European Union. In confronting the flaws inherent to the system of processing asylum applications, this paper argues for the reform of the CEAS with emphasis on the inclusion of LBGTQ+ asylum seekers as vulnerable people following standards set by international human rights law.

Keywords: accommodation, asylum seekers, CEAS, Common European Asylum System, European Union, LGBTQ+, reception conditions, vulnerable people

Procedia PDF Downloads 112
60 Physical and Mechanical Phenomena Associated with Rock Failure in Brazilian Disc Specimens

Authors: Hamid Reza Nejati, Amin Nazerigivi, Ahmad Reza Sayadi

Abstract:

Failure mechanism of rocks is one of the fundamental aspects to study rock engineering stability. Rock is a material that contains flaws, initial damage, micro-cracks, etc. Failure of rock structure is largely due to tensile stress and was influenced by various parameters. In the present study, the effect of brittleness and loading rate on the physical and mechanical phenomena produced in rock during loading sequences is considered. For this purpose, Acoustic Emission (AE) technique is used to monitor fracturing process of three rock types (onyx marble, sandstone and soft limestone) with different brittleness and sandstone samples under different loading rate. The results of experimental tests revealed that brittleness and loading rate have a significant effect on the mode and number of induced fracture in rocks. An increase in rock brittleness increases the frequency of induced cracks, and the number of tensile fracture decreases when loading rate increases.

Keywords: brittleness, loading rate, acoustic emission, tensile fracture, shear fracture

Procedia PDF Downloads 429
59 Between Dark and Light: The Construction and the Exclusion of Memory of Prison Heritage in Post-Soviet Period

Authors: Guo Cyuan Deng

Abstract:

This study represents how the Soviet-occupied dark memory in Baltic countries were interpreted and represented by examining the way of management of prison heritage. Based on the formulation of a dark-tourism spectrum which Philip Stone proposed, the Patarei prison in Estonia and the Karosta prison in Latvia are compared, and it is thought that both prisons, which had experienced similar colonial history, face different tourism operation in the present. The former is being run by NGO and remain the situation of “empty" by art intervening. However, the Estonia government attempt to get the operation of museum and transform it to anti-Soviet museum in order show national identity. By contrast, the latter is being managed by private company, whom transformed the prison to "dark fun factories" by entertainment activities in order to private capital accumulation. Moreover, it is not only indicated that both prisons exclude the minority's memory, but also the flaws of dark-tourism spectrum which divide the dark and light are discussed. Finally, given the nature and function of dark heritage, the concept "le métro" is used to supplement Stone's spectrum.

Keywords: dark tourism, prison heritage, Post-Soviet, Baltic countries, national identities

Procedia PDF Downloads 284