Search results for: inherent hijacking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 656

Search results for: inherent hijacking

656 Detect QOS Attacks Using Machine Learning Algorithm

Authors: Christodoulou Christos, Politis Anastasios

Abstract:

A large majority of users favoured to wireless LAN connection since it was so simple to use. A wireless network can be the target of numerous attacks. Class hijacking is a well-known attack that is fairly simple to execute and has significant repercussions on users. The statistical flow analysis based on machine learning (ML) techniques is a promising categorization methodology. In a given dataset, which in the context of this paper is a collection of components representing frames belonging to various flows, machine learning (ML) can offer a technique for identifying and characterizing structural patterns. It is possible to classify individual packets using these patterns. It is possible to identify fraudulent conduct, such as class hijacking, and take necessary action as a result. In this study, we explore a way to use machine learning approaches to thwart this attack.

Keywords: wireless lan, quality of service, machine learning, class hijacking, EDCA remapping

Procedia PDF Downloads 14
655 Heavy Liquid Metal Coolant – the Key Safety Element in the Complex of New Nuclear Energy Technologies

Authors: A. Orlov, V. Rachkov

Abstract:

The future of Nuclear Energetics is seen in fast reactors with inherent safety working in the closed nuclear fuel cycle. The concept of inherent safety, which lies in deterministic elimination of the most severe accidents due to inherent properties of the reactor rather than through building up engineered barriers, is a cornerstone of success in ensuring safety and economic efficiency of future Nuclear Energetics. The focus of this paper is one of the key elements of inherent safety - the lead coolant of a nuclear reactor. Advantages of lead coolant for reactor application, influence on safety are reviewed. BREST-OD-300 fast reactor, currently being developed in Russia withing the “Proryv” Project utilizes lead coolant and a special set of measures and devices, called technology of lead coolant that ensures safe operation in a wide range of temperatures. Here these technological elements are reviewed, and current progress in their development is discussed.

Keywords: BREST-OD-300. , fast reactor, inherent safety, lead coolant

Procedia PDF Downloads 117
654 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 328
653 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 47
652 Evaluation of Colour Perception in Different Correlated Colour Temperature of LED Lighting

Authors: Saadet Akbay, Ayşe Nihan Avcı

Abstract:

The perception of colour is a subjective experience which depends on age, gender, race, cultural and educational backgrounds, etc. of an individual. However, colour perception is also affected by the correlated colour temperature (CCT) of a light source which is considered as one of the most fundamental quantitative lighting characteristics. This study focuses on evaluating colour perception in different CCT of light emitting diodes (LED) lighting. The aim is to compare the inherent colours with the perceived colours under two CCT of ‘warm’ (2700K), and ‘cool’ (4000K) LED lights and to understand how different CTT affect the perception of a colour. Analysis and specifications of colour attributes are made with Natural Colour System (NCS) which is an international colour communication system. The outcome of the study reveals the possible tendencies for perceived colours under different illuminance levels of LED lighting.

Keywords: colour perception, correlated colour temperature, inherent and perceived colour, LED lighting, natural colour system (NCS)

Procedia PDF Downloads 231
651 Useful Effects of Silica Nanoparticles in Ionic Liquid Electrolyte for Energy Storage

Authors: Dong Won Kim, Hye Ji Kim, Hyun Young Jung

Abstract:

Improved energy storage is inevitably needed to improve energy efficiency and to be environmentally friendly to chemical processes. Ionic liquids (ILs) can play a crucial role in addressing these needs due to inherent adjustable properties including low volatility, low flammability, inherent conductivity, wide liquid range, broad electrochemical window, high thermal stability, and recyclability. Here, binary mixtures of ILs were prepared with fumed silica nanoparticles and characterized to obtain ILs with conductivity and electrochemical properties optimized for use in energy storage devices. The solutes were prepared by varying the size and the weight percent concentration of the nanoparticles and made up 10 % of the binary mixture by weight. We report on the physical and electrochemical properties of the individual ILs and their binary mixtures.

Keywords: ionic liquid, silica nanoparticle, energy storage, electrochemical properties

Procedia PDF Downloads 176
650 Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags

Authors: Niddal Imam, Vassilios G. Vassilakis

Abstract:

After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%.

Keywords: Twitter spam detection, adversarial examples, evasion attack, adversarial concept drift, account hijacking, trending hashtag

Procedia PDF Downloads 32
649 'Spare the Rod and Spoil the Child': The Criminal Career of an Armed Robber

Authors: Mahlogonolo Stephina Thobane

Abstract:

The aim of the study upon which this article is based was “to evaluate the possibility of using criminal career research in the development and evaluation of crime control strategies, particularly for armed robberies.” The research employed a concurrent triangulation mixed-method approach where quantitative and qualitative data were collected concurrently but analysed separately through the use of SPSS and Atlas.ti respectively. Forty offenders incarcerated at six correctional centres around the Gauteng province of South Africa for robbery with aggravating circumstances were interviewed as research participants. Since the researcher had no prior information on the total number of the population, purposive sampling (i.e. snowballing) was executed to draw the sample. This research found that offenders launched their criminal career at a very young age of, 11 years, by committing petty crimes such as theft and then, as they grew older, they progressed to more serious and violent crimes such as vehicle hijacking and Cash-in-Transit (CIT) robberies. Thus, it is pivotal that those responsible for developing crime prevention policies focus on interrupting the root causes of crime in the early stages of one’s life in order to prevent continuation of delinquent behaviour from childhood to adolescence and adulthood.

Keywords: criminal career, robbery with aggravating circumstances, cash-in-transit robbery, criminal career research

Procedia PDF Downloads 413
648 Enhancing Anode Performance in Li-S Batteries via Coating with Waste Battery-Derived Materials

Authors: Mohsen Hajian Foroushani, Samane Maroufi, Rasoul Khayyam Nekouei, Veena Sahajwalla

Abstract:

Lithium (Li) metal possesses outstanding characteristics, with the highest specific capacity (3860 mAh g-1) and the lowest electrochemical potential (-3.04 V vs. SHE) among available metal anodes. The collaborative impact of Li and sulfur, featuring a specific capacity of 1670 mAh g-1, positions Li–S batteries (LSBs) as highly promising contenders for the next generation of high-energy-density batteries. However, the comprehensive commercialization of LSBs relies on addressing various challenges inherent to these batteries. One of the most formidable hurdles is the widespread issue of Li dendrite nucleation and growth on the anode surface, stemming from the inherent instability of the solid electrolyte interphase (SEI) layer. In this study, we employed a Zn-based coating derived from waste materials, significantly enhancing the performance of the symmetrical cell across various current densities. The applied coating not only improved the cyclability of the cell by more than fourfold but also reduced the charge transfer resistance from over 300 to less than 10 before cycling. Examination through SEM micrographs of both samples revealed the successful suppression of Li dendrites by the applied coating.

Keywords: Li-S batteries, Li dendrite, sustainability, Li anode

Procedia PDF Downloads 22
647 ASEAN Our Eyes: A Strategic Information Exchange Platform on Counter-Terrorism

Authors: Nila Febri Wilujeng, Helda Risman

Abstract:

Enjoying stable security within its region for the last 50 years, ASEAN nowadays contends with the global context emerging dynamically, which brings about multidimensional challenges and threats such as terrorism, radicalism, armed rebellion, hijacking, and other non-traditional threats. Dealing with these circumstances, ASEAN member states tighten its capacity by enhancing regional cooperation and strategic information exchange among ASEAN member states so-called ASEAN Our Eyes. This initiative adopted for the sake of forestalling any possible threat posed by violent extremism, radicalization, and terrorism through timely strategic information exchange among ASEAN member states. By using qualitative method, this paper will utilize regional security complex and international cooperation theories in analyzing the process to examine ASEAN Our Eyes based on its terms of reference. As a result, it portrays that ASEAN Our Eyes is able to undermine the gaps in the realm of strategic information exchange in monitoring the movement of violent extremism, radicalism, foreign terrorist fighters, and crime-terror nexus. However, it remains premature as a strategic measure to encounter those threats in the years to come.

Keywords: regional cooperation, counter-terrorism, ASEAN our eyes, strategic information exchange

Procedia PDF Downloads 170
646 Intersections and Consequences of the Epistemology and Methodology used in Equity-Related Chemistry Education Research

Authors: Vanessa R. Ralph, Kathryn N. Hosbein, Megan Y. Deshaye, Paulette Vincent-Ruz

Abstract:

The language of the statement “persistent achievement gaps between demographic groups” communicates much about the philosophies inherent to the author. In this synthesis of two flagship journals of Chemistry Education Research: Chemistry Education Research and Practice and the Journal of Chemical Education, the use and investigation of equity was examined by the language, epistemology, and methodologies of the researchers. Findings include a considerable increase in the use and investigation of equity in these journals following the years 2012 and 2020. While an increase in consciousness of equity was apparent, epistemologies were stagnated. The majority reflects a deficit-oriented perspective wherein deficits are attributed to students as a “lack of achievement” inherent to specific “demographic groups” and minimized as “gaps” rather than systemic inequities. The lack of epistemological progress may be the result of reading and citing literature within discipline-based education research, failing to acknowledge the efforts propagated for decades by equity theory advancement in disciplines of sociology and psychology. To envision liberated educational systems across the globe, one must first contend with the biases within.

Keywords: liberating education research, philosophy of research, synthesis, review

Procedia PDF Downloads 164
645 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)

Authors: Dilip Singh Sisodia, Shrish Verma

Abstract:

Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.

Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework

Procedia PDF Downloads 296
644 An Alternative Stratified Cox Model for Correlated Variables in Infant Mortality

Authors: K. A. Adeleke

Abstract:

Often in epidemiological research, introducing stratified Cox model can account for the existence of interactions of some inherent factors with some major/noticeable factors. This research work aimed at modelling correlated variables in infant mortality with the existence of some inherent factors affecting the infant survival function. An alternative semiparametric Stratified Cox model is proposed with a view to take care of multilevel factors that have interactions with others. This, however, was used as a tool to model infant mortality data from Nigeria Demographic and Health Survey (NDHS) with some multilevel factors (Tetanus, Polio, and Breastfeeding) having correlation with main factors (Sex, Size, and Mode of Delivery). Asymptotic properties of the estimators are also studied via simulation. The tested model via data showed good fit and performed differently depending on the levels of the interaction of the strata variable Z*. An evidence that the baseline hazard functions and regression coefficients are not the same from stratum to stratum provides a gain in information as against the usage of Cox model. Simulation result showed that the present method produced better estimates in terms of bias, lower standard errors, and or mean square errors.

Keywords: stratified Cox, semiparametric model, infant mortality, multilevel factors, cofounding variables

Procedia PDF Downloads 527
643 The Desire to Know: Arnold’s Contribution to a Psychological Conceptualization of Academic Motivation

Authors: F. Ruiz-Fuster

Abstract:

Arnold’s redefinition of human motives can sustain a psychology of education which emphasizes the beauty of knowledge and the exercise of intellectual functions. Thus, education instead of focusing on skills and learning by doing would be centered on ‘the widest reaches of the human spirit’. One way to attain it is by developing children’s inherent interest. Arnold takes into account the fact that the desire to know is the inherent interest which leads students to explore and learn. She also emphasizes the need of exercising human functions as thinking, judging and reasoning. According to Arnold, the influence of psychological theories of motivation in education has derived in considering that all learning and school tasks should derive from children’s needs and impulses. The desire to know and the curiosity have not been considered as basic and active as any instinctive drive or basic need, so there has been an attempt to justify and understand how biological drives guide student’s learning. However, understanding motives and motivation not as a drive, an instinct or an impulse guided by our basic needs, but as a want that leads to action can help to understand, from a psychological perspective, how teachers can motivate students to learn, strengthening their desire and interest to reason and discover the whole new world of knowledge.

Keywords: academic motivation, interests, desire to know, educational psychology, intellectual functions

Procedia PDF Downloads 122
642 Identity (Mis)Representation and Ideological Struggles in Discourses on Boko Haram in Nigeria

Authors: Temitope Ogungbemi

Abstract:

Jama'atu Ahlis Sunna Lidda'awati wal-Jihad (also called Boko Haram) in the North-East of Nigeria has facilitated ideological binarity in discourses on the crisis. Since its proliferation, media representation of the crisis has facilitated identity contamination and ideological struggle through which other critical issues, such as religious intolerance, ethnic diversity and other forms of class conflict in the Nigerian state, are brought to public notice. Though Boko Haram insurgency is ideological laden, the manifestation of the inherent ideologies requires extensive scholarly attention in order deconstruct the veiled ideologies. Therefore, the thrust of this study is to critically investigate identity (mis)representation as a basis for ideological mapping in discourses on Boko Haram in Nigeria, adopting critical discourse analytical tools supported with insights from systemic functional linguistics and critical discourse analysis. The data for this study consist of articles on Boko Haram in Nigerian newspapers published in English. The data selection is purposive and aimed at responding to challenges that are inherent in Nigeria's multifaithism and multiculturalism, and their effects on the construction of narratives on Boko Haram. The study reveals that identity manipulation is a constructive device for ideological mapping, realised through labeling, agency activation, and transitivity. Identity representation in discourses on Boko Haram depicted four dichotomous binarities using exclusion, generalisation, contrasting and attribution.

Keywords: identity representation, ideology, Boko Haram, newspapers

Procedia PDF Downloads 293
641 Web Proxy Detection via Bipartite Graphs and One-Mode Projections

Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo

Abstract:

With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.

Keywords: bipartite graph, one-mode projection, clustering, web proxy detection

Procedia PDF Downloads 216
640 The Meaning Structures of Political Participation of Young Women: Preliminary Findings in a Practical Phenomenology Study

Authors: Amanda Aliende da Matta, Maria del Pilar Fogueiras Bertomeu, Valeria de Ormaechea Otalora, Maria Paz Sandin Esteban, Miriam Comet Donoso

Abstract:

This communication presents the preliminary emerging themes in a research on political participation of young women. The study follows a qualitative methodology; in particular, the applied hermeneutic phenomenological method, and the general objective of the research is to give an account of the experience of political participation as young women. The study participants are women aged 18 to 35 who have experience in political participation. The techniques of data collection are the descriptive story and the phenomenological interview. With respect to the first methodological steps, these have been: 1) collect and select stories of lived experience in political participation, 2) select descriptions of lived experience (DLEs) in political participation of the chosen stories, 3) to prepare phenomenological interviews from the selected DLEs, 4) to conduct phenomenological thematic analysis (PTA) of the DLEs. We have so far initiated the PTA on 5 vignettes. Hermeneutic phenomenology as a research approach is based on phenomenological philosophy and applied hermeneutics. Phenomenology is a descriptive philosophy of pure experience and essences, through which we seek to capture an experience at its origins without categorizing, interpreting or theorizing it. Hermeneutics, on the other hand, may be defined as a philosophical current that can be applied to data analysis. Max Van Manen wrote that hermeneutic phenomenology is a method of abstemious reflection on the basic structures of the lived experience of human existence. In hermeneutic phenomenology we focus, then, on the way we experience “things” in the first person, seeking to capture the world exactly as we experience it, not as we categorize or conceptualize it. In this study, the empirical methods used were: Lived experience description (written) and conversational interview. For these short stories, participants were asked: “What was your lived experience of participation in politics as a young woman? Can you tell me any stories or anecdotes that you think exemplify or typify your experience?”. The questions were accompanied by a list of guidelines for writing descriptive vignettes. And the analytical method was PTA. Among the provisional results, we found preliminary emerging themes, which could in the advance of the investigation result in meaning structures of political participation of young women. They are the following: - Complicity may be inherent/essential in political participation as a young woman; - Feelings may be essential/inherent in political participation as a young woman; - Hope may be essential in authentic political participation as a young woman; - Frustration may be essential in authentic political participation as a young woman; - Satisfaction may be essential in authentic political participation as a young woman; - There may be tension between individual/collective inherent/essential in political participation as a young woman; - Political participation as a young woman may include moments of public demonstration.

Keywords: applied hermeneutic phenomenology, hermeneutics, phenomenology, political participation

Procedia PDF Downloads 48
639 Defect Correlation of Computed Tomography and Serial Sectioning in Additively Manufactured Ti-6Al-4V

Authors: Bryce R. Jolley, Michael Uchic

Abstract:

This study presents initial results toward the correlative characterization of inherent defects of Ti-6Al-4V additive manufacture (AM). X-Ray Computed Tomography (CT) defect data are compared and correlated with microscopic photographs obtained via automated serial sectioning. The metal AM specimen was manufactured out of Ti-6Al-4V virgin powder to specified dimensions. A post-contour was applied during the fabrication process with a speed of 1050 mm/s, power of 260 W, and a width of 140 µm. The specimen was stress relief heat-treated at 16°F for 3 hours. Microfocus CT imaging was accomplished on the specimen within a predetermined region of the build. Microfocus CT imaging was conducted with parameters optimized for Ti-6Al-4V additive manufacture. After CT imaging, a modified RoboMet. 3D version 2 was employed for serial sectioning and optical microscopy characterization of the same predetermined region. Automated montage capture with sub-micron resolution, bright-field reflection, 12-bit monochrome optical images were performed in an automated fashion. These optical images were post-processed to produce 2D and 3D data sets. This processing included thresholding and segmentation to improve visualization of defect features. The defects observed from optical imaging were compared and correlated with the defects observed from CT imaging over the same predetermined region of the specimen. Quantitative results of area fraction and equivalent pore diameters obtained via each method are presented for this correlation. It is shown that Microfocus CT imaging does not capture all inherent defects within this Ti-6Al-4V AM sample. Best practices for this correlative effort are also presented as well as the future direction of research resultant from this current study.

Keywords: additive manufacture, automated serial sectioning, computed tomography, nondestructive evaluation

Procedia PDF Downloads 108
638 Design of a Fuzzy Expert System for the Impact of Diabetes Mellitus on Cardiac and Renal Impediments

Authors: E. Rama Devi Jothilingam

Abstract:

Diabetes mellitus is now one of the most common non communicable diseases globally. India leads the world with largest number of diabetic subjects earning the title "diabetes capital of the world". In order to reduce the mortality rate, a fuzzy expert system is designed to predict the severity of cardiac and renal problems of diabetic patients using fuzzy logic. Since uncertainty is inherent in medicine, fuzzy logic is used in this research work to remove the inherent fuzziness of linguistic concepts and uncertain status in diabetes mellitus which is the prime cause for the cardiac arrest and renal failure. In this work, the controllable risk factors "blood sugar, insulin, ketones, lipids, obesity, blood pressure and protein/creatinine ratio" are considered as input parameters and the "the stages of cardiac" (SOC)" and the stages of renal" (SORD) are considered as the output parameters. The triangular membership functions are used to model the input and output parameters. The rule base is constructed for the proposed expert system based on the knowledge from the medical experts. Mamdani inference engine is used to infer the information based on the rule base to take major decision in diagnosis. Mean of maximum is used to get a non fuzzy control action that best represent possibility distribution of an inferred fuzzy control action. The proposed system also classifies the patients with high risk and low risk using fuzzy c means clustering techniques so that the patients with high risk are treated immediately. The system is validated with Matlab and is used as a tracking system with accuracy and robustness.

Keywords: Diabetes mellitus, fuzzy expert system, Mamdani, MATLAB

Procedia PDF Downloads 256
637 Experimental Study of Complete Loss of Coolant Flow (CLOF) Test by System–Integrated Modular Advanced Reactor Integral Test Loop (SMART-ITL) with Passive Residual Heat Removal System (PRHRS)

Authors: Jin Hwa Yang, Hwang Bae, Sung Uk Ryu, Byong Guk Jeon, Sung Jae Yi, Hyun Sik Park

Abstract:

Experimental studies using a large-scale thermal-hydraulic integral test facility, System–integrated Modular Advanced Reactor Integral Test Loop (SMART-ITL), have been carried out to validate the performance of the prototype, SMART. After Fukushima accident, the passive safety systems have been dealt as important designs for retaining of nuclear safety. One of the concerned scenarios for evaluating the passive safety system is a Complete Loss of Coolant Flow (CLOF). The flowrate of coolant in the primary system is maintained by Reactor Coolant Pump (RCP). When the supply of electric power of RCP is shut off, the flowrate of coolant decreases sharply, and the temperature of the coolant increases rapidly. Therefore, the reactor trip signal is activated to prevent the over-heating of the core. In this situation, Passive Residual Heat Removal System (PRHRS) plays a significant role to assure the soundness of the SMART. The PRHRS using a two-phase natural circulation is a passive safety system in the SMART to eliminate the heat of steam generator in the secondary system with heat exchanger submarined in the Emergency Cooling Tank (ECT). As the RCPs continue to coast down, inherent natural circulation in the primary system transfers heat to the secondary system. The transferred heat is removed by PRHRS in the secondary system. In this paper, the progress of the CLOF accident is described with experimental data of transient condition performed by SMART-ITL. Finally, the capability of passive safety system and inherent natural circulation will be evaluated.

Keywords: CLOF, natural circulation, PRHRS, SMART-ITL

Procedia PDF Downloads 411
636 Microwave Sanitization of Polyester Fabrics

Authors: K. Haggag, M. Salama, H. El-Sayed

Abstract:

Polyester fabrics were sanitized by exposing them to vaporized water under the influence of conventional heating or microwave irradiation. Hydrogen peroxide was added the humid sanitizing environment as a disinfectant. The said sanitization process was found to be effective towards two types of bacteria, namely Escherichia coli ATCC 2666 (G –ve) and Staphylococcus aureus ATCC 6538 (G +ve). The effect of the sanitization process on some of the inherent properties of polyester fabrics was monitored.

Keywords: polyester, fabric, sanitization, microwave, bacteria

Procedia PDF Downloads 339
635 Mannosidase Alpha Class 1B Member 1 Targets F Severe Acute Respiratory Syndrome Coronavirus 2 Spike Protein and Ebola Virus Glycoprotein to Endoplasmic Reticulum-To-Lysosome-Associated Degradation by Micro-Endoplasmic Reticulum-Phagy

Authors: Yong-Hui Zheng

Abstract:

Viruses hijack host machineries to propagate and spread, which disrupts cellular homeostasis and activates various counteractive mechanisms. Infection of enveloped viruses is dependent on their fusion proteins, which bind to viral receptors to allow virus entry into cells. Fusion proteins are glycoproteins and expressed in the endoplasmic reticulum (ER) by hijacking the secretory pathway. Previously, we reported that Zaire ebolavirus (EBOV)-glycoprotein (GP) expression induces ER stress, and EBOV-GP is targeted by the calnexin cycle to macro-ER-phagy for degradation. We now report that expression of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2/SARS2)-spike (S) protein also causes ER stress, and its expression is strongly downregulated by mannosidase alpha class 1B member 1 (MAN1B1), a class I α-mannosidase from the ER. MAN1B1 co-localizes with SARS2-S in the ER, and its downregulation of SARS2-S is blocked by inhibitors targeting lysosomes and autophagy, but not proteasomes, indicating SARS2-S degradation by autolysosomes. Notably, the SARS2-S degradation does not require the core autophagy machinery including ATG3, ATG5, ATG7, and phosphatidylinositol 3-kinase catalytic subunit type 3 (PI3KC3)/vacuolar protein sorting 34 (VPS34), and instead, it requires Beclin 1 (BECN1), a core component in the PI3KC3 complex. In addition, MAN1B1 does not trigger SARS2-S polyubiquitination, and consistently, the SARS2-S degradation does not require the autophagy receptor sequestosome 1 (SQSTM1)/p62. MAN1B1 also downregulates EBOV-GP similarly, but this degradation does not require BECN1. Collectively, we conclude that MAN1B1 downregulates viral fusions by micro-ER-phagy, and importantly, we have identified BECN1-dependent and BECN1-independent mechanisms for micro-ER-phagy.

Keywords: Micro-ER-phagy, reticulophagy, fusion proteins, ER stress

Procedia PDF Downloads 44
634 Microwave-Assisted Eradication of Wool

Authors: M. Salama, K. Haggag, H. El-Sayed

Abstract:

An environmentally and ecologically acceptable method for eradication of wool fabrics based on microwave irradiation (MWI) was described. The process would be a suitable alternative for mothproofing of wool using toxic degradative chemical or biological methods. The effect of microwave irradiation and exposure time on the extent of eradication of wool fabrics from moth larvae was monitored. The inherent properties of the MW-irradiated wool fabrics; viz. tensile properties, alkali solubility, and yellowing index, were not adversely altered.

Keywords: microwave, wool, fabric, moth, eradication, resistance

Procedia PDF Downloads 422
633 Democratization, Market Liberalization and the Raise of Vested Interests and Its Impacts on Anti-Corruption Reform in Indonesia

Authors: Ahmad Khoirul Umam

Abstract:

This paper investigates the role of vested interests and its impacts on anti-corruption agenda in Indonesia following the collapse of authoritarian regime in 1998. A pervasive and rampant corruption has been believed as the main cause of the state economy’s fragility. Hence, anti-corruption measures were implemented by applying democratization and market liberalization since the establishment of a consolidated democracy which go hand in hand with a liberal market economy is convinced to be an efficacious prescription for effective anti-corruption. The reform movement has also mandated the establishment of the independent, neutral and professional special anti-corruption agency namely Corruption Eradication Commission (KPK) to more intensify the fight against the systemic corruption. This paper will examine whether these anti-corruption measures have been effective to combat corruption, and investigate to what extend have the anti-corruption efforts, especially those conducted by KPK, been impeded by the emergence of a nexus of vested interests as the side-effect of democratization and market liberalization. Based on interviews with key stakeholders from KPK, other law enforcement agencies, government, prominent scholars, journalists and NGOs in Indonesia, it is found that since the overthrow of Soeharto, anti-corruption movement in the country have become more active and serious. After gradually winning the hearth of people, KPK successfully touched the untouchable corruption perpetrators who were previously protected by political immunity, legal protection and bureaucratic barriers. However, these changes have not necessarily reduced systemic and structural corruption practices. Ironically, intensive and devastating counterattacks were frequently posed by the alignment of business actors, elites of political parties, government, and also law enforcement agencies by hijacking state’s instruments to make KPK deflated, powerless, and surrender. This paper concludes that attempts of democratization, market liberalization and the establishment of anti-corruption agency may have helped Indonesia to reduce corruption. However, it is still difficult to imply that such anti-corruption measures have fostered the more effective anti-corruption works in the newly democratized and weakly regulated liberal economic system.

Keywords: vested interests, democratization, market liberalization, anti-corruption, Indonesia

Procedia PDF Downloads 196
632 Health Hazards of Performance Enhancing Drugs

Authors: Austin Oduor Otieno

Abstract:

There is an ingrained belief that the use of performance-enhancing drugs by athletes enable them to perform better. While this has been found to be truth, it also raises ethical and health issues. This paper analyzes the health hazards associated with performance enhancing drugs. It seeks to achieve this through the analysis of different academic journals as well as publications on the relationship between doping in sports and health. It concludes that there are inherent health hazards associated with the use of performance-enhancing drugs as they affect the physical and psychological health and wellbeing of a user (athlete).

Keywords: doping, health hazards, athletes, drugs

Procedia PDF Downloads 126
631 Social Media and Counseling: Opportunities, Risks and Ethical Considerations

Authors: Kyriaki G. Giota, George Kleftaras

Abstract:

The purpose of this article is to briefly review the opportunities that social media presents to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.

Keywords: social media, counseling, risks, ethics

Procedia PDF Downloads 386
630 Investigation of Aerodynamic and Design Features of Twisting Tall Buildings

Authors: Sinan Bilgen, Bekir Ozer Ay, Nilay Sezer Uzol

Abstract:

After decades of conventional shapes, irregular forms with complex geometries are getting more popular for form generation of tall buildings all over the world. This trend has recently brought out diverse building forms such as twisting tall buildings. This study investigates both the aerodynamic and design features of twisting tall buildings through comparative analyses. Since twisting a tall building give rise to additional complexities related with the form and structural system, lateral load effects become of greater importance on these buildings. The aim of this study is to analyze the inherent characteristics of these iconic forms by comparing the wind loads on twisting tall buildings with those on their prismatic twins. Through a case study research, aerodynamic analyses of an existing twisting tall building and its prismatic counterpart were performed and the results have been compared. The prismatic twin of the original building were generated by removing the progressive rotation of its floors with the same plan area and story height. Performance-based measures under investigation have been evaluated in conjunction with the architectural design. Aerodynamic effects have been analyzed by both wind tunnel tests and computational methods. High frequency base balance tests and pressure measurements on 3D models were performed to evaluate wind load effects on a global and local scale. Comparisons of flat and real surface models were conducted to further evaluate the effects of the twisting form without façade texture contribution. Comparisons highlighted that, the twisting form under investigation shows better aerodynamic behavior both for along wind but particularly for across wind direction. Compared to the prismatic counterpart; twisting model is superior on reducing vortex-shedding dynamic response by disorganizing the wind vortices. Consequently, despite the difficulties arisen from inherent complexity of twisted forms, they could still be feasible and viable with their attractive images in the realm of tall buildings.

Keywords: aerodynamic tests, motivation for twisting, tall buildings, twisted forms, wind excitation

Procedia PDF Downloads 202
629 Investigating Software Engineering Challenges in Game Development

Authors: Fawad Zaidi

Abstract:

This paper discusses a variety of challenges and solutions involved with creating computer games and the issues faced by the software engineers working in this field. This review further investigates the articles coverage of project scope and the problem of feature creep that appears to be inherent with game development. The paper tries to answer the following question: Is this a problem caused by a shortage, or bad software engineering practices, or is this outside the control of the software engineering component of the game production process?

Keywords: software engineering, computer games, software applications, development

Procedia PDF Downloads 447
628 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 46
627 Perceptual Image Coding by Exploiting Internal Generative Mechanism

Authors: Kuo-Cheng Liu

Abstract:

In the perceptual image coding, the objective is to shape the coding distortion such that the amplitude of distortion does not exceed the error visibility threshold, or to remove perceptually redundant signals from the image. While most researches focus on color image coding, the perceptual-based quantizer developed for luminance signals are always directly applied to chrominance signals such that the color image compression methods are inefficient. In this paper, the internal generative mechanism is integrated into the design of a color image compression method. The internal generative mechanism working model based on the structure-based spatial masking is used to assess the subjective distortion visibility thresholds that are visually consistent to human eyes better. The estimation method of structure-based distortion visibility thresholds for color components is further presented in a locally adaptive way to design quantization process in the wavelet color image compression scheme. Since the lowest subband coefficient matrix of images in the wavelet domain preserves the local property of images in the spatial domain, the error visibility threshold inherent in each coefficient of the lowest subband for each color component is estimated by using the proposed spatial error visibility threshold assessment. The threshold inherent in each coefficient of other subbands for each color component is then estimated in a local adaptive fashion based on the distortion energy allocation. By considering that the error visibility thresholds are estimated using predicting and reconstructed signals of the color image, the coding scheme incorporated with locally adaptive perceptual color quantizer does not require side information. Experimental results show that the entropies of three color components obtained by using proposed IGM-based color image compression scheme are lower than that obtained by using the existing color image compression method at perceptually lossless visual quality.

Keywords: internal generative mechanism, structure-based spatial masking, visibility threshold, wavelet domain

Procedia PDF Downloads 214